Skip to content

Commit 4932bba

Browse files
authored
LDAP and Enterprise plan activation (#183)
* LDAP and Enterprise plan activation * Updated references and fixed sentry images * minor edits * coderabbit fixes
1 parent cfa6634 commit 4932bba

File tree

18 files changed

+269
-16
lines changed

18 files changed

+269
-16
lines changed
77.7 KB
Loading

images/ldap/enable-ldap.webp

50.1 KB
Loading
83.4 KB
Loading

images/ldap/sign-in-ldap.webp

31.6 KB
Loading

mint.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,7 @@
110110
"self-hosting/govern/github-oauth",
111111
"self-hosting/govern/oidc-sso",
112112
"self-hosting/govern/saml-sso",
113+
"self-hosting/govern/ldap",
113114
"self-hosting/govern/reset-password"
114115
]
115116
},
@@ -147,6 +148,13 @@
147148
"self-hosting/manage/upgrade-from-0.13.2-0.14.0"
148149
]
149150
},
151+
{
152+
"group": "Manage licenses",
153+
"pages": [
154+
"self-hosting/manage/manage-licenses/activate-pro-and-business",
155+
"self-hosting/manage/manage-licenses/activate-enterprise"
156+
]
157+
},
150158
"self-hosting/manage/view-logs",
151159
"self-hosting/manage/migrate-plane",
152160
"self-hosting/manage/prime-cli"

self-hosting/govern/integrations/sentry.mdx

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,6 @@ A custom integration (also called a public integration) connects your Sentry org
4343
Replace `[YOUR_DOMAIN]` with your actual Plane instance domain. For example, if your Plane instance is at `plane.company.com`, your Webhook URL would be `https://plane.company.com/silo/api/sentry/sentry-webhook/`
4444
</Note>
4545

46-
![Public integration](/images/sentry/public-integration.webp)
47-
4846
**Field explanations:**
4947

5048
**Webhook URL**
@@ -238,8 +236,6 @@ Configure these permissions to allow Sentry to interact with Plane appropriately
238236
| **Member** | Read | Access member details for assignee functionality |
239237
| **Alerts** | Read | Enable alert rule actions for automatic issue creation |
240238

241-
![Sentry integration permissions](/images/sentry/sentry-permissions.webp)
242-
243239
### Enable webhooks
244240

245241
Webhooks keep Plane and Sentry synchronized. When issues change in Sentry, Plane receives notifications and updates accordingly.
@@ -254,8 +250,6 @@ Enable the **issue** webhook with these events:
254250
| **archived** | Reflect archived status in Plane |
255251
| **unresolved** | Update Plane when resolved issues reopen |
256252

257-
![Sentry webhook configuration](/images/sentry/sentry-webhook-config.webp)
258-
259253
### Save and retrieve credentials
260254

