최근 검색
최근 검색 없음

Jake Burgy
가입한 날짜: 2021년 4월 16일
·
마지막 활동: 2021년 10월 22일
팔로잉
0
팔로워
0
총 활동 수
3
투표 수
0
가입 플랜
1
활동 개요
배지
문서
게시물
커뮤니티 댓글
문서 댓글
활동 개요
님의 최근 활동 Jake Burgy
Jake Burgy님이 에 댓글을 입력함
Hey Bryan,
Maybe that's the confusion here - because that is what this thread is about. You have it backwards.
People want ZenDesk to act like the RP (Relying Party) in an OpenID scenario where they are bringing their own IdP's such as an Azure AD, Google, or other custom IdP tenant. We aren't asking that Zendesk be an IdP - though I could see scenarios where that may be useful, that should be a separate discussion.
Take a look at the original request: Can I use Zendesk to authenticate Zendesk users on behalf of another application? (like Google Sign In)
In that question, Google is the IdP (which holds the user account), and Ryan wants to be able to authenticate (or, more accurately, authorize) into Zendesk using a Google account (via OpenID Connect).
Zendesk already supports a proprietary mechanism that utilizes JWT tokens - so all you would need to do is enhance that custom implementation to adhere to the OIDC 1.0 standard (which is really just OAuth 2.0 with some extra bits).
Is there an ETA on Zendesk adding support for the OAuth 2.0 or OpenID Connect protocols as a Relying Party (RP)?
댓글 보기 · 2020년 5월 01일에 게시됨 · Jake Burgy
0
팔로워
2
투표 수
0
댓글
Jake Burgy님이 에 댓글을 입력함
Is ZenDesk any closer to (re-)implementing OpenID Connect?
It seems rather silly to support "JWT" and call your SSO "JWT SSO" without supporting OpenID Connect, or even just OAuth 2.0 with a JWT payload.
OpenID Connect isn't as widely adopted, but why not support OAuth 2.0 as a RP with a possible JWT payload?
Your customers that have IdPs with other solutions want to be able to sign in to ZenDesk with those IdP's, and by having a custom solution instead of an industry standard (RFC) protocol supported, it makes it difficult to make those integrations happen.
댓글 보기 · 2019년 10월 22일에 게시됨 · Jake Burgy
0
팔로워
2
투표 수
0
댓글