Skip to content

added GH links to oidc and scim frontmatter #1492

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 7 commits into from
Mar 7, 2024
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions _source/_posts/2023-07-28-oidc_workshop.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,11 @@ tweets:
- ""
image: blog/oidc_workshop/social.jpg
type: awareness
github: https://github.com/oktadev/okta-enterprise-ready-workshops/tree/oidc-workshop-complete
changelog:
- 2024-03-07: Add completed GH branch to frontmatter
---

This workshop is part of our Enterprise Readiness Workshop series.

In this workshop, you will be wearing the hat of a SaaS developer who will up-level his/her app to allow users (from your big enterprise customers) to log on using their own company credentials without providing a password directly to your app. When any enterprise customer considers buying your software to enhance their employees' productivity, their IT and security teams want to make sure employees can access your app securely. As a developer, you'd prefer not to rebuild large portions of your authentication flow for every new customer. Fortunately, the OpenID Connect standard solves both of these problems! By adding OpenID Connect (OIDC) support to your app, you can meet the identity security needs of every enterprise organization that uses an OIDC-compatible identity provider.
Expand Down
4 changes: 3 additions & 1 deletion _source/_posts/2023-07-28-scim-workshop.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,13 +12,15 @@ tweets:
- ""
image: blog/scim-workshop/social.jpg
type: awareness
github: https://github.com/oktadev/okta-enterprise-ready-workshops/tree/scim-workshop-complete
changelog:
- 2023-08-21: Added a Supplemental section at the end
- 2023-08-28: Corrected hyperlink to OIDC Workshop blog, provided more clarity in accessing the Prisma web interface. Added a disclaimer for using API tokens.
- 2023-08-30: Improved instructions for bearer auth check
- 2023-09-15: Corrected url typos on SCIM diagram
- 2023-09-19: Clarified instructions and changed the Bearer auth handling to the SCIM route definition
- 2023-09-21: Removed auth0 logo as they don't support SCIM at this time
- 2024-03-07: Add completed GH branch to frontmatter
---

Hello SaaS developers! You sell your software to technologically mature enterprises, and they expect it to interface seamlessly with all their other tools. In our [Enterprise-Ready Workshop on OpenID Connect](/blog/2023/07/28/oidc_workshop), you learned how to solve part of this problem, by creating user accounts in your application for your customers' employees whenever they log in.
Expand Down Expand Up @@ -88,7 +90,7 @@ Have you seen these endpoints before? Are they familiar to you? Perhaps you've b

Before we begin, please note that this implementation of SCIM is meant to be vendor agnostic, and I will be adding notes on how Okta implements this standard throughout the demo. More importantly, we'll refer to [the SCIM 2.0 spec](https://datatracker.ietf.org/doc/html/rfc7644) to build the server.

## Set Up the sample React and Express application
## Set up the sample React and Express application

Follow [these setup instructions](/blog/2023/07/27/enterprise-ready-getting-started) to install and run the Todo sample app. Run `node -v` and make sure you have Node version 18 or newer.

Expand Down
Loading