From 198d57ad5570e65cb7cab03f2a842dfe4f30187d Mon Sep 17 00:00:00 2001 From: Justin Prince Date: Fri, 13 Mar 2026 09:07:29 -0400 Subject: [PATCH 1/3] Added a note about using the '.us' domain for Gov Cloud customers. --- .../custom-idps/idp-providers/ms-entra-id/index.md | 1 + 1 file changed, 1 insertion(+) diff --git a/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md b/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md index 8610739526..80b41d9f23 100644 --- a/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md +++ b/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md @@ -128,6 +128,7 @@ chainctl iam identity-provider create \ --default-role=viewer \ --name=${NAME} ``` +> Customers using Azure Government Cloud should set `ISSUER="https://login.microsoftonline.us/${TENANT_ID}/v2.0' Note the `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. If you don't include this option, you'll be prompted to specify the role interactively. For more information, refer to the [IAM and Security section](/chainguard/administration/custom-idps/custom-idps/#iam-and-security) of our Introduction to Custom Identity Providers in Chainguard tutorial. From 20a4483e1c8451f308531f0c8d2861be611ea104 Mon Sep 17 00:00:00 2001 From: Justin Prince Date: Fri, 13 Mar 2026 09:08:16 -0400 Subject: [PATCH 2/3] Added a note about using the '.us' domain for Gov Cloud customers. --- .../custom-idps/idp-providers/ms-entra-id/index.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md b/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md index 80b41d9f23..88c1a589a5 100644 --- a/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md +++ b/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md @@ -116,7 +116,7 @@ export CLIENT_ID= export CLIENT_SECRET= export ORG= export TENANT_ID= -export ISSUER="https://login.microsoftonline.com/${TENANT_ID}/v2.0" +export ISSUER="https://login.microsoftonline.com/${TENANT_ID}/v2.0" chainctl iam identity-provider create \ --configuration-type=OIDC \ --oidc-client-id=${CLIENT_ID} \ @@ -128,7 +128,7 @@ chainctl iam identity-provider create \ --default-role=viewer \ --name=${NAME} ``` -> Customers using Azure Government Cloud should set `ISSUER="https://login.microsoftonline.us/${TENANT_ID}/v2.0' +> Customers using Azure Government Cloud should set ISSUER="https://login.microsoftonline.us/${TENANT_ID}/v2.0" Note the `--default-role` option. This defines the default role granted to users registering with this identity provider. This example specifies the `viewer` role, but depending on your needs you might choose `editor` or `owner`. If you don't include this option, you'll be prompted to specify the role interactively. For more information, refer to the [IAM and Security section](/chainguard/administration/custom-idps/custom-idps/#iam-and-security) of our Introduction to Custom Identity Providers in Chainguard tutorial. From 3c8ef1d2e946a628bc78fbf1bf0810288a54ec4f Mon Sep 17 00:00:00 2001 From: Justin Prince Date: Fri, 13 Mar 2026 09:09:55 -0400 Subject: [PATCH 3/3] Removed whitespace --- .../custom-idps/idp-providers/ms-entra-id/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md b/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md index 88c1a589a5..2a05d7f0e6 100644 --- a/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md +++ b/content/chainguard/administration/custom-idps/idp-providers/ms-entra-id/index.md @@ -116,7 +116,7 @@ export CLIENT_ID= export CLIENT_SECRET= export ORG= export TENANT_ID= -export ISSUER="https://login.microsoftonline.com/${TENANT_ID}/v2.0" +export ISSUER="https://login.microsoftonline.com/${TENANT_ID}/v2.0" chainctl iam identity-provider create \ --configuration-type=OIDC \ --oidc-client-id=${CLIENT_ID} \