diff --git a/.github/workflows/firebase-hosting-pull-request.yml b/.github/workflows/firebase-hosting-pull-request.yml
index 02e518549..a46fd70b9 100644
--- a/.github/workflows/firebase-hosting-pull-request.yml
+++ b/.github/workflows/firebase-hosting-pull-request.yml
@@ -11,7 +11,7 @@ jobs:
NODE_ENV: 'development'
steps:
- uses: actions/checkout@v2
- - run: npm install && npm run docusaurus gen-api-docs all && npm run build
+ - run: npm install && npm run gen-api-docs-all && npm run build
- uses: FirebaseExtended/action-hosting-deploy@v0
with:
repoToken: '${{ secrets.GITHUB_TOKEN }}'
diff --git a/docusaurus.config.js b/docusaurus.config.js
index 23fc49d64..f691d9ec9 100644
--- a/docusaurus.config.js
+++ b/docusaurus.config.js
@@ -15,9 +15,9 @@ const config = {
url: "https://developer.sailpoint.com",
baseUrl,
favicon: "img/SailPoint-Logo-Icon.ico",
- onBrokenLinks: "warn",
- onBrokenMarkdownLinks: "warn",
- onDuplicateRoutes: "warn",
+ onBrokenLinks: "throw",
+ onBrokenMarkdownLinks: "throw",
+ onDuplicateRoutes: "throw",
i18n: {
defaultLocale: "en",
locales: ["en"],
diff --git a/package-lock.json b/package-lock.json
index 619f2d920..e5248bc3f 100644
--- a/package-lock.json
+++ b/package-lock.json
@@ -12,6 +12,7 @@
"@docusaurus/plugin-google-gtag": "^2.0.1",
"@docusaurus/preset-classic": "2.0.1",
"@mdx-js/react": "^1.6.22",
+ "@typeform/embed-react": "^1.21.0",
"clsx": "^1.1.1",
"docusaurus-plugin-openapi-docs": "^1.2.0",
"docusaurus-theme-openapi-docs": "^1.2.0",
@@ -3279,6 +3280,29 @@
"node": ">=10.13.0"
}
},
+ "node_modules/@typeform/embed": {
+ "version": "1.38.0",
+ "resolved": "https://registry.npmjs.org/@typeform/embed/-/embed-1.38.0.tgz",
+ "integrity": "sha512-qYxtwckEcRt++F1sUeILb/qmUFQ3PwcUxKedCBSseC8lFo1ukD1wmsBf+Il8YSRPKPqhTrGUG5WPaJg83n1xuw==",
+ "engines": {
+ "node": ">=10"
+ }
+ },
+ "node_modules/@typeform/embed-react": {
+ "version": "1.21.0",
+ "resolved": "https://registry.npmjs.org/@typeform/embed-react/-/embed-react-1.21.0.tgz",
+ "integrity": "sha512-nZi7OD5mxZUKQjkzxAll05JU6QNWuHuCE+L/S1Vagy7fgb/rdx4iEIfvqFogTcrVw61bCS6TaAJ+ateD7vR7sw==",
+ "dependencies": {
+ "@typeform/embed": "1.38.0",
+ "fast-deep-equal": "^3.1.3"
+ },
+ "engines": {
+ "node": ">=10"
+ },
+ "peerDependencies": {
+ "react": ">=16.8.0"
+ }
+ },
"node_modules/@types/body-parser": {
"version": "1.19.2",
"resolved": "https://registry.npmjs.org/@types/body-parser/-/body-parser-1.19.2.tgz",
@@ -17310,6 +17334,20 @@
"resolved": "https://registry.npmjs.org/@trysound/sax/-/sax-0.2.0.tgz",
"integrity": "sha512-L7z9BgrNEcYyUYtF+HaEfiS5ebkh9jXqbszz7pC0hRBPaatV0XjSD3+eHrpqFemQfgwiFF0QPIarnIihIDn7OA=="
},
+ "@typeform/embed": {
+ "version": "1.38.0",
+ "resolved": "https://registry.npmjs.org/@typeform/embed/-/embed-1.38.0.tgz",
+ "integrity": "sha512-qYxtwckEcRt++F1sUeILb/qmUFQ3PwcUxKedCBSseC8lFo1ukD1wmsBf+Il8YSRPKPqhTrGUG5WPaJg83n1xuw=="
+ },
+ "@typeform/embed-react": {
+ "version": "1.21.0",
+ "resolved": "https://registry.npmjs.org/@typeform/embed-react/-/embed-react-1.21.0.tgz",
+ "integrity": "sha512-nZi7OD5mxZUKQjkzxAll05JU6QNWuHuCE+L/S1Vagy7fgb/rdx4iEIfvqFogTcrVw61bCS6TaAJ+ateD7vR7sw==",
+ "requires": {
+ "@typeform/embed": "1.38.0",
+ "fast-deep-equal": "^3.1.3"
+ }
+ },
"@types/body-parser": {
"version": "1.19.2",
"resolved": "https://registry.npmjs.org/@types/body-parser/-/body-parser-1.19.2.tgz",
diff --git a/package.json b/package.json
index 41da48ccd..87c151b04 100644
--- a/package.json
+++ b/package.json
@@ -24,6 +24,7 @@
"@docusaurus/plugin-google-gtag": "^2.0.1",
"@docusaurus/preset-classic": "2.0.1",
"@mdx-js/react": "^1.6.22",
+ "@typeform/embed-react": "^1.21.0",
"clsx": "^1.1.1",
"docusaurus-plugin-openapi-docs": "^1.2.0",
"docusaurus-theme-openapi-docs": "^1.2.0",
diff --git a/products/idn/api/authentication.md b/products/idn/api/authentication.md
index 1086f0819..722080ba1 100644
--- a/products/idn/api/authentication.md
+++ b/products/idn/api/authentication.md
@@ -658,7 +658,7 @@ You can also view all of the active clients in the UI by going to
4. If using an A[Authorization Code](#authorization-code-grant-flow) flow,
verify the redirect URL(s) for your application match the `redirectUris`
value in the client. You can check this using the
- [oauth-clients endpoint](/idn/api/beta/list-oauth-client).
+ [oauth-clients endpoint](/idn/api/beta/list-oauth-clients).
5. **Verify the OAuth 2.0 Calls**
diff --git a/products/idn/docs/identity-now/index.mdx b/products/idn/docs/identity-now/index.mdx
index fb79a954c..1be49d16b 100644
--- a/products/idn/docs/identity-now/index.mdx
+++ b/products/idn/docs/identity-now/index.mdx
@@ -66,7 +66,7 @@ A webhook in web development is a method of augmenting or altering the behavior
of a web page or web application with custom callbacks. These callbacks may be
maintained, modified, and managed by third-party users and developers who may
not necessarily be affiliated with the originating website or application. Our
-[Event Triggers](docs/identity-now/event-triggers) are a form of webhook, for
+[Event Triggers](docs/event-triggers) are a form of webhook, for
example.
[Learn more about webhooks here](https://zapier.com/blog/what-are-webhooks/).
diff --git a/products/idn/docs/identity-now/rules/cloud-rules/index.md b/products/idn/docs/identity-now/rules/cloud-rules/index.md
index 7115fb6fd..7f60ac99d 100644
--- a/products/idn/docs/identity-now/rules/cloud-rules/index.md
+++ b/products/idn/docs/identity-now/rules/cloud-rules/index.md
@@ -61,8 +61,8 @@ All submitted rules must follow proper rule submission guidelines.
- Check whether your rule follows SailPoint best practice guidance, and ensure that you have
considered other product features first.
- **Rule Quality**
- - Rules must follow the [Rule Guidelines](../rule_guide#rule-guidelines)
- and [Code Restrictions](../rule_guide#rule-code-restrictions)
+ - Rules must follow the [Rule Guidelines](../index.md#rule-guidelines)
+ and [Code Restrictions](../index.md#rule-code-restrictions)
- Rules must be adequately tested prior to submission.
- **Documentation**
- Include detailed comments for non-obvious features in the configurations,
diff --git a/products/idn/docs/identity-now/rules/connector-rules/index.md b/products/idn/docs/identity-now/rules/connector-rules/index.md
index 7bbc8886e..f51f52afd 100644
--- a/products/idn/docs/identity-now/rules/connector-rules/index.md
+++ b/products/idn/docs/identity-now/rules/connector-rules/index.md
@@ -31,12 +31,12 @@ For more details, see [Configuration Process](#configuration-process).
