Skip to content

Commit fc020d9

Browse files
author
isemona
committed
added GH links to oidc and scim frontmatter
1 parent eae7c5b commit fc020d9

File tree

2 files changed

+7
-1
lines changed

2 files changed

+7
-1
lines changed

_source/_posts/2023-07-28-oidc_workshop.md

+4
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,11 @@ tweets:
1212
- ""
1313
image: blog/oidc_workshop/social.jpg
1414
type: awareness
15+
github: https://github.com/oktadev/okta-enterprise-ready-workshops/tree/oidc-workshop-complete
16+
changelog:
17+
- 2024-03-07: Add completed GH branch to frontmatter
1518
---
19+
1620
This workshop is part of our Enterprise Readiness Workshop series.
1721

1822
In this workshop, you will be wearing the hat of a SaaS developer who will up-level his/her app to allow users (from your big enterprise customers) to log on using their own company credentials without providing a password directly to your app. When any enterprise customer considers buying your software to enhance their employees' productivity, their IT and security teams want to make sure employees can access your app securely. As a developer, you'd prefer not to rebuild large portions of your authentication flow for every new customer. Fortunately, the OpenID Connect standard solves both of these problems! By adding OpenID Connect (OIDC) support to your app, you can meet the identity security needs of every enterprise organization that uses an OIDC-compatible identity provider.

_source/_posts/2023-07-28-scim-workshop.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,15 @@ tweets:
1212
- ""
1313
image: blog/scim-workshop/social.jpg
1414
type: awareness
15+
github: https://github.com/oktadev/okta-enterprise-ready-workshops/tree/scim-workshop-complete
1516
changelog:
1617
- 2023-08-21: Added a Supplemental section at the end
1718
- 2023-08-28: Corrected hyperlink to OIDC Workshop blog, provided more clarity in accessing the Prisma web interface. Added a disclaimer for using API tokens.
1819
- 2023-08-30: Improved instructions for bearer auth check
1920
- 2023-09-15: Corrected url typos on SCIM diagram
2021
- 2023-09-19: Clarified instructions and changed the Bearer auth handling to the SCIM route definition
2122
- 2023-09-21: Removed auth0 logo as they don't support SCIM at this time
23+
- 2024-03-07: Add completed GH branch to frontmatter
2224
---
2325

2426
Hello SaaS developers! You sell your software to technologically mature enterprises, and they expect it to interface seamlessly with all their other tools. In our [Enterprise-Ready Workshop on OpenID Connect](/blog/2023/07/28/oidc_workshop), you learned how to solve part of this problem, by creating user accounts in your application for your customers' employees whenever they log in.
@@ -88,7 +90,7 @@ Have you seen these endpoints before? Are they familiar to you? Perhaps you've b
8890

8991
Before we begin, please note that this implementation of SCIM is meant to be vendor agnostic, and I will be adding notes on how Okta implements this standard throughout the demo. More importantly, we'll refer to [the SCIM 2.0 spec](https://datatracker.ietf.org/doc/html/rfc7644) to build the server.
9092

91-
## Set Up the sample React and Express application
93+
## Set up the sample React and Express application
9294

9395
Follow [these setup instructions](/blog/2023/07/27/enterprise-ready-getting-started) to install and run the Todo sample app. Run `node -v` and make sure you have Node version 18 or newer.
9496

0 commit comments

Comments
 (0)