261255
After saving your integration, Sentry generates OAuth credentials:

self-hosting/govern/ldap.mdx

Lines changed: 171 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,171 @@
1+
---
2+
title: LDAP authentication
3+
sidebarTitle: LDAP
4+
---
5+
6+
LDAP (Lightweight Directory Access Protocol) authentication lets your team sign in to Plane using their existing corporate credentials. Instead of creating separate Plane passwords, users authenticate through your organization's directory service.
7+
8+
## Before you begin
9+
10+
You'll need:
11+
12+
- Plane Commercial Edition with an active Enterprise plan license.
13+
- Don't have an Enterprise license? Contact Sales at [sales@plane.so](mailto:sales@plane.so) to get started.
14+
- Already have a license? See how to [activate your Enterprise license](/self-hosting/manage/manage-licenses/activate-enterprise).
15+
- Connection details for your LDAP server.
16+
- A service account on your LDAP server with read-only access to the user directory.
17+
18+
## Configure LDAP authentication
19+
20+
1. Sign in to your Plane instance in [God Mode](/self-hosting/govern/instance-admin).
21+
![Turn on LDAP](/images/ldap/enable-ldap.webp)
22+
2. Select **Authentication** from the left pane.
23+
3. Click **Configure** next to **LDAP** at the bottom of the page.
24+
4. Enter your LDAP server details.
25+
![LDAP configuration](/images/ldap/ldap-configuration.webp)
26+
- **Server URI (required)**
27+
This is the address of your LDAP server. Include the protocol and port number.
28+
29+
**Format:**
30+
- For unencrypted connections: `ldap://hostname:389`
31+
- For encrypted connections (recommended): `ldaps://hostname:636`
32+
33+
**Examples:**
34+
```
35+
ldap://ldap.company.com:389
36+
ldaps://ad.company.com:636
37+
ldap://192.168.1.100:389
38+
```
39+
40+
- **Bind DN (required)**
41+
42+
This is the username of the service account that Plane will use to search your directory. Think of it as Plane's "read-only" account on your LDAP server.
43+
44+
The format varies depending on your directory service:
45+
46+
**Active Directory examples:**
47+
```
48+
cn=PlaneService,ou=Service Accounts,dc=company,dc=com
49+
plane-svc@company.com
50+
```
51+
52+
**OpenLDAP examples:**
53+
```
54+
cn=admin,dc=example,dc=com
55+
cn=readonly,ou=services,dc=example,dc=com
56+
```
57+
58+
- **Bind Password (required)**
59+
60+
Enter the password for your service account (Bind DN). Plane encrypts and stores this securely in its database.
61+
62+
- **User Search Base (required)**
63+
64+
This defines where in your directory Plane should look for users. Think of it as the "starting folder" for user searches.
65+
66+
Use the most specific path possible for better performance.
67+
68+
**Examples:**
69+
```
70+
ou=users,dc=example,dc=com
71+
ou=employees,ou=people,dc=company,dc=com
72+
cn=users,dc=company,dc=local
73+
```
74+
75+
- **User Search Filter (optional)**
76+
77+
This tells Plane how to find users when they try to sign in. Use `{username}` as a placeholder - Plane replaces it with whatever the user types in the login field.
78+
79+
**Common filters by directory type:**
80+
81+
| Directory Type | Filter | What it does |
82+
|----------------|--------|--------------|
83+
| OpenLDAP | `(uid={username})` | Searches by user ID |
84+
| Active Directory | `(sAMAccountName={username})` | Searches by Windows login name |
85+
| Active Directory | `(userPrincipalName={username})` | Searches by email-style username |
86+
| Any | `(mail={username})` | Searches by email address |
87+
88+
**Default:** If you don't specify a filter, Plane uses `(uid={username})`.
89+
90+
**Combined filter example:**\
91+
If you want users to sign in with either their username OR email:
92+
```
93+
(|(uid={username})(mail={username}))
94+
```
95+
96+
- **User Attributes (optional)**
97+
98+
List the LDAP attributes Plane should retrieve to create user profiles. Plane uses these to populate the user's display name and email in Plane.
99+
100+
**How Plane maps attributes:**
101+
102+
| Plane needs | LDAP provides (in order of preference) |
103+
|-------------|----------------------------------------|
104+
| Email address | `mail`, `userPrincipalName` |
105+
| First name | `givenName`, or first part of `cn` if `givenName` is missing |
106+
| Last name | `sn`, or last part of `cn` if `sn` is missing |
107+
108+
**Recommended setting:**
109+
```
110+
mail,cn,givenName,sn,userPrincipalName,displayName
111+
```
112+
113+
**Default:** If you don't specify attributes, Plane uses `mail,cn,givenName,sn`.
114+
115+
- **Provider Name (optional)**
116+
117+
This is the label that appears on Plane's login button. Choose something your team will recognize.
118+
119+
**Examples:**
120+
- `Corporate Directory`
121+
- `Company SSO`
122+
- `Active Directory`
123+
124+
**Default:** If you don't specify a name, Plane shows `LDAP`.
125+
126+
The login button will display as: **"Sign in with [Provider Name]"**
127+
128+
5. Click **Save changes** to apply your LDAP settings. Plane will validate the connection to your LDAP server.
129+
130+
6. Users will see **Sign in with LDAP** on Plane's login page and can use their directory credentials to sign in.
131+
![Sign in using LDAP](/images/ldap/sign-in-ldap.webp)
132+
133+
## How LDAP authentication works
134+
135+
LDAP authentication in Plane works through a two-phase process. First, Plane locates the user in your directory, then it verifies their credentials. This separation is fundamental to how LDAP works and explains why you need both a service account (Bind DN) and the user's own credentials.
136+
137+
### The service account pattern
138+
Unlike simpler authentication systems where you might directly check a username and password against a database, LDAP uses what's called a "bind" operation. Plane needs to authenticate twice: once as itself (using the Bind DN) to search your directory, and once as the user to verify their password.
139+
140+
This is why you configure a Bind DN and password - it's Plane's identity on your LDAP server. Think of it as Plane introducing itself before asking about your users. The Bind DN only needs read access because Plane is just looking up information, never modifying your directory.
141+
142+
### The authentication flow
143+
When a user tries to sign in, here's what happens behind the scenes:
144+
145+
**Connection and service authentication**
146+
Plane connects to your LDAP server using the Server URI, then authenticates using the Bind DN credentials. If this fails, no users can sign in; the service account must work first.
147+
148+
**User search**
149+