| Rule Name | Rule Type | Source Type(s) | Purpose |
| --------------------------------------------------- | ---------------------------------------------------- | ---------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
-| [Before Creation Rule](before_after_operation_rule) | [ConnectorBeforeCreate](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is created. |
-| [Before Modify Rule](before_after_operation_rule) | [ConnectorBeforeModify](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is modified. |
-| [Before Delete Rule](before_after_operation_rule) | [ConnectorBeforeDelete](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is deleted. |
-| [After Creation Rule](before_after_operation_rule) | [ConnectorAfterCreate](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is created. |
-| [After Modify Rule](before_after_operation_rule) | [ConnectorAfterModify](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is modified. |
-| [After Delete Rule](before_after_operation_rule) | [ConnectorAfterDelete](before_after_operation_rule) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is deleted. |
+| [Before Creation Rule](./before_after_operation_rule.md) | [ConnectorBeforeCreate](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is created. |
+| [Before Modify Rule](./before_after_operation_rule.md) | [ConnectorBeforeModify](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is modified. |
+| [Before Delete Rule](./before_after_operation_rule.md) | [ConnectorBeforeDelete](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component before a source account is deleted. |
+| [After Creation Rule](./before_after_operation_rule.md) | [ConnectorAfterCreate](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is created. |
+| [After Modify Rule](./before_after_operation_rule.md) | [ConnectorAfterModify](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is modified. |
+| [After Delete Rule](./before_after_operation_rule.md) | [ConnectorAfterDelete](./before_after_operation_rule.md) | Active Directory, Azure Active Directory | Executes PowerShell commands on the IQService component after a source account is deleted. |
| Build Map Rule | BuildMap | Delimited File | Calculates and transforms data from a parsed file during the aggregation process. _Note: This is only available for the Delimited File source type, not Generic source types._ |
| JDBC Build Map Rule | JDBCBuildMap | JDBC | Calculates and transforms data from a database query result during the aggregation process. It can also perform additional calls back to the database. _Note: This rule is available for the JDBC Generic source, as well as other sources that derive from the JDBC connector (e.g., Oracle EBS, PeopleSoft, etc.)_ |
| JDBC Provision Rule | JDBCProvision | JDBC | Executes database queries to perform provisioning of account and access for all account operations. |
@@ -63,7 +63,7 @@ which provide ability to interact with rules directly.
SailPoint architectural optimizations have added resiliency and protections
against malformed or long-running rules. These APIs also offer built-in
protection and checking against potentially harmful code. For more information,
-see [Rule Code Restrictions](../rule_guide.md#rule-code-restrictions).
+see [Rule Code Restrictions](../../rules/index.md#rule-code-restrictions).
## Connector Rule Object Model
diff --git a/products/idn/docs/identity-now/saas-connectivity/postman-collection.md b/products/idn/docs/identity-now/saas-connectivity/postman-collection.md
index e1fa0ab9f..bf868c858 100644
--- a/products/idn/docs/identity-now/saas-connectivity/postman-collection.md
+++ b/products/idn/docs/identity-now/saas-connectivity/postman-collection.md
@@ -16,4 +16,4 @@ tags: ["Connectivity", "Postman"]
Use the following Postman Collection file to run tests for each of the commands
locally.
-[Postman Collection](../../../files/collection.json)
+[Postman Collection](./assets/SaaS_Connectivity.postman_collection)
diff --git a/products/idn/docs/identity-now/transforms/guides/temporary-password.md b/products/idn/docs/identity-now/transforms/guides/temporary-password.md
index 303525a12..c790b49e9 100644
--- a/products/idn/docs/identity-now/transforms/guides/temporary-password.md
+++ b/products/idn/docs/identity-now/transforms/guides/temporary-password.md
@@ -531,9 +531,9 @@ To verify your transform is working, create the transfrom through the REST API.
To call the APIs for transforms, you need a personal access token and your
tenant's name to provide with the request. For more information about how to get
a personal access token, see
-[Personal Access Tokens](/idn/docs/getting-started/authentication#personal-access-tokens).
+[Personal Access Tokens](../../../../api/authentication.md#personal-access-tokens).
For more information about how to get the name of your tenant, see
-[Finding Your Organization Tenant Name](/idn/docs/getting-started#finding-your-orgtenant-name).
+[Finding Your Organization Tenant Name](../../../../api/getting-started.md#find-your-tenant-name).
```bash
curl --location --request POST 'https://{tenant}.api.identitynow.com/v3/transforms' \
diff --git a/src/components/conference/Hero/index.js b/src/components/conference/Hero/index.js
index b5507231c..9a7532f3f 100644
--- a/src/components/conference/Hero/index.js
+++ b/src/components/conference/Hero/index.js
@@ -1,10 +1,39 @@
import React from "react";
-import clsx from "clsx";
import styles from "./styles.module.css";
-import Link from '@docusaurus/Link';
+import useBaseUrl from '@docusaurus/useBaseUrl';
+import ThemedImage from '@theme/ThemedImage';
+import { addDarkToFileName } from "../../../util/util";
+import { SliderButton } from '@typeform/embed-react'
export default function ConferenceHero() {
+ const communication = '/conf/communication.svg'
+
return (
-
+
+
+
+
+ Shipyard
+
+
+
+ 2023
+
+
+
+
+
+ COMING SOON | AUSTIN, TX
+
+
+ The conference for extensibility on SailPoint platforms.
+