4 results found
-
Streamlined Microsoft Entra ID Authentication with Role-Based Login Interface
As an IT professional using PRTG in a Microsoft Entra ID environment, I want a consistent and intuitive login experience that automatically recognizes my authentication method and user role, so that I can quickly access the monitoring system without confusion about which login option to use.
Specifically, I need the system to remove separate sign-in and use consistent SSO for Entra users and tenant owners. It's confusing for users to enter their email instead of clicking the blue "Sign-in with Microsoft Button". Or change the login page to have a separate button for system administrator's vs users.
2 votesHi there,
Thank you again for submitting your idea to Paessler. We appreciate your perspective on streamlining the authentication process.
After careful consideration, we've decided not to implement this specific feature request at this time for the following reasons:
- Planned SSO improvements: We're currently working on broader enhancements to our SSO login experience that will address authentication workflows more comprehensively.
- Failback authentication requirement: While we understand your desire for a single, streamlined login option, maintaining multiple authentication methods is essential for system reliability. If SSO connectivity is interrupted or Microsoft services experience downtime, alternative login options ensure that administrators and users can still access PRTG without disruption. This redundancy is a critical safeguard for business continuity.
While this particular idea won't be moving forward, please don't be discouraged! Your input is incredibly valuable, and we encourage you to continue sharing your thoughts and ideas with us.
Thanks for your understanding…
-
Support for Two-Factor Authentication (2FA) in PRTG On-Premise
As an IT Infrastructure Manager responsible for security and compliance, I want to enforce Two-Factor Authentication (2FA) for all users accessing the PRTG On-Premise web interface,
At the moment, PRTG On-Premise only supports password-based authentication. Given today’s security requirements and compliance standards, 2FA has become essential for protecting administrative interfaces and monitoring systems. Since PRTG contains critical infrastructure information, enhanced login security is necessary in many environments.
Requested Feature:
Please add support for Two-Factor Authentication (2FA) for PRTG On-Premise, ideally with multiple methods such as:
- TOTP apps (Google Authenticator, Microsoft Authenticator, etc.)
- Hardware tokens (FIDO2, YubiKey)
- SMS…1 voteHi Yannik,
Thank you again for submitting your idea to Paessler. We truly appreciate you taking the time to share your feedback.
Please note that MFA is already available through SSO (Okta and Microsoft Entra ID) options:
How can I enable Microsoft Entra ID multifactor authentication? | Paessler Knowledge Base
How can I enable Okta multifactor authentication? | Paessler Knowledge Base
Beside that, the following workarounds are possible:
Since PRTG supports SAML 2.0, you can effectively use any compatible Identity Provider to enforce MFA:
- Keycloak (Open Source): Host your own free Identity Provider. It connects to your Active Directory and forces users to use TOTP (Google Authenticator) or hardware keys before passing them to PRTG.
- AD FS (Active Directory Federation Services): Use your existing Windows Server infrastructure to act as the SAML provider. You can configure AD FS to require certificates or smart cards.
- Duo SSO: Use Duo's native…
-
Improve OnPremise AD-Integration in PRTG
Support for trusted and sub domains
PRTG doesn't support AD forests and trusted sub domains. Only accounts within the same domain as configured in the settings can log into PRTG.Without this feature we have unnecessary administrative overhead due to having to create extra user accounts for users in sub domains.
This task is not only a waste of time, but also poses additional security risks, since users tend to use the same password for more accounts.This has been the feature request with the highest upvotes in the old system (https://helpdesk.paessler.com/en/support/solutions/articles/76000073698--looking-at-improve-ad-integration-in-prtg-including-sso-with-ad-or-adfs-2fa-), yet it's still not implemented.
We…1 voteHi there,
Thank you again for submitting your idea to Paessler. We truly appreciate you taking the time to share your feedback.
After careful consideration by our team, we've decided to decline this idea at this time.
While we appreciate your request for PRTG to natively support authentication across an entire AD forest, here is our perspective on why we focus on a more streamlined authentication model and how you can use Microsoft Entra ID (formerly Azure AD) or Active Directory Federation Services (AD FS) to achieve a best-practice, single-identity solution.
Why Direct Multi-Domain/Forest Support is Complex
PRTG is a network monitoring solution, and its design prioritizes ease of deployment, stability, and security in its core function. Directly integrating with an entire Active Directory Forest—including all trusted domains and sub-domains—involves significant complexities that are generally handled by dedicated identity services:
- Trust and Authentication Flow Complexity: Supporting authentication across different AD…
-
Detailled permissions on structural levels
We work in the regulated pharmaceutical environment and I need a clear assignment of permissions at the individual structural levels (inheritance / interruption of inheritance) or at least an export of which permissions have been assigned to the respective structures. (Who has access to the different structures --> who has read permissions / who has read/write permissions on each structure?)
It is very important for the regulated pharmaceutical sector to have a detailed access configuration overview.1 voteHi there,
Thank you again for submitting your idea to Paessler. We truly appreciate you taking the time to share your feedback.
We do not plan to change the permissioning system in PRTG as it exists today, as this would require major changes to core architecture of the product. We are building a new cloud control plane (across multiple cores) which will allow for more granular permissioning of who can do what. This new cloud service is currently in development and we are putting in more sophisticated RBAC there. This should meet your needs when it comes out. The management use cases will likely be in beta by the end of 2026. Please email me back if you have specific questions.
After careful consideration by our team, we've decided to decline this idea at this time. This decision was made based on several factors, which may include:
- It doesn't align…
- Don't see your idea?