Online testing
You may online test PlugSSO at https://elshaug.xyz having path /sso protected. There will be Single Sign-On between all realms in the same domain. For testing purpose, internal login accepts all usernames having password = password. If more than 4 incorrect login attempts, user will be banned for 1 hour. You may also test using misc sub paths under each realm.
Passkey/U2F prerequisite:
External USB or NFC security key is required, or running on a device having PIN or biometric security enabled like Fingerprint, Touch ID or Face ID
OTP prerequisite:
OTP Authenticator app is required e.g. installed on iPhone or Android (using an app from Microsoft, Google, Authy,…)
Logout: /plug/logout Note, you will also be logged out when going from one domain to another or closing browser
Domain1
Prelogin: Google, Azure and internal authentication
Authorization: No
Multi Factor: Selection (OTP, Passkey, Passkey user-less)
Comment: Multi Factor can be selected having OTP as default.
Selecting "Passkey user-less" will automatically start
username-less authentication (Prelogin not needed)
See also comments for Domain2/Domain3.
Realms for testing:
/sso/app1
/sso/app2
Domain2
Prelogin: Google, Azure and internal authentication
Authorization: No
Multi Factor: Passkey
Comment: Password is not needed, but username is required. Username
will be automatically given by the Prelogin authentication.
When using Microsoft or Google you may already have
the auth cookie and will not notice this authentication.
On first time use, you need to register your
Authenticator/ID. You may later on register as many as
you want e.g. when using another device or using
a different username.
Realms for testing:
/sso/app3
/sso/app4
Domain3
Prelogin: Only for registration - Google, Azure and internal authentication
Authorization: No
Multi Factor: Passkey user-less
Comment: Using user-less we do not have to provide any username
or password. Authenticator/ID needs to be registered on
first time use having a Prelogin and the traditional
authentication. You may later on register as many as you
want e.g. when using another device or want to use
a different username. When having several usernames
registered, you have to select one of then from the list
that pops up during the login process.
Realms for testing:
/sso/app5
/sso/app6
Domain4 Prelogin: No Prelogin, using direct Google authentication Authorization: No Multi Factor: No Realms for testing: /sso/app7 /sso/app8/abc
OpenID Connect authentication require a consent on first time use. This means user have to accept exchanging profile attributes like mail address with PlugSSO. Installing and using mobile apps you are probably familiar with this concept.
Microsoft login selection is configured with Azure authentication having AzureAdAndPersonalMicrosoftAccount. This means all users with a work, school, or personal Microsoft account are allowed for authentication.
Note, you may not use your work or school account unless your Azure tenant administrator have granted global consent permissions (default turned off) or specific consent have been defined in Azure for PlugSSO. So, you most likely have to use a personal Microsoft account (@outlook.com, @hotmail.com, @live.com, …). If you get a dialog box like shown in figure below, you have to click Have an admin account? Sign in with that account and then specify your personal account.
