SAML Single Sign On (ADFS login)

posted by miniOrange - 8/8/2019
miniOrange Active Since 8/8/2019
Singapore

reviews Ask a Question

1 users are watching this product.

DNN SAML Single Sign-On (SSO) allows users to login into your DNN website using existing SAML Identity Provider(IdP) credentials. Our module acts as a Service Provider (SP) to establish the trust between the DNN and SAML capable Identity Provider to securely authenticate the users into your website. Module 40013
  • $0.00 Free Trial (Evaluation) version
  • $249.00 Premium Version

$0.00

Add To Cart
SAML

SAML Single Sign On

miniOrange SAML Single Sign on (SSO) plugin acts as a SAML Service Provider which can be configured to establish the trust between the plugin and a SAML capable Identity Providers to securely authenticate the user to the DNN site.

  • No need to understand complex SSO Protocols
  • Easy to perform SSO with any Identity provider
  • Provides stable, fast and secure 24/7 access to your online service
  • Key Features

    Single Sign On

    Easy and seamless access to all resources. DNN Single Sign On via any existing SAML 2.0 Identity Provider

    Protect Your Complete Site

    You can restrict your site to only logged in users by redirecting the users to your IdP if logged in session is not found

    Widget to add IDP Login

    Add a link or button anywhere on your DNN site to allow user to authenticate via their Identity Provider

    Attribute Mapping

    Helps you to get user attributes from your IdP and map them to DNN user attributes like firstname, lastname with support for custom attributes

    Role Mapping

    Helps you to assign specific roles to users of a certain group in your IdP

    Single Logout

    Allows user to logout once from any service provider even user handling multiple service provider.

    Widget to add IDP Login

    Add a link or button anywhere on your DNN site to allow user to authenticate via their Identity Provider

    Multiple IDP's Supported

    Configuration of multiple IDP's to authenticate the different group of users with different IDP's.

    Auto-sync IdP Configuration from metadata

    Keep your IDP SAML Configuration and Certificates updated and in sync

    Supported Identity Providers

    ADFS
    Azure AD
    Bitium
    Shibboleth
    Okta
    IBM
    Salesforce
    OneLogin
    miniOrange
    WSO2
    BitIQ
    RSA
    Auth0
    Centrify
    Google Apps
    Ping Identity
    And Many More...

    Trusted by respected brands across the world


    Guide

    Read our Step-by-step guide to setup IDP



    Click Here

    Support

    • 24x7 access to Support Engineers via email and dedicated account manager on phone
    • 24x7 access to Self-help Resources,Getting started guides and support forums
    • Initial Response Time within 24 hrs ( All business days)
    • On-boarding & Environment Familiarity
    • Customer specific architectural support such as proposed deployment architecture options, performance tuning, configuration and implementation assistance delivered by miniorange technical specialists.
    • Third-Party Software Support : Interoperability & configuration guidance and troubleshooting

    FAQ

    A: The Claims contain the user profile attributes. A user identifier needs to be sent in a claim along with any other additional attributes (which are optional).

    A: We support all major encryption and signing algorithms supported by any SAML compliant IDP.
    RSA: RSA_SHA1, RSA_SHA256, RSA_SHA384, RSA_SHA512, RSA_1_5, RSA_OAEP_MGF1P
    DSA: SHA1
    AES: AES128_CBC, AES192_CBC, AES256_CBC, AES128_GMC
    HMAC : HMAC_SHA1
    TRIPLEDES : TRIPLEDES_CBC

    A:
    1. Download SAML tracer add-on for firefox
    2. After the extension has been installed login to your Admin console.
    3. Go to the Identity Provider Tab in WordPress IDP settings.
    4. Open the SAML tracer from the firefox menu.
    5. Keep the SAML tracer window open and click on Test as shown below.
    6. In the SAML Tracer windows click on the link with the keyword Export to get the SAML tracer logs.

    A: There are a couple of reasons why this can happen:
    1. Caching is enabled on the website.
      When auto-redirect is enabled, the user is redirected to IDP login page and after logging in back to the main site but as caching is enables it redirects to the IDP login page hence a loop.

    2. HTTP/HTTPS discrepancy:
      This happens when HTTPS is not enforced on the site but is configured on IDP side with HTTPS URL.This can be solved by enforcing HTTPS on the site by defining a redirect rule in the .htaccess file or at the Apache level.

    3. Cookie adulteration:
      The cookie created by the plugin after logging in the user is altered by another plugin which causes the user to not log in WordPress site but the session is created on IDP.



    About us

    miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider. It securely connects enterprises to their customers and partners by providing and supporting single sign-on (SSO), multi-factor authentication (MFA), User Provisioning, Adaptive Authentication, Social Login, and Network Security products and solutions. miniOrange SSO provides Single Sign-On to any type of devices or applications whether they are in the cloud or on-premise. The company aims to give organizations the ability to securely manage access to all of their web based applications in one place.

    Contact us

    Check out our website for other plugins http://miniorange.com/plugins .
    For more support or info email us at [email protected] or Contact us.

      For any general or product related information, mail us on:
    • [email protected]

    • Call Us On:
    • +1 978 658 9387