Search Results :

×

SSO Login into Drupal using GitLab as OAuth / OpenID Connect Provider

Drupal OAuth/OpenID Connect SSO integration enables SSO between the Drupal site and Gluu Server. This setup guide helps in configuring Single Sign-On (SSO) between the Drupal site and Gluu using the OAuth/OpenID Connect module. When you incorporate the OAuth/OpenID Connect module with the Drupal site, you can log into the Drupal site seamlessly with GitLab credentials. This module is compatible with Drupal 7, Drupal 8, Drupal 9, Drupal 10, and Drupal 11.

  • Download the module:
    composer require 'drupal/miniorange_oauth_client'
  • Navigate to Extend menu on your Drupal admin console and search for miniOrange OAuth Client Configuration using the search box.
  • Enable the module by checking the checkbox and click on the Install button.
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc
  • Install the module:
    drush en drupal/miniorange_oauth_client
  • Clear the cache:
     drush cr
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc
  • Navigate to Extend menu on your Drupal admin console and click on Install new module.
  • Install the Drupal OAuth & OpenID Connect Login - OAuth2 Client SSO Login module either by downloading the zip or from the URL of the package (tar/zip).
  • Click on Enable newly added modules.
  • Enable this module by checking the checkbox and click on install button.
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc
  • After installing the module, navigate to the Configuration -> miniOrange OAuth Client Configuration -> Configure OAuth tab and select Custom OAuth 2.0 Provider from the Select Application dropdown list.
Drupal as OAuth Client - Under Configure OAuth -> Select Application

  • Copy the Callback/Redirect URL and keep it handy.
  • Enter the Display Name as the Gluu.
  • Note and Contact Us - SSO between two WordPress sites

    Note: If your provider only supports HTTPS Callback/Redirect URLs and you have an HTTP site, please make sure to enable the 'Enforce HTTPS Callback URL' checkbox at the bottom of the tab.


Drupal OAuth Client Single Sign-On - Configure OAuth tab Select GitLab and copy the Callback URL

  • Go to Gluu and log into your Gluu account.
  • Navigate to OpenID Connect > Client button.
Drupal Gluu sso Login openid connects under clients

  • click the Add Client button.
Gitlab OAuth/OIDC Single Sign-On - Provide the required details such as Name, Callback/Redirect URL and select Scope

  • You will be shown a form, paste the previously copied Callback URL from Drupal in Redirect Login URIs text field and click on Add button.
Drupal Gluu sso add information and click on add button

  • After adding client you will find Client ID and Client Secret for your Gluu application. Copy Client ID & Client Secret and keep it handy. It will require to setup Drupal as OAuth client.
oauth-sso-gluu-client-credentials

  • Go to miniOrange OAuth Client module.
  • In Drupal’s Configure OAuth tab paste the copied Client ID and Client Secret from Gluu in the Client ID and Client Secret text fields.
Drupal OAuth/OoenId connect- paste the copied Client ID and Client Secret

  • Confirm the Scope and Endpoints from the table below and click on the Save Configuration button.
  • Scope openid
    Authorize EndPoint https://<gluu-server-domain>/oxauth/restv1/authorize
    Access Token Endpoint https://<gluu-server-domain>/oxauth/restv1/token
    Get User Info Endpoint https://<gluu-server-domain>/oxauth/restv1/userinfo
  • After successfully saving the configurations, please click on the Test Configuration button to test the connection between Drupal and Gluu.
Drupal-OAuth-OIDC-Client-Configuration-click-perform-text-confi

  • On a Test Configuration popup, if you don't have any active sessions on the same browser, you will be requested to login into the Gluu. After successfully logging into the Gitlab, you will be provided a list of attributes received from the Gluu.
  • Select the Email Attribute from the dropdown menu in which the user's email ID is obtained and click on the Done button.
  • Note and Contact Us - SSO between two WordPress sites

    Note: Mapping the Email Attribute is mandatory for your login to Gluu.


Github sso login with drupal OAuth OpenID Single Single On DeviantArt Select Email Attribute and Click on Done button

  • On the Attribute & Role Mapping tab, please select the Username Attribute from the dropdown list and click on the Save Configuration button.
Drupal OAuth OpenID Single Single On - Once click on Done button, you will be redirected to Attribute and Role Mapping tab

  • Now log out and go to your Drupal site’s login page. You will automatically find a Login with Gluu link there. If you want to add the SSO link to other pages as well, please follow the steps given in the image below:
Box sso login with drupal OAuth OpenID Single Single On DeviantArt test Configuration successfully

Congratulations! You have successfully configured Gluu as OAuth/OpenID Provider and Drupal as an OAuth Client.

If you face any issues during the configuration or if you want some additional features, please contact us at drupalsupport@xecurify.com.

More FAQs ➔

Follow the steps mentioned HERE

Follow the steps mentioned HERE

The logout functionality you've mentioned here is the default behavior of a module. It's logging you out of Drupal but not from your Application/Provider. To allow the module to logout from your provider/application account (what you are looking for), you need to make the below configurations: [know more]

As you have upgraded to one of our paid versions of the Drupal module and replaced the free module with the paid one, you must first activate the paid module. Please refer to the below steps. [Know more]


[MO_CONTACT_US]
ADFS_sso ×
Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com