mirror of
https://github.com/LukeHagar/developer.sailpoint.com.git
synced 2025-12-06 12:27:46 +00:00
fixed broken links
This commit is contained in:
@@ -15,9 +15,9 @@ const config = {
|
||||
url: "https://developer.sailpoint.com",
|
||||
baseUrl,
|
||||
favicon: "img/SailPoint-Logo-Icon.ico",
|
||||
onBrokenLinks: "warn",
|
||||
onBrokenMarkdownLinks: "warn",
|
||||
onDuplicateRoutes: "warn",
|
||||
onBrokenLinks: "throw",
|
||||
onBrokenMarkdownLinks: "throw",
|
||||
onDuplicateRoutes: "throw",
|
||||
i18n: {
|
||||
defaultLocale: "en",
|
||||
locales: ["en"],
|
||||
|
||||
@@ -658,7 +658,7 @@ You can also view all of the active clients in the UI by going to
|
||||
4. If using an A[Authorization Code](#authorization-code-grant-flow) flow,
|
||||
verify the redirect URL(s) for your application match the `redirectUris`
|
||||
value in the client. You can check this using the
|
||||
[oauth-clients endpoint](/idn/api/beta/list-oauth-client).
|
||||
[oauth-clients endpoint](/idn/api/beta/list-oauth-clients).
|
||||
|
||||
5. **Verify the OAuth 2.0 Calls**
|
||||
|
||||
|
||||
@@ -66,7 +66,7 @@ A webhook in web development is a method of augmenting or altering the behavior
|
||||
of a web page or web application with custom callbacks. These callbacks may be
|
||||
maintained, modified, and managed by third-party users and developers who may
|
||||
not necessarily be affiliated with the originating website or application. Our
|
||||
[Event Triggers](docs/identity-now/event-triggers) are a form of webhook, for
|
||||
[Event Triggers](docs/event-triggers) are a form of webhook, for
|
||||
example.
|
||||
[Learn more about webhooks here](https://zapier.com/blog/what-are-webhooks/).
|
||||
|
||||
|
||||
@@ -61,8 +61,8 @@ All submitted rules must follow proper rule submission guidelines.
|
||||
- Check whether your rule follows SailPoint best practice guidance, and ensure that you have
|
||||
considered other product features first.
|
||||
- **Rule Quality**
|
||||
- Rules must follow the [Rule Guidelines](../rule_guide#rule-guidelines)
|
||||
and [Code Restrictions](../rule_guide#rule-code-restrictions)
|
||||
- Rules must follow the [Rule Guidelines](../index.md#rule-guidelines)
|
||||
and [Code Restrictions](../index.md#rule-code-restrictions)
|
||||
- Rules must be adequately tested prior to submission.
|
||||
- **Documentation**
|
||||
- Include detailed comments for non-obvious features in the configurations,
|
||||
|
||||
@@ -31,12 +31,12 @@ For more details, see [Configuration Process](#configuration-process).
|
||||
|
||||
| Rule Name | Rule Type | Source Type(s) | Purpose |
|
||||
| --------------------------------------------------- | ---------------------------------------------------- | ---------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| [Before Creation Rule](before_after_operation_rule) | [ConnectorBeforeCreate](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is created. |
|
||||
| [Before Modify Rule](before_after_operation_rule) | [ConnectorBeforeModify](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is modified. |
|
||||
| [Before Delete Rule](before_after_operation_rule) | [ConnectorBeforeDelete](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is deleted. |
|
||||
| [After Creation Rule](before_after_operation_rule) | [ConnectorAfterCreate](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is created. |
|
||||
| [After Modify Rule](before_after_operation_rule) | [ConnectorAfterModify](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is modified. |
|
||||
| [After Delete Rule](before_after_operation_rule) | [ConnectorAfterDelete](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is deleted. |
|
||||
| [Before Creation Rule](./before_after_operation_rule.md) | [ConnectorBeforeCreate](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is created. |
|
||||
| [Before Modify Rule](./before_after_operation_rule.md) | [ConnectorBeforeModify](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is modified. |
|
||||
| [Before Delete Rule](./before_after_operation_rule.md) | [ConnectorBeforeDelete](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is deleted. |
|
||||
| [After Creation Rule](./before_after_operation_rule.md) | [ConnectorAfterCreate](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is created. |
|
||||
| [After Modify Rule](./before_after_operation_rule.md) | [ConnectorAfterModify](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is modified. |
|
||||
| [After Delete Rule](./before_after_operation_rule.md) | [ConnectorAfterDelete](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is deleted. |
|
||||
| Build Map Rule | BuildMap | Delimited File | Calculates and transforms data from a parsed file during the aggregation process. _Note: This is only available for the Delimited File source type, not Generic source types._ |
|
||||
| JDBC Build Map Rule | JDBCBuildMap | JDBC | Calculates and transforms data from a database query result during the aggregation process. It can also perform additional calls back to the database. _Note: This rule is available for the JDBC Generic source, as well as other sources that derive from the JDBC connector (e.g., Oracle EBS, PeopleSoft, etc.)_ |
|
||||
| JDBC Provision Rule | JDBCProvision | JDBC | Executes database queries to perform provisioning of account and access for all account operations. |
|
||||
@@ -63,7 +63,7 @@ which provide ability to interact with rules directly.