Now authenticated, Plane searches for the user starting from the User Search Base and applying the User Search Filter. For example, if a user enters "jsmith" and your filter is `(uid={username})`, Plane searches for `(uid=jsmith)`. The search returns the user's distinguished name (DN), their full path in the directory.
150+
151+
**User authentication**
152+
Plane now attempts to bind again using the user's DN and their entered password. If the bind succeeds, the password is correct. This is why LDAP authentication is secure. Plane never stores user passwords; they go straight to your LDAP server for verification.
153+
154+
**Profile creation**
155+
Once authentication succeeds, Plane retrieves the User Attributes you configured (like email, first name, last name) from the user's LDAP record. If this is the user's first time signing in, Plane creates their profile using this information. If they've signed in before, Plane updates their profile with any changes from LDAP.
156+
157+
**Session establishment**
158+
Finally, Plane creates a session for the user and redirects them into the workspace. From this point on, the user's session works identically to any other Plane session. The LDAP interaction is complete.
159+
160+
### Why search filters matter
161+
The User Search Filter determines sign-in flexibility. A simple filter like `(uid={username})` requires exact usernames, but you can make it more flexible:
162+
163+
`(mail={username})` lets users sign in with email
164+
`(|(uid={username})(mail={username}))` allows either username or email
165+
166+
Filters can also restrict access: `(&(uid={username})(memberOf=cn=plane-users,ou=groups,dc=company,dc=com))` only permits specific group members.
167+
168+
### The role of user attributes
169+
User Attributes tell Plane which LDAP fields to retrieve after authentication. This is separate from the search filter. The filter finds the user, the attributes populate their profile.
170+
171+
Plane specifically looks for email addresses (required) and names (optional). If your LDAP server uses different attribute names, you need to include them.
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
title: Activate Enterprise license
3+
sidebarTitle: Activate Enterprise
4+
---
5+
6+
Enterprise plan licenses are activated at the instance level through God Mode, not through individual workspace settings. This gives instance administrators centralized control over Enterprise features across all workspaces.
7+
8+
## Activate license key
9+
10+
1. Sign in to the [Prime portal](https://prime.plane.so/licenses) with the email address you used to purchase your Enterprise plan.
11+
2. Navigate to **Manage licenses**.
12+
3. Copy the license key for your Enterprise plan.
13+
4. Sign in to your Plane instance in [God Mode](/self-hosting/govern/instance-admin).
14+
5. Select **Billing** from the left pane.
15+
6. Paste your license key in the **Activate Enterprise license** field.
16+
7. Click **Activate**.
17+
18+
![Activate Enterprise license](/images/activate-license/activate-enterprise-plan.webp)
19+
20+
Once activated, Enterprise features become available across all workspaces on your instance.
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
---
2+
title: Activate Pro and Business licenses
3+
sidebarTitle: Activate Pro or Business
4+
---
5+
6+
Pro and Business plan licenses are activated at the workspace level as each license is tied to a specific workspace.
7+
8+
## Activate your license
9+
Activate a paid plan license on your self-hosted Plane instance using a license key from the Prime portal.
10+
11+
1. Login to the [Prime portal](https://prime.plane.so/licenses) with the same email address you used to purchase one of our paid plans.
12+
13+
2. Go to [Manage licenses](https://prime.plane.so/licenses). Copy the value of the **License key** for the license you want to activate.
14+
15+
![Manage licenses](https://media.docs.plane.so/activate-license/copy-license-key.webp#hero)
16+
17+
<Tip>
18+
Click the **Get more licenses** button as in the image above on the [Prime portal](https://prime.plane.so/licenses/plans) to buy more licenses.
19+
</Tip>
20+
3. On the Plane app, navigate to **Workspace Settings > Billing and plans**
21+
4. Click the **Activate this Workspace** button.
22+
23+
![Activate workspace](https://media.docs.plane.so/activate-license/enter-license-key-selfhosted.webp#hero-tr)
24+
5. Paste the license key in the **Enter license key** box.
25+
6. Click **Activate**. You will see a confirmation.
26+
7. That's it. To check your plan at any time and find additional details, just go to the **Billing and plans** tab in **Workspace Settings**.
27+
28+
![Manage subscription](https://media.docs.plane.so/activate-license/pro-activated-cloud.webp#hero-tr)
29+
30+
## Sync plan
31+
32+
If you've made changes to your subscription, like renewing your license, upgrading your plan, or adjusting seats, use **Sync plan** to pull those updates into your workspace.
33+
34+
Syncing refreshes your workspace with the latest subscription information from the Prime server, including plan type, seat count, expiration dates, and feature access.
35+
36+
**To sync your plan:**
37+
38+
1. Navigate to **Workspace Settings > Billing and plans**.
39+
2. Click **Sync plan**.
40+
3. Wait for the sync to complete. You'll see a confirmation once your workspace is updated.
41+
42+
Use this whenever you see a mismatch between what's in the Prime portal and what appears in your workspace, or after making any subscription changes externally.
43+
44+
## Delink license key
45+
46+
Your license key is linked to both a workspace and an instance, meaning it can only be used on one workspace on one machine at a time. If you switch machines or reinstall the Commercial edition, you’ll need to reactivate your workspace. This helps prevent any misuse of the license on multiple machines or workspaces.
47+
48+
To make it easier for you to move between machines or workspaces, we've added a new Delink feature. This lets you free up your license from its current workspace, so you can reuse it on a new machine or workspace.
49+
50+
Here’s how to delink your license key from a workspace:
51+
52+
1. Head over to the **Billing and Plans** screen of the workspace that's currently using the license.
53+
2. Click **Delink license key**. This will release the license key, making it available for use on another machine or workspace.
54+
55+
![Delink license key](https://media.docs.plane.so/activate-license/delink-license-key.webp#hero-tl)
56+
3. Restart the instance using `prime-cli restart`.
57+
4. If you’re switching machines or reinstalling the Commercial edition, see [Move Plane instance to another server](https://developers.plane.so/self-hosting/manage/migrate-plane).
58+
5. Ensure you are connected to the internet and reactivate the new workspace using the license key you delinked earlier.
59+
60+

