docs: SSO Self Service#2911
Merged
marksalpeter merged 1 commit intomainfrom May 11, 2026
Merged
Conversation
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
|
@claude review |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Motivation
Description
<Frame>SSO sign-in image and theOIDC only<Callout>block from the end of the Cloud configuration steps into the Enterprise SSO overview area just after the details list.Verify DomainandConfigure SSOsteps intact and removed the general context from the procedural flow to improve scan-ability.content/docs/administration/authentication-and-sso.mdxto reflect the new ordering.Testing
pnpm exec prettier --check content/docs/administration/authentication-and-sso.mdxand the check passed.Codex Task
Disclaimer: Experimental PR review
Greptile Summary
This PR reorganizes the Enterprise SSO documentation to surface the sign-in flow illustration and the OIDC-only callout earlier in the overview, and replaces the legacy "contact support" setup path with a self-service Cloud configuration flow covering DNS domain verification and SSO configuration.
Confidence Score: 3/5
The documentation reorganization is clean, but the Okta vendor guide now contains two conflicting redirect-URI instructions that could leave users with a misconfigured IdP allowlist.
The Okta guide's Step 2 still tells users to manually enter a hard-coded callback URL in Okta, while the new Step 5 tells them to copy a system-generated callback URL from Langfuse's UI and add it to the same allowlist. A user following the guide linearly will configure the redirect URI twice with possibly different values — the manually entered one from Step 2 may not match the UI-generated one, leaving SSO broken after setup.
content/docs/administration/authentication-and-sso.mdx — specifically the Okta vendor guide section where Step 2 (Configure the Application) and Step 5 (Configure SSO in Langfuse) both reference the Sign-in redirect URI.
Flowchart
%%{init: {'theme': 'neutral'}}%% flowchart TD A[User navigates to Org Settings > SSO] --> B[Add Domain] B --> C[Copy DNS TXT record to DNS provider] C --> D{DNS propagated?} D -- No --> E[Wait up to 24 hours] E --> D D -- Yes --> F[Click Verify in Langfuse] F --> G[Domain verified] G --> H[Click Configure SSO next to domain] H --> I[Copy callback URL from Langfuse UI] I --> J[Whitelist callback URL in IdP] J --> K[Enter Issuer URL, Client ID, Client Secret] K --> L[Save configuration] L --> M[Test sign-in with domain user] M --> N{Sign-in successful?} N -- Yes --> O[SSO configured ✓] N -- No --> P[Check issuer URL & callback allowlist] P --> KPrompt To Fix All With AI
Reviews (1): Last reviewed commit: "docs: move SSO signin and OIDC note abov..." | Re-trigger Greptile