This idea was imported from Canny. Originally created by: Robby GreenLeaf. The current owner is: Sal Carrasco.
Equinix Metal Organizations would like the ability to integrate their identity provider to authenticate into the Metal Console. By configuring both their identity provider and Equinix Federated SSO information organizations should be able to use their selected identity provider as a log in method.
This comment was imported from Canny. Originally created by: Dimitry Sanivsky with 1 likes.
We need Azure SSO.
This comment was imported from Canny. Originally created by: Francois-Xavier Jammes with 0 likes.
As part of our migration to a new Identity service, we’re planning to add this capability to our product. We are discussing the details internally and we will communicate an ETA once we have one.
This comment was imported from Canny. Originally created by: Zain Mujtaba with 0 likes.
It looks like this has been planned since Nov 2020. When will this be in place?
This comment was imported from Canny. Originally created by: Eran Guy with 0 likes.
Please consider SCIM support as part of this effort- user provision/de-provision is important.
This comment was imported from Canny. Originally created by: Greg Swift with 0 likes.
Group sync/access mapping would be very nice to have as well!
This comment was imported from Canny. Originally created by: Matt Johnson with 1 likes.
AzureAD would be great!
This comment was imported from Canny. Originally created by: Robby GreenLeaf with 3 likes.
Integrations: SAML Active Directory / Azure AD LDAP Google Auth OKTA Auth0 OneLogin Ping Identity
This comment was imported from Canny. Originally created by: Marques Johansson with 0 likes.
This is very powerful when the API client wrappers are made aware of this. packngo.NewSession() could, for example, infer API access without the need for an explicit token. Packet nodes in Kubernetes clusters running deployments like CSI, CCM, ClusterAPI, and Crossplane would not require token based access, and could be deployed with a common set of access controls (a group), that can then be managed externally or internally if the access controls permits modifications to the relationship. Devices (service accounts) can only create devices (service accounts) with the same or less rights than they have.