Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow SSO / SAML as alternative to using /auth/login #3725

Open
IngeniousCoder opened this issue Aug 3, 2024 · 4 comments
Open

Allow SSO / SAML as alternative to using /auth/login #3725

IngeniousCoder opened this issue Aug 3, 2024 · 4 comments

Comments

@IngeniousCoder
Copy link

I would like to be able to..

Integrate Plan with my own server website through SAML SSO

Is your feature request related to a problem? Please describe.

@IngeniousCoder IngeniousCoder changed the title Allow SSO / SAML as alternative to using /auto/login Allow SSO / SAML as alternative to using /auth/login Aug 3, 2024
@MeesJ
Copy link

MeesJ commented Sep 5, 2024

This would not only be a more convenient way of logging in, but also makes the process safer if 2FA is used on the SSO provider. Definitely seconding this!

@IngeniousCoder
Copy link
Author

Your idea works too! But what I meant was more of Plan being SSO provider as well. I intend to make a portal website, and use the plan account as the login account. There is a way now, which is to use /auth/login API endpoint. But SSO would be better :)

@AuroraLS3
Copy link
Collaborator

If anyone knows ready made SSO libraries for Jetty that would make this a lot easier

@jehendeoff
Copy link

jehendeoff commented Nov 19, 2024

I couldn't find any jetty SAML/SSO librairies that is not deprecated.
I did manage to find a popular java libraries, SAML-Toolkits/java-saml, it seems to include everything that would be necessary and a lot more

Personally I would like to connect to my plan instance with keycloak, not use plan as an IdP

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants