Skip to content

Commit cffcad1

Browse files
committed
Fix Links
1 parent dc05cc6 commit cffcad1

File tree

6 files changed

+21
-20
lines changed

6 files changed

+21
-20
lines changed

src/pages/selfhosted/identity-providers/authentik.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ Use Authentik as your primary identity provider instead of NetBird's embedded Id
9191
For most deployments, the [embedded IdP](/selfhosted/identity-providers#local-user-management) is the simpler choice — it's built into NetBird, fully integrated, and requires minimal configuration to get started. For this implementation, go back up to the [Connector Setup (Recommended)](#connector-setup-recommended) section above.
9292

9393
<Note>
94-
If you prefer not to self-host an Identity and Access Management solution, you could use a managed alternative like [Auth0](/selfhosted/identity-providers/auth0).
94+
If you prefer not to self-host an Identity and Access Management solution, you could use a managed alternative like [Auth0](/selfhosted/identity-providers/managed/auth0).
9595
</Note>
9696

9797
### Prerequisites

src/pages/selfhosted/identity-providers/index.mdx

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -418,9 +418,9 @@ External identity providers give you:
418418
| Provider | Type | Best For |
419419
|----------|------|----------|
420420
| [**Generic OIDC**](#adding-external-identity-providers) | `oidc` | Any OIDC-compliant provider |
421-
| [**Google**](/selfhosted/identity-providers/google) | `google` | Google Workspace, personal Google accounts |
422-
| [**Microsoft**](/selfhosted/identity-providers/microsoft) | `microsoft` / `entra` | Personal accounts, Azure AD / Entra ID |
423-
| [**Okta**](/selfhosted/identity-providers/okta) | `okta` | Enterprise SSO |
421+
| [**Google**](/selfhosted/identity-providers/managed/google-workspace) | `google` | Google Workspace, personal Google accounts |
422+
| [**Microsoft**](/selfhosted/identity-providers/managed/microsoft-entra-id) | `microsoft` / `entra` | Personal accounts, Azure AD / Entra ID |
423+
| [**Okta**](/selfhosted/identity-providers/managed/okta) | `okta` | Enterprise SSO |
424424
| [**Zitadel**](/selfhosted/identity-providers/zitadel) | `zitadel` | Self-hosted Zitadel |
425425
| [**Keycloak**](/selfhosted/identity-providers/keycloak) | `oidc` | Self-hosted Keycloak |
426426
| [**Authentik**](/selfhosted/identity-providers/authentik) | `oidc` | Self-hosted Authentik |
@@ -449,8 +449,8 @@ The Identity Providers tab is only visible when `embedded_idp_enabled` is `true`
449449
</Note>
450450

451451
For detailed setup instructions for each provider, see the individual provider pages:
452-
- [Google](/selfhosted/identity-providers/google)
453-
- [Microsoft](/selfhosted/identity-providers/microsoft)
452+
- [Google Workspace](/selfhosted/identity-providers/managed/google-workspace)
453+
- [Microsoft Entra ID](/selfhosted/identity-providers/managed/microsoft-entra-id)
454454
- [Keycloak](/selfhosted/identity-providers/keycloak)
455455
- [Zitadel](/selfhosted/identity-providers/zitadel)
456456
- [All Providers →](/selfhosted/identity-providers)
@@ -625,18 +625,19 @@ Managed Identity Providers handle infrastructure and maintenance for you. See ea
625625

626626
| Provider | Description |
627627
|----------|-------------|
628-
| [**Google**](/selfhosted/identity-providers/google) | Google accounts and Google Workspace authentication |
629-
| [**Microsoft**](/selfhosted/identity-providers/microsoft) | Microsoft personal accounts and Entra ID (Azure AD) for work accounts |
630-
| [**Okta**](/selfhosted/identity-providers/okta) | Enterprise identity and access management with extensive integrations |
631-
| [**Auth0**](/selfhosted/identity-providers/auth0) | Flexible authentication service with customization options |
632-
| [**JumpCloud**](/selfhosted/identity-providers/jumpcloud) | Cloud directory platform with identity and device management |
628+
| [**Google Workspace**](/selfhosted/identity-providers/managed/google-workspace) | Google accounts and Google Workspace authentication |
629+
| [**Microsoft Entra ID**](/selfhosted/identity-providers/managed/microsoft-entra-id) | Microsoft personal accounts and Entra ID (Azure AD) for work accounts |
630+
| [**Okta**](/selfhosted/identity-providers/managed/okta) | Enterprise identity and access management with extensive integrations |
631+
| [**Auth0**](/selfhosted/identity-providers/managed/auth0) | Flexible authentication service with customization options |
632+
| [**JumpCloud**](/selfhosted/identity-providers/managed/jumpcloud) | Cloud directory platform with identity and device management |
633633

634634
---
635635

636636
## User Provisioning
637637

638638
In addition to OIDC-based authentication, NetBird supports provisioning users and groups through SCIM and the API. However, this functionality is not available in the open source Community Edition. It is offered only in the cloud-managed version of NetBird or through a [Commercial License](https://netbird.io/pricing#on-prem) for enterprise self-hosted deployments.
639639

640+
<a id="migration-guide"></a>
640641
## Migration Guide
641642

642643
If you have an existing NetBird deployment using a standalone IdP (like Zitadel from the previous quickstart), you have several options:

src/pages/selfhosted/identity-providers/keycloak.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Use Keycloak as your primary identity provider instead of NetBird's embedded IdP
7676
For most deployments, the [embedded IdP](/selfhosted/identity-providers#local-user-management) is the simpler choice — it's built into NetBird, fully integrated, and requires minimal configuration to get started. For this implementation, go back up to the [Connector Setup (Recommended)](#connector-setup-recommended) section above.
7777

7878
<Note>
79-
If you prefer not to self-host an Identity and Access Management solution, you could use a managed alternative like [Auth0](/selfhosted/identity-providers/auth0).
79+
If you prefer not to self-host an Identity and Access Management solution, you could use a managed alternative like [Auth0](/selfhosted/identity-providers/managed/auth0).
8080
</Note>
8181

8282
### Expected Result

src/pages/selfhosted/identity-providers/zitadel.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -286,4 +286,4 @@ If you deployed NetBird using the previous quickstart script with Zitadel:
286286
- [Zitadel Documentation](https://zitadel.com/docs)
287287
- [Zitadel GitHub](https://github.com/zitadel/zitadel)
288288
- [Embedded IdP Overview](/selfhosted/identity-providers#local-user-management)
289-
- [Migration Guide](/selfhosted/identity-providers/migration)
289+
- [Migration Guide](/selfhosted/identity-providers#migration-guide)

src/pages/selfhosted/selfhosted-guide.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -144,11 +144,11 @@ Pick the one that suits your needs, follow the **Standalone Setup (Advanced)** s
144144
- [PocketID](/selfhosted/identity-providers/pocketid) - Lightweight self-hosted option
145145

146146
**Managed options**
147-
- [Microsoft Entra ID](/selfhosted/identity-providers/microsoft) - Azure AD / Microsoft 365
148-
- [Google Workspace](/selfhosted/identity-providers/google) - Google accounts
149-
- [Okta](/selfhosted/identity-providers/okta) - Enterprise SSO
150-
- [Auth0](/selfhosted/identity-providers/auth0) - Flexible auth platform
151-
- [JumpCloud](/selfhosted/identity-providers/jumpcloud) - Cloud directory
147+
- [Microsoft Entra ID](/selfhosted/identity-providers/managed/microsoft-entra-id) - Azure AD / Microsoft 365
148+
- [Google Workspace](/selfhosted/identity-providers/managed/google-workspace) - Google accounts
149+
- [Okta](/selfhosted/identity-providers/managed/okta) - Enterprise SSO
150+
- [Auth0](/selfhosted/identity-providers/managed/auth0) - Flexible auth platform
151+
- [JumpCloud](/selfhosted/identity-providers/managed/jumpcloud) - Cloud directory
152152

153153
<Note>
154154
Each provider page includes both "Connector Setup" (for use with embedded IdP) and "Standalone Setup (Advanced)" sections. For this guide, follow the **Standalone Setup** section.
@@ -309,7 +309,7 @@ If you've deployed NetBird using this advanced guide and want to simplify your s
309309
2. Users can continue logging in with their existing credentials
310310
3. You can gradually transition to local user management
311311

312-
See the [Migration Guide](/selfhosted/identity-providers/migration) for detailed instructions.
312+
See the [Migration Guide](/selfhosted/identity-providers#migration-guide) for detailed instructions.
313313

314314
## Get in touch
315315

src/pages/selfhosted/selfhosted-quickstart.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,7 +225,7 @@ If you have an existing Zitadel deployment and want to migrate:
225225
1. **Option A**: Keep Zitadel as an external provider—add it as an identity provider in Settings
226226
2. **Option B**: Recreate users as local users and decommission Zitadel
227227

228-
See the [Migration Guide](/selfhosted/identity-providers/migration) for detailed steps.
228+
See the [Migration Guide](/selfhosted/identity-providers#migration-guide) for detailed steps.
229229

230230
---
231231

0 commit comments

Comments
 (0)