Port
Create
Log in
Sign up
Roadmap
Feedback
Feature ideas
Changelog
Boards
Feature ideas
Powered by Canny
Feature ideas
We take your ideas seriously! Read more on our prioritization process in our blog
https://productmanagement.port.io/posts/managing-feature-ideas
Details
Category
Select a category
Showing
Trending
Sort
Trending
Top
New
Filter
Under Review
Exploring
Planned
In Progress
Complete
posts in
All Categories
All Categories
Audit log (24)
Automations (35)
Dashboards & widgets (133)
Data model (142)
Data sources (122)
External Integrations (219)
Navigation & search (38)
Scorecards (40)
Self-service actions (272)
Specific entity page (53)
Tables & views (89)
RBAC & Ownership (63)
Organization settings (53)
AI Agents (13)
Product Security (4)
Increase character limit for URLs in org announcements
Right now there is a 300 character count limit for the URL input when configuring an Organization Announcement. Many links are longer than 300 characters, and there should be no limit - or a far higher one.
0
2
Add access_token endpoint a flag to force generate a new token
This feature will make it possible to make a request to the access_token endpoint with a special flag, when a request with the flag is received, a new token will be generated (with a new TTL of 3 hours) even if an existing token is still valid
0
2
Improve SSO Expired Secret Error Message
When an SSO connection secret expires, show a more informative and user-friendly error message instead of a generic “Something went wrong, please contact Port support.” The message should clearly explain that the issue is related to an expired SSO secret and guide the user to renew or reconfigure it. This will help users resolve authentication issues faster and reduce dependency on support for simple maintenance tasks.
0
3
Pre-Login Assignment for SSO Teams
Currently, users cannot be added to an existing SSO-managed teams in Port until they log in, even if they already belong to the team in the SSO provider. This creates a gap where team assignments aren’t visible in Port until the first login, preventing admins from ensuring that team data is complete before users start using Port.
0
3
Sort organization Url/webhook secrets dropdowns in integration settings alphabetically
Currently, the webhook secret and organization url dropdowns in the settings tab of data exporters are sorted nondeterministically. We request the secrets/URLs be ordered alphabetically to improve user experience when searching the dropdowns.
0
2
Ability to create service accounts with your own email domain
Currently service accounts must use the email domain serviceaccounts.getport.io . We would like the ability to create service accounts with our own email domain.
0
2
Simpler mechanism for authenticating with AWS in Embedded URLs
As we are implementing Port, we want to embed URLs with videos that are secured through AWS/S3 via Okta. Currently it is very complex to get the video authentication set up and would like an easier way to set up the authentication directly with AWS.
0
2
Embedded URL click through authentication
As we are implementing Port, we want to embed URLs with videos that are secured through AWS/S3 via Okta. When we click on the video it opens up in another tab and the authentication mechanism does not work. When seen within the entity it authenticates and the video works. We would like embedded links to either authenticate when opening in another tab or redirect to the entity tab where the embedded link is for ease of use.
0
2
Dedicated API tokens for critical flows
Port's API is critical for us and is used in the CI pipelines. We would want to have a dedicated API token for these flows that does not interact with the general rate limits from Port and has it's own rate limits even if they are reduced. More details about the question: would be great to isolate the critical system features (e.g. CI) using the API from influence of other components, which are not under our control - like other users and integrations. That probably would mean having separate limit buckets. E.g.: We could use a dedicated service account for the CI calls - maybe it could have a separate bucket and not sharing with the integrations? Probably the biggest question - non-admin users. I'd really like to limit how non-admin users can influence the rest of the system (in general too ofc, but in terms of API consumption for this context). So it'd be totally OK if personal tokens had much tighter limits, but not influence the common bucket.
4
1
Hide sensitive fields (e.g. password) in Kafka tab UI
Add the ability to hide the password field value in the Kafka tab of the UI. Currently, the password displays in plain text, and users would like it to be masked for security reasons, similar to how client secret is handled after using the REMOVE_SECRETS feature flag
0
3
Load More
→
Powered by Canny