Skip to content

Commit

Permalink
Merge pull request wso2#1 from wso2/testhackathon
Browse files Browse the repository at this point in the history
Testhackathon
  • Loading branch information
gomathyk authored Sep 17, 2019
2 parents f60e267 + 7aec443 commit f6aae01
Show file tree
Hide file tree
Showing 13 changed files with 12 additions and 15 deletions.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,7 @@ applications.
!!! Info "Recommended reading"
For more information on XACML specifications and other related
information, see [the OASIS
website](http://oasis-open.org/committees/xacml rel="noopener").
website](http://oasis-open.org/committees/xacml "(target|_blank)").



Expand Down
6 changes: 2 additions & 4 deletions en/docs/learn/openid-connect-logout-url-redirection.md
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ Follow the steps below to send an OIDC logout request:
```

Following are the parameters you need to specify in the URL:

<a name="parameters"></a>
<table>
<thead>
<tr class="header">
Expand Down Expand Up @@ -157,9 +157,7 @@ when you send an OIDC logout request as a POST request:
```
For descriptions of all the parameters that you need to specify in the
POST request, see the [parameter descriptions given
above](#OpenIDConnectLogoutURLRedirection-parameters).
POST request, see the <a href="<#parameters>parameter descriptions given above</a>
Following is the sample HTML form with sample parameter values to render
the page in a browser:
Expand Down
7 changes: 3 additions & 4 deletions en/docs/learn/password-history-validation.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,12 +24,11 @@ password. Follow the steps below to configure the count.
configure the password policy. Next, logout and login again with
Tenant B credentials to configure a different policy for Tenant B.



![password-history-validation](../../assets/img/using-wso2-identity-server/password-history-validation.png)

!!! info "Related Links"

See [Configuring
Claims](../../learn/configuring-claims) for more
information on how to store the claim values in the user store.
By default, the claim values of the identity claims used in this feature are stored in
the JDBC datasource based on a configuration. See [Configuring Claims](../../learn/configuring-claims)
for more information on how to store the claim values in the user store.
9 changes: 5 additions & 4 deletions en/docs/learn/password-patterns.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Password Patterns

WSO2 Identity Server (IS) allows you to define custom password policies
WSO2 Identity Server allows you to define custom password policies
and enforce them at the point of user creation. This topic guides you
through configuring a simple custom password policy and enforcing it.
You can also have a different password policy for each tenant in a
Expand All @@ -13,8 +13,11 @@ multi-tenant environment.
3. Expand the **Password Policies** tab.
4. Expand the **Password Patterns** tab and select **Enable Password
Policy Feature**. Update the default values and click **Update**.

![password-policies](../../assets/img/using-wso2-identity-server/password-policies.png)


!!! note "Configuring password policies for multiple tenants"
!!! note "Configuring password policies for multiple tenants"
To configure this separately for different tenants in a
multi-tenant environment, first login with Tenant A credentials and
configure the password policy. Next, logout and login again with
Expand Down Expand Up @@ -60,8 +63,6 @@ multi-tenant environment.
</tbody>
</table>

![password-policies](../../assets/img/using-wso2-identity-server/password-policies.png)

!!! info "Related Links"

- To configure a global password policy that applies to all tenants,
Expand Down
3 changes: 1 addition & 2 deletions en/mkdocs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ nav:
- 'General Data Protection Regulation': compliance/general-data-protection-regulation.md
- 'Electronic Identification, Authentication and Trust Services Regulation': compliance/electronic-identification-authentication-and-trust-services-regulation.md
- 'Learn':
- 'learn':
- 'Tutorials':
- 'Authentication':
- 'Logging in to your application via Identity Server using Facebook Credentials': learn/logging-in-to-your-application-via-identity-server-using-facebook-credentials.md
- 'Configuring Shibboleth IdP as a Trusted Identity Provider': learn/configuring-shibboleth-idp-as-a-trusted-identity-provider.md
Expand Down Expand Up @@ -274,7 +274,6 @@ nav:
- 'Forced Password Reset': learn/forced-password-reset.md
- 'User Account Suspension': learn/user-account-suspension.md
- 'Password Policies':
- 'Password Policies': learn/password-policies.md
- 'Password History Validation': learn/password-history-validation.md
- 'Password Patterns': learn/password-patterns.md
- 'Login Policies':
Expand Down

0 comments on commit f6aae01

Please sign in to comment.