Skip to content

Commit 2b87d23

Browse files
committed
Updates to content
1 parent 2acfce2 commit 2b87d23

File tree

1 file changed

+3
-4
lines changed
  • content/hcp-docs/content/docs/hcp/iam/sso

1 file changed

+3
-4
lines changed

content/hcp-docs/content/docs/hcp/iam/sso/manage.mdx

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,8 @@ Organization owners and admins can configure SSO. The **Single Sign-On** page in
1717
When you enable SSO for an organization, the user invitations feature is no longer offered. You must provision new users through the external identity provider.
1818

1919
User accounts that join through SSO are limited to that one organization, cannot be associated with an existing personal account such as GitHub or email, and cannot be invited to other organizations within HCP.
20-
After you provision a new user, HCP grants them the default [role](/hcp/docs/hcp/iam/users#user-permissions) you selected when configuring SSO for your organization.
20+
21+
After you provision a new user, HCP grants them [the default role you selected when configuring SSO for your organization](/hcp/docs/hcp/iam/users#user-permissions).
2122
An HCP administrator can then manually update and increase their user permissions on the [HCP Access Control](https://portal.cloud.hashicorp.com/access/users) page.
2223

2324
Existing personal user accounts can still access the organization unless an administrator removes them. Existing SAML user accounts with emails matching the configured SSO domain must log in with the SSO URL link. This link is available on the **Single Sign-On** page in **Settings**.
@@ -26,9 +27,7 @@ It is important to delete SSO accounts for users that were removed from your ide
2627

2728
### Admins and owners
2829

29-
The administrator who owns the organization and enabled SSO can still use their original, non-SSO account to sign in to the HCP web portal and access the SSO-enabled organization. If they previously signed in through GitHub, they can continue doing so. If they signed in with an email and password, they can use a special [force email + password sign-in](https://portal.cloud.hashicorp.com/sign-in?with=email) link. This is because the login page defaults to SSO and hides the password when an email matches the configured SSO domain.
30-
31-
The organization owner can also sign up with a new SSO user principal and promote themselves to **Admin** if appropriate. However, they cannot remove their old user account or transfer ownership. They can use them as a recovery option if the SSO configuration requires troubleshooting.
30+
The administrator who owns the organization and enabled SSO can still use their original, non-SSO account to sign in to the HCP web portal and access the SSO-enabled organization. If they previously signed in through GitHub, they can continue to access the organization through GitHub as well.
3231

3332
## Update SSO
3433

0 commit comments

Comments
 (0)