Open ti0rafa opened 7 years ago
It's been mentioned but no work has commenced. If you can set it up and submit a PR I would definitely merge it.
What kind of SSO do you need?
More specifically protocol and provider.
Passport would properly be the best option since it has support for 300+ authenticators - http://passportjs.org/docs
I would think the option for: Facebook, Google, Twitter and Github would be more than enough to cover everyone. What are your thoughts?
Throw LDAP into the mix and you also got local/corp deployments covered.
Passportjs seems like a good option, if it can be integrated.
The provider: (in my case) will be my main app, it's a small ERP I help develop for a friend that needed a custom solution. So their users are managed locally.
The protocol: OAuth 2.0 probably is the way to go.
I was looking forward to an experience similar to what disqus or zendesk have for their SSO implementations. A very basic description of the process I hope I can achieve goes like this:
I believe that experience can be achieve using passport if it can be integrated. And passport can help with the social logins for projects that need them.
So to satisfy everybody's needs as well as #72, following packages should suffice?
"passport": "^0.3.2",
"passport-oauth": "^1.0.0",
"passport-ldapauth": "^1.0.0",
"passport-facebook": "^2.1.1",
"passport-twitter": "^1.0.4",
"passport-google-oauth": "^1.0.0"
I have made a design concept for the user login:
I got the Facebook and Twitter login buttons from https://dribbble.com/shots/1358062-Social-Login-Buttons, the Google and GitHub I made based on the Twitter login button design.
I am not sure if a corp/org SSO login button is needed or what it should look like.
Looks good!
I am not sure how the Settings design should look and the same goes for what happens after the user clicks the "Login with ....." button.
Could be:
I think it would be more economical to use the font-awesome icons for the login services (fa-facebook, fa-github, fa-google and fa-twitter). Looks good regardless!
Definitely +1 for LDAP SSO! It'd be fantastic to be able to deploy in a corp environment without having to remember another password :)
I've already built LDAP into ezyFAQ but haven't had the chance to add it to openKB
as yet.
Fair enough. Any chance you could build in Kerberos too? If not I'll send you a PR.
On Tue, 4 Apr 2017, 09:21 Mark Moffat, notifications@github.com wrote:
I've already built LDAP into ezyFAQ https://www.ezyfaq.com but haven't had the chance to add it to openKB as yet.
— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/mrvautin/openKB/issues/144#issuecomment-291428552, or mute the thread https://github.com/notifications/unsubscribe-auth/AUTwhNQCSSlH8mPUk4pqi3EmDCnKdK6Aks5rsf2dgaJpZM4Mf_io .
-- Regards, Daniel Urson
passport-kerberos
I have not had the time to adding passport support as of yet, might be able to do it next week.
Hey there, any update on the plans for this?
👍
Hello, i've added Google login using Passport.
You need to manually configure auth tokens from "config/config.json".
If anyone i interested on modify Admin > Settings page to load clientID, clientSecret and callbackURL will be great.
Feel free to add the rest of the providers with Passport and using Google as a template.
I can't seem to find passport for AD integration? is the "strategy" for AD deprecated??
For AD integration we're using passport with openkb and ADFS 4 using the openid connect functionality made available in 4. Although as of right now we're only using it to give view access and don't have modifications to give any rights.
@JDCain The only thing halting me from deploying openkb is ad integration, do you have a working build, at the moment my nodejs dev level is to low to implement adfs and passport into openkb.
@TBK @skydiver Excellent, awesome.
+1
:+1:
Hey Folks Super interested in this passport integration. Is there a plan to merge these? Thanks!
Are there any plans for "Single Sign On" option??.
Im trying to manage openKB users on my main app, and wanted to avoid different users.