Search Results :

×

Configure ASP.NET as SAML Identity Provider Setup Guide

ASP.NET as SAML identity provider module provides a ready-to-use solution for SAML 2.0 login using ASP.NET credentials. ASP.NET SAML IdP module acts as a SAML 2.0 identity provider which can be configured to establish the trust between the ASP.NET application and various SAML 2.0 supported service providers such as WordPress, Drupal, Moodle and many more to securely authenticate the users using the ASP.NET application credentials.

  • To install the miniOrange SAML IDP NuGet package in your .NET application, just install the miniOrange NuGet package on top of your application.
NuGet Package
.NET CLI

PM> NuGet\Install-Package miniOrange.SAML.IDP -Version 7.1.0

  • After Installation, open your browser and browse the module dashboard with the URL below:
  https://<your-application-base-url>/?ssoaction=config
  • If the registration page or login page pops up, you have successfully added the miniOrange SAML IDP NuGet package to your application.
.NET-SAML-IDP-module-dashboard

  • Register or log in with your account by clicking the Register button.
  • After successful registration, you will receive a trial license key on your registered email address.
  • If you have not received the license key to your provided email, use the Click here button in the plugin to download the license file.
License Key Manual Download link

  • To activate the module, you can either:
    • Enter the license key received via email in the provided input field.

    OR

    • Upload the license file that you downloaded using the link mentioned above.
Enter License Key

  • Then, check the box "I have read the above conditions and I want to activate the module", and click the Activate License button.
Activate License

  • Open the Service Provider Settings in your ASP.NET application where you can provide these service provider metadata.
Service Provider Settings

  • You can fill in the details manually or by using the Upload SP Metadata button. You will be able to upload all the metadata using a Metadata XML file or a Metadata URL.
Upload SP metadata

  • Now, go to the Identity Provider Settings tab. Provide the IdP metadata to your Service Provider by either downloading the metadata file or copying the metadata details manually, as per your integration requirements.
Identity Provider Settings

To send the details from ASP.NET to your service provider in the form of SAML tokens first, we will be required to set the authenticated user details in session variables.

  • If you want to send user details such as the username, you can store this information in a session variable after your authentication mechanism. Refer to the sample code below:
  HttpContext.Session["Username"] = "<Authenticated_User_Username>";
  • Map this same session variable in the ASP.NET SAML IdP plugin so that the plugin knows which session value needs to be sent in the SAML token.
  • NameID is the default SAML attribute which you can set to the given values.
Attribute Mapping

  • Once everything above is completed, you can initiate the SSO from your .NET application using the following link for the authenticated user:
  https://[Your-Application-Base-URL]/?ssoaction=idpinitiatedsso
  • For example, you can use it as HTML anchor tag or HTML button on your site after a user is authenticated on .NET application.
  <a href=”https://base-url/?ssoaction=idpinitiatedsso”>Login</a>

Please reach out to us at aspnetsupport@xecurify.com, and our team will assist you with setting up the ASP.NET Core SAML SSO. Our team will help you to select the best suitable solution/plan as per your requirement.

ADFS_sso ×
Hello there!

Need Help? We are right here!

support