diff --git a/e2e/support/data/dsync/index.ts b/e2e/support/data/dsync/index.ts index 4ba8fd60b..8e521a483 100644 --- a/e2e/support/data/dsync/index.ts +++ b/e2e/support/data/dsync/index.ts @@ -2,7 +2,7 @@ export * from './azure'; export * from './okta'; export enum DirectorySyncProviders { - 'azure-scim-v2' = 'Azure SCIM v2.0', + 'azure-scim-v2' = 'Entra ID SCIM v2.0', 'onelogin-scim-v2' = 'OneLogin SCIM v2.0', 'okta-scim-v2' = 'Okta SCIM v2.0', 'jumpcloud-scim-v2' = 'JumpCloud v2.0', diff --git a/e2e/ui/Enterprise SSO/setup_link.spec.ts b/e2e/ui/Enterprise SSO/setup_link.spec.ts index 2d21585e8..9e6cea125 100644 --- a/e2e/ui/Enterprise SSO/setup_link.spec.ts +++ b/e2e/ui/Enterprise SSO/setup_link.spec.ts @@ -56,8 +56,8 @@ const setupLinkTestsData: { testRunner: testOktaSaml, }, { - testDescription: 'Admin Portal Enterprise SSO SetupLink using Azure SAML SSO', - testTitle: 'should be able to create setup link and sso connection Azure SAML SSO', + testDescription: 'Admin Portal Enterprise SSO SetupLink using Entra ID SAML SSO', + testTitle: 'should be able to create setup link and sso connection Entra ID SAML SSO', testRunner: testAzureSaml, }, ]; @@ -293,7 +293,7 @@ async function testOktaSaml(setupLinkPage: Page) { async function testAzureSaml(setupLinkPage: Page) { // Create SSO connection using Okta SAML workflow - await setupLinkPage.getByRole('button', { name: 'Azure SAML SSO' }).click(); + await setupLinkPage.getByRole('button', { name: 'Entra ID SAML SSO' }).click(); // check mdx generated content using remart-gfm plugin for step1 await expect(setupLinkPage.getByRole('heading', { name: 'Step 1: Create Application' })).toBeVisible(); diff --git a/internal-ui/src/types.ts b/internal-ui/src/types.ts index 2cf30c423..bcea02c6d 100644 --- a/internal-ui/src/types.ts +++ b/internal-ui/src/types.ts @@ -7,7 +7,7 @@ export interface ApiError extends Error { // eslint-disable-next-line @typescript-eslint/no-unused-vars enum DirectorySyncProviders { - 'azure-scim-v2' = 'Azure SCIM v2.0', + 'azure-scim-v2' = 'Entra ID SCIM v2.0', 'onelogin-scim-v2' = 'OneLogin SCIM v2.0', 'okta-scim-v2' = 'Okta SCIM v2.0', 'jumpcloud-scim-v2' = 'JumpCloud v2.0', diff --git a/lib/constants.ts b/lib/constants.ts index 5ece815c0..e4c503716 100644 --- a/lib/constants.ts +++ b/lib/constants.ts @@ -7,7 +7,7 @@ export const identityProviders = [ stepCount: 3, }, { - name: 'Azure SAML SSO', + name: 'Entra ID SAML SSO', id: 'azure', stepCount: 4, }, diff --git a/npm/src/directory-sync/scim/DirectoryConfig.ts b/npm/src/directory-sync/scim/DirectoryConfig.ts index 756eb28a5..76010148e 100644 --- a/npm/src/directory-sync/scim/DirectoryConfig.ts +++ b/npm/src/directory-sync/scim/DirectoryConfig.ts @@ -597,7 +597,7 @@ export class DirectoryConfig { private transform(directory: Directory): Directory { if (directory.scim.path) { - // Add the flag to ensure SCIM compliance when using Azure AD + // Add the flag to ensure SCIM compliance when using Entra ID if (directory.type === 'azure-scim-v2') { directory.scim.path = `${directory.scim.path}/?aadOptscim062020`; } diff --git a/npm/src/directory-sync/types.ts b/npm/src/directory-sync/types.ts index a4ab761d5..5f39a994c 100644 --- a/npm/src/directory-sync/types.ts +++ b/npm/src/directory-sync/types.ts @@ -32,7 +32,7 @@ export type DirectorySyncEventType = | 'group.user_removed'; export enum DirectorySyncProviders { - 'azure-scim-v2' = 'Azure SCIM v2.0', + 'azure-scim-v2' = 'Entra ID SCIM v2.0', 'onelogin-scim-v2' = 'OneLogin SCIM v2.0', 'okta-scim-v2' = 'Okta SCIM v2.0', 'jumpcloud-scim-v2' = 'JumpCloud v2.0',