Search Results :

×

Azure AD B2C SSO OAuth / OpenID Connect Single Sign On into TYPO3 | Azure AD B2C Login

Azure AD B2C SSO OAuth / OpenID Connect Single Sign On into TYPO3 | Azure AD B2C Login


Integration of Azure AD B2C Login (Azure AD B2C OAuth Single Sign-On) with Typo3 using OAuth 2.0 Protocol. The Typo3 OAuth / OpenID Connect Single Sign-On (SSO) extension makes it easy to use OAuth2 to set up Azure AD B2C Login on Typo3 (Azure AD B2C Single Sign on).

The extension can be set up using other Social Media sources, as well as custom OAuth and OIDC providers. It contains a lot of Single Sign-On (SSO) features, like Attribute Mapping for user profiles, Role Mapping, and so on. In this guide, we'll go over how to set up SSO between Typo3 and Azure AD B2C. At the end of this article, users should be able to log into Typo3 using Azure AD B2C. Click here to read more about the Typo3 OAuth Single Sign-On (OAuth & OpenID Connect Client) extensions extra features.

The Typo3 OAuth & OpenID Connect Single Sign-On (SSO) extension makes it possible to log into Typo3 securely using Azure AD B2C as an OAuth and OpenID Connect provider. You can also use alternative OAuth providers, such as Azure B2C, Office 365, and other custom providers, to configure the extension. Advanced Single Sign-On features such as user profile Attribute Mapping, Role Mapping, and so on are supported. We'll go over how to set up SSO between Typo3 and Azure AD B2C in this article. Users should be able to log in to Typo3 through Azure AD B2C by the end of this guide.

Click here to know more about other features we provide in Typo3 OAuth Single Sign-On ( OAuth & OpenID Connect SSO ) extension

Pre-requisites : Download And Installation

  • Log into your Typo3 instance as an admin.
  • Navigate to Extensions tab from left pane.
  • Select Get Extension from the dropdown and search for miniOrange OAuth and install the extension.
  • Now select Installed Extensions from the dropdown menu and search for OAuth and activate the extension.

Steps to configure Azure AD B2C OAuth & OpenID Single Sign-On (SSO) Login into Typo3

1. Setup Azure AD B2C as OAuth Provider

Follow the steps below to configure Azure AD B2C as OAuth Provider

miniorange img Configure Azure AD B2C as OAuth Provider
  • Sign in to Azure portal.
  • From the Azure services menu, select Azure AD B2C.
  • Typo3 Azure AD B2C Single Sign On, Azure AD SSO Login
  • Click the App registrations service in the left-hand navigation panel, then click New registration.
  •  Azure AD B2C SSO OAuth / OpenID / OIDC Single Sign On, Azure AD SSO App-Registration
  • Enter the Name of the Application. Select Web from the dropdown menu and enter the Redirect URL. (You will get the redirect URL from the OAuth settings tab of the extension). Register your application.
  • Typo3 Azure AD B2C Single Sign On, Azure AD SSO registration
  • Your application is given a unique Application ID by Azure AD B2C. Copy Application ID and the Directory ID, this will be your Client ID and Tenant ID respectively.
  • Typo3 SSO Azure AD B2C SSO OAuth / OpenID / OIDC Single Sign On, Azure AD SSO Overview
  • From the left navigation column, select Certificates and Secrets and then New Client Secret. Click the ADD button after entering a description and an expiration time.
  • Typo3 Azure AD B2C SSO Azure AD SSO client-secret
  • Copy the obtained value of the generated client secret. This will be your Secret key.
  •  Azure AD B2C SSO OAuth / OpenID / OIDC Single Sign On, Azure AD SSO Secret Key
  • Navigate to Azure AD B2C. Choose User flows. and select New user flow from the drop-down menu.
  • Azure AD SSO user flow creation
  • Name the user flow. Choose Email Signup and click the Create button.
  •  Azure AD B2C SSO OAuth / OpenID / OIDC Single Sign On, Azure AD SSO user flow create
  • Click on your created user flow
  •  Azure AD B2C Typo3 SSO select user flow
  • Replace the policy name you just created in the appropriate endpoints.

You've successfully configured Azure AD (Active Directory) B2C as an OAuth Provider for Typo3 user integration using Azure AD Single Sign-On (SSO).

2. Configuring Typo3 as OAuth Client

  • After successfully configuring OAuth Provider, enter the OAuth Provider Name, Client ID, Client Secret, Scope and provided endpoints.

    Please refer below Endpoints to configure the OAuth client


    Scope: openid
    Authorize Endpoint: https://{tenant-name}.b2clogin.com/{tenant-name}.onmicrosoft.com/{policy-name}/oauth2/v2.0/authorize
    Access Token Endpoint: https://{tenant-name}.b2clogin.com/{tenant-name}.onmicrosoft.com/{policy-name}/oauth2/v2.0/token
    Get User Info Endpoint: https://graph.microsoft.com/v1.0/me
  • Click on the Save button to save the settings.
  • Typo3 SSO OAuth 2.0 SSO credentials Azure AD B2C SSO
  • Click on the Test Configuration button.
  • Typo3 OAuth credentials Azure AD B2C SSO OAuth
  • You will see all the values returned by your OAuth Provider to Typo3 in a table. If you don't see value for First Name, Last Name, Email or Username, make the required settings in your OAuth Provider to return this information.
  • You have successfully configured your Typo3 as an OAuth Client. You will see the SSO button on your frontend. Click on the button and test the SSO.
  • Typo3 OAuth 2.0 SSO Azure AD B2C SSO

3: Attribute Mapping (Optional). *This is Premium feature.

  • You can map attributes in the Attribute Mapping tab. Only username and email are allowed to be mapped in free version of the extension. However, in the premium version of the extension, you can map various attributes coming from your OAuth Provider to the attributes present in your Typo3 site.
  • Typo3 OAuth attribute mapping Typo3 SSO

4: Group Mapping (Optional). *This is Premium feature.

  • You can specify a default role in the free extension that will be allocated to all non-admin users when they conduct SSO.
  • Go to Group mapping tab and navigate to Group Mapping section.
  • Select the Default Role and click on the Save button.
  • Azure AD B2C Typo3 SSO - Azure AD B2C Single Sign-On(SSO) Login in Typo3 - role mapping

By configuring Azure AD B2C as an OAuth Provider and Typo3 as an OAuth Client using our Typo3 OAuth Client extension, you have successfully installed Typo3 Azure AD B2C Single Sign-On (SSO). Within minutes, you'll be able to provide safe access to your Typo3 site utilising Azure AD B2C login credentials thanks to this solution.

Additional Resources


If you are looking for anything which you cannot find, please drop us an email on info@xecurify.com

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com