Hi Peplink,
To enable companies to centrally manage theire users, it should be possible in a modern environment to bind the peplink-ID of a company domain against its own iDP like AAD or Okta by using SAMLv2 and do provisioning with SCIM.
This is super default for a security product in 2023.
Best regards
Linus
5 Likes
For Peplink ID this is already possible. We have linked AAD to Peplink ID and I can login to inControl with my Microsoft business account.
Donât remember which steps to take, but it is already possible.
1 Like
Hi @padaco-daniel ,
Right, there is a button âlogin with M365â that enables you to forward authentication to MS. Never the less, you can not restrict access method to that and it is always possible for users to fall back to username & password. So this is not a valid solution if you want to increase security and deploy centralised iDP as default authentication.
Best regards
Linus
2 Likes
All systems I have linked to M365 SSO have the same that âlocal usersâ still work after linking to AAD. In other systems I have just removed the âlocal usersâ from the systems and only the AAD entries are left. Just kept 1-2 fail save accounts in case AAD/SSO would be down someday.
Havenât tested what inControl does when you remove a local user from inControl if the account can still login when given the proper rights inside the Enterprise Application in AAD.
1 Like
I need BYO IdP before I can implement InControl for my enterprise. Cradelpoint Netcloud does this today (7/29/2024) which will be direction I have to go until this is corrected.
1 Like
Dear Peplink Team,
On behalf of Cornelis Vrolijk Holding, a large enterprise user of Peplink solutions for our SD-WAN and network management needs, I am submitting this formal request to prioritize the implementation of SAML 2.0-based Single Sign-On (SSO) support in the cloud-hosted InControl 2 platform.
As an organization with strict security and identity governance policies, we rely on centralized identity providers such as Microsoft Entra ID (Azure AD) and/or Okta for all SaaS applications. The current authentication options (Peplink ID with optional Google federation and 2FA) do not meet our enterprise requirements for:
- Seamless integration with our existing Identity Provider (IdP)
- Centralized user provisioning/de-provisioning (ideally with SCIM support)
- Compliance with zero-trust and least-privilege access models
- Reduced administrative overhead and improved security posture
This feature has been repeatedly requested by the community since 2021 (e.g., in threads such as https://forum.peplink.com/t/saml-sso-for-incontrol/33059 and https://forum.peplink.com/t/sso-with-saml-scim/45092), and its absence is increasingly becoming a barrier for larger organizations adopting or expanding Peplink deploymentsâparticularly as competitors in the SD-WAN space already offer robust SAML/SSO integrations.
Implementing SAML SSO would significantly enhance InControl 2âs appeal to enterprise customers like ours and align it with industry standards.
We kindly request that this be added to the public roadmap with an estimated timeline, or at minimum, an official acknowledgment of its priority.
Thank you for your attention to this matter. We value our partnership with Peplink and look forward to your response.
Best regards (on behalf of Cornelis Vrolijk Holding B.V.)
Niels Jan Bruggenkamp (IT Architect)