mirror of https://github.com/zulip/zulip.git
docs: Add language to code blocks.
This commit is contained in:
parent
adb30c4d18
commit
9a6529f86a
|
@ -330,7 +330,7 @@ settings in `/etc/zulip/settings.py`.
|
|||
|
||||
An example configation for Active Directory group restriction can be:
|
||||
|
||||
```
|
||||
```python
|
||||
import django_auth_ldap
|
||||
AUTH_LDAP_GROUP_TYPE = django_auth_ldap.config.ActiveDirectoryGroupType()
|
||||
|
||||
|
@ -613,7 +613,7 @@ integration](../production/scim.md).
|
|||
|
||||
Save the certificate in a new `{idp_name}.crt` file constructed as follows:
|
||||
|
||||
```
|
||||
```text
|
||||
-----BEGIN CERTIFICATE-----
|
||||
{Paste the content here}
|
||||
-----END CERTIFICATE-----
|
||||
|
@ -676,7 +676,7 @@ this with another IdP.
|
|||
`/etc/zulip/settings.py` as `slo_url`. For example it may look like
|
||||
this:
|
||||
|
||||
```
|
||||
```text
|
||||
"your_keycloak_idp_name": {
|
||||
"entity_id": "https://keycloak.example.com/auth/realms/yourrealm",
|
||||
"url": "https://keycloak.example.com/auth/realms/yourrealm/protocol/saml",
|
||||
|
|
|
@ -511,7 +511,7 @@ Apache requires you use the hostname, not the IP address; see
|
|||
|
||||
1. Enable some required Apache modules:
|
||||
|
||||
```
|
||||
```bash
|
||||
a2enmod ssl proxy proxy_http headers rewrite
|
||||
```
|
||||
|
||||
|
|
|
@ -122,7 +122,7 @@ Congratulations! The integration should be fully operational.
|
|||
1. Test your configuration by sending emails to the target email
|
||||
account and then running the Zulip tool to poll that inbox:
|
||||
|
||||
```
|
||||
```bash
|
||||
su zulip -c '/home/zulip/deployments/current/manage.py email_mirror'
|
||||
```
|
||||
|
||||
|
|
|
@ -23,13 +23,13 @@ The Zulip server-side configuration is straightforward:
|
|||
example, if your organization is hosted on a subdomain
|
||||
(`subdomain.zulip.example.com`):
|
||||
|
||||
```
|
||||
```bash
|
||||
/home/zulip/deployments/current/manage.py add_scim_client okta -r 'subdomain'
|
||||
```
|
||||
|
||||
Or your organization is hosted on the root domain (`zulip.example.com`):
|
||||
|
||||
```
|
||||
```bash
|
||||
/home/zulip/deployments/current/manage.py add_scim_client okta -r ""
|
||||
```
|
||||
|
||||
|
@ -39,14 +39,14 @@ The Zulip server-side configuration is straightforward:
|
|||
1. Configure the Zulip server by adding a `SCIM_CONFIG` block to your
|
||||
`/etc/zulip/settings.py`:
|
||||
|
||||
```
|
||||
```python
|
||||
SCIM_CONFIG = {
|
||||
"subdomain": {
|
||||
"bearer_token": "<secret token>",
|
||||
"scim_client_name": "okta",
|
||||
"name_formatted_included": False,
|
||||
}
|
||||
}
|
||||
"subdomain": {
|
||||
"bearer_token": "<secret token>",
|
||||
"scim_client_name": "okta",
|
||||
"name_formatted_included": False,
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
The `bearer_token` should contain a secure, secret token that you
|
||||
|
|
Loading…
Reference in New Issue