Skip to content

Commit 66f2fb6

Browse files
committed
Security page update
1 parent a5dbbe8 commit 66f2fb6

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

content/en/docs/control-center/security/security.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ You can turn application data replication back on by clicking **Activate**.
7373

7474
On the **Single Sign-On** tab, you can set up an identity federation between the Mendix Platform and your corporate identity provider. This feature is called [Bring Your Own Identity Provider (BYOIDP)](/control-center/security/set-up-sso-byoidp/).
7575

76-
### IdP-managed Mendix Admins
76+
### IdP-managed Mendix Admins {#idp-managed-mendix-admins}
7777

7878
Once you have set up Single Sign-On (SSO) for the Mendix platform, you can extend this Identity Provider (IdP) integration to control who is granted the Mendix Admin role. From an access management perspective, central management of privileged roles, such as the Mendix Admin, is a recognized best practice. This approach mitigates the risk of privilege creep, where existing Mendix Admins can freely give admin rights to others without proper control.
7979

@@ -96,18 +96,20 @@ As a result, the overview of [Mendix Admins](/control-center/mendix-admins-page/
9696

9797
#### Onboarding Prerequisites
9898

99-
Before you request to be onboarded to the IdP-managed Mendix Admins feature, please ensure the following prerequisites are met:
99+
Before you request to be onboarded to the IdP-managed Mendix Admins feature, ensure the following prerequisites are met:
100100

101-
1. You have a Premium platform license to use this feature.
101+
1. You have a premium platform license to use this feature.
102102
2. You have set up an active SSO or BYO-IdP configuration, as described in [Set Up an SSO (BYOIDP)](/control-center/security/set-up-sso-byoidp/).
103-
3. You have a user group in your IdP that includes your current Mendix Admins. Typically, your IT department should manage this group, possibly with a request/approval process.
103+
3. You have a user group in your IdP that includes your current Mendix Admins. Typically, your IT department should manage this group, possibly with a request or approval process.
104104
4. The ID token sent by your IdP to the Mendix platform during SSO must include a claim that indicates whether a user is a member of the Mendix Admin group. For configuration, Mendix needs to know the name of the claim and the expected value. When using Entra ID, a typical setup should have the following claim in the ID token:
105105

106106
```text
107107
“roles” : “Mendix-admin”
108108
```
109109
110-
The Mendix platform has the flexibility of using any claim name and value.
110+
The Mendix platform has the flexibility of using any claim name and value.
111+
112+
5. Note that when using the BYOIDP feature to manage your Mendix Admins (see the [IdP-managed Mendix Admins](#idp-managed-mendix-admins) section above), the Mendix platform does not include anything specific in the SSO request (such as a specific scope value or claims request parameter). It expects that your IdP includes the required claim based on the configurations in your IdP for Mendix as a client.
111113
112114
## Security History Tab
113115

0 commit comments

Comments
 (0)