3 votes
Hello,
The following use case:
Only Azure Authentication should be activated externally and redirected directly so that the login screen does not appear. The website is external and must not disclose any information about the application.
From internally, only the SSO and domain login may be visible.
Kind regards
Christian
Bild1.png
Hello Christian,
Thank you for your request. All authentication modes can be enabled/disabled here in the application
And I understand that you would like to avoid the click on "Microsoft" button and force that mode as primary. We receive a similar request here. Is it what you meant ? I don't have an ETA for that, but it is something that we would like to improve for sure.
Best regards,
François Dubois
652985ac-8c07-4e66-b441-35a71bb930db.png
Thanks for the feedback.
Avoiding the click on the “Microsoft” button is not the problem. It works, with https://<DVLS_URL>/login/entra-id
What we want are two different login pages. One for external users who only use login with entra-id and one for internal users who only use domain with SSO.
The perfect way where we can separate the IIS web content from the application layer. So, only the IIS content is located in a DMZ zone server for external users.
Kind regards,
Christian
Hello Christian,
Thank you for your answer and clarifications. Now I have a better understanding of your use case: you would like two different login pages, one for external users and one for internal users, and of course, each page should not be available to the other users. This is not possible today. It is not a product development that is currently planned. We're taking note of your feedback and will follow this topic to see if there's any additional interest or input from other users.
Best regards,
François Dubois
Hello,
Same request here, it would be nice to have :
Regards,
Damien R.