What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general.

Learn more

PRTG Network Monitor

Intuitive to Use. Easy to manage.
More than 500,000 users rely on Paessler PRTG every day. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free Download

Top Tags


View all Tags

[LOOKING AT] Improve AD-Integration in PRTG (including SSO with AD or ADFS, 2FA)

Votes:

327


Want this feature implemented, too? Please upvote by clicking Thumbs up!

(Posts as a reply won't be published in this feature request thread. Read Me!)


User Story

As a PRTG User, I want to have a single SignOn method for all my applications, including PRTG.

Details of User Story

SSO Implementation

There is currently no way of SSO implementation in PRTG OnPremises Installation. Please either include basic Active Directory Logins, or (which i would prefer) add the possibility to perform the login with SAML, this would also solve other feature requests with 2FA as SAML could handle that as well. This request only relates to Active Directory based SSO. If you'd like to see ways of two-factor authentication (2FA) integrated, please place your upvote in this thread.

StatusLooking At
Support for trusted and sub domains

As of now, PRTG doesn't support AD forests and trusted sub domains. Only accounts within the same domain as the PRTG Server is a member of can log into PRTG.

StatusLooking At
Active Directory synchronization

A full-permanent sync between AD & PRTG is by far the most important feature for us: "Permanent sync between AD & PRTG to reflect group - membership changes of AD-Users in the AD" It may be automatic, or even by the push of a button, but not being able to administer AD group changes leads to either much work and a lot of uncertainty if you caught everything or to users being alerted that no longer wish to be and complaint about that. The first one, removing the users and then the group in PRTG whenever an AD change happens to the associated group will lead to gaps. Where else was the group used? It is hard to find out or report on that, so when you delete the group, every association becomes orphaned and people that were previously alerted and wanted to, may no longer be because the alert using the deleted group is missing.

StatusLooking At

Acceptance criteria

  • SSO in PRTG as login method available
  • Include trusted/sub domains
  • Permanent sync between AD & PRTG to reflect group - membership changes of AD-Users in the AD

Status

Looking At

Updates

ImportantThis request only relates to Active Directory based SSO. If you'd like to see ways of two-factor authentication (2FA) integrated, please place your upvote in https://kb.paessler.com/en/topic/81138-open-two-factor-2fa-implementation.
Update 07.10.2020This question has been split into milestones according to the acceptance criteria, as we cannot implement them all at once. In order to not lose the votes, we'll split them up here.

2fa active-directory add-feature improve-prtg prtg-kbtracker

Created on Nov 27, 2018 6:48:14 AM

Last change on Oct 7, 2020 11:24:18 AM by  Stephan Linke [Paessler Support]



Replies

Nobody has replied yet


Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.