self-hosting/manage/migrate-plane.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ If you need to change your domain during migration, contact our support team for
1818

1919
## Steps
2020
1. **Delink licenses**
21-
Log in to Plane on your current server. Head to each paid workspace like Pro or Business and [delink the licenses](https://docs.plane.so/workspaces-and-users/upgrade-plan#delink-license-key). This will free up the licenses for activation on your new server. Ideally, you have just one paid workspace.
21+
Log in to Plane on your current server. Head to each paid workspace like Pro or Business and [delink the licenses](/self-hosting/manage/manage-licenses/activate-pro-and-business#delink-license-key). This will free up the licenses for activation on your new server. Ideally, you have just one paid workspace.
2222

2323
2. **Backup data**
2424
Create a backup of your Plane instance with ↓:
@@ -45,6 +45,6 @@ On the new server, restore your data with ↓:
4545
Follow the prompts during the restore process to make sure everything is set up correctly.
4646

4747
6. **Reactivate license**
48-
Finally, [reactivate your license keys](https://docs.plane.so/workspaces-and-users/upgrade-plan#self-hosted-only) on the new instance.
48+
Finally, [reactivate your license keys](/self-hosting/manage/manage-licenses/activate-pro-and-business#activate-your-license) on the new instance.
4949

5050
This should get your Plane instance up and running on the new server.

0 commit comments

Comments
 (0)