Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature request: Dynamic SSO Identity Provider selection mechanism (beyond email domain) #5662

Open
cesdperez opened this issue Apr 9, 2024 · 8 comments
Labels
feature Cool stuff pending-verification Something is still under investigation stale

Comments

@cesdperez
Copy link

Summary

We're looking into using logto.io for SSO across our B2B products, but we've hit a snag. The current IdP selection relies mainly on email domains, which doesn't work well for us because:

  • Some of our clients use generic email providers like Gmail.
  • Others have multiple IdPs for the same domain.

We need a more flexible way to route authentication requests.

Proposed Solution

Allow applications to pass extra parameters (see for example Keycloak's idpHint parameter) to help select the right IdP.
Alternatively, add customizable rules that can look at things like user input, IP address, or metadata to dynamically pick the correct IdP.

Benefits

  • Makes logto.io work for more types of organizations and use cases.
  • Gives users a smoother authentication experience.
  • Keeps logto.io competitive with other SSO solutions.

We think a more flexible IdP selection feature would be a big help for users and companies with complex authentication setups. We'd love to hear any ideas or suggestions from the community or the logto.io team on how to tackle this.

@simeng-li simeng-li added the feature Cool stuff label Apr 9, 2024
@simeng-li
Copy link
Contributor

Hi @cesdperez , thanks for your feedback.

We actually have a direct sign-in feature that allows users to jump directly to a specific SSO IdP's sign-in page, without needing a valid email domain. Would this address your issue?

However, this feature requires you to have a particular SSO IdP pre-configured. For multiple SSO IdP enabled, we still need to use user email to identify the enabled SSO connectors.

@cesdperez
Copy link
Author

Hi @simeng-li, thanks a lot for your reply!

We actually have a direct sign-in feature that allows users to jump directly to a specific SSO IdP's sign-in page, without needing a valid email domain. Would this address your issue?

This could be what I'm looking for indeed. Is it available for Enterprise SSO? I couldn't find that option, and when setting up an SSO connector the email domain is a required field.

I forgot to mention, I'm using the OSS version.

@simeng-li
Copy link
Contributor

Glad to hear. It's a new feature we just added. We are working on the documentation. I'll keep you updated once it's released.

@simeng-li
Copy link
Contributor

@cesdperez please check this doc. Let us know if this helps.

@simeng-li simeng-li added the pending-verification Something is still under investigation label Apr 12, 2024
@cesdperez
Copy link
Author

cesdperez commented Apr 15, 2024

Yes, that would be what I'm looking for 👍🏼. I haven't verified the functionality, tho. Thanks for the quick response.

Nonetheless, my use case requires that for any kind of enterprise SSO connection (either OIDC or SAML).

Is this also working with SAML SSO enterprise connectors?

@cesdperez
Copy link
Author

I see that the email domain is still a required field when creating an SSO Enterprise connector
image.

For my use case, I'd need this to be optional.

I'm using version 1.15.

@simeng-li
Copy link
Contributor

For direct sign-in, you may leave this field empty, it should jump the email domain validation step. Let us know if you met any blockers.

Copy link

github-actions bot commented May 2, 2024

This issue is stale because it has been open for 30 days with no activity. Remove stale label or comment or this will be closed in 5 days.

@github-actions github-actions bot added the stale label May 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature Cool stuff pending-verification Something is still under investigation stale
Development

No branches or pull requests

2 participants