Authentication

fylr can use the following authentication services (a.k.a. SSO - Single Sign On) to:

  • Authenticate user logins. Then your users can log into fylr with their existing credentials.

  • Apply group membership for rights management.

  • Retrieve user records: email address, display name, etc..

LDAP

fylr can be connected to multiple LDAP servers. With or without TLS. Typically, a bind user (a.k.a. machine user) is used to allow the connection.

SAML

fylr can be configured to be a Service Provider against a SAML IDP. In other words: fylr can be connected to e.g. Shibboleth IDPs and Microsoft Azure Active Directory via SAML.

Shibboleth

Shibboleth IDentityProviders can be connected via SAML to fylr, which then is a ServiceProvider.

Active Directory

Microsoft Active Directory, as used in a Local Area network, can be connected via LDAP.

Microsoft Azure Active Directory can be connected via SAML to fylr.

Kerberos

Kerberos is not supported by fylr. But if it is used in an Active Directory, LDAP can be connected instead.

OpenID

We don’t support authentication against OpenID IDPs yet.

OAuth

fylr is usually configured to accept multiple OAuth2 clients and you can add more (fylr in the server role). We don’t support authentication against OAuth IDPs yet (fylr in the client role).

Last updated