-
-
Notifications
You must be signed in to change notification settings - Fork 2.6k
feat: Microsoft authentication #1953
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Waiting on Microsoft Partner approval before moving this forward |
🙌 one step closer. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Successfully authenticated for me
Any idea when this might be merged in? |
Hi, I have 2 issues with this branch (but maybe it's just me)
|
RE 2, weird but it could be the case – other packages do produce a new object, eg: I'll fork the dependency now – it's clearly not maintained and a poor thing to rely on for such a key aspect of the application |
@ulentini moved to a fork, and included your fix for the state and the updated authentication domain. I checked that the state is not retained between sign-ins, so looking good now. |
Based on the branding guidelines for sign-in here: https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-add-branding-in-azure-ad-apps#branding-dos-and-donts > DON’T use “Microsoft 365 ID” or “Azure ID.” Microsoft 365 is also the name of a consumer offering from Microsoft, which doesn’t use Azure AD for authentication.
@bglidwell this is now deployed to the cloud hosted version of Outline |
LDAP and SAML are included in the enterprise edition and will not be included in the open source codebase – you (or anyone in the future that reads this) can contact hello@getoutline.com to arrange an enterprise license key. I have detailed what is required for local accounts in the ticket you linked, if the community wants to build that feature now that the authentication providers are pluggable they are welcome to do so! |
>> Setup Guide <<
If anyone wants to follow the guide and try this branch out on their own instance it would be much appreciated, I only have one Microsoft team to test with and it would be good to get some broader coverage before merging
closes #755