DNN SAML Single Sign-On (SSO) with Google Apps as IDP
DNN SAML Single Sign-On (SSO)
authentication provider gives the ability to enable SAML Single Sign-On for your DotNetNuke
applications. Using Single Sign-On you can use only one password to access
your DotNetNuke application and services. Our authentication provider is compatible with all
the SAML-compliant
identity providers. Here we will go through a step-by-step guide to configure Single Sign-On
(SSO) between DotNetNuke and Google Apps considering Google Apps as IdP.
Pre-requisites: Download And Installation
Download
the package for DNN SAML Single Sign-On (SSO) authentication provider.
Upload the installation package
dnn-saml-single-sign-on_xxx_Install by going in
Settings > Extension > Install Extension.
Steps to configure DNN SAML Single Sign-On (SSO) using Google Apps as IDP
1. Add authnetication provider on DNN page
Now under the Installed extensions tab select Authentication Systems.Here you can see the miniOrange DNN SAML Authentication Plugin.
Just Click on the pencil icon as mentioned in the image below to configure the DNN SAML Authentication Provider.
Now go to the site settings tab. Here you can see the DNN SAML Authentication Provider Dashboard.
You have finished with the Installation of the authentication provider on your DNN site.
2. Setup Google Apps as Identity Provider
Select your identity provider Google Apps from the list shown below.
There are two ways detailed below with which you can get the SAML SP
metadata to configure onto your identity provider end.
A] Using SAML metadata URL or metadata file:
Under Service Provider Settings, you can find the metadata URL as
well as the option to download the SAML metadata.
Copy metadata URL or download the metadata file to configure the same on
your identity provider end.
You may refer to the screenshot below:
B] Uploading metadata manually:
Under the Service Provider Settings section, you can manually copy
the service provider metadata like Base URL, SP Entity ID, ACS URL
and share it with your identity provider for configuration.
Navigate to the Apps tab in the left menu and click on
Web and mobile apps.
Add a SAML App
Click on the Add App button, then in the dropdown select
Add Custom SAML app tab to create a new saml app.
Enter details for your custom SAML app and click on Continue button.
IDP Information
Click on Download Metadata button. This will be used for configuring
your Service Provider.
You can also copy G Suite details like
SSO URL, entity ID and Certificate
to configure the Service Provider manually and then click on
Continue button.
Service Provider Details
Enter details from the Service Provider Metadata tab in the
SAML SP plugin.
ACS URL
Copy and paste the ACS URL from the plugin.
Entity ID
Copy and paste the SP Entity ID/ Issuer from the plugin.
Signed Response
Check Signed Response ✓
Name ID Format
EMAIL
Click on Continue button.
Attribute Mapping
Click on Add Mapping button.
Add and select user fields in Google Directory, then map them to Service
Provider attributes and Click on Finish button.
User Access to Configured App
Go to SAML Apps again and click on
OFF for everyone .
Then, select ON for everyone to activate SSO.
You have successfully configured G Suite / Google Apps as SAML IdP (Identity
Provider) for achieving G Suite / Google Apps SSO login into your DNN
website.
3. Configure DotNetNuke SAML Authentication Provider as Service Provider
For configuring application in the authentication provider, click on the Add new IdP button in the Identity Provider Settings tab.
A] Select your Identity Provider
Select Google from the list.You can also
search for your Identity Provider using the search box.
B] Configure your Identity Provider
Under the Service Provider Settings tab, you can download SP metadata as
a XML document or copy the metadata url.
Alternatively, copy and paste the SP Entity ID and ACS Url from the SP
metadata Table to your Google configuration page.
C] Configure your Service Provider
To upload IdP's metadata, you can use the
Upload IdP metadata button under the Identity Provider Settings
tab, if you have the IdP metadata URL or the IdP metadata .xml file.
Alternatively, you can copy the IDP Entity ID and
Single Sign-On Url values from the IdP and fill them up under the
Identity Provider Settings tab.
4. Testing SAML SSO
Click the Test Configuration button to verify if you have configured
the plugin correctly.
On successful configuration, you will get Attribute Name and Attribute
Values in the Test Configuration window.
You can even configure the
ASP.NET SAML Single Sign-On (SSO)
module with any identity provider such as
ADFS, Azure AD, Bitium, centrify, G Suite, JBoss Keycloak, Okta, OneLogin,
Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA
SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2
or even with your own custom identity provider. To check other identity
providers, click
here.
Not able to find your identity provider? Mail us on
dnnsupport@xecurify.com
and we'll help you set up SSO with your IDP and for quick guidance (via
email/meeting) on your requirement and our team will help you to select the
best suitable solution/plan as per your requirement.
×
Hello there!
Need Help? We are right here!
Contact miniOrange Support
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com