Skip to content
Share
Explore

Support knowledge base

light

Why should you use this support knowledge base?

By keeping your support documentation or knowledge base in a single table, you simplify the need to search across many pages to find the information you’re looking for. Because creating a row/card and adding information is a low friction experience, teammates are encouraged to add documentation without it feeling too cumbersome.
info

Using this template

Use the “Add article” button at the top right of the table to add articles or you can import rows using /import. Tags will be automatically selected using AI, you can refresh these tags manually or select them yourself. The tags available can be found in the table.
Clear sample data
Help articles
🌀 IT Owned Automations
Welcome to our guide on IT owned automations! In today's fast-paced world, automation has become an essential part of our lives, and the IT industry is no exception. The use of automation in IT can help streamline processes, improve efficiency, and reduce errors. In this article, we'll take a closer look at what IT owned automations are and how they can benefit your organization.

What are IT owned automations?

IT owned automations are automated processes that are managed and owned by the IT department. These processes can range from simple tasks, such as password resets, to more complex tasks, such as server maintenance and software updates. The goal of IT owned automations is to reduce the workload of IT personnel, freeing them up to focus on more critical tasks.
Last Updated: 11/15/2023
Automation Bot
📰 IT Newsletter Template
Are you looking for a way to keep your team up-to-date on all the latest technology news and updates? Look no further than our IT Newsletter template! This easy-to-use template is perfect for anyone who wants to create a professional and informative newsletter that will keep your team informed and engaged.
The template is fully customizable, so you can add your own branding and content to make it uniquely yours. You can include articles on topics like new software releases, cybersecurity updates, and industry trends. You can also feature interviews with experts in the field or highlight your own team's achievements.
Our IT Newsletter template is designed to be easy to read and visually appealing. With a clean, modern layout and eye-catching graphics, your team will look forward to receiving your newsletter each month. And with the ability to send it via email or print it out, you can choose the format that works best for your team. So why wait? Start creating your own IT Newsletter today and keep your team informed and engaged!
Last Updated: 11/15/2023
Automation Bot
💻 macOS Provisioning
If you're setting up a new macOS device or need to make changes to an existing one, provisioning can save you time and effort. Provisioning is the process of configuring a device with the necessary settings, applications, and user accounts. In this article, we'll cover the basics of macOS provisioning and how you can get started.
First, you'll need a provisioning profile. A provisioning profile is a digital document that contains information about your app and how it will be used. It's required to install your app on a device and to test it before submitting it to the App Store. To create a provisioning profile, you'll need an Apple Developer account. Once you have an account, you can create a profile in Xcode or using the Apple Developer website.
Next, you'll want to configure your device with the necessary settings and applications. This can be done manually or through a Mobile Device Management (MDM) solution. With an MDM solution, you can remotely manage your devices and apply changes to multiple devices at once. You can also configure settings such as Wi-Fi, VPN, and email accounts.
Last Updated: 11/15/2023
Automation Bot
🚪Windows Provisioning
If you've ever had to set up a new computer or reinstall Windows, you know it can be a time-consuming process. Windows provisioning can help make this process smoother and more efficient. Provisioning is the process of setting up a computer with the necessary software, settings, and configurations to make it ready for use. In this article, we'll cover the basics of Windows provisioning and how it can benefit you.
First, let's talk about the different types of provisioning. There are two main types: standard and dynamic. Standard provisioning involves creating a preconfigured image of Windows and installing it on a computer. This can be useful for companies that need to set up multiple computers with the same software and settings. Dynamic provisioning, on the other hand, involves configuring a computer on-the-fly using scripts and templates. This can be useful for companies that need to set up computers with different configurations based on user roles or departments.
Now that you know the basics of provisioning, let's talk about how to get started. Windows provisioning can be done using a variety of tools, including Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS). These tools allow you to create and deploy images, as well as automate the provisioning process using scripts and templates. You can also use third-party tools like System Center Configuration Manager (SCCM) for more advanced provisioning options.
Last Updated: 11/15/2023
Automation Bot
🕛 Temporary Access - Okta Group Assignment
Have you ever needed to provide temporary access to a group of people for a specific project or task? With Okta, you can easily assign temporary access to a group of users without having to manually update each individual user's permissions.
To get started, navigate to the Okta Admin Dashboard and select the "Groups" tab. From here, you can create a new group or select an existing group to assign temporary access to.
