by mathiasn on 4/11/23, 12:40 PM with 103 comments
Like many others we couldn’t justify the Enterprise-plan for every SaaS tool to simply get access to SSO and SCIM/SAML APIs. For Notion alone the cost would have nearly doubled to $14 per user per month. That’s insane! Mostly unknown to people, SSO Tax also limits access to APIs that are used for managing user access (SCIM/SAML).
This has proven to be an incredibly annoying roadblock that prevented me from doing anything useful with our user data: - You want to download the current list of users and their permissions? Forget about it! - You want to centrally assign user roles and permissions? Good luck with that! - You want to delete user accounts immediately? Yeah right, like that's ever gonna happen!
It literally cost me hours to update our access matrix at the end of every quarter for our access reviews and manually assigning user accounts and permissions.
I figured, there must be a better way than praying to the SaaS gods to miraculously make the SSO Tax disappear (and open up SCIM/SAML along the way). That’s why I sat down a few weeks ago and started building OpenOwl (https://github.com/AccessOwl/open_owl). It allows me to just plug in my user credentials and automatically download user lists, including permissions from SaaS tools.
Granted, OpenOwl is still a work in progress, and it's not perfect. At the moment it's limited to non-SSO login flows and covers only 7 SaaS vendors. My favorite part is that you can configure integrations as “recipes”. The goal was for anybody to be able to add new integrations (IT managers and developers alike). Therefore you ideally don’t even have to write any new code, just tell OpenOwl how the new SaaS vendor works.
What do you think? Have you dealt with manually maintaining a list of users and their permissions? Could this approach get us closer to overcoming parts of the SSO Tax?
by kdeldycke on 4/11/23, 2:25 PM
A documented rant has made the rounds at https://sso.tax , which lists all vendors and their pricing of SSO.
by dboreham on 4/11/23, 1:46 PM
by hobs on 4/11/23, 2:13 PM
Last time I talked with dbt on their enterprise plan for the Okta integration level they pitched us 3000 user/year with the clear acknowledgement that they just raised their prices 100% on their other tier and were about to do major price increases to their enterprise tier.
by OliverJones on 4/11/23, 3:35 PM
It's going to save growing companies a fortune, by helping cancel promptly unused money-sucking accounts across the SaaS multiverses.
I just hope it's easy to use for superbusy founders, tech people now riding a success wave. Because those are often the people who do the account-cleanup job. If this tool is a pain in the *s to use, there's even more time down the hopper.
It's almost impossible for people like us to teach ourselves to delegate by inflicting pain on ourselves. And saving big money is worth some pain, amirite? Been there. Done that.
But HERE's an incentive to delegate:
* grab the most talented devops person you know. * tell them about this open-source project * delegate to them this account-cleanup PITA * invite them to donate time to the open-source project and give them time to do so. * but they still have to do the actual cleanup regularly. * stand back and watch the growth of a REALLY USABLE open source money-leak-hunting project.
Every single YCombinator portfolio company would benefit from this. You VC guys? Get some really smart interns to work on this too.
by vegardx on 4/11/23, 2:47 PM
Now lets talk about SaaS providers that don't offer any other way than paying by credit card. Not even pre-paying with a wire transfer. If you've ever tried to source a company credit card in a huge organization you know how hard that can be. And no way in hell I'm going to put $10k/month for various services on my personal credit card and expense it every month. It sometimes feel like they don't even want to run a business.
by cheeseblubber on 4/11/23, 1:54 PM
by hnlmorg on 4/11/23, 5:02 PM
Until those limitations are resolved, if that’s even possible, this feels like an audit hack rather than a security solution.
by shellcromancer on 4/11/23, 6:12 PM
Understanding how your breach impacts me, or detecting how the abuse of your tools are used to impact our organizations shouldn't cost additional money or be gated to only enterprise contracts.
Happy to take PRs for other vendors logs being added: https://github.com/shellcromancer/audit-log-wall-of-shame
by ensignavenger on 4/11/23, 2:56 PM
I don't really need all of the auditing and compliance features this solution seems to currently offer- I just need a simple SSO proxy. If some one wants to build that, it could be a huge help for small non-commercial self-hosters like me.
by westurner on 4/11/23, 6:20 PM
> Glim is a simple identity access management system that speaks some LDAP and has a REST API to manage users and groups
"Proxy LDAP to limit scope of access #60" https://github.com/doncicuto/glim/issues/60
by somegent on 4/11/23, 5:24 PM
There is at least one other 'open' library for solving this problem (https://github.com/ConductorOne/baton).
However, I like how you're scraping web data for apps that don't have APIs. I've been waiting for someone to do that. That said, I want it built into other tooling I have purchased, so I don't have to implement myself.
by lozenge on 4/11/23, 1:59 PM
As it supports so few services, putting the list up top in the README would be a good idea, and a quick explanation of what programming languages/methods can be used to add more services. The chances another organisation has picked the same 7 services as you is pretty low.
by dbdoskey on 4/11/23, 2:30 PM
Anything that will allow to semi-automate this, and get a periodic report that compares this to where the Single Point of Truth for the account list would be amazing.
by londons_explore on 4/11/23, 2:01 PM
Ie. it will create a temporary deadbeef123@your-domain.com email address, use that to sign up to the 3rd party web app and keep the password secret from the user.
Then, when the user returns to the site, your on-site server provides the auth details for each logon (or even better, logs in for the user and just sets the right cookies).
For some sites, it will also make sure the user is a member of the right 'team', has access to the right shared documents, has their display name matching their name in the corp database, etc.
by throwawaaarrgh on 4/11/23, 2:20 PM
SSO isn't a tax. You either need a single method to disable an account across all providers instantly and enforce password policies globally, or you don't. Do the risk vs reward math and then put the line item in your budget. Get a discount or use a reseller to avoid retail.
by cratermoon on 4/12/23, 3:58 AM
Knowing what I know, I don't really begrudge any SSO provider their premium pricing.
by Flipflip79 on 4/11/23, 2:35 PM
Regardless, I totally understand the use case and I can immediately put this to work for my team - we will likely contribute some recipes too.
Thanks for sharing!
by CSDude on 4/11/23, 4:21 PM
https://resmo.com/saas-discovery
Then you can do `SELECT * FROM users WHERE mail = 'mustafa@resmo.com'`
by pulvinar on 4/11/23, 2:12 PM
(No, it's not Social Security Organization tax...)
by Nezteb on 4/11/23, 7:48 PM
Out of curiosity, what made you choose Elixir?
I wanted to use Elixir to build my PDF scraper (https://github.com/Nezteb/scrape-pdf) but didn't want to spend too much time figuring out how to use Playwright from Elixir, so I went with Node. I'll have to borrow some of your methods!
by distantsounds on 4/11/23, 2:23 PM
by alex7734 on 4/12/23, 12:20 PM
I mean you could of course lie when signing up but if a company is risk averse enough to use SSO it's probably risk averse enough to not breach contracts.
by ThePhysicist on 4/11/23, 2:19 PM
Apart from that, SSO is just a handy feature that non-Enterprise customers usually don't need while Enterprise customers do, so it's ideal for differentiating customers. That said an Enterprise edition contains much more than SSO in many cases, e.g. audit logging, containerized deployments, extensive support, etc.. That's what you pay for with an Enterprise offering, the SSO feature is just a small part of that.
by goldenCeasar on 4/11/23, 2:50 PM
by zebroc on 4/11/23, 2:41 PM
Well done, thanks for sharing!
by api on 4/11/23, 2:06 PM
by thallium205 on 4/11/23, 3:32 PM
by LionTamer on 4/11/23, 5:04 PM