fixed broken links

This commit is contained in:
philip-ellis-sp
2022-09-28 15:48:56 -04:00
parent c8f57b2840
commit 2b4684aa0d
9 changed files with 22 additions and 22 deletions

View File

@@ -15,9 +15,9 @@ const config = {
url: "https://developer.sailpoint.com",
baseUrl,
favicon: "img/SailPoint-Logo-Icon.ico",
onBrokenLinks: "warn",
onBrokenMarkdownLinks: "warn",
onDuplicateRoutes: "warn",
onBrokenLinks: "throw",
onBrokenMarkdownLinks: "throw",
onDuplicateRoutes: "throw",
i18n: {
defaultLocale: "en",
locales: ["en"],

View File

@@ -658,7 +658,7 @@ You can also view all of the active clients in the UI by going to
4. If using an A[Authorization Code](#authorization-code-grant-flow) flow,
verify the redirect URL(s) for your application match the `redirectUris`
value in the client. You can check this using the
[oauth-clients endpoint](/idn/api/beta/list-oauth-client).
[oauth-clients endpoint](/idn/api/beta/list-oauth-clients).
5. **Verify the OAuth 2.0 Calls**

View File

@@ -66,7 +66,7 @@ A webhook in web development is a method of augmenting or altering the behavior
of a web page or web application with custom callbacks. These callbacks may be
maintained, modified, and managed by third-party users and developers who may
not necessarily be affiliated with the originating website or application. Our
[Event Triggers](docs/identity-now/event-triggers) are a form of webhook, for
[Event Triggers](docs/event-triggers) are a form of webhook, for
example.
[Learn more about webhooks here](https://zapier.com/blog/what-are-webhooks/).

View File

@@ -61,8 +61,8 @@ All submitted rules must follow proper rule submission guidelines.
- Check whether your rule follows SailPoint best practice guidance, and ensure that you have
considered other product features first.
- **Rule Quality**
- Rules must follow the [Rule Guidelines](../rule_guide#rule-guidelines)
and [Code Restrictions](../rule_guide#rule-code-restrictions)
- Rules must follow the [Rule Guidelines](../index.md#rule-guidelines)
and [Code Restrictions](../index.md#rule-code-restrictions)
- Rules must be adequately tested prior to submission.
- **Documentation**
- Include detailed comments for non-obvious features in the configurations,

View File

@@ -31,12 +31,12 @@ For more details, see [Configuration Process](#configuration-process).
| Rule Name | Rule Type | Source Type(s) | Purpose |
| --------------------------------------------------- | ---------------------------------------------------- | ---------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [Before Creation Rule](before_after_operation_rule) | [ConnectorBeforeCreate](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is created. |
| [Before Modify Rule](before_after_operation_rule) | [ConnectorBeforeModify](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is modified. |
| [Before Delete Rule](before_after_operation_rule) | [ConnectorBeforeDelete](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is deleted. |
| [After Creation Rule](before_after_operation_rule) | [ConnectorAfterCreate](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is created. |
| [After Modify Rule](before_after_operation_rule) | [ConnectorAfterModify](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is modified. |
| [After Delete Rule](before_after_operation_rule) | [ConnectorAfterDelete](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is deleted. |
| [Before Creation Rule](./before_after_operation_rule.md) | [ConnectorBeforeCreate](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is created. |
| [Before Modify Rule](./before_after_operation_rule.md) | [ConnectorBeforeModify](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is modified. |
| [Before Delete Rule](./before_after_operation_rule.md) | [ConnectorBeforeDelete](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is deleted. |
| [After Creation Rule](./before_after_operation_rule.md) | [ConnectorAfterCreate](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is created. |
| [After Modify Rule](./before_after_operation_rule.md) | [ConnectorAfterModify](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is modified. |
| [After Delete Rule](./before_after_operation_rule.md) | [ConnectorAfterDelete](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is deleted. |
| Build Map Rule | BuildMap | Delimited File | Calculates and transforms data from a parsed file during the aggregation process. _Note: This is only available for the Delimited File source type, not Generic source types._ |
| JDBC Build Map Rule | JDBCBuildMap | JDBC | Calculates and transforms data from a database query result during the aggregation process. It can also perform additional calls back to the database. _Note: This rule is available for the JDBC Generic source, as well as other sources that derive from the JDBC connector (e.g., Oracle EBS, PeopleSoft, etc.)_ |
| JDBC Provision Rule | JDBCProvision | JDBC | Executes database queries to perform provisioning of account and access for all account operations. |
@@ -63,7 +63,7 @@ which provide ability to interact with rules directly.
SailPoint architectural optimizations have added resiliency and protections
against malformed or long-running rules. These APIs also offer built-in
protection and checking against potentially harmful code. For more information,
see [Rule Code Restrictions](../rule_guide.md#rule-code-restrictions).
see [Rule Code Restrictions](../../rules/index.md#rule-code-restrictions).
## Connector Rule Object Model

View File

@@ -16,4 +16,4 @@ tags: ["Connectivity", "Postman"]
Use the following Postman Collection file to run tests for each of the commands
locally.
[Postman Collection](../../../files/collection.json)
[Postman Collection](./assets/SaaS_Connectivity.postman_collection)

View File

@@ -531,9 +531,9 @@ To verify your transform is working, create the transfrom through the REST API.
To call the APIs for transforms, you need a personal access token and your
tenant's name to provide with the request. For more information about how to get
a personal access token, see
[Personal Access Tokens](/idn/docs/getting-started/authentication#personal-access-tokens).
[Personal Access Tokens](../../../../api/authentication.md#personal-access-tokens).
For more information about how to get the name of your tenant, see
[Finding Your Organization Tenant Name](/idn/docs/getting-started#finding-your-orgtenant-name).
[Finding Your Organization Tenant Name](../../../../api/getting-started.md#find-your-tenant-name).
```bash
curl --location --request POST 'https://{tenant}.api.identitynow.com/v3/transforms' \

View File

@@ -5,7 +5,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
import ThemedImage from '@theme/ThemedImage';
import { addDarkToFileName } from "../../../util/util";
export default function ThemeCard({title, name, expertise, image}) {
export default function ThemeCard({title, name, image}) {
return (
<div className={styles.card}>
<div className={styles.cardFaceContainer}>

View File

@@ -1169,7 +1169,7 @@
},
"/LaunchedWorkflows": {
"get": {
"operationId": "LaunchedWorkflows",
"operationId": "LaunchedWorkflowsGet",
"tags": [
"LaunchedWorkflows"
],
@@ -2250,7 +2250,7 @@
"/ServiceProviderConfig": {
"description": "Schema for representing the service provider's configuration",
"get": {
"operationId": "ServiceProviderConfig",
"operationId": "ServiceProviderConfigGet",
"tags": [
"ServiceProviderConfig"
],
@@ -2331,7 +2331,7 @@
},
"/TaskResults": {
"get": {
"operationId": "TaskResults",
"operationId": "TaskResultsGet",
"tags": [
"TaskResults"
],
@@ -2959,7 +2959,7 @@
},
"/Workflows": {
"get": {
"operationId": "Workflows",
"operationId": "WorkflowsGet",
"tags": [
"Workflows"
],