diff --git a/docs/reference/configuration/Single Sign-On/Identity Providers/overview.md b/docs/reference/configuration/Single Sign-On/Identity Providers/overview.md index 583d84ce07..4b1cae7026 100644 --- a/docs/reference/configuration/Single Sign-On/Identity Providers/overview.md +++ b/docs/reference/configuration/Single Sign-On/Identity Providers/overview.md @@ -1,7 +1,7 @@ --- title: Overview sidebar: - order: 20 + order: 2 --- diff --git a/docs/reference/configuration/Single Sign-On/overview.md b/docs/reference/configuration/Single Sign-On/overview.md index 1fed24ae97..9aee6c12a8 100644 --- a/docs/reference/configuration/Single Sign-On/overview.md +++ b/docs/reference/configuration/Single Sign-On/overview.md @@ -1,7 +1,7 @@ --- title: Overview sidebar: - order: 20 + order: 3 --- UDS Core leverages [Keycloak](https://www.keycloak.org/) and [Authservice](https://github.com/istio-ecosystem/authservice) to implify authentication and authorization for applications. These tools enable seamless user authentication experiences while supporting various OAuth 2.0 and OpenID Connect (OIDC) flows. diff --git a/docs/reference/configuration/UDS operator/exemption.md b/docs/reference/configuration/UDS operator/exemption.md index c95d819bb1..43fe394b8c 100644 --- a/docs/reference/configuration/UDS operator/exemption.md +++ b/docs/reference/configuration/UDS operator/exemption.md @@ -1,7 +1,5 @@ --- title: UDS Exemption -sidebar: - order: 3 ---  diff --git a/docs/reference/configuration/UDS operator/package.md b/docs/reference/configuration/UDS operator/package.md index 08e5611e09..4df924cf3f 100644 --- a/docs/reference/configuration/UDS operator/package.md +++ b/docs/reference/configuration/UDS operator/package.md @@ -1,7 +1,5 @@ --- title: UDS Package -sidebar: - order: 2 ---  diff --git a/docs/reference/configuration/authorization-policies.md b/docs/reference/configuration/authorization-policies.md index 07bbd0eb5a..1eb31330ff 100644 --- a/docs/reference/configuration/authorization-policies.md +++ b/docs/reference/configuration/authorization-policies.md @@ -1,7 +1,5 @@ --- title: How Authorization Policies Protect Your Services -sidebar: - order: 3 --- In clusters running Istio Ambient Mesh, UDS‑Core enforces **ingress network security** using Istio **ALLOW** AuthorizationPolicies. These policies are automatically generated for each application package you define with a [UDS Package](https://uds.defenseunicorns.com/reference/configuration/uds-operator/package/) resource. diff --git a/docs/reference/configuration/backup and restore/vsphere-rke2-csi.md b/docs/reference/configuration/backup and restore/vsphere-rke2-csi.md index 1f493d883f..85202c7db0 100644 --- a/docs/reference/configuration/backup and restore/vsphere-rke2-csi.md +++ b/docs/reference/configuration/backup and restore/vsphere-rke2-csi.md @@ -1,5 +1,7 @@ --- title: RKE2 CSI Snapshotting on vSphere +sidebar: + order: 4 --- ## Introduction diff --git a/docs/reference/configuration/custom resources/exemptions-v1alpha1-cr.md b/docs/reference/configuration/custom resources/exemptions-v1alpha1-cr.md index 2174bda692..be16758844 100644 --- a/docs/reference/configuration/custom resources/exemptions-v1alpha1-cr.md +++ b/docs/reference/configuration/custom resources/exemptions-v1alpha1-cr.md @@ -2,6 +2,8 @@ title: Exemptions CR (v1alpha1) tableOfContents: maxHeadingLevel: 6 +sidebar: + order: 20 ---