Skip to content

Commit a6e2d2d

Browse files
docs: add descriptions to items in manifest (#18064)
[preview](https://coder.com/docs/@manifest-descriptions/admin/users/quotas#up-next) --------- Co-authored-by: EdwardAngert <17991901+EdwardAngert@users.noreply.github.com> Co-authored-by: Atif Ali <atif@coder.com>
1 parent 97ba7f1 commit a6e2d2d

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

docs/manifest.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -304,14 +304,17 @@
304304
"children": [
305305
{
306306
"title": "Up to 1,000 Users",
307+
"description": "Hardware specifications and architecture guidance for Coder deployments that support up to 1,000 users",
307308
"path": "./admin/infrastructure/validated-architectures/1k-users.md"
308309
},
309310
{
310311
"title": "Up to 2,000 Users",
312+
"description": "Hardware specifications and architecture guidance for Coder deployments that support up to 2,000 users",
311313
"path": "./admin/infrastructure/validated-architectures/2k-users.md"
312314
},
313315
{
314316
"title": "Up to 3,000 Users",
317+
"description": "Enterprise-scale architecture recommendations for Coder deployments that support up to 3,000 users",
315318
"path": "./admin/infrastructure/validated-architectures/3k-users.md"
316319
}
317320
]
@@ -341,42 +344,51 @@
341344
"children": [
342345
{
343346
"title": "OIDC Authentication",
347+
"description": "Configure OpenID Connect authentication with identity providers like Okta or Active Directory",
344348
"path": "./admin/users/oidc-auth.md"
345349
},
346350
{
347351
"title": "GitHub Authentication",
352+
"description": "Set up authentication through GitHub OAuth to enable secure user login and sign-up",
348353
"path": "./admin/users/github-auth.md"
349354
},
350355
{
351356
"title": "Password Authentication",
357+
"description": "Manage username/password authentication settings and user password reset workflows",
352358
"path": "./admin/users/password-auth.md"
353359
},
354360
{
355361
"title": "Headless Authentication",
362+
"description": "Create and manage headless service accounts for automated systems and API integrations",
356363
"path": "./admin/users/headless-auth.md"
357364
},
358365
{
359366
"title": "Groups \u0026 Roles",
367+
"description": "Manage access control with user groups and role-based permissions for Coder resources",
360368
"path": "./admin/users/groups-roles.md",
361369
"state": ["premium"]
362370
},
363371
{
364372
"title": "IdP Sync",
373+
"description": "Synchronize user groups, roles, and organizations from your identity provider to Coder",
365374
"path": "./admin/users/idp-sync.md",
366375
"state": ["premium"]
367376
},
368377
{
369378
"title": "Organizations",
379+
"description": "Segment and isolate resources by creating separate organizations for different teams or projects",
370380
"path": "./admin/users/organizations.md",
371381
"state": ["premium"]
372382
},
373383
{
374384
"title": "Quotas",
385+
"description": "Control resource usage by implementing workspace budgets and credit-based cost management",
375386
"path": "./admin/users/quotas.md",
376387
"state": ["premium"]
377388
},
378389
{
379390
"title": "Sessions \u0026 API Tokens",
391+
"description": "Manage authentication tokens for API access and configure session duration policies",
380392
"path": "./admin/users/sessions-tokens.md"
381393
}
382394
]

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy