docs: Finish renaming AzureAD to Entra ID.

Microsoft has been renaming AzureAD to Entra ID. Though both names still
seem to function, even if unofficially, so this mostly renames to `Entra
ID (AzureAD)` to reference both for clarity.
This commit is contained in:
Mateusz Mandera
2024-12-12 23:45:26 +01:00
committed by Tim Abbott
parent 5787a11b53
commit 81c2c0b328
5 changed files with 8 additions and 8 deletions

View File

@@ -30,7 +30,7 @@ authentication providers:
- Google accounts, with `GoogleAuthBackend` - Google accounts, with `GoogleAuthBackend`
- GitHub accounts, with `GitHubAuthBackend` - GitHub accounts, with `GitHubAuthBackend`
- GitLab accounts, with `GitLabAuthBackend` - GitLab accounts, with `GitLabAuthBackend`
- Microsoft Azure Active Directory, with `AzureADAuthBackend` - Microsoft Entra ID (AzureAD), with `AzureADAuthBackend`
Each of these requires one to a handful of lines of configuration in Each of these requires one to a handful of lines of configuration in
`settings.py`, as well as a secret in `zulip-secrets.conf`. Details `settings.py`, as well as a secret in `zulip-secrets.conf`. Details

View File

@@ -16,7 +16,7 @@ Zulip Cloud Plus, and all self-hosted Zulip servers:
The following options are available for organizations on Zulip Cloud Plus, and all self-hosted Zulip servers: The following options are available for organizations on Zulip Cloud Plus, and all self-hosted Zulip servers:
- [SAML authentication](/help/saml-authentication), including Okta, OneLogin, AzureAD, Keycloak, Auth0 - [SAML authentication](/help/saml-authentication), including Okta, OneLogin, Entra ID (AzureAD), Keycloak, Auth0
- [SCIM provisioning](/help/scim) - [SCIM provisioning](/help/scim)
The following authentication and identity management options are available for The following authentication and identity management options are available for

View File

@@ -9,7 +9,7 @@ This page describes how to configure SAML authentication with several common pro
* Okta * Okta
* OneLogin * OneLogin
* AzureAD * Entra ID (AzureAD)
* Keycloak * Keycloak
* Auth0 * Auth0
@@ -92,14 +92,14 @@ providers.
{!upgrade-to-plus-if-needed.md!} {!upgrade-to-plus-if-needed.md!}
1. From your AzureAD Dashboard, navigate to **Enterprise applications**, 1. From your Entra ID Dashboard, navigate to **Enterprise applications**,
click **New application**, followed by **Create your own application**. click **New application**, followed by **Create your own application**.
1. Enter a name (e.g., `Zulip Cloud`) for the new AzureAD application, 1. Enter a name (e.g., `Zulip Cloud`) for the new Entra ID application,
choose **Integrate any other application you don't find in the choose **Integrate any other application you don't find in the
gallery (Non-gallery)**, and click **Create**. gallery (Non-gallery)**, and click **Create**.
1. From your new AzureAD application's **Overview** page that opens, go to 1. From your new Entra ID application's **Overview** page that opens, go to
**Single sign-on**, and select **SAML**. **Single sign-on**, and select **SAML**.
1. In the **Basic SAML Configuration** section, specify the following fields: 1. In the **Basic SAML Configuration** section, specify the following fields:

View File

@@ -66,7 +66,7 @@ priority.
## Authentication ## Authentication
- Zulip supports integrated single sign-on with Google, GitHub, SAML - Zulip supports integrated single sign-on with Google, GitHub, SAML
(including Okta), AzureAD, and Active Directory/LDAP. With Zulip (including Okta), Entra ID (AzureAD), and Active Directory/LDAP. With Zulip
on-premise, we can support any of the 100+ authentication tools on-premise, we can support any of the 100+ authentication tools
supported by supported by
[python-social-auth](https://python-social-auth.readthedocs.io/en/latest/backends/index.html#social-backends) [python-social-auth](https://python-social-auth.readthedocs.io/en/latest/backends/index.html#social-backends)

View File

@@ -100,7 +100,7 @@ TAB_SECTION_LABELS = {
"self-hosting": "Self hosting", "self-hosting": "Self hosting",
"okta": "Okta", "okta": "Okta",
"onelogin": "OneLogin", "onelogin": "OneLogin",
"azuread": "AzureAD", "azuread": "Entra ID (AzureAD)",
"entraid": "Microsoft Entra ID", "entraid": "Microsoft Entra ID",
"keycloak": "Keycloak", "keycloak": "Keycloak",
"auth0": "Auth0", "auth0": "Auth0",