Skip to Main Content
feedback.corp.metal
Status Planned
Workspace Administration
Created by Ben White
Created on Sep 1, 2020

Federated SSO Support for Authentication

This idea was imported from Canny. Originally created by: Robby GreenLeaf. The current owner is: Sal Carrasco.

Equinix Metal Organizations would like the ability to integrate their identity provider to authenticate into the Metal Console. By configuring both their identity provider and Equinix Federated SSO information organizations should be able to use their selected identity provider as a log in method.
  • Admin
    Ben White
    Reply
    |
    Sep 7, 2022

    This comment was imported from Canny. Originally created by: Dimitry Sanivsky with 1 likes.

    We need Azure SSO.

  • Admin
    Ben White
    Reply
    |
    Aug 15, 2022

    This comment was imported from Canny. Originally created by: Francois-Xavier Jammes with 0 likes.

    As part of our migration to a new Identity service, we’re planning to add this capability to our product. We are discussing the details internally and we will communicate an ETA once we have one.

  • Admin
    Ben White
    Reply
    |
    Feb 1, 2022

    This comment was imported from Canny. Originally created by: Zain Mujtaba with 0 likes.

    It looks like this has been planned since Nov 2020. When will this be in place?

  • Admin
    Ben White
    Reply
    |
    Feb 17, 2021

    This comment was imported from Canny. Originally created by: Eran Guy with 0 likes.

    Please consider SCIM support as part of this effort- user provision/de-provision is important.

  • Admin
    Ben White
    Reply
    |
    Jan 25, 2021

    This comment was imported from Canny. Originally created by: Greg Swift with 0 likes.

    Group sync/access mapping would be very nice to have as well!

  • Admin
    Ben White
    Reply
    |
    Oct 26, 2020

    This comment was imported from Canny. Originally created by: Matt Johnson with 1 likes.

    AzureAD would be great!

  • Admin
    Ben White
    Reply
    |
    Sep 1, 2020

    This comment was imported from Canny. Originally created by: Robby GreenLeaf with 3 likes.

    Integrations: SAML Active Directory / Azure AD LDAP Google Auth OKTA Auth0 OneLogin Ping Identity

  • Admin
    Ben White
    Reply
    |
    Aug 24, 2020

    This comment was imported from Canny. Originally created by: Marques Johansson with 0 likes.

    This is very powerful when the API client wrappers are made aware of this. packngo.NewSession() could, for example, infer API access without the need for an explicit token. Packet nodes in Kubernetes clusters running deployments like CSI, CCM, ClusterAPI, and Crossplane would not require token based access, and could be deployed with a common set of access controls (a group), that can then be managed externally or internally if the access controls permits modifications to the relationship. Devices (service accounts) can only create devices (service accounts) with the same or less rights than they have.

  • +63