diff --git a/website/integrations/services/minio/index.md b/website/integrations/services/minio/index.md index 57aba9924..9aae1f71f 100644 --- a/website/integrations/services/minio/index.md +++ b/website/integrations/services/minio/index.md @@ -19,7 +19,7 @@ The following placeholders will be used: - `minio.company` is the FQDN of the MinIO install. - `authentik.company` is the FQDN of the authentik install. -Under _Property Mappings_, create a _Scope Mapping_. Give it a name like "OIDC-Scope-minio". Set the scope name to `minio` and the expression to the following +Under _Customization_ -> _Property Mappings_, create a _Scope Mapping_. Give it a name like "OIDC-Scope-minio". Set the scope name to `minio` and the expression to the following ```python return { diff --git a/website/integrations/services/rancher/index.md b/website/integrations/services/rancher/index.md index 635b19184..18b4e2696 100644 --- a/website/integrations/services/rancher/index.md +++ b/website/integrations/services/rancher/index.md @@ -20,7 +20,7 @@ The following placeholders will be used: - `rancher.company` is the FQDN of the Rancher install. - `authentik.company` is the FQDN of the authentik install. -Under _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following +Under _Customization_ -> _Property Mappings_, create a _SAML Property Mapping_. Give it a name like "SAML Rancher User ID". Set the SAML name to `rancherUidUsername` and the expression to the following ```python return f"{user.pk}-{user.username}" diff --git a/website/integrations/services/roundcube/index.md b/website/integrations/services/roundcube/index.md index 72a1fc294..9dc87bdd4 100644 --- a/website/integrations/services/roundcube/index.md +++ b/website/integrations/services/roundcube/index.md @@ -25,7 +25,7 @@ The following placeholders will be used: Create a new oauth2 Scope Mapping which does not return the 'group' values and associate this mapping in the provider settings instead of the default oauth mapping. -Under _Property Mappings_, create a _Scope Mapping_. Give it a name like "oauth2-Scope-dovecot". Set the scope name to `dovecotprofile` and the expression to the following +Under _Customization_ -> _Property Mappings_, create a _Scope Mapping_. Give it a name like "oauth2-Scope-dovecot". Set the scope name to `dovecotprofile` and the expression to the following ``` return { diff --git a/website/integrations/services/vmware-vcenter/index.md b/website/integrations/services/vmware-vcenter/index.md index 3fa3f29e9..348944eb1 100644 --- a/website/integrations/services/vmware-vcenter/index.md +++ b/website/integrations/services/vmware-vcenter/index.md @@ -35,7 +35,7 @@ Since vCenter only allows OpenID-Connect in combination with Active Directory, i ### Step 1 -Under _Property Mappings_, create a _Scope Mapping_. Give it a name like "OIDC-Scope-VMware-vCenter". Set the scope name to `openid` and the expression to the following +Under _Customization_ -> _Property Mappings_, create a _Scope Mapping_. Give it a name like "OIDC-Scope-VMware-vCenter". Set the scope name to `openid` and the expression to the following ```python return {