Page and Post Restriction for WordPress (WP) banner

Use cases supported with our SSO module

1. Windows Authentication:

    ASP.NET SAML SSO Module has support for Integrated Windows Authentication(IWA). Integrated Windows Authentication is the preferred approach to authentication whenever users are part of the same Windows domain as the server. Users are authenticated against an existing identity store such as Active Directory which gives seamless login experience.

2. Single Sign-On (SSO) into Multiple applications:

    ASP.NET SAML SSO Module also supports for login (asp.net sso) into multiple asp.net application with one IdP and one set of credentials using SAML protocol. Once the user will be logged into one of the applications, he/she will be logged into to asp.net application automatically that is no need to enter login credentials for other applications again.

3. Single Sign-On (SSO) into single custom ASP.NET / ASP.NET MVC / ASP.NET Core / VB.NET application:

    ASP.NET SAML SSO module helps you to add functionality for Single Sign-On (SSO) to your ASP.NET, ASP.NET MVC, ASP.NET Core, VB.NET applications. Implementation of Single Sign On (SSO) in ASP.NET, ASP.NET MVC, ASP.NET Core, VB.NET applications will help you to protect your web application by providing authentication using your existing identity provider.

Benefits

Single Sign On

Easy and seamless access to all resources. ASP.NET Single Sign-On (SSO) via any existing SAML 2.0 Identity Provider

Protect Your Complete Site

You can restrict your site to only logged in users by redirecting the users to your IdP if logged in session is not found

Single Logout

Allows a user to logout from all server sessions established via SAML SSO by initiating the logout process once.

Attribute Mapping

Offers you to map the attributes from your IdP to your ASP.NET application

Role Mapping

Map your Identity Provider roles to your ASP.NET application and restrict resources to specific roles

Custom Certificate

Add your own custom X.509 Certificate for sending signed Request and verification of signed Response.

Auto-sync IdP Configuration from metadata

Keep your IDP SAML Configuration and Certificates updated and in sync

You can enable Wordpress Single Sign-On (SSO) in your site using our SSO plugin and connect it to any Identity Provider. See our integration guides with the most popular Identity Providers.

Can't find your IDP ? Contact us on oauthsupport@xecurify.com. We'll help you set it up in no time.

Plans For Everyone

License is linked to the domain of the ASP.NET instances or applications, so if you have dev-staging-prod type of environment then you will require 3 licenses of the plugin (with discounts applicable on pre-production environments). Contact us at oauthsupport@xecurify.com for bulk discounts.
  • PREMIUM


    $ 449*
  • See the Premium Plugin features list below

  • Unlimited Authentications
  • Basic Attribute Mapping (Username)
  • Custom Redirect URL after Login
  • Login link
  • Step by Step guide to setup IDP
  • Protect Complete Site
  • Advanced Attribute Mapping(Email, FirstName, LastName)
  • SAML Single Logout
  • Custom Attribute Mapping
  • Customize SP Configuration
  • Use different Binding types [Http-Redirect Binding, Http-POST Binding]
  • Custom Redirect URL after Login/Logout
  • -
  • -
  • -
  • -
  • -
  •  Support 24x7

    Contact Us

  • ENTERPRISE


    $ 649*
  • See the Enterprise Plugin features list below

  • Unlimited Authentications
  • Basic Attribute Mapping (Username)
  • Custom Redirect URL after Login
  • Login link
  • Step by Step guide to setup IDP
  • Protect Complete Site
  • Advanced Attribute Mapping(Email, FirstName, LastName)
  • SAML Single Logout
  • Custom Attribute Mapping
  • Customize SP Configuration
  • Use different Binding types [Http-Redirect Binding, Http-POST Binding, Artifact Binding, SOAP Binding]
  • Custom Redirect URL after Login/Logout
  • **Multiple IDPs support
  • Header Based Authentication
  • Cookie based Authentication
  • Custom Certificates
  • Customized Login & Logout URL
  •  Support 24x7

    Contact Us

* Multiple IdP Support -

There is an additional cost for the number of Identity Providers you have.

* Cost applicable for one instance only. Licenses are perpetual and the Support Plan includes 12 months of maintenance (support and version updates). You can renew maintenance after 12 months at 50% of the current license cost.

* We provide deep discounts on bulk license purchases and pre-production environment licenses. As the no. of licenses increases, the discount percentage also increases.

Steps to Configure the ASP.NET SAML 2.0 Module

Step 1: Download and extract package.

  • Download miniOrange ASP.NET SAML 2.0 Module.
  • For Setting up the module, extract the asp-net-saml-sso-module-xxx.zip, you will find a DLL file miniorange-saml-sso.dll, a configuration file saml.config and a integration.md file which contain the steps for adding the module into your application.

Step 2: Add the module in your application.

  • Add miniorange-saml-sso.dll in bin folder (where your other DLL files exists) for your application.
  • Register miniorangesamlsso module in your application according to the provided steps in the integration.md file.
  • Add the provided configuration file saml.config in the root directory for your application.
  • After integration open browser and browse the connector dashboard with URL below:
    https:// <your-application-base-url>/?ssoaction=config
  • If it pops up the registration page or login page, you have successfully added the miniOrange saml sso connector for your application.
  • Register or Login for configuring the module.

Step 3: Configure your Identity Provider

There are below two ways with which you can get the SAML SP metadata to configure on your identity provider end.

A] Using SAML metadata url or metadata file:
  • Under the Service Provider Settings section you can find the metadata URL as well as option to download the SAML metadata.
  • Copy metadata URL or download metadata file to configure the same on your identity provider end.
  • You can refer to the below screenshot:
B] Uploading metadata manually:
  • From the Service Provider Settings section you can copy the service provider metadata manually like SP Entity ID, ACS Url, Single Logout Url and provide it to your identity provider for configuration.
  • You can refer to the below screenshot:

Step 4: Configure your Service Provider

There are below two ways with which you can configure your SAML identity provider metadata in the module.

A] Upload metadata using the Upload IDP Metadata button:
  • If your identity provider has provided you with the metadata URL or metadata file (.xml format only) then you simply configure the identity provider metadata in the module using the Upload IdP Metadata option.
  • You can refer to the below screenshot.
  • You can choose any one of the options according to the metadata format you are available with.
B] Configure the identity provider metadata manually:
  • After configuring your Identity Provider, it will provide you with IDP Entity ID, IDP Single Sign On URL and x.509 Certificate. Configure these values under IDP Entity ID, Single Sign-On Url and SAML X509 Certificate fields respectively.
  • Click Save to Save your IDP details.

Step 5: Test Configuration

  • Click on the Test Configuration button to test whether the SAML configuration you’ve done is correct or not.
  • The below Screenshot shows a successful result.

Step 6:Attribute Mapping

  • Map your application attributes with the Identity Provider (IdP) attributes.
  • Note: All the mapped attributes will be stored in the session so that you can access them in your application.

Step 7: Integration Code

  • You can find the integration code in Integration Code tab in the connector. Just copy-paste that code snippet wherever you want to access the user attributes.

Step 8: Add following link in your application for Single Sign-On (SSO)

  • Use the following URL as a link in your application from where you want to perform SSO:
    https://base-url/?ssoaction=login
  • For example you can use it as:
    <a href="https://base-url/?ssoaction=login”>Log in</a>"

Step 9: Add following link in your application for SLO

  • Use the following URL as a link in your application from where you want to perform SLO:
    https://base-url/?ssoaction=logout
  • For example you can use it as:
    <a href="https://base-url/?ssoaction=logout”>Log out</a>"
  • You can configure the ASP.NET SAML 2.0 Single Sign-On (SSO) module with any Identity Provider such as ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with your own custom identity provider and secure your ASP.NET / ASP.NET MVC / ASP.NET Core / VB.NET applications by performing Single Sign-on (SSO) into them. .

    Not able to find your IdP? Contact us at info@xecurify.com and we'll help you set up SSO with your IdP in no time.


    The miniOrange ASP.NET SAML 2.0 Connector supports C# and Visual Basic languages.


    We also provide DotNet Nuke Single Sign-On SAML Connector. Click Here to know more.

    miniOrange also provides you modules for integration with legacy apps such as Active Directory, SiteMinder, Radius, Unix and so on.
    miniOrange helps you for adding login/authentication into your ASP.NET site using OAuth, OpenID, ADFS, SAML and WSFED protocols.
    Have questions or need clarifications? Please contact us at info@xecurify.com and our experts will be there to help you.

    Reference links:

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com