|
||||
SailPoint architectural optimizations have added resiliency and protections
|
||||
against malformed or long-running rules. These APIs also offer built-in
|
||||
protection and checking against potentially harmful code. For more information,
|
||||
see [Rule Code Restrictions](../rule_guide.md#rule-code-restrictions).
|
||||
see [Rule Code Restrictions](../../rules/index.md#rule-code-restrictions).
|
||||
|
||||
## Connector Rule Object Model
|
||||
|
||||
|
||||
@@ -16,4 +16,4 @@ tags: ["Connectivity", "Postman"]
|
||||
Use the following Postman Collection file to run tests for each of the commands
|
||||
locally.
|
||||
|
||||
[Postman Collection](../../../files/collection.json)
|
||||
[Postman Collection](./assets/SaaS_Connectivity.postman_collection)
|
||||
|
||||
@@ -531,9 +531,9 @@ To verify your transform is working, create the transfrom through the REST API.
|
||||
To call the APIs for transforms, you need a personal access token and your
|
||||
tenant's name to provide with the request. For more information about how to get
|
||||
a personal access token, see
|
||||
[Personal Access Tokens](/idn/docs/getting-started/authentication#personal-access-tokens).
|
||||
[Personal Access Tokens](../../../../api/authentication.md#personal-access-tokens).
|
||||
For more information about how to get the name of your tenant, see
|
||||
[Finding Your Organization Tenant Name](/idn/docs/getting-started#finding-your-orgtenant-name).
|
||||
[Finding Your Organization Tenant Name](../../../../api/getting-started.md#find-your-tenant-name).
|
||||
|
||||
```bash
|
||||
curl --location --request POST 'https://{tenant}.api.identitynow.com/v3/transforms' \
|
||||
|
||||
@@ -5,7 +5,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
|
||||
import ThemedImage from '@theme/ThemedImage';
|
||||
import { addDarkToFileName } from "../../../util/util";
|
||||
|
||||
export default function ThemeCard({title, name, expertise, image}) {
|
||||
export default function ThemeCard({title, name, image}) {
|
||||
return (
|
||||
<div className={styles.card}>
|
||||
<div className={styles.cardFaceContainer}>
|
||||
|
||||
@@ -1169,7 +1169,7 @@
|
||||
},
|
||||
"/LaunchedWorkflows": {
|
||||
"get": {
|
||||
"operationId": "LaunchedWorkflows",
|
||||
"operationId": "LaunchedWorkflowsGet",
|
||||
"tags": [
|
||||
"LaunchedWorkflows"
|
||||
],
|
||||
@@ -2250,7 +2250,7 @@
|
||||
"/ServiceProviderConfig": {
|
||||
"description": "Schema for representing the service provider's configuration",
|
||||
"get": {
|
||||
"operationId": "ServiceProviderConfig",
|
||||
"operationId": "ServiceProviderConfigGet",
|
||||
"tags": [
|
||||
"ServiceProviderConfig"
|
||||
],
|
||||
@@ -2331,7 +2331,7 @@
|
||||
},
|
||||
"/TaskResults": {
|
||||
"get": {
|
||||
"operationId": "TaskResults",
|
||||
"operationId": "TaskResultsGet",
|
||||
"tags": [
|
||||
"TaskResults"
|
||||
],
|
||||
@@ -2959,7 +2959,7 @@
|
||||
},
|
||||
"/Workflows": {
|
||||
"get": {
|
||||
"operationId": "Workflows",
|
||||
"operationId": "WorkflowsGet",
|
||||
"tags": [
|
||||
"Workflows"
|
||||
],
|
||||
|
||||
Reference in New Issue
Block a user