diff --git a/openmetadata-docs/content/deployment/bare-metal/security.md b/openmetadata-docs/content/deployment/bare-metal/security.md
index d61cb891d0a..2004b315567 100644
--- a/openmetadata-docs/content/deployment/bare-metal/security.md
+++ b/openmetadata-docs/content/deployment/bare-metal/security.md
@@ -5,12 +5,14 @@ slug: /deployment/bare-metal/security
# Bare Metal Security
+Follow the steps for setting up the SSO, and then check the specific `Bare Metal` section of your chosen SSO.
+
Configure Auth0 SSO to access the UI and APIs
@@ -18,7 +20,7 @@ slug: /deployment/bare-metal/security
color="violet-70"
bold="Azure SSO"
icon="add_moderator"
- href="/deployment/security/azure/bare-metal"
+ href="/deployment/security/azure"
>
Configure Azure SSO to access the UI and APIs
@@ -26,7 +28,7 @@ slug: /deployment/bare-metal/security
color="violet-70"
bold="Custom OIDC SSO"
icon="add_moderator"
- href="/deployment/security/custom-oidc/bare-metal"
+ href="/deployment/security/custom-oidc"
>
Configure a Custom OIDC SSO to access the UI and APIs
@@ -34,7 +36,7 @@ slug: /deployment/bare-metal/security
color="violet-70"
bold="Google SSO"
icon="add_moderator"
- href="/deployment/security/google/bare-metal"
+ href="/deployment/security/google"
>
Configure Google SSO to access the UI and APIs
@@ -42,8 +44,32 @@ slug: /deployment/bare-metal/security
color="violet-70"
bold="Okta SSO"
icon="add_moderator"
- href="/deployment/security/okta/bare-metal"
+ href="/deployment/security/okta"
>
Configure Okta SSO to access the UI and APIs
+
+ Configure Amazon Cognito SSO to access the UI and APIs
+
+
+ Configure OneLogin SSO to access the UI and APIs
+
+
+ Configure Keycloak SSO to access the UI and APIs
+
\ No newline at end of file
diff --git a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/docker.md b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/docker.md
index 2b3539c9acc..79888e6d4c2 100644
--- a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/docker.md
+++ b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/docker.md
@@ -37,5 +37,5 @@ from [Enabling JWT Tokens](/deployment/security/enable-jwt-tokens).
## 2. Start Docker
```commandline
-docker compose --env-file ~/openmetadata.env up -d
+docker compose --env-file ~/openmetadata_cognito.env up -d
```
diff --git a/openmetadata-docs/content/deployment/security/custom-oidc/docker.md b/openmetadata-docs/content/deployment/security/custom-oidc/docker.md
index 920c33b34c8..76555629e65 100644
--- a/openmetadata-docs/content/deployment/security/custom-oidc/docker.md
+++ b/openmetadata-docs/content/deployment/security/custom-oidc/docker.md
@@ -39,5 +39,5 @@ OM_AUTH_AIRFLOW_CUSTOM_OIDC_TOKEN_ENDPOINT_URL={endpoint}
## 2. Start Docker
```commandline
-docker compose --env-file ~/openmetadata_azure.env up -d
+docker compose --env-file ~/openmetadata_oidc.env up -d
```
diff --git a/openmetadata-docs/content/deployment/security/enable-ssl/index.md b/openmetadata-docs/content/deployment/security/enable-ssl/index.md
index 19cb7627453..fc09b110e1c 100644
--- a/openmetadata-docs/content/deployment/security/enable-ssl/index.md
+++ b/openmetadata-docs/content/deployment/security/enable-ssl/index.md
@@ -18,9 +18,9 @@ In this section we will guide you through adding SSL to your OpenMetadata deploy
Set SSL directly at the OpenMetadata server.
diff --git a/openmetadata-docs/content/deployment/security/google/docker.md b/openmetadata-docs/content/deployment/security/google/docker.md
index 2baa226ec05..a6a5bb8f3ad 100644
--- a/openmetadata-docs/content/deployment/security/google/docker.md
+++ b/openmetadata-docs/content/deployment/security/google/docker.md
@@ -34,5 +34,5 @@ OM_AUTH_AIRFLOW_GOOGLE_SECRET_KEY_PATH=/path/to/secret.json
## 2. Start Docker
```commandline
-docker compose --env-file ~/openmetadata.env up -d
+docker compose --env-file ~/openmetadata_google.env up -d
```
diff --git a/openmetadata-docs/content/deployment/security/keycloak/docker.md b/openmetadata-docs/content/deployment/security/keycloak/docker.md
index 023c1f8e753..f42c9c077df 100644
--- a/openmetadata-docs/content/deployment/security/keycloak/docker.md
+++ b/openmetadata-docs/content/deployment/security/keycloak/docker.md
@@ -9,7 +9,7 @@ To enable security for the Docker deployment, follow the next steps:
## 1. Create an .env file
-Create an `openmetadata_oidc.env` file and add the following contents as an example. Use the information
+Create an `openmetadata_keycloak.env` file and add the following contents as an example. Use the information
generated when setting up the account.
The configuration below already uses the presets shown in the example of keycloak configurations, you can change to yours.
@@ -39,5 +39,5 @@ OM_AUTH_AIRFLOW_CUSTOM_OIDC_TOKEN_ENDPOINT_URL="http://localhost:8080/realms/dat
## 2. Start Docker
```commandline
-docker compose --env-file ~/openmetadata_azure.env up -d
+docker compose --env-file ~/openmetadata_keycloak.env up -d
```
diff --git a/openmetadata-docs/content/deployment/security/okta/docker.md b/openmetadata-docs/content/deployment/security/okta/docker.md
index 46084e644aa..9516c0a0836 100644
--- a/openmetadata-docs/content/deployment/security/okta/docker.md
+++ b/openmetadata-docs/content/deployment/security/okta/docker.md
@@ -40,5 +40,5 @@ OM_AUTH_AIRFLOW_OKTA_SCOPES={OM_AUTH_AIRFLOW_OKTA_SCOPES:-[]}
## 2. Start Docker
```commandline
-docker compose --env-file ~/openmetadata_azure.env up -d
+docker compose --env-file ~/openmetadata_okta.env up -d
```