Skip to content

Commit 28384b9

Browse files
authored
Merge pull request #1384 from redis/DOC-5029
RC Rebrand Phase 3: CIDR allow list and Top-level SAML page
2 parents 1a3c3a1 + 7b17afe commit 28384b9

28 files changed

+35
-75
lines changed

content/operate/rc/security/access-control/saml-sso/_index.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You can also initiate single sign-on from the [Redis Cloud console](https://clou
4444

4545
1. From the Redis Cloud console's [sign-in screen](https://cloud.redis.io/#/login), select **SSO**.
4646

47-
{{<image filename="images/rc/button-sign-in-sso.png" width="150px" alt="Sign in with SSO button">}}
47+
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}
4848

4949
1. Enter the email address associated with your SAML user account.
5050

@@ -100,7 +100,7 @@ Before you set up SAML SSO in Redis Cloud, you must verify that you own the doma
100100

101101
{{<image filename="images/rc/saml-button-add-domain.png" width="120px" alt="Add domain button">}}
102102

103-
1. Enter the domain name and select {{<image filename="images/rc/saml-button-confirm.png#no-click" width="20px" alt="The confirm domain button" class="inline">}} to save it, or select {{<image filename="images/rc/saml-button-cancel.png#no-click" width="20px" alt="The cancel button" class="inline">}} to cancel.
103+
1. Enter the domain name and select {{<image filename="images/rc/saml-button-confirm.png#no-click" width="20px" alt="Confirm domain" class="inline">}} to save it, or select {{<image filename="images/rc/saml-button-cancel.png#no-click" width="20px" alt="Cancel" class="inline">}} to cancel.
104104

105105
{{<image filename="images/rc/saml-enter-domain.png" width="80%" alt="Enter domain name in the Domain field.">}}
106106

@@ -110,12 +110,10 @@ Before you set up SAML SSO in Redis Cloud, you must verify that you own the doma
110110

111111
We'll check the domain's DNS records for the provided TXT record. If the TXT record does not exist or we can't resolve your domain, we won't be able to verify the domain and users with that domain won't be able to sign in using SAML SSO.
112112

113-
Select {{<image filename="images/rc/saml-button-delete-domain.png#no-click" width="25px" alt="The delete domain button" class="inline">}} to delete a domain if it was added by mistake.
113+
Select {{<image filename="images/rc/saml-button-delete-domain.png#no-click" width="25px" alt="delete domain" class="inline">}} to delete a domain if it was added by mistake.
114114

115115
If we find the TXT record, the domain's status will change to **Verified**.
116116

117-
{{<image filename="images/rc/saml-domain-verified.png" width="80%" alt="The Manage domain bindings panel, with a verified domain">}}
118-
119117
You can select **Add domain** to add another domain.
120118

121119
1. Select **Close** to close the domain binding panel.
@@ -300,12 +298,10 @@ To see and interact with the Redis Cloud account in the **Unlinked accounts** li
300298

301299
1. Select **Link account**.
302300

303-
{{<image filename="images/rc/saml/button-saml-link-account.png" alt="The Link Account button">}}
301+
{{<image filename="images/rc/saml/button-saml-link-account.png" alt="The Link Account button" width=150px >}}
304302

305303
1. In the **Convert existing users** dialog, select **Confirm conversion** to finish linking the accounts.
306304

307-
{{<image filename="images/rc/saml/popup-saml-convert-users.png" alt="The Convert users popup">}}
308-
309305
## Deactivate SAML SSO
310306

311307
Before you can deactivate SAML SSO for an account, you must sign in to the account as a local (non-SAML) user with the owner role assigned.

content/operate/rc/security/access-control/saml-sso/saml-integration-auth0.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -175,16 +175,14 @@ Replace `ID` so it matches the `AssertionConsumerService` Location URL ID (the c
175175
176176
{{<image filename="images/rc/saml/sm_saml_8.png" >}}
177177
178-
A popup appears, explaining that, in order to test the SAML connection, that we need to login with credentials of a user defined in Auth0.
179-
180-
{{<image filename="images/rc/saml/sm_saml_9.png" >}}
178+
A popup appears, explaining that, in order to test the SAML connection, we need to login with credentials of a user defined in Auth0. Select **Continue** to go to the Auth0 login screen.
181179
182180
1. The Auth0 login screen appears. Enter the credentials and select **Sign In**.
183181
184182
{{<image filename="images/rc/saml/auth0_saml_12.png" >}}
185183
186-
1. If the test has succeeded, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account. To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.
184+
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.
187185
188-
1. Enter your SAML email and select **Login**.
186+
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.
189187
190-
You have successfully configured SAML as an identification provider.
188+
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}

content/operate/rc/security/access-control/saml-sso/saml-integration-aws-identity-center.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -138,18 +138,14 @@ The final step in our SAML integration with AWS IAM identity Center is to activa
138138

139139
{{<image filename="images/rc/saml/sm_saml_8.png" >}}
140140

141-
A logout notification screen displays, letting you know that you are redirected to AWS IAM Identity Center's login screen.
142-
143-
{{<image filename="images/rc/saml/sm_saml_9.png" >}}
141+
A logout notification screen displays, letting you know that you will be redirected to your identity provider. Select **Continue** to go to the AWS IAM Identity Center's login screen.
144142

145143
1. Enter your AWS IAM Identity Center credentials.
146144

147145
{{<image filename="images/rc/saml/aws_iam_identity_center_saml_18.png" >}}
148146

149-
1. If everything is configured correctly, you should get a **SAML activation succeeded** message. From this point forward, users need to click **SSO** to sign in to the Redis Cloud console.
150-
151-
{{<image filename="images/rc/saml/aws_iam_identity_center_saml_19.png" >}}
147+
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.
152148

153-
A message displays, stating that your local user is now converted to a SAML user. Select **Confirm**.
149+
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.
154150

155-
You have successfully configured AWS IAM Identity Center as an identification provider.
151+
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}

content/operate/rc/security/access-control/saml-sso/saml-integration-azure-ad.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -163,23 +163,17 @@ Make sure the **Namespace** field is empty when modifying these claims.
163163

164164
{{<image filename="images/rc/saml/sm_saml_8.png" >}}
165165

166-
1. A popup appears, explaining that you must log in with the credentials of a Microsoft Entra user to test the SAML connection.
167-
168-
{{<image filename="images/rc/saml/sm_saml_9.png" >}}
166+
1. A popup appears, explaining that you must log in with the credentials of a Microsoft Entra user to test the SAML connection. Select **Continue** to go to the Microsoft login screen.
169167

170168
1. The Microsoft login screen will appear. Enter the credentials and click **Sign In**.
171169

172170
{{<image filename="images/rc/saml/ad_saml_19.png" >}}
173171

174-
1. If the test has succeeded, you will see the following screen. Your local account is now considered a SAML account. To log in to Redis Cloud console going forward, select **Sign in with SSO**.
175-
176-
{{<image filename="images/rc/saml/sm_saml_11.png" >}}
177-
178-
1. Enter your SAML email and click **Login**.
172+
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.
179173

180-
{{<image filename="images/rc/saml/ad_saml_21.png" >}}
174+
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.
181175

182-
You have successfully configured SAML as an identification provider.
176+
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}
183177

184178
## Claim conditions and user groups
185179

content/operate/rc/security/access-control/saml-sso/saml-integration-google.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -163,10 +163,8 @@ A logout notification screen displays, letting you know that you are redirected
163163

164164
{{<image filename="images/rc/saml/google_workspace_saml_18.png" >}}
165165

166-
1. If everything is configured correctly, you should get a **SAML activation succeeded** message. From this point forward, users need to click **SSO** to log in to the Redis Cloud console.
166+
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.
167167

168-
{{<image filename="images/rc/saml/google_workspace_saml_19.png" >}}
168+
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.
169169

170-
A message displays, stating that your local user is now converted to a SAML user. Select **Confirm**.
171-
172-
You have successfully configured Google Workspace as an identification provider.
170+
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}

content/operate/rc/security/access-control/saml-sso/saml-integration-okta-generic.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -253,24 +253,14 @@ To activate SAML, you must have a local user (or social sign-on user) with the *
253253

254254
{{<image filename="images/rc/saml/sm_saml_8.png" >}}
255255

256-
A popup appears, stating that to test the SAML connection, you need to log in with Okta credentials of the user defined in the Redis Cloud group. This user is part of the group to which you assigned the Redis Cloud application.
257-
258-
{{<image filename="images/rc/saml/sm_saml_9.png" >}}
256+
A popup appears, stating that to test the SAML connection, you need to log in with Okta credentials of the user defined in the Redis Cloud group. This user is part of the group to which you assigned the Redis Cloud application. Select **Continue** to go to the Okta login screen.
259257

260258
1. The Okta login screen appears. Enter the credentials and select **Sign In**.
261259

262260
{{<image filename="images/rc/saml/okta_saml_app_int_14.png" >}}
263261

264-
1. If the test succeeds, your local account is now considered a SAML account. To log in to Redis Cloud console going forward, select **Sign in with SSO**.
265-
266-
{{<image filename="images/rc/saml/sm_saml_11.png" >}}
267-
268-
1. Enter your SAML email and click **Login**.
269-
270-
{{<image filename="images/rc/saml/okta_saml_app_int_15.png" >}}
271-
272-
1. If only one user is defined in Redis Cloud console, you get a popup window where you select **Confirm** to convert the local user to a SAML user. Consider setting up one more local user other than a SAML user.
262+
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.
273263

