Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FR] Support OIDC. #413

Open
pinarruiz opened this issue Mar 9, 2023 · 10 comments
Open

[FR] Support OIDC. #413

pinarruiz opened this issue Mar 9, 2023 · 10 comments
Assignees
Labels

Comments

@pinarruiz
Copy link
Contributor

Adding OIDC support would allow for some existing user bases on different identity providers to use plane, specially on the self hosted plane, as many of us use Authentik, Keycloak or others to manage identities.

Having OIDC would also remove the need for Google and Github being mandatory.

@pablohashescobar
Copy link
Collaborator

Thank you for taking the time to submit this feature request. Please know that it’s already on our roadmap and we’re working hard to prioritize it. In the meantime, we encourage you to upvote this item to help us ensure it receives the attention it deserves.

@pinarruiz
Copy link
Contributor Author

Hi, where can I see the roadmap, I know it was on the way, but I do not know where to find it.

@pablohashescobar
Copy link
Collaborator

Currently, we are using Plane to plan our roadmap. Since the GitHub Sync feature is now available, we will be moving our issues from Plane to GitHub

@PatrickHuetter
Copy link

+1 for keycloak. Solves all other auth issues since you could use id chaining.

@torbenraab
Copy link

Is there already a timeline for this one as it is listed on the website as a feature for a self-hosted instance?

@olivierlambert
Copy link

Login via OIDC (Keycloack in my case) is probably the only serious blocker to adopt it. Let us know if you need help to test it, I'll be happy to provide a test SSO account.

@torbenraab
Copy link

@olivierlambert Just checkout my PR and you can test it. I build everything according to the OpenID Spec. Testing was done with Authentik as we use it at our company

@olivierlambert
Copy link

Great! I will test it as soon I find how to build everything without Docker ^^

@RoshanCubastion
Copy link

Hey @pinarruiz ,
Can we implement Microsoft Entra ID OIDC to plane app ? What are all necessary nginx parameters required ?

@torbenraab
Copy link

@RoshanCubastion Please try the new PR. You just have to provide the issuer and client credentials from the Entra ID Provider. It should work as expected

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

9 participants