Search Results :

×

Classic ASP SAML Single Sign-On (SSO) with Office365 as IDP

Classic ASP Single Sign-On (SSO) Connector gives the ability to enable SAML Single Sign-On for your Classic ASP applications. Using Single Sign-On you can use only one password to access your Classic ASP application and services. Our Connector is compatible with all the SAML compliant identity providers. Here we will go through a step-by-step guide to configure SAML Single Sign-On (SSO) between Classic ASP and Office365 considering Office365 as IdP.

Classic ASP Trial and enterprise plugin Downlaod

Note: Download the Classic ASP Trial Plugin from here and the Classic ASP Enterprise Plugin from here.


  • Extract the downloaded classic-asp-saml-sso-connector zip file to get Classic ASP SAML 2.0 Connector.
  • Add the connector as a separate application on IIS.
  • To add the application in IIS Manager, copy the extracted folder to the following path: C:\inetpub\wwwroot.
  • Open IIS Manager. In the left panel, right-click on your site and click Add Application.
IIS Manager

  • Add an alias name for your application (e.g., ssoapp) and set the physical path to where you copied the connector, such as: C:\inetpub\wwwroot\classic-asp-saml-sso-connector-xxx.
Alias Name

  • Go to C:\inetpub\wwwroot\, right-click on the classic-asp-saml-sso-connector-xxx folder, and select Properties.
  • Under the Security tab, click Edit, Select from the Application Pool User, and grant it Full Control permission.
Permissions for IIS_IUSRS
  • Open any browser and navigate to : http://localhost/<Alias-Name> (Replace <Alias-Name> with the alias you provided while adding the application in IIS)
  • If the registration or login page appears, it means the miniOrange Classic ASP SAML Connector has been successfully added to your application.
Login-Page

  • Register or log in with your account by clicking the Register button.
  • After successful registration, you will receive a trial license key on your registered email address.
  • If you have not received the license key to your provided email, use the Click here button in the plugin to download the license file.
Download-License-key

  • To activate the connector, you can either:
    • Enter the license key received via email in the provided input field.

    OR

    • Upload the license file that you downloaded using the link mentioned above.
Enter License Key

Upload License Key

  • Then, check the box "I have read the above conditions and I want to activate the connector", and click the Activate License button.
Activate License Key
  • Open any browser and navigate to : http://localhost/<Alias-Name> (Replace <Alias-Name> with the alias you provided while adding the application in IIS)
  • If the login page appears, it means the miniOrange Classic ASP SAML Connector has been successfully added to your application.
Login-Page

  • Log in to the SAML connector in order to access the connector's admin dashboard with your miniOrange account under which you have the licenses.
  • Open any browser and navigate to : http://localhost/<Alias-Name> (Replace <Alias-Name> with the alias you provided while adding the application in IIS)
  • If the login page appears, it means the miniOrange Classic ASP SAML Connector has been successfully added to your application.
Login-Page

  • Log in to the SAML connector in order to access the connector's admin dashboard with your miniOrange account under which you have the licenses.
  • First, navigate to the Service Provider Settings tab. Provide the SP metadata to your Identity Provider by either downloading the metadata file or copying the metadata details manually, as per your integration requirements.
Service Provider Settings

  • Go to https://portal.azure.com/ and login into Office365.
  • Log into Office365 Admin Console.
  • Click on Azure Active Directory.
Azure Active Directory

  • Click on App Registration -> New Registrations.
App Registration

  • Enter the Application Name and the Redirect URI (ACS URL from the Classic ASP SSO Connector available in the Service Provider Metadata section, as shown above), and then click on Register.
Application Name and Redirect URI

  • Click on API Permissions -> Add Permission then select API as Office 365 Management APIs.
API Permissions

  • Select the ActivityFeed.Read.
Application permissions

  • Navigate to Overview → Endpoints and copy the Federation Metadata Document URL. Keep this metadata URL handy, as it will be required in the later steps of the configuration.
Federation metadata document
  • First, navigate to the Service Provider Settings tab. Provide the SP metadata to your Identity Provider by either downloading the metