docs: Add language to code blocks.

This commit is contained in:
Alex Vandiver 2023-05-30 23:18:00 +00:00 committed by Tim Abbott
parent adb30c4d18
commit 9a6529f86a
4 changed files with 14 additions and 14 deletions

View File

@ -330,7 +330,7 @@ settings in `/etc/zulip/settings.py`.
An example configation for Active Directory group restriction can be:
```
```python
import django_auth_ldap
AUTH_LDAP_GROUP_TYPE = django_auth_ldap.config.ActiveDirectoryGroupType()
@ -613,7 +613,7 @@ integration](../production/scim.md).
Save the certificate in a new `{idp_name}.crt` file constructed as follows:
```
```text
-----BEGIN CERTIFICATE-----
{Paste the content here}
-----END CERTIFICATE-----
@ -676,7 +676,7 @@ this with another IdP.
`/etc/zulip/settings.py` as `slo_url`. For example it may look like
this:
```
```text
"your_keycloak_idp_name": {
"entity_id": "https://keycloak.example.com/auth/realms/yourrealm",
"url": "https://keycloak.example.com/auth/realms/yourrealm/protocol/saml",

View File

@ -511,7 +511,7 @@ Apache requires you use the hostname, not the IP address; see
1. Enable some required Apache modules:
```
```bash
a2enmod ssl proxy proxy_http headers rewrite
```

View File

@ -122,7 +122,7 @@ Congratulations! The integration should be fully operational.
1. Test your configuration by sending emails to the target email
account and then running the Zulip tool to poll that inbox:
```
```bash
su zulip -c '/home/zulip/deployments/current/manage.py email_mirror'
```

View File

@ -23,13 +23,13 @@ The Zulip server-side configuration is straightforward:
example, if your organization is hosted on a subdomain
(`subdomain.zulip.example.com`):
```
```bash
/home/zulip/deployments/current/manage.py add_scim_client okta -r 'subdomain'
```
Or your organization is hosted on the root domain (`zulip.example.com`):
```
```bash
/home/zulip/deployments/current/manage.py add_scim_client okta -r ""
```
@ -39,14 +39,14 @@ The Zulip server-side configuration is straightforward:
1. Configure the Zulip server by adding a `SCIM_CONFIG` block to your
`/etc/zulip/settings.py`:
```
```python
SCIM_CONFIG = {
"subdomain": {
"bearer_token": "<secret token>",
"scim_client_name": "okta",
"name_formatted_included": False,
}
}
"subdomain": {
"bearer_token": "<secret token>",
"scim_client_name": "okta",
"name_formatted_included": False,
}
}
```
The `bearer_token` should contain a secure, secret token that you