diff --git a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/index.md b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/index.md
index 117dd5e5ab4..4bd20e15181 100644
--- a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/index.md
+++ b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/index.md
@@ -7,7 +7,7 @@ slug: /deployment/security/amazon-cognito
Follow the sections in this guide to set up Amazon Cognito SSO.
-
+## Create Server Credentials
### Step 1: Login to AWS Portal
@@ -54,8 +54,6 @@ Follow the sections in this guide to set up Amazon Cognito SSO.
-
-
After the applying these steps, you can update the configuration of your deployment:
diff --git a/openmetadata-docs/content/deployment/security/auth0/index.md b/openmetadata-docs/content/deployment/security/auth0/index.md
index ce54bf3f8ab..5b19cc5158a 100644
--- a/openmetadata-docs/content/deployment/security/auth0/index.md
+++ b/openmetadata-docs/content/deployment/security/auth0/index.md
@@ -7,7 +7,7 @@ slug: /deployment/security/auth0
Follow the sections in this guide to set up Auth0 SSO.
-
+## Create Server Credentials
### Step 1: Create the Account
@@ -47,9 +47,7 @@ Follow the sections in this guide to set up Auth0 SSO.
-
-
-
+## Create Service Account
This section will guide to create the Ingestion Bot service account.
@@ -109,8 +107,6 @@ This section will guide to create the Ingestion Bot service account.
-
-
After the applying these steps, you can update the configuration of your deployment:
diff --git a/openmetadata-docs/content/deployment/security/azure/index.md b/openmetadata-docs/content/deployment/security/azure/index.md
index f0600c47d5b..214436dff22 100644
--- a/openmetadata-docs/content/deployment/security/azure/index.md
+++ b/openmetadata-docs/content/deployment/security/azure/index.md
@@ -7,7 +7,7 @@ slug: /deployment/security/azure
Follow the sections in this guide to set up Azure SSO.
-
+## Create Server Credentials
### Step 1: Login to Azure Active Directory
@@ -49,9 +49,7 @@ Admin permissions are required to register the application on the Azure portal.
"authority": "https://login.microsoftonline.com/c11234b7c-b1b2-9854-0mn1-56abh3dea295"
```
-
-
-
+## Create Service Application
### Step 1: Access Tokens and ID Tokens
@@ -158,9 +156,6 @@ This information is required to configure Airflow.
-
-
-
After the applying these steps, you can update the configuration of your deployment:
diff --git a/openmetadata-docs/content/deployment/security/custom-oidc/index.md b/openmetadata-docs/content/deployment/security/custom-oidc/index.md
index 26245c22553..6687541a612 100644
--- a/openmetadata-docs/content/deployment/security/custom-oidc/index.md
+++ b/openmetadata-docs/content/deployment/security/custom-oidc/index.md
@@ -7,22 +7,16 @@ slug: /deployment/security/custom-oidc
Follow the sections in this guide to set up Custom OIDC SSO.
-
+## Create Server Credentials
- Go to the console of your preferred custom OIDC SSO provider
- Create an OIDC client application with implicit flow enabled to get a client ID.
-
-
### Create Client ID and Secret Key
- Navigate to your preferred OIDC provider console and create an OIDC client application.
- Generate client ID and secret key in JSON format.
-
-
-
-
After the applying these steps, you can update the configuration of your deployment:
diff --git a/openmetadata-docs/content/deployment/security/google/index.md b/openmetadata-docs/content/deployment/security/google/index.md
index 7888b56af67..c059051fd02 100644
--- a/openmetadata-docs/content/deployment/security/google/index.md
+++ b/openmetadata-docs/content/deployment/security/google/index.md
@@ -7,7 +7,7 @@ slug: /deployment/security/google
Follow the sections in this guide to set up Google SSO.
-
+## Create Server Credentials
### Step 1: Create the Account
- Go to [Create Google Cloud Account](https://console.cloud.google.com/)
@@ -72,9 +72,8 @@ After selecting the **Application Type**, name your project and give the authori
- You will find the **Client ID** and **Client Secret** in the top right corner
-
+## Create Service Account
-
This is a guide to create ingestion bot service account.
### Step 1: Create Service-Account
@@ -136,8 +135,6 @@ Ensure that the Service Account ID is **ingestion-bot** and click on **CREATE AN
- The private-key/service-account JSON file will be downloaded.
-
-
After the applying these steps, you can update the configuration of your deployment:
diff --git a/openmetadata-docs/content/deployment/security/keycloak/index.md b/openmetadata-docs/content/deployment/security/keycloak/index.md
index 1c2f77198c8..6d0f8e8e264 100644
--- a/openmetadata-docs/content/deployment/security/keycloak/index.md
+++ b/openmetadata-docs/content/deployment/security/keycloak/index.md
@@ -7,7 +7,7 @@ slug: /deployment/security/keycloak
Follow the sections in this guide to set up Keycloak SSO.
-
+## Create Server Credentials
### Step 1: Access the Keycloak Admin Console
@@ -57,8 +57,6 @@ Follow the sections in this guide to set up Keycloak SSO.
-
-
After the applying these steps, the users in your realm are able to login in the openmetadata, as a suggestion create a user called "admin-user". Now you can update the configuration of your deployment:
diff --git a/openmetadata-docs/content/deployment/security/okta/index.md b/openmetadata-docs/content/deployment/security/okta/index.md
index 77da3643623..e3c84261ef6 100644
--- a/openmetadata-docs/content/deployment/security/okta/index.md
+++ b/openmetadata-docs/content/deployment/security/okta/index.md
@@ -7,7 +7,8 @@ slug: /deployment/security/okta
Follow the sections in this guide to set up Okta SSO.
-
+## Create Server Credentials
+
This document will explain how to create an Okta app and configure it for OAuth. This will generate the information required for Single Sign On with Okta.
### Step 1: Create an Okta Account
@@ -114,9 +115,8 @@ The Issuer URL shows up as Dynamic by default. Change the Issuer URL to Okta URL
- The **Audience** is the same as the Client ID.
-
+## Create Service Application
-
This is a guide to create ingestion bot service app.
### Step 1: Generate Public/Private Key Pair
@@ -197,8 +197,6 @@ curl --location --request POST '/oauth2/v1/clients' \
- To get more information on the Scopes. Visit the [Doc](https://developer.okta.com/docs/guides/implement-oauth-for-okta/scopes/).
-
-
After the applying these steps, you can update the configuration of your deployment:
diff --git a/openmetadata-docs/content/deployment/security/one-login/index.md b/openmetadata-docs/content/deployment/security/one-login/index.md
index 648155902ae..f7b9091fa70 100644
--- a/openmetadata-docs/content/deployment/security/one-login/index.md
+++ b/openmetadata-docs/content/deployment/security/one-login/index.md
@@ -7,7 +7,7 @@ slug: /deployment/security/one-login
Follow the sections in this guide to set up OneLogin SSO.
-
+## Create Server Credentials
### Step 1: Configure a new Application
@@ -44,9 +44,7 @@ Follow the sections in this guide to set up OneLogin SSO.
- Copy the Issuer URL
-
-
-
+## Create Service Account
### Create Secret Key
@@ -54,8 +52,6 @@ Follow the sections in this guide to set up OneLogin SSO.
-
-
After the applying these steps, you can update the configuration of your deployment: