diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
index cdf6b78aa10b67875006572e6b2b341f1db94825..06a3cdb24fbb5b1a3643475434e6833b2b24e7d4 100644
--- a/.gitlab-ci.yml
+++ b/.gitlab-ci.yml
@@ -1,5 +1,5 @@
 include:
-  - remote: https://open.greenhost.net/openappstack/openappstack/raw/master/.gitlab/ci_templates/kaniko.yml
+  - remote: https://open.greenhost.net/stackspin/stackspin/raw/master/.gitlab/ci_templates/kaniko.yml
 
 stages:
   - build
@@ -96,7 +96,7 @@ behave-integration:
         - --dangerous-force-http
         - --dangerous-allow-insecure-redirect-urls
         - "http://oidc:5000/callback"
-    - name: open.greenhost.net:4567/openappstack/user-panel/backend:master
+    - name: open.greenhost.net:4567/stackspin/user-panel/backend:master
       alias: backend
     - name: ${CI_REGISTRY_IMAGE}/integration_test_app:${CI_COMMIT_REF_NAME}
       alias: oidc
diff --git a/.gitmodules b/.gitmodules
index 42291c96ad9d35fbb24579d68769577068cc72a0..88b746c00097eb28e282c95ef9eddd5c168648b9 100644
--- a/.gitmodules
+++ b/.gitmodules
@@ -1,3 +1,3 @@
 [submodule "user-panel"]
 	path = user-panel
-	url = https://open.greenhost.net/openappstack/user-panel.git
+	url = https://open.greenhost.net/stackspin/user-panel.git
diff --git a/LICENSE b/LICENSE
index a0bd49f4e435e6a6febd14d116120f574d9727ed..68a70de0c6915b5c5680f3c7de3bb097f57c4f75 100644
--- a/LICENSE
+++ b/LICENSE
@@ -186,7 +186,7 @@
       same "printed page" as the copyright notice for easier
       identification within third-party archives.
 
-   Copyright 2019 openappstack
+   Copyright 2019 stackspin
 
    Licensed under the Apache License, Version 2.0 (the "License");
    you may not use this file except in compliance with the License.
diff --git a/README.md b/README.md
index 9f02f8f23a46c88d72694bd431248e0ae42b2d30..04f479e222c3210f51e487fca9095b682cd0ab9f 100644
--- a/README.md
+++ b/README.md
@@ -1 +1 @@
-Please refer to the [online documentation](https://docs.openappstack.net/projects/single-sign-on/) for all the details
+Please refer to the [online documentation](https://docs.stackspin.net/projects/single-sign-on/) for all the details
diff --git a/consent_provider/db.py b/consent_provider/db.py
index 2ad3e80864f7a3a488d5d84b908f6e735e1dd8e4..fa994efa52ad7cc07f3896278fe6a348c7cb88fe 100644
--- a/consent_provider/db.py
+++ b/consent_provider/db.py
@@ -66,7 +66,7 @@ class User():
                 "name": self.username,
                 "preferred_username": self.username,
                 "email" : self.email,
-                "openappstack_roles": self.roles}
+                "stackspin_roles": self.roles}
         }
 
 
diff --git a/docs/conf.py b/docs/conf.py
index 758b3a7965b03788a7a57cfd3cf8fac7c2ed136c..f83f336d4166c7b92dfa15b69763962334bace20 100644
--- a/docs/conf.py
+++ b/docs/conf.py
@@ -18,8 +18,8 @@
 # -- Project information -----------------------------------------------------
 
 project = 'single-sign-on'
-copyright = '2020, OpenAppStack'
-author = 'OpenAppStack'
+copyright = '2020, Stackspin'
+author = 'Stackspin'
 
 # The full version, including alpha/beta/rc tags
 with open('../VERSION') as version_file:
diff --git a/docs/helmchart.md b/docs/helmchart.md
index 5abda4e8ab3d7ceb4d785839dc748f826d8520cf..d4625b009e6f61481f36c9aeef0465f1c23ccbc3 100644
--- a/docs/helmchart.md
+++ b/docs/helmchart.md
@@ -4,7 +4,7 @@ Single sign-on adds an Authentication server to your k8s cluster, that can be us
 applications within your cluster and by external applications to log in your users.
 
