Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file added images/custom-sso/github-oauth.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added images/custom-sso/google-oauth.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed images/custom-sso/oidc-config.png
Binary file not shown.
Binary file added images/custom-sso/oidc-oauth.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed images/custom-sso/saml-config.png
Binary file not shown.
Binary file added images/custom-sso/saml-oauth.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
6 changes: 3 additions & 3 deletions plane-one/governance/authentication/custom-sso.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: OIDC and SAML
sidebarTitle: Custom SSO
---
Plane One enables custom SSO via any identity provider with an official and supported implementation of OIDC + SAML standards. This page cites examples from Okta, but we will soon publish provider-specific instructions in phases.
Plane enables custom SSO via any identity provider with an official and supported implementation of OIDC + SAML standards. This page cites examples from Okta, but we will soon publish provider-specific instructions in phases.

## OIDC

Expand Down Expand Up @@ -30,7 +30,7 @@ Go to `/god-mode/authentication/oidc` on your Plane app and find the configs ↓
Your IdP will generate some of the following configs for you. Others, you will specify yourself. Just copy them over to each field.
</Tip>

<Frame>![OIDC Configuration](/images/custom-sso/oidc-config.png)</Frame>
<Frame>![OIDC Configuration](/images/custom-sso/oidc-oauth.png)</Frame>

- Copy the `CLIENT_ID` for the Plane client or app you just created over from your IdP and paste it in the field for it.

Expand Down Expand Up @@ -100,7 +100,7 @@ By default, your IdP will send the value listed under `Property`. You have to ma

### On Plane

<Frame>![SAML Configuration](/images/custom-sso/saml-config.png)</Frame>
<Frame>![SAML Configuration](/images/custom-sso/saml-oauth.png)</Frame>

<Tip>
You will find all of the values for the fields below in the `/metadata` endpoint your IdP generates for the Plane app or client.
Expand Down
2 changes: 2 additions & 0 deletions self-hosting/govern/github-oauth.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,8 @@ Plane also supports GitHub OAuth so your users can sign-in with GitHub instead.

## Configure Plane

<Frame>![GitHub Oauth Configuration](/images/custom-sso/github-oauth.png)</Frame>

1. Go to `GitHub` on the Authentication screen of `/god mode`.
2. Add the client ID + the client secret from the GitHub app you just registered.
3. Click `Save `.
Expand Down
1 change: 1 addition & 0 deletions self-hosting/govern/google-oauth.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ First, you will need to identify Plane as an approved OAuth app to Google.
<Frame>![](/images/authentication/google/google-auth-4.png)</Frame>

## Configure Plane
<Frame>![Google Oauth Configuration](/images/custom-sso/google-oauth.png)</Frame>

1. Go to `Google` on the Authentication screen of `/god mode`.
2. Add the client ID + the client secret from Google API Console.
Expand Down
6 changes: 3 additions & 3 deletions self-hosting/govern/oidc-sso.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@ title: OIDC SSO
sidebarTitle: OIDC SSO
---

> **Plan**: Plane One, Plane Pro
> **Plan**: Pro, Business

Plane One enables custom SSO via any identity provider with an official and supported implementation of OIDC standards. This page cites examples from Okta, but we will soon publish provider-specific instructions in phases.
Plane enables custom SSO via any identity provider with an official and supported implementation of OIDC standards. This page cites examples from Okta, but we will soon publish provider-specific instructions in phases.

## OIDC

Expand Down Expand Up @@ -33,7 +33,7 @@ Go to `/god-mode/authentication/oidc` on your Plane app and find the configs ↓
Your IdP will generate some of the following configs for you. Others, you will specify yourself. Just copy them over to each field.
</Tip>

<Frame>![OIDC Configuration](/images/custom-sso/oidc-config.png)</Frame>
<Frame>![OIDC Configuration](/images/custom-sso/oidc-oauth.png)</Frame>

- Copy the `CLIENT_ID` for the Plane client or app you just created over from your IdP and paste it in the field for it.

Expand Down
6 changes: 3 additions & 3 deletions self-hosting/govern/saml-sso.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@ title: SAML SSO
sidebarTitle: SAML SSO
---

> **Plan**: Plane One, Plane Pro
> **Plan**: Pro, Business

Plane One enables custom SSO via any identity provider with an official and supported implementation of SAML standards. This page cites examples from Okta, but we will soon publish provider-specific instructions in phases.
Plane enables custom SSO via any identity provider with an official and supported implementation of SAML standards. This page cites examples from Okta, but we will soon publish provider-specific instructions in phases.

## SAML

Expand Down Expand Up @@ -49,7 +49,7 @@ By default, your IdP will send the value listed under `Property`. You have to ma

### On Plane

<Frame>![SAML Configuration](/images/custom-sso/saml-config.png)</Frame>
<Frame>![SAML Configuration](/images/custom-sso/saml-oauth.png)</Frame>

<Tip>
You will find all of the values for the fields below in the `/metadata` endpoint your IdP generates for the Plane app or client.
Expand Down
2 changes: 1 addition & 1 deletion self-hosting/manage/migrate-plane.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ If you need to change your domain during migration, contact our support team for

## Steps
1. **Delink licenses**
Log in to Plane on your current server. Head to each paid workspace like One or Pro and [delink the licenses](https://docs.plane.so/workspaces-and-users/upgrade-plan#delink-license-key). This will free up the licenses for activation on your new server. Ideally, you have just one paid workspace.
Log in to Plane on your current server. Head to each paid workspace like Pro or Business and [delink the licenses](https://docs.plane.so/workspaces-and-users/upgrade-plan#delink-license-key). This will free up the licenses for activation on your new server. Ideally, you have just one paid workspace.

2. **Backup data**
Create a backup of your Plane instance with ↓:
Expand Down
Loading