Once you have selected the group, click on the "Add Rule" button. This will allow you to set the duration of the temporary access, as well as the specific applications and permissions that the group will have access to.
Last Updated: 11/15/2023
Automation Bot
💸 Hardware Standards
Welcome to our help article about hardware standards! In this article, we'll cover everything you need to know about hardware standards and how they impact your devices.
Hardware standards are specifications that define how a particular device should be built and how it should interact with other devices. These standards ensure that devices are compatible with each other, even if they are made by different manufacturers. For example, USB is a hardware standard that allows you to connect a wide range of devices to your computer, including mice, keyboards, and external hard drives.
When you're shopping for new hardware, it's important to pay attention to the hardware standards that your devices use. If your devices use different hardware standards, they may not work properly together. This can lead to frustrating compatibility issues that can be difficult to resolve. By sticking to compatible hardware standards, you can ensure that your devices work seamlessly together and avoid any potential headaches down the line.
Last Updated: 11/15/2023
Automation Bot
♻️ Refresh Snowflake SCIM Token
Refreshing your Snowflake SCIM token is an important step in maintaining the security of your Snowflake account. A SCIM token is used to authenticate API requests made to Snowflake. It's important to note that SCIM tokens expire after a certain amount of time, and when that happens, you'll need to refresh your token.
To refresh your Snowflake SCIM token, first log in to your Snowflake account. Then, navigate to the "Security" tab and select "API Access" from the menu. From there, you'll be able to see all of the SCIM tokens associated with your account. Find the token you want to refresh and click the "Refresh" button.
Once you've clicked the "Refresh" button, a new token will be generated and the old token will be invalidated. It's important to update any scripts or applications that use the old token with the new token to ensure they continue to function properly. By taking the time to refresh your Snowflake SCIM token, you'll be taking an important step in maintaining the security of your Snowflake account.
Last Updated: 11/15/2023
Automation Bot
🧑‍🤝‍🧑 Entitlements
Entitlements are benefits or privileges that individuals or groups of people are entitled to receive. These entitlements are usually provided by the government, organizations, or institutions. The purpose of these entitlements is to ensure that everyone has access to basic necessities, such as healthcare, education, and housing.
One of the most common types of entitlements are social security benefits. Social security benefits are provided to individuals who have contributed to the social security system over a period of time. These benefits are meant to provide financial assistance to individuals who are retired, disabled, or have lost a loved one. Social security benefits are a crucial part of the safety net that ensures that everyone has a basic standard of living.
Another type of entitlement is healthcare. In many countries, healthcare is considered a basic entitlement that everyone should have access to. Healthcare entitlements can include access to preventive care, treatment for illnesses and injuries, and prescription drugs. Healthcare entitlements are important because they ensure that everyone has access to the same level of care, regardless of their income or social status.
Last Updated: 11/15/2023
Automation Bot
🗳️ AWS RBAC Groups
Are you confused about AWS RBAC Groups? Don't worry, we've got you covered! In this article, we'll explain what AWS RBAC Groups are and how they work.
AWS RBAC Groups allow you to manage access to AWS resources based on the roles and responsibilities of your users. With RBAC, you can define the permissions that each user has and assign them to specific roles. This makes it easy to manage access to your AWS resources and ensure that your users only have access to the resources they need.
To get started with AWS RBAC Groups, you'll need to create a group and assign roles to it. Once you've created your group, you can add users to it and assign them to specific roles. You can also create policies that define the permissions that each role has. With RBAC, you have complete control over access to your AWS resources, and you can easily manage permissions as your users' roles and responsibilities change.
Last Updated: 11/15/2023
Automation Bot
↪️Okta Rule Prefixes
If you're new to Okta or just getting started with creating rules, you may be wondering what the prefixes in the rule names mean. In this article, we'll explain the different prefixes you might see when creating rules in Okta and what they mean.
The most common prefix you'll see in rule names is "IDP." This stands for Identity Provider and refers to rules that apply to the identity provider Okta is connecting to, such as Active Directory or LDAP. These rules are used to map attributes between the identity provider and Okta, and to control which users can authenticate with Okta.
Another prefix you might see is "SWA," which stands for Secure Web Authentication. These rules are used to automate the login process for web applications that don't support SAML or OIDC, such as legacy applications or those that use form-based authentication. With SWA rules, you can configure Okta to automatically fill in login fields and submit the form on behalf of the user.
Last Updated: 11/15/2023
Automation Bot
Article tags
Want to print your doc?
This is not the way.
Try clicking the ··· in the right corner or using a keyboard shortcut (
CtrlP
) instead.