PLTW & SSO in Platform 2.0
How SolidProfessor Handles Single Sign-On Today
In the legacy SolidProfessor platform, Project Lead The Way (PLTW) had a custom-coded
login integration built specifically for their organization. Platform 2.0 replaces this
approach with a flexible, configurable SAML SSO system that works with any identity
provider — no custom code required.
This document explains what the legacy PLTW integration was, why it's no longer needed,
and how we'd set up PLTW (or any similar customer) in Platform 2.0 today.
Prepared by: SolidProfessor
Document Version: 1.0
Date: February 2026
What Was PLTW in the Legacy Platform?
Project Lead The Way (PLTW) is a nonprofit organization that provides STEM
education curricula to schools across the United States. As a SolidProfessor customer, PLTW
needed their users to be able to log in to SolidProfessor using their existing organizational
credentials — a feature known as Single Sign-On (SSO).
How It Worked in the Legacy App
In the old SolidProfessor platform, the engineering team built a dedicated, custom-coded
login flow specifically for PLTW. Here's what the experience looked like:
-
A user visiting SolidProfessor would see a special "Login with PLTW" button
on the login page.
-
Clicking that button redirected the user to PLTW's Okta instance (their
identity provider) to enter their credentials.
-
After successful authentication, the user was redirected back to SolidProfessor and
automatically provisioned with a 1-year access plan.
The Problem with This Approach
While it worked for PLTW, this approach had serious limitations:
-
Every new SSO customer required custom code. If another organization
wanted the same login experience, engineers had to write new code, test it, and deploy
it — a process that could take days or weeks.
-
Each integration was hardcoded. PLTW's Okta endpoints, redirect URLs,
and provisioning logic were written directly into the application source code.
-
It didn't scale. Supporting 5 SSO customers meant maintaining 5 separate
custom integrations, each with its own code paths and potential for bugs.
Key Insight:
PLTW used Okta as their identity provider. Okta supports SAML 2.0,
which is an industry-standard protocol for SSO. This means PLTW's authentication needs could
have been handled by any system that supports SAML — no custom code necessary. That's
exactly what Platform 2.0 does.
How SSO Works in Platform 2.0
Platform 2.0 takes a fundamentally different approach to SSO. Instead of writing custom code
for each customer, we built a generic, configurable SAML SSO system that works
with any identity provider right out of the box.
Legacy vs. Platform 2.0: A Comparison
| Aspect |
Legacy Platform |
Platform 2.0 |
| Adding a new SSO customer |
Write custom code, test, deploy |
Fill out a form in platform-admin |
| Endpoints & URLs |
Hardcoded per customer |
Configurable via admin settings |
| Supported identity providers |
Only those with custom code |
Any SAML 2.0 provider |
| Time to set up |
Days to weeks (requires engineering) |
Minutes to hours (admin configuration) |
| Code changes required |
Yes, for every customer |
None |
| Deployment required |
Yes, for every customer |
None |
How It Works at a High Level
-
Customer's IT team configures their identity provider (Okta, Microsoft
Entra ID, Google Workspace, etc.) with SolidProfessor's SAML metadata — essentially
telling their system where to send authenticated users.
-
A SolidProfessor admin enters the customer's metadata into platform-admin
— telling our system where to verify incoming users from that organization.
-
Users log in via SSO. When a user enters their email on SolidProfessor's
login page, the system detects their email domain, routes them to their organization's
identity provider, and — after successful authentication — automatically
provisions them into the correct company account.
Bottom Line:
Any organization using Okta, Microsoft Entra ID, Google
Workspace, or any SAML 2.0 provider can be configured for SSO
without writing a single line of code.
Why We Don't Need a PLTW Integration in 2.0
The generic SAML SSO system in Platform 2.0 handles everything that the legacy
PLTW custom integration did — and more. Here's a direct comparison of each feature:
| Legacy PLTW Feature |
Platform 2.0 Equivalent |
| Custom "Login with PLTW" button |
Standard SAML login with automatic email domain detection. Users enter their email, and the system routes them to the correct identity provider automatically. |
| Hardcoded Okta endpoints |
Configurable metadata URL entered through platform-admin. Works with any Okta instance — not just PLTW's. |
| Auto-provisioning with a 1-year plan |
Auto-provisioning to the correct company account with available seats. Plan/subscription management is handled through account settings. |
| 1-year plan auto-renewal |
Managed through account and subscription settings in the admin portal, independent of the SSO configuration. |
| PLTW-specific code paths |
No customer-specific code. All SSO customers use the same SAML flow, configured differently per organization. |
In Plain Terms:
PLTW was essentially a SAML SSO customer whose setup happened to be hardcoded into the
legacy application. In Platform 2.0, they would just be another configured account — no
special treatment, no custom code, no dedicated engineering effort. The same system that serves
PLTW serves every other SSO customer.
What This Means for the Team
-
No engineering bottleneck. SSO setup moves from a developer task to an
admin task. The engineering team doesn't need to be involved for each new SSO customer.
-
Faster onboarding. New SSO customers can be configured and live in the
same day, rather than waiting for a development cycle.
-
Less maintenance. One generic system to maintain instead of multiple
custom integrations, each with their own potential issues.
-
Better scalability. Whether we have 5 or 500 SSO customers, the system
works the same way.
How We'd Set Up PLTW (or Any Okta Customer) Today
If PLTW — or any new customer using Okta — needed SSO access to SolidProfessor
today, here's how the setup would work. No code changes. No deployments. Just configuration.
-
Create the account in platform-admin.
Set up the customer's organization in platform-admin and select SAML as
the onboarding strategy. This tells the system that users from this account will
authenticate via SSO.
-
Add the customer's email domain(s).
Enter the email domains associated with the organization (e.g., pltw.org).
This is how the system knows to route users to the correct identity provider when they
enter their email address.
-
Send the customer our SAML details.
Provide the customer's IT team with our ACS URL (Assertion Consumer
Service URL) and Entity ID. They'll need these to configure their Okta
instance to trust SolidProfessor.
-
Receive their Okta metadata URL.
The customer's IT team will provide their Okta metadata URL after
configuring the SAML application on their side.
-
Configure SAML connection details in platform-admin.
Enter the following into the account's SAML configuration:
- Identity — the identity provider name
- IDP Identifier — from the customer's metadata
- Client ID — from the AWS Cognito app client
- Client Secret — from the AWS Cognito app client
-
Done.
Users with @pltw.org email addresses are now automatically routed to
PLTW's Okta instance for authentication. After they log in, they're provisioned into
the correct SolidProfessor account.
Note:
The AWS Cognito Identity Provider and App Client must still be created manually in the
AWS Console before entering the credentials in platform-admin. This is a known manual
step in the current process.
Summary & Key Takeaways
The legacy SolidProfessor platform required custom, hardcoded integrations for every SSO
customer. Platform 2.0 replaces that approach with a standards-based, configurable system
that makes SSO accessible to any organization.
-
PLTW doesn't need a dedicated integration. The generic SAML SSO system
covers everything PLTW's custom integration did, plus it supports any other SAML-compatible
identity provider.
-
Any SAML 2.0 identity provider works. Okta, Microsoft Entra ID, Google
Workspace, and hundreds of others — if it supports SAML 2.0, it works with Platform 2.0.
-
Setup is configuration, not code. No deployments, no engineering sprints.
A SolidProfessor admin can configure a new SSO customer through platform-admin.
-
User provisioning is built in. Auto-creating user accounts and assigning
them to the correct company is part of the SAML login flow — no separate provisioning
step needed.
-
The system scales. The same configuration process works whether we're
supporting 1 SSO customer or 100. Each one is just another entry in platform-admin.
The Big Picture:
What used to require custom code and a deployment now requires a few form fields in
platform-admin. PLTW — and every customer like them — is simply a configured
SAML account in Platform 2.0.
Questions?
For more details on our SAML SSO implementation, refer to the companion document
"SAML SSO Set Up: Okta", which provides the step-by-step technical configuration
guide for Okta administrators.