diff --git a/docs/self-managed/setup/guides/connect-to-an-oidc-provider.md b/docs/self-managed/setup/guides/connect-to-an-oidc-provider.md index 8e1bb289e3..9e90a31e86 100644 --- a/docs/self-managed/setup/guides/connect-to-an-oidc-provider.md +++ b/docs/self-managed/setup/guides/connect-to-an-oidc-provider.md @@ -148,17 +148,17 @@ For authentication, the Camunda components use the scopes `email`, `openid`, `of global: identity: auth: - issuer: https://login.microsoftonline.com//v2.0 + issuer: https://login.microsoftonline.com//v2.0 # this is used for container to container communication issuerBackendUrl: https://login.microsoftonline.com//v2.0 tokenUrl: https://login.microsoftonline.com//oauth2/v2.0/token jwksUrl: https://login.microsoftonline.com//discovery/v2.0/keys type: "MICROSOFT" - publicIssuerUrl: https://login.microsoftonline.com//v2.0 + publicIssuerUrl: https://login.microsoftonline.com//v2.0 identity: - clientId: - existingSecret: - audience: + clientId: + existingSecret: + audience: initialClaimName: initialClaimValue: redirectUrl: diff --git a/versioned_docs/version-8.4/self-managed/platform-deployment/helm-kubernetes/guides/connect-to-an-oidc-provider.md b/versioned_docs/version-8.4/self-managed/platform-deployment/helm-kubernetes/guides/connect-to-an-oidc-provider.md index 16eb4a5748..00efca4b7b 100644 --- a/versioned_docs/version-8.4/self-managed/platform-deployment/helm-kubernetes/guides/connect-to-an-oidc-provider.md +++ b/versioned_docs/version-8.4/self-managed/platform-deployment/helm-kubernetes/guides/connect-to-an-oidc-provider.md @@ -142,13 +142,13 @@ For authentication, the Camunda components use the scopes `email`, `openid`, `of global: identity: auth: - issuer: https://login.microsoftonline.com//v2.0 + issuer: https://login.microsoftonline.com//v2.0 # this is used for container to container communication issuerBackendUrl: https://login.microsoftonline.com//v2.0 tokenUrl: https://login.microsoftonline.com//oauth2/v2.0/token jwksUrl: https://login.microsoftonline.com//discovery/v2.0/keys type: "MICROSOFT" - publicIssuerUrl: https://login.microsoftonline.com//v2.0 + publicIssuerUrl: https://login.microsoftonline.com//v2.0 operate: clientId: audience: @@ -175,7 +175,7 @@ global: publicApiAudience: redirectUrl: connectors: - clientId: + clientId: existingSecret: ``` diff --git a/versioned_docs/version-8.5/self-managed/setup/guides/connect-to-an-oidc-provider.md b/versioned_docs/version-8.5/self-managed/setup/guides/connect-to-an-oidc-provider.md index 8e1bb289e3..9e90a31e86 100644 --- a/versioned_docs/version-8.5/self-managed/setup/guides/connect-to-an-oidc-provider.md +++ b/versioned_docs/version-8.5/self-managed/setup/guides/connect-to-an-oidc-provider.md @@ -148,17 +148,17 @@ For authentication, the Camunda components use the scopes `email`, `openid`, `of global: identity: auth: - issuer: https://login.microsoftonline.com//v2.0 + issuer: https://login.microsoftonline.com//v2.0 # this is used for container to container communication issuerBackendUrl: https://login.microsoftonline.com//v2.0 tokenUrl: https://login.microsoftonline.com//oauth2/v2.0/token jwksUrl: https://login.microsoftonline.com//discovery/v2.0/keys type: "MICROSOFT" - publicIssuerUrl: https://login.microsoftonline.com//v2.0 + publicIssuerUrl: https://login.microsoftonline.com//v2.0 identity: - clientId: - existingSecret: - audience: + clientId: + existingSecret: + audience: initialClaimName: initialClaimValue: redirectUrl: