Cloudron documentation outdated? Bitwarden now supports SSO
-
Hello!
I believe the Cloudron documentation may be outdated:
Bitwarden now supports SSO: https://bitwarden.com/help/about-sso/
Can we expect SSO to be added to Vaultwarden?
-
Hello!
I believe the Cloudron documentation may be outdated:
Bitwarden now supports SSO: https://bitwarden.com/help/about-sso/
Can we expect SSO to be added to Vaultwarden?
@marylou said in Cloudron documentation outdated? Bitwarden now supports SSO:
Can we expect SSO to be added to Vaultwarden?
I wonder if it could too. But I'm guessing perhaps not given SSO on Bitwarden is an enterprise-only feature.
-
I've been watching this for a while. This has been a longstanding feature request #3899 is the merged one from the seemingly hundreds of requests lol. But it does seem to be close to being finalized and merged.
-
@andreasdueren cool! I'm intrigued as to how exactly this will work in practice... will have to have a play around once we've got it in the Cloudron package...
-
https://github.com/dani-garcia/vaultwarden/pull/3899#event-19062298364
Finally merged. Didn’t believe in it anymore lol
-
Can we have this preconfigured on install, now that this is supported?
##################################### ### SSO settings (OpenID Connect) ### ##################################### ## Controls whether users can login using an OpenID Connect identity provider # SSO_ENABLED=false ## Prevent users from logging in directly without going through SSO # SSO_ONLY=false ## On SSO Signup if a user with a matching email already exists make the association # SSO_SIGNUPS_MATCH_EMAIL=true ## Allow unknown email verification status. Allowing this with `SSO_SIGNUPS_MATCH_EMAIL=true` open potential account takeover. # SSO_ALLOW_UNKNOWN_EMAIL_VERIFICATION=false ## Base URL of the OIDC server (auto-discovery is used) ## - Should not include the `/.well-known/openid-configuration` part and no trailing `/` ## - ${SSO_AUTHORITY}/.well-known/openid-configuration should return a json document: https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationResponse # SSO_AUTHORITY=https://auth.example.com ## Authorization request scopes. Optional SSO scopes, override if email and profile are not enough (`openid` is implicit). # SSO_SCOPES="email profile" ## Additional authorization url parameters (ex: to obtain a `refresh_token` with Google Auth). # SSO_AUTHORIZE_EXTRA_PARAMS="access_type=offline&prompt=consent" ## Activate PKCE for the Auth Code flow. # SSO_PKCE=true ## Regex for additional trusted Id token audience (by default only the client_id is trusted). # SSO_AUDIENCE_TRUSTED='^$' ## Set your Client ID and Client Key # SSO_CLIENT_ID=11111 # SSO_CLIENT_SECRET=AAAAAAAAAAAAAAAAAAAAAAAA ## Optional Master password policy (minComplexity=[0-4]), `enforceOnLogin` is not supported at the moment. # SSO_MASTER_PASSWORD_POLICY='{"enforceOnLogin":false,"minComplexity":3,"minLength":12,"requireLower":false,"requireNumbers":false,"requireSpecial":false,"requireUpper":false}' ## Use sso only for authentication not the session lifecycle # SSO_AUTH_ONLY_NOT_SESSION=false ## Client cache for discovery endpoint. Duration in seconds (0 to disable). # SSO_CLIENT_CACHE_EXPIRATION=0 ## Log all the tokens, LOG_LEVEL=debug is required # SSO_DEBUG_TOKENS=false
-
@andreasdueren thanks, I have created a task internally for @vladimir.d .
edit: er, @andreasdueren looks like this is not released yet right ? https://github.com/dani-garcia/vaultwarden/releases has no releases saying so.
-
@andreasdueren thanks, I have created a task internally for @vladimir.d .
edit: er, @andreasdueren looks like this is not released yet right ? https://github.com/dani-garcia/vaultwarden/releases has no releases saying so.
@girish said in Cloudron documentation outdated? Bitwarden now supports SSO:
looks like this is not released yet right
I guess you're right, merge happened after the last release.