Add docs and minor tweaks.

This commit is contained in:
Bruno Bernardino 2022-05-12 14:52:05 +01:00
parent b69792ab48
commit 905802acc5
No known key found for this signature in database
GPG Key ID: D1B0A69ADD114ECE
5 changed files with 31 additions and 8 deletions

View File

@ -251,7 +251,7 @@
# =============================================================================
# PROVISIONING
#
# Supported backends: simple (default), stripe
# Supported backends: simple (default), stripe, directory
# =============================================================================
# -----------------------------------------------------------------------------
@ -273,7 +273,7 @@
# PL_PROVISIONING_SIMPLE_DEFAULT_QUOTA_VAULTS=3
# -----------------------------------------------------------------------------
# SIMPLE PROVISIONING
# STRIPE PROVISIONING
#
# Manage provisioning via stripe
# -----------------------------------------------------------------------------
@ -283,6 +283,15 @@
# PL_PROVISIONING_STRIPE_PUBLIC_KEY=[required]
# PL_PROVISIONING_STRIPE_WEBHOOK_PORT=[required]
# -----------------------------------------------------------------------------
# DIRECTORY PROVISIONING
#
# Manage provisioning via directory (only SCIM supported for now)
# -----------------------------------------------------------------------------
# PL_PROVISIONING_BACKEND=directory
# PL_DIRECTORY_PROVIDERS=scim
# PL_DIRECTORY_SCIM_PORT=[required]
# =============================================================================
# SERVER

View File

@ -0,0 +1,19 @@
# SCIM ( with Active Directory ) Example
These are simple instructions to setup SCIM provisioning with Active Directory
(Azure Active Directory is used below, but any other setup should be similar).
1. Make sure your server has SCIM support enabled (i.e.
`PL_PROVISIONING_BACKEND=directory` and `PL_DIRECTORY_PROVIDERS=scim`).
2. Go to your organization's settings in Padloc and enable Directory Sync. Take
note of the `Tenant URL` and `Secret Token` values, as you'll need them in
step 4.
3. In your Active Directory, create a new Enterprise application (you can name
id "Padloc", for example) and choose Automatic provisioning.
4. Enter the proper `Tenant URL` (you) and `Secret Token` values you got from
step 2.
5. Test the connection, it should pass.
That is it. You can now optionally try "Provision on demand" to manually
provision some user, or simply "Start provisioning" to get it automatically
synchronizing values every X minutes, depending on your setup.

View File

@ -116,7 +116,7 @@ export class AccountProvisioning extends Storable {
accountId?: AccountID = undefined;
status: ProvisioningStatus = ProvisioningStatus.Active;
status: ProvisioningStatus = ProvisioningStatus.Unprovisioned;
statusLabel: string = "";

View File

@ -38,8 +38,6 @@ export class DirectoryProvisioner extends BasicProvisioner implements DirectoryS
}
}
// TODO: Groups
groupCreated(_group: DirectoryGroup, _orgId: string) {
return Promise.resolve();
}

View File

@ -1084,9 +1084,6 @@ export class ScimServer implements DirectoryProvider {
return this._handleScimPatch(httpReq, httpRes);
case "DELETE":
return this._handleScimDelete(httpReq, httpRes);
case "PUT":
httpRes.statusCode = 405;
httpRes.end();
default:
httpRes.statusCode = 405;
httpRes.end();