Online testing
You may online test PlugSSO at https://elshaug.xyz having path /sso protected. There will be Single Sign-On between all realms in the same domain. For testing purpose, internal login accepts all usernames having password = password. If more than 4 incorrect login attempts, user will be banned for 1 hour. You may also test using misc sub paths under each realm.
Passkey/U2F prerequisite:
External USB or NFC security key is required, or running on a device having PIN or biometric security enabled like Fingerprint, Touch ID or Face ID
OTP prerequisite:
OTP Authenticator app is required e.g. installed on iPhone or Android (using an app from Microsoft, Google, Authy,…)
Logout: /plug/logout Note, you will also be logged out when going from one domain to another or closing browser
Domain1 Prelogin: Google, Azure and internal authentication Authorization: No Multi Factor: Selection (OTP, Passkey, Passkey user-less) Comment: Multi Factor can be selected having OTP as default. Selecting "Passkey user-less" will automatically start username-less authentication (Prelogin not needed) See also comments for Domain2/Domain3. Realms for testing: /sso/app1 /sso/app2
Domain2 Prelogin: Google, Azure and internal authentication Authorization: No Multi Factor: Passkey Comment: Password is not needed, but username is required. Username will be automatically given by the Prelogin authentication. When using Microsoft or Google you may already have the auth cookie and will not notice this authentication. On first time use, you need to register your Authenticator/ID. You may later on register as many as you want e.g. when using another device or using a different username. Realms for testing: /sso/app3 /sso/app4
Domain3 Prelogin: Only for registration - Google, Azure and internal authentication Authorization: No Multi Factor: Passkey user-less Comment: Using user-less we do not have to provide any username or password. Authenticator/ID needs to be registered on first time use having a Prelogin and the traditional authentication. You may later on register as many as you want e.g. when using another device or want to use a different username. When having several usernames registered, you have to select one of then from the list that pops up during the login process. Realms for testing: /sso/app5 /sso/app6
Domain4 Prelogin: No Prelogin, using direct Google authentication Authorization: No Multi Factor: No Realms for testing: /sso/app7 /sso/app8/abc
OpenID Connect authentication require a consent on first time use. This means user have to accept exchanging profile attributes like mail address with PlugSSO. Installing and using mobile apps you are probably familiar with this concept.
Microsoft login selection is configured with Azure authentication having AzureAdAndPersonalMicrosoftAccount
. This means all users with a work, school, or personal Microsoft account are allowed for authentication.
Note, you may not use your work or school account unless your Azure tenant administrator have granted global consent permissions (default turned off) or specific consent have been defined in Azure for PlugSSO. So, you most likely have to use a personal Microsoft account (@outlook.com, @hotmail.com, @live.com, …). If you get a dialog box like shown in figure below, you have to click Have an admin account? Sign in with that account
and then specify your personal account.