274-
{{<image filename="images/rc/saml/okta_saml_app_int_16.png" >}}
264+
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.
275265

276-
1. You have successfully configured SAML as an identity provider.
266+
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}

content/operate/rc/security/access-control/saml-sso/saml-integration-okta-org2org.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -241,20 +241,14 @@ Replace `<ID>` so it matches the AssertionConsumerService Location URL ID (the c
241241

242242
{{<image filename="images/rc/saml/sm_saml_8.png" >}}
243243

244-
A popup appears, explaining that, to test the SAML connection, you need to log in with Okta credentials of the user defined in the Redis Cloud group. This user is part of the group to which you assigned the Redis Cloud application.
244+
A popup appears, explaining that, to test the SAML connection, you need to log in with Okta credentials of the user defined in the Redis Cloud group. This user is part of the group to which you assigned the Redis Cloud application. Select **Continue** to go to the Okta login screen.
245245

246-
{{<image filename="images/rc/saml/sm_saml_9.png" >}}
247-
248-
1. The Okta log-in screen appears. Enter the credentials and select **Sign In**.
246+
1. The Okta login screen appears. Enter the credentials and select **Sign In**.
249247

250248
{{<image filename="images/rc/saml/sm_saml_10.png" >}}
251249

252-
1. If the test succeeds, the next screen appears. Your local account is now considered a SAML account. Going forward, to log in to Redis Cloud console, select **Sign in with SSO**.
253-
254-
{{<image filename="images/rc/saml/sm_saml_11.png" >}}
255-
256-
1. Enter your SAML email and select **Login**
250+
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.
257251

258-
{{<image filename="images/rc/saml/sm_saml_12.png" >}}
252+
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.
259253

260-
You have successfully configured SAML as an identity provider.
254+
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}

content/operate/rc/security/access-control/saml-sso/saml-integration-ping-identity.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -162,25 +162,19 @@ To activate SAML, you must have a local user (or social sign-on user) with the *
162162

163163
1. Return to the Redis Cloud console and select **Activate**.
164164

165-
{{<image filename="images/rc/saml/ping_identity_saml_19.png" >}}
165+
{{<image filename="images/rc/saml/sm_saml_8.png" >}}
166166

167-
1. A popup appears, explaining that to test the SAML connection, you need to log in with credentials of a user defined in Ping Federate.
168-
169-
{{<image filename="images/rc/saml/sm_saml_9.png" >}}
167+
1. A popup appears, explaining that to test the SAML connection, you need to log in with credentials of a user defined in Ping Federate. Select **Continue** to go to the Ping Federate login screen.
170168

171169
1. The Ping Federate login screen will appear. Enter the credentials and select **Sign In**.
172170

173171
{{<image filename="images/rc/saml/ping_identity_saml_20.png" >}}
174172

175-
1. If the test has succeeded, you will see the following screen. Your local account is now considered a SAML account. To log in to Redis Cloud console going forward, select the **Sign in with SSO** button.
176-
177-
{{<image filename="images/rc/saml/sm_saml_11.png" >}}
178-
179-
1. In the screen, enter your SAML email and select *Login*.
173+
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.
180174

181-
{{<image filename="images/rc/saml/ad_saml_21.png" >}}
175+
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.
182176

183-
You have successfully configured SAML as an identity provider.
177+
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}
184178

185179
## IdP-initiated SSO
186180

content/operate/rc/security/cidr-whitelist.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,15 +30,15 @@ To define the CIDR allow list for a database:
3030

3131
1. Enter the first IP address (in CIDR format) you want to allow in the text box and then select the check mark to add it to the allow list:
3232

33-
{{<image filename="images/rc/database-details-configuration-tab-security-cidr-allowlist-add-first-ip.png" width="300px" alt="Add the first IP address to the CIDR allow list." >}}
33+
{{<image filename="images/rc/database-details-configuration-tab-security-cidr-allowlist-add-first-ip.png" width="80%" alt="Add the first IP address to the CIDR allow list." >}}
3434

3535
1. To allow additional IP addresses:
3636

3737
1. Select **Add CIDR**.
3838

3939
1. Enter the new IP address in the text box and then select check to add it to the allow list.
4040

41-
{{<image filename="images/rc/database-details-configuration-tab-security-cidr-allowlist-add-more-ips.png" width="300px" alt="Add a new IP address to the CIDR allow list." >}}
41+
{{<image filename="images/rc/database-details-configuration-tab-security-cidr-allowlist-add-more-ips.png" width="80%" alt="Add a new IP address to the CIDR allow list." >}}
4242

4343
1. Select **Save database** to apply your changes.
4444

Loading

0 commit comments

Comments
 (0)