[GH-ISSUE #248] [Feature Request] SSO / User Provisioning with SAML based IDP like Azure AD #780

Closed
opened 2026-03-14 10:34:03 +03:00 by kerem · 8 comments
Owner

Originally created by @timomayer on GitHub (Jan 4, 2022).
Original GitHub issue: https://github.com/anonaddy/anonaddy/issues/248

To use the service also in an corporate environment this would be a highly needed feature

Originally created by @timomayer on GitHub (Jan 4, 2022). Original GitHub issue: https://github.com/anonaddy/anonaddy/issues/248 To use the service also in an corporate environment this would be a highly needed feature
kerem closed this issue 2026-03-14 10:34:08 +03:00
Author
Owner

@ccorneli commented on GitHub (Jan 4, 2022):

I'm curious where you see this being useful in a corporate environment. I can't think of a use case.

<!-- gh-comment-id:1004862891 --> @ccorneli commented on GitHub (Jan 4, 2022): I'm curious where you see this being useful in a corporate environment. I can't think of a use case.
Author
Owner

@willbrowningme commented on GitHub (Jan 11, 2022):

I'm afraid I do not currently have any plans to add this so I'm closing this issue for now.

<!-- gh-comment-id:1009781661 --> @willbrowningme commented on GitHub (Jan 11, 2022): I'm afraid I do not currently have any plans to add this so I'm closing this issue for now.
Author
Owner

@Queuecumber commented on GitHub (Nov 18, 2022):

@ccorneli this is important for a corporate environment because any service that's being hosted by a company for its employees generally has a hard requirement for how they can authenticate and what username/password/2-factor they can use.

@willbrowningme would you accept a PR for login/provisioning via an authenticating proxy (like oauth2-proxy) which sets the X-Auth-Request-Email header? This way the actual oauth logic is outsourced to the proxy and anonaddy only needs to check for the header

<!-- gh-comment-id:1319432907 --> @Queuecumber commented on GitHub (Nov 18, 2022): @ccorneli this is important for a corporate environment because any service that's being hosted by a company for its employees generally has a hard requirement for how they can authenticate and what username/password/2-factor they can use. @willbrowningme would you accept a PR for login/provisioning via an authenticating proxy (like oauth2-proxy) which sets the `X-Auth-Request-Email` header? This way the actual oauth logic is outsourced to the proxy and anonaddy only needs to check for the header
Author
Owner

@Queuecumber commented on GitHub (Jan 28, 2023):

Hi @willbrowningme I just wanted to ping again and ask if you'd accept a PR that integrates with oauth2-proxy

I'm more than happy to do the work for this and the change should be quite minimal but I want to know if you're idealogically opposed to it first

<!-- gh-comment-id:1407264756 --> @Queuecumber commented on GitHub (Jan 28, 2023): Hi @willbrowningme I just wanted to ping again and ask if you'd accept a PR that integrates with oauth2-proxy I'm more than happy to do the work for this and the change should be quite minimal but I want to know if you're idealogically opposed to it first
Author
Owner

@willbrowningme commented on GitHub (Jan 30, 2023):

Yes I would likely accept a PR for this. Are you able to explain exactly how such an integration would work with AnonAddy?

Since I'm not familiar with this I wouldn't want to accept any future maintenance overhead for updates etc.

<!-- gh-comment-id:1408576220 --> @willbrowningme commented on GitHub (Jan 30, 2023): Yes I would likely accept a PR for this. Are you able to explain exactly how such an integration would work with AnonAddy? Since I'm not familiar with this I wouldn't want to accept any future maintenance overhead for updates etc.
Author
Owner

@Queuecumber commented on GitHub (Jan 30, 2023):

The cool thing about going this route is that the change would be quite minimal and you get support for basically all oauth providers

What will happen in such a setup is that oauth2-proxy will sit in front of anonaddy. When a user visits anonaddy they will first hit the oauth2-proxy login page which will allow them to login however that admin configured it, oauth2-proxy will then set the X-Auth-Request-Email header when forwarding requests to anonaddy.

The modification to anonaddy is just to check for that header and skip the built in login flow if it is present, reading off the header value for the username. Onboarding can also be modified to work with this (e.g. if the X-Auth-Request-Email isn't present in the DB then provision a new account for them)

This needs to be gated behind some kind of flag so that people don't enable it by accident as it should only be used if the appropriate proxy is in place.

<!-- gh-comment-id:1408651951 --> @Queuecumber commented on GitHub (Jan 30, 2023): The cool thing about going this route is that the change would be quite minimal and you get support for basically all oauth providers What will happen in such a setup is that oauth2-proxy will sit in front of anonaddy. When a user visits anonaddy they will first hit the oauth2-proxy login page which will allow them to login however that admin configured it, oauth2-proxy will then set the `X-Auth-Request-Email` header when forwarding requests to anonaddy. The modification to anonaddy is just to check for that header and skip the built in login flow if it is present, reading off the header value for the username. Onboarding can also be modified to work with this (e.g. if the `X-Auth-Request-Email` isn't present in the DB then provision a new account for them) This needs to be gated behind some kind of flag so that people don't enable it by accident as it should only be used if the appropriate proxy is in place.
Author
Owner

@willbrowningme commented on GitHub (Jan 30, 2023):

Okay, sounds good to me.

This needs to be gated behind some kind of flag so that people don't enable it by accident as it should only be used if the appropriate proxy is in place.

Yes that would be great, perhaps an option to add to the .env file.

<!-- gh-comment-id:1408845595 --> @willbrowningme commented on GitHub (Jan 30, 2023): Okay, sounds good to me. > This needs to be gated behind some kind of flag so that people don't enable it by accident as it should only be used if the appropriate proxy is in place. Yes that would be great, perhaps an option to add to the `.env` file.
Author
Owner

@Queuecumber commented on GitHub (Jan 30, 2023):

OK great, I'll start scoping it out then

<!-- gh-comment-id:1408850313 --> @Queuecumber commented on GitHub (Jan 30, 2023): OK great, I'll start scoping it out then
Sign in to join this conversation.
No labels
bug
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/anonaddy#780
No description provided.