 This chart also includes a minimalistic
-[user-panel](https://open.greenhost.net/openappstack/user-panel), which can be used to create
+[user-panel](https://open.greenhost.net/stackspin/user-panel), which can be used to create
 new users, assign roles to users and grant users access to applications.
 
 ## Prerequisites
@@ -28,19 +28,19 @@ This table lists the variables you are most likely to change. Take a look at the
 
 | Parameter                            | Description                                             | Default                                 |
 | ------------------------------------ | ------------------------------------------------------- | -------------------------               |
-| `consentProvider.image.repository`   | Name of image repository to be used for consent provider| open.greenhost.net:4567/openappstack/single-sign-on/consent_provider |
+| `consentProvider.image.repository`   | Name of image repository to be used for consent provider| open.greenhost.net:4567/stackspin/single-sign-on/consent_provider |
 | `consentProvider.image.tag`          | Release version of consent provider image               | master                                  |
-| `loginProvider.image.repository`     | Name of image repository to be used for login provider  | open.greenhost.net:4567/openappstack/single-sign-on/login_provider |
+| `loginProvider.image.repository`     | Name of image repository to be used for login provider  | open.greenhost.net:4567/stackspin/single-sign-on/login_provider |
 | `loginProvider.image.tag`            | Release version of login provider image                 | master                                  |
-| `singleSignOnHost`                   | **FQDN of the openID Connect / oAuth2 server**          | **sso.oas.example.net**                 |
-| `userpanel.ingress.host`             | **FQDN of the userpanel**                               | **admin.oas.example.net**               |
+| `singleSignOnHost`                   | **FQDN of the openID Connect / oAuth2 server**          | **sso.stackspin.example.net**                 |
+| `userpanel.ingress.host`             | **FQDN of the userpanel**                               | **admin.stackspin.example.net**               |
 | `userbackend.username`               | Username of the admin user                              | admin                                   |
 | `userbackend.password`               | Password of the admin user                              | YouReallyNeedToChangeThis               |
 | `userbackend.email`                  | Email address of the admin user                         | admin@example.net                       |
 | `userbackend.postgres.password`      | Root pw of the psql DB                                  | postgres                                |
-| `hydra.hydra.config.urls.self.issuer`| **Base URI of the oAuth server**                        | **https://sso.oas.example.net**         |
-| `hydra.hydra.config.urls.login`      | **URI that will be used for the login page**            | **https://sso.oas.example.net/login**   |
-| `hydra.hydra.config.urls.consent`    | **URI that will be used for permission checks**         | **https://sso.oas.example.net/consent** |
+| `hydra.hydra.config.urls.self.issuer`| **Base URI of the oAuth server**                        | **https://sso.stackspin.example.net**         |
+| `hydra.hydra.config.urls.login`      | **URI that will be used for the login page**            | **https://sso.stackspin.example.net/login**   |
+| `hydra.hydra.config.urls.consent`    | **URI that will be used for permission checks**         | **https://sso.stackspin.example.net/consent** |
 | `hydra.hydra.config.secrets.system`  | Secret that is used to generate secure tokens           | YouReallyNeedToChangeThis               |
 | `oAuthClients`                       | A list of clients that need to be registered after installation. See [Registering clients](#registering-clients) for more info | user-panel configuration (**Change the `clientSecret`**!) |
 
@@ -70,13 +70,13 @@ clientName: user-panel
 clientSecret: "YouReallyNeedToChangeThis"
 # The url the browser will be redirected to by Hydra when the authentication process is 
 # completed
-redirectUri: "https://admin.oas.example.net/callback"
+redirectUri: "https://admin.stackspin.example.net/callback"
 # A list of scopes the client needs access to
-scopes: "openid profile email openappstack_roles"
+scopes: "openid profile email stackspin_roles"
 # A url that is displayed in the user-panel for the user to navigate to the application
-clientUri: "https://admin.oas.example.net"
+clientUri: "https://admin.stackspin.example.net"
 # Point to a logo for the application that will be displayed in the user-panel
-clientLogoUri: "https://admin.oas.example.net/favicon.ico"
+clientLogoUri: "https://admin.stackspin.example.net/favicon.ico"
 # Set the method that the oAUth client uses to authenticate agains the oAuth server i.e. to
 # retrieve tokens or userinfo
 tokenEndpointAuthMethod: "client_secret_basic"
@@ -94,7 +94,7 @@ To install the chart with the realease name `single-sign-on` first clone the rep
 and then run helm install.
 
 ```
-$ git clone https://open.greenhost.net/openappstack/single-sign-on
+$ git clone https://open.greenhost.net/stackspin/single-sign-on
 $ cd single-sign-on/helmchart/single-sign-on/
 $ helm install -n single-sign-on .
 ```
diff --git a/docs/index.rst b/docs/index.rst
index 4f4c2f0a7ad990f0509afb414369c75d0012c6db..8b46d87b55c23bf854929cab5c31dcd003adc343 100644
--- a/docs/index.rst
+++ b/docs/index.rst
@@ -8,7 +8,7 @@ Welcome to single-sign-on's documentation!
 
 This project provides a single sign on solution based on
 [hydra](https://github.com/ory/hydra) and in combination with a [user
-panel](https://open.greenhost.net/openappstack/user-panel).
+panel](https://open.greenhost.net/stackspin/user-panel).
 
 .. toctree::
    :maxdepth: 2
diff --git a/docs/local_dev_remote_kratos.md b/docs/local_dev_remote_kratos.md
index 548756b11d324ab1ebb70b33e5fd7c0a708562e0..3ac795434532f908a51de37980deb33f8ee94c43 100644
--- a/docs/local_dev_remote_kratos.md
+++ b/docs/local_dev_remote_kratos.md
@@ -22,7 +22,7 @@ kratos. To use / add the kratos backend, the following needs to be done:
 
 On your provisioning machine, make sure to checkout:
 
-`git@open.greenhost.net:openappstack/single-sign-on.git`
+`git@open.greenhost.net:stackspin/single-sign-on.git`
 
 Be sure to check out the latest master. Or select a more modern brach if you
 want to test / install (optional) improvements of the kratos system. 
@@ -35,14 +35,14 @@ Once this is all fetched, installation can be done with the following steps:
    to prevent this. We can suspend the service with:
 
 ```
-flux suspend source chart oas-single-sign-on
+flux suspend source chart stackspin-single-sign-on
 ```
 
 2. Make a backup of the current keys and configuration values. We needs those
    when we install the new version of the `single-sign-on` helmchart:
 
 ```
-helm get values single-sign-on -n oas > /to/a/path/my_cluster_values.yaml
+helm get values single-sign-on -n stackspin > /to/a/path/my_cluster_values.yaml
 ```
 
 3. Install all helm dependencies
@@ -89,7 +89,7 @@ kratos:
 
 ```
 cd helmchart/single-sign-on
-helm upgrade -f /to/a/path/my_cluster_values.yaml single-sign-on . -n oas --debug
+helm upgrade -f /to/a/path/my_cluster_values.yaml single-sign-on . -n stackspin --debug
 ```
 
 This will install the latest version. 
@@ -102,7 +102,7 @@ giving access to localhost port 8000 and 8080 for the admin/public port of
 kratos.
 
 ```
-./set-ssh-tunnel.sh `oas.example.com`
+./set-ssh-tunnel.sh `stackspin.example.com`
 ```
 
 (the tunnel goes to the kubernetes node, so *not* to your provisioning machine.
diff --git a/docs/set-ssh-tunnel.sh b/docs/set-ssh-tunnel.sh
index 127bc53761589b416d395ade4e1f3fe086c7e104..9e164fbce7ece5fc6547dfb10a2c7e984bba7958 100755
--- a/docs/set-ssh-tunnel.sh
+++ b/docs/set-ssh-tunnel.sh
@@ -10,8 +10,8 @@ then
 fi
 
 
-admin=`ssh $host -lroot kubectl get service -n oas|grep single-sign-on-kratos-admin | awk '{print $3'}`
-public=`ssh $host -lroot kubectl get service -n oas|grep single-sign-on-kratos-public | awk '{print $3}'`
+admin=`ssh $host -lroot kubectl get service -n stackspin|grep single-sign-on-kratos-admin | awk '{print $3'}`
+public=`ssh $host -lroot kubectl get service -n stackspin|grep single-sign-on-kratos-public | awk '{print $3}'`
 
 echo "Admin port will be at localhost:8000, public port will be at localhost:
 8080"
diff --git a/docs/usage.md b/docs/usage.md
index b29e86febe3bf2041a2f80af3393a42720951d77..2d7c5cbbd2c4c970d6619afa3b015d3a6f628165 100644
--- a/docs/usage.md
+++ b/docs/usage.md
@@ -25,4 +25,4 @@ chapter](helmchart)
 
 `single-sign-on` includese a simple `user-panel` to manage users. To read more
 about this, see the [user panel
-documentation](https://docs.openappstack.net/projects/user-panel/)
+documentation](https://docs.stackspin.net/projects/user-panel/)
diff --git a/helmchart/single-sign-on/Chart.yaml b/helmchart/single-sign-on/Chart.yaml
index 05c0a91247f5f346d5ce65948c3dfddd0086f065..1604d49502b2631209435fa52cc91c811dfeb5c7 100644
--- a/helmchart/single-sign-on/Chart.yaml
+++ b/helmchart/single-sign-on/Chart.yaml
@@ -1,4 +1,4 @@
 apiVersion: v1
-description: A Helm chart for OpenAppStack's Single sign-on components
+description: A Helm chart for Stackspin's Single sign-on components
 name: single-sign-on
 version: 0.3.0
diff --git a/helmchart/single-sign-on/values.yaml b/helmchart/single-sign-on/values.yaml
index 27dfcb7528140f4ee45482f05fad9086294614eb..8f8cc1384e99fac8c33bbf5de62015dbe8d9c451 100644
--- a/helmchart/single-sign-on/values.yaml
+++ b/helmchart/single-sign-on/values.yaml
@@ -5,20 +5,20 @@ consentProvider:
     # together in order to guarantee compatibility
     tag: "master"
     pullPolicy: "Always"
-    repository: "open.greenhost.net:4567/openappstack/single-sign-on/consent_provider"
+    repository: "open.greenhost.net:4567/stackspin/single-sign-on/consent_provider"
   podAnnotations: {}
 
 loginProvider:
   image:
     tag: "master"
     pullPolicy: "Always"
-    repository: "open.greenhost.net:4567/openappstack/single-sign-on/login_provider"
+    repository: "open.greenhost.net:4567/stackspin/single-sign-on/login_provider"
   podAnnotations: {}
 
 # singleSignOnHost is the FQDN that will be used by the ingress to make the consent and
 # the login provider accessible by user agents. For now it is recommended to set it to the
 # same value as hydra.ingress.public.hosts[0].host
-singleSignOnHost: sso.oas.example.net
+singleSignOnHost: sso.stackspin.example.net
 
 userpanel:
   # userpanel.applicationName is the name of the application. This is a duplicate of
@@ -31,17 +31,17 @@ userpanel:
     # together in order to guarantee compatibility
     tag: "master"
     pullPolicy: "Always"
-    repository: "open.greenhost.net:4567/openappstack/user-panel/frontend"
+    repository: "open.greenhost.net:4567/stackspin/user-panel/frontend"
   ingress:
     # userpanel.ingress.host is the FQDN of the userpanel application
-    host: admin.oas.example.net
+    host: admin.stackspin.example.net
   podAnnotations: {}
 
 userbackend:
   image:
     tag: "master"
     pullPolicy: "Always"
-    repository: "open.greenhost.net:4567/openappstack/user-panel/backend"
+    repository: "open.greenhost.net:4567/stackspin/user-panel/backend"
   # userbackend.username is the username of the admin user that will be create
   # after the installation of the user backend.
   username: "admin"
@@ -191,14 +191,14 @@ hydra:
         self:
           # hydra.hydra.config.urls.self is the base url of hydra. It needs to match the FQDN
           # specified in hydra.ingress.public
-          issuer: https://sso.oas.example.net
+          issuer: https://sso.stackspin.example.net
         # hydra.hydra.config.urls.login is the uri that users are redirect to perform the
         # login operation. The FQDN used here needs to match the value of singleSignOnHost
-        login: https://sso.oas.example.net/login
+        login: https://sso.stackspin.example.net/login
         # hydra.hydra.config.urls.consent is the uri that users are redirect to trigger
         # the consent/permission check. The FQDN used here needs to match the value of
         # singleSignOnHost
-        consent: https://sso.oas.example.net/consent
+        consent: https://sso.stackspin.example.net/consent
       secrets:
         # hydra.hydra.config.secret is used as a seed whenever cryptographic operations are
         # performed by hydra i.e. creation of a token.
@@ -212,7 +212,7 @@ hydra:
       hosts:
         # hydra.ingress.public.hosts[0].hosts.host is the FQDN of the single sign-on system
         # that will be used by oAuth clients to retrieve userinfo and redirect their users to.
-        - host: sso.oas.example.net
+        - host: sso.stackspin.example.net
           paths:
             - path: /
               pathType: ImplementationSpecific
@@ -220,7 +220,7 @@ hydra:
         # oAuth2 only works via https. You really need to configure your ingress service to
         # provide access to hydra via https.
         - hosts:
-          - sso.oas.example.net
+          - sso.stackspin.example.net
           secretName: hydra-public.tls
     # hydra.ingress.admin is the ingress resource that controls access to the hydra
     # admin API server. It can be activated using the same options as in
@@ -239,15 +239,15 @@ oAuthClients:
   clientSecret: "YouReallyNeedToChangeThis"
   # oAuthClients[].redirectUri is the url the user will be redirected to by hydra when the
   # authentication process is completed
-  redirectUri: "https://admin.oas.example.net/callback"
+  redirectUri: "https://admin.stackspin.example.net/callback"
   # oAuthClients[].scopes is a list of scopes the client need access to
-  scopes: "openid profile email openappstack_roles"
+  scopes: "openid profile email stackspin_roles"
   # oAuthClients[].clientUri is a url that is displayed for the user to navigate to the
   # application
-  clientUri: "https://admin.oas.example.net"
+  clientUri: "https://admin.stackspin.example.net"
   # oAuthClients[].clientLogoUri is a url that points to a logo that will be displayed
   # whenever refering to the application
-  clientLogoUri: "https://admin.oas.example.net/favicon.ico"
+  clientLogoUri: "https://admin.stackspin.example.net/favicon.ico"
   # oAuthClients[].tokenEndpointAuthMethod sets the method that the oAUth client uses to
   # authenticate agains the oAuth server i.e. to retrieve tokens or userinfo
   tokenEndpointAuthMethod: "client_secret_basic"
diff --git a/login_provider/templates/login.html b/login_provider/templates/login.html
index dfceb48c4293f35164bb36598184fa4485c3847e..912d0bfb336b13d7c7660b12c43bce079bedef1d 100644
--- a/login_provider/templates/login.html
+++ b/login_provider/templates/login.html
@@ -1,5 +1,5 @@
 <!doctype html>
-<title>OAS authentication service</title>
+<title>Stackspin authentication service</title>
 <div style='margin: 0 auto ; width: 350px; padding:20px; border-style:solid; border-color:#6c757d; border-width: 1px; background-color: #f8f9fa; font-family: "Segoe UI", Roboto; font-family: "Helvetica Neue", Arial; font-family: "Noto Sans", sans-serif;'>
   {% if logo %}
   <div style="position:relative; width: 350px; height:100px">
diff --git a/login_provider/templates/skip.html b/login_provider/templates/skip.html
index 64b2474979f4b35b9f0527b28da08bafa907c127..8effa5460a2b02eedeb5c76e18db010338982258 100644
--- a/login_provider/templates/skip.html
+++ b/login_provider/templates/skip.html
@@ -1,5 +1,5 @@
 <!doctype html>
-<title>OAS authentication service</title>
+<title>Stackspin authentication service</title>
 <div style='margin: 0 auto ; width: 350px; padding:20px; border-style:solid; border-color:#6c757d; border-width: 1px; background-color: #f8f9fa; font-family: "Segoe UI", Roboto; font-family: "Helvetica Neue", Arial; font-family: "Noto Sans", sans-serif;'>
   {% if logo %}
   <div style="position:relative; width: 350px; height:100px">
diff --git a/test/create-hydra-client.bash b/test/create-hydra-client.bash
index 56f63e422dd26ed84e78e849b6efa1a0b3f6b26d..8297fdfdf9ceb4adf86f15d03ebc8928d3d74011 100755
--- a/test/create-hydra-client.bash
+++ b/test/create-hydra-client.bash
@@ -11,7 +11,7 @@ HOST_URL=$3
 REDIRECT_URI=$4
 POST_LOGOUT_REDIRECT_URI=$5
 FRONTCHANNEL_LOGOUT_URI=$6
-SCOPES="openid profile email openappstack_roles"
+SCOPES="openid profile email stackspin_roles"
 
 curl --request DELETE \
     $HOST_URL/clients/$KEY;
diff --git a/test/integration_tests/Dockerfile b/test/integration_tests/Dockerfile
index dc40d1310636c19048613aa0d9080892f626e001..7fa78c7c918719c10584c0edd3d7fc4325886b03 100644
--- a/test/integration_tests/Dockerfile
+++ b/test/integration_tests/Dockerfile
@@ -18,7 +18,7 @@ RUN pip3 install --no-cache-dir -r requirements.txt
 
 COPY . .
 
-ENV BASE_URL https://sso.oas.example.net
+ENV BASE_URL https://sso.stackspin.example.net
 ENV KEY testapp
 ENV SECRET verysecret
 
diff --git a/test/integration_tests/README.md b/test/integration_tests/README.md
index d5c910149a483456c15df6ec5bffb84d629ba6e3..3805ad5f6c4997dc1b70f604b38f1e0eb0598945 100644
--- a/test/integration_tests/README.md
+++ b/test/integration_tests/README.md
@@ -5,7 +5,7 @@ work together according to [OpenID Connect Standards](https://openid.net/develop
 
 The single sign-on application needs to be up and running. Instructions on how to accomplish
 that can be found [in the
-documentation](https://docs.openappstack.net/projects/single-sign-on/en/latest/local_development.html).
+documentation](https://docs.stackspin.net/projects/single-sign-on/en/latest/local_development.html).
 
