PLTW & SSO in Platform 2.0
How SolidProfessor Handles Single Sign-On Today
In the legacy SolidProfessor platform, Project Lead The Way (PLTW) had a custom-coded login integration built specifically for their organization. Platform 2.0 replaces this approach with a flexible, configurable SAML SSO system that works with any identity provider — no custom code required.
This document explains what the legacy PLTW integration was, why it's no longer needed, and how we'd set up PLTW (or any similar customer) in Platform 2.0 today.
Prepared by: SolidProfessor Document Version: 1.0 Date: February 2026

What Was PLTW in the Legacy Platform?

Project Lead The Way (PLTW) is a nonprofit organization that provides STEM education curricula to schools across the United States. As a SolidProfessor customer, PLTW needed their users to be able to log in to SolidProfessor using their existing organizational credentials — a feature known as Single Sign-On (SSO).

How It Worked in the Legacy App

In the old SolidProfessor platform, the engineering team built a dedicated, custom-coded login flow specifically for PLTW. Here's what the experience looked like:

  1. A user visiting SolidProfessor would see a special "Login with PLTW" button on the login page.
  2. Clicking that button redirected the user to PLTW's Okta instance (their identity provider) to enter their credentials.
  3. After successful authentication, the user was redirected back to SolidProfessor and automatically provisioned with a 1-year access plan.

The Problem with This Approach

While it worked for PLTW, this approach had serious limitations:

Key Insight:  PLTW used Okta as their identity provider. Okta supports SAML 2.0, which is an industry-standard protocol for SSO. This means PLTW's authentication needs could have been handled by any system that supports SAML — no custom code necessary. That's exactly what Platform 2.0 does.

How SSO Works in Platform 2.0

Platform 2.0 takes a fundamentally different approach to SSO. Instead of writing custom code for each customer, we built a generic, configurable SAML SSO system that works with any identity provider right out of the box.

Legacy vs. Platform 2.0: A Comparison

Aspect Legacy Platform Platform 2.0
Adding a new SSO customer Write custom code, test, deploy Fill out a form in platform-admin
Endpoints & URLs Hardcoded per customer Configurable via admin settings
Supported identity providers Only those with custom code Any SAML 2.0 provider
Time to set up Days to weeks (requires engineering) Minutes to hours (admin configuration)
Code changes required Yes, for every customer None
Deployment required Yes, for every customer None

How It Works at a High Level

  1. Customer's IT team configures their identity provider (Okta, Microsoft Entra ID, Google Workspace, etc.) with SolidProfessor's SAML metadata — essentially telling their system where to send authenticated users.
  2. A SolidProfessor admin enters the customer's metadata into platform-admin — telling our system where to verify incoming users from that organization.
  3. Users log in via SSO. When a user enters their email on SolidProfessor's login page, the system detects their email domain, routes them to their organization's identity provider, and — after successful authentication — automatically provisions them into the correct company account.
Bottom Line:  Any organization using Okta, Microsoft Entra ID, Google Workspace, or any SAML 2.0 provider can be configured for SSO without writing a single line of code.

Why We Don't Need a PLTW Integration in 2.0

The generic SAML SSO system in Platform 2.0 handles everything that the legacy PLTW custom integration did — and more. Here's a direct comparison of each feature:

Legacy PLTW Feature Platform 2.0 Equivalent
Custom "Login with PLTW" button Standard SAML login with automatic email domain detection. Users enter their email, and the system routes them to the correct identity provider automatically.
Hardcoded Okta endpoints Configurable metadata URL entered through platform-admin. Works with any Okta instance — not just PLTW's.
Auto-provisioning with a 1-year plan Auto-provisioning to the correct company account with available seats. Plan/subscription management is handled through account settings.
1-year plan auto-renewal Managed through account and subscription settings in the admin portal, independent of the SSO configuration.
PLTW-specific code paths No customer-specific code. All SSO customers use the same SAML flow, configured differently per organization.
In Plain Terms:  PLTW was essentially a SAML SSO customer whose setup happened to be hardcoded into the legacy application. In Platform 2.0, they would just be another configured account — no special treatment, no custom code, no dedicated engineering effort. The same system that serves PLTW serves every other SSO customer.

What This Means for the Team

How We'd Set Up PLTW (or Any Okta Customer) Today

If PLTW — or any new customer using Okta — needed SSO access to SolidProfessor today, here's how the setup would work. No code changes. No deployments. Just configuration.

  1. Create the account in platform-admin.
    Set up the customer's organization in platform-admin and select SAML as the onboarding strategy. This tells the system that users from this account will authenticate via SSO.
  2. Add the customer's email domain(s).
    Enter the email domains associated with the organization (e.g., pltw.org). This is how the system knows to route users to the correct identity provider when they enter their email address.
  3. Send the customer our SAML details.
    Provide the customer's IT team with our ACS URL (Assertion Consumer Service URL) and Entity ID. They'll need these to configure their Okta instance to trust SolidProfessor.
  4. Receive their Okta metadata URL.
    The customer's IT team will provide their Okta metadata URL after configuring the SAML application on their side.
  5. Configure SAML connection details in platform-admin.
    Enter the following into the account's SAML configuration:
    • Identity — the identity provider name
    • IDP Identifier — from the customer's metadata
    • Client ID — from the AWS Cognito app client
    • Client Secret — from the AWS Cognito app client
  6. Done.
    Users with @pltw.org email addresses are now automatically routed to PLTW's Okta instance for authentication. After they log in, they're provisioned into the correct SolidProfessor account.
Note:  The AWS Cognito Identity Provider and App Client must still be created manually in the AWS Console before entering the credentials in platform-admin. This is a known manual step in the current process.

Summary & Key Takeaways

The legacy SolidProfessor platform required custom, hardcoded integrations for every SSO customer. Platform 2.0 replaces that approach with a standards-based, configurable system that makes SSO accessible to any organization.

The Big Picture:  What used to require custom code and a deployment now requires a few form fields in platform-admin. PLTW — and every customer like them — is simply a configured SAML account in Platform 2.0.

Questions?

For more details on our SAML SSO implementation, refer to the companion document "SAML SSO Set Up: Okta", which provides the step-by-step technical configuration guide for Okta administrators.