 ### Create oAuth Client
 
diff --git a/test/integration_tests/app.py b/test/integration_tests/app.py
index 61577d95ee222a34341edd9a60b3be9115f99e09..5d6e328959d8046c7a105ed78f07769a0481839d 100644
--- a/test/integration_tests/app.py
+++ b/test/integration_tests/app.py
@@ -21,7 +21,7 @@ sso_client_auth = {"client_id": KEY, "client_secret": SECRET}
 sso_auth_args = {
     "client_id": KEY,
     "response_type": ["code"],
-    "scope": ["openid", "profile", "email", "openappstack_roles"],
+    "scope": ["openid", "profile", "email", "stackspin_roles"],
     "nonce": "",
     "state": "",
     "redirect_uri": ""
diff --git a/test/integration_tests/test/behave/features/login.feature b/test/integration_tests/test/behave/features/login.feature
index 86a132aeecc50f22fb5a758687a1d8d53c93685d..3a8eca2a3378156a7021e71a7051e0de1ecc22df 100644
--- a/test/integration_tests/test/behave/features/login.feature
+++ b/test/integration_tests/test/behave/features/login.feature
@@ -1,7 +1,7 @@
 @oauth
 Feature: Test login-provider function
-    As an OAS user
-    I want to be able to login to an OAS App
+    As a Stackspin user
+    I want to be able to login to a Stackspin App
     And verify my userdata that is provided by OpenID Connect
 
 Scenario: Open the oAuth application and Login witha valid user
@@ -18,7 +18,7 @@ Scenario: Get OpenID Connect userdata for testuser
     When I open the oauth client "userinfo" URL
     Then I expect that the "preferred_username" in the json output is the same as oauth variable "username"
     And I expect that the "email" in the json output is the same as oauth variable "email"
-    And I expect that the "openappstack_roles" in the json output contains the value of oauth variable "role"
+    And I expect that the "stackspin_roles" in the json output contains the value of oauth variable "role"
     And I expect that the "name" in the json output is the same as oauth variable "username"
 
 Scenario: Logout
diff --git a/test/integration_tests/test/behave/features/logout.feature b/test/integration_tests/test/behave/features/logout.feature
index 6df862eebbd57eabee0a95b48fc1878e08bebb27..de3c520c0fe5a5de5fa457f8b2bf8de53b8124d3 100644
--- a/test/integration_tests/test/behave/features/logout.feature
+++ b/test/integration_tests/test/behave/features/logout.feature
@@ -1,8 +1,8 @@
 @oauth
 Feature: Test logout-provider function
-    As an OAS user
-    I want to be able to use single-sign off triggered by an
-    OAS APP. And verify that even though I selected remember me
+    As a Stackspin user
+    I want to be able to use single-sign off triggered by a
+    Stackspin APP. And verify that even though I selected remember me
     my session was removed.
 
 Scenario: Login with a valid user and remember session
diff --git a/test/integration_tests/test/behave/features/reject_unauthorized_logins.feature b/test/integration_tests/test/behave/features/reject_unauthorized_logins.feature
index fb1c0639fa48165707bfce35c402717a6d26d4a8..2e1bd15e0d25aeb64972a2965399457f2d295629 100644
--- a/test/integration_tests/test/behave/features/reject_unauthorized_logins.feature
+++ b/test/integration_tests/test/behave/features/reject_unauthorized_logins.feature
@@ -1,7 +1,7 @@
 @oauth
 Feature: Test features that prohibit unauthorized access
     As an attacker or unauthorized user
-    I want to to login to an OAS App
+    I want to to login to a Stackspin App
     And the single sign-on will block my login attempts
 
 Scenario: Login with a valid user without access to an application
diff --git a/test/integration_tests/test/behave/features/remember_me.feature b/test/integration_tests/test/behave/features/remember_me.feature
index d5b3e53cd76e0f4cd2fa91831913a1333e96b564..3c76afac52e86097c8b3d349f8009c2fa924246a 100644
--- a/test/integration_tests/test/behave/features/remember_me.feature
+++ b/test/integration_tests/test/behave/features/remember_me.feature
@@ -1,6 +1,6 @@
 @oauth
 Feature: Testing single sign-on sessions
-    As an OAS user
+    As a Stackspin user
     I want to login once to use an application
     And I use my active single sign-on session to login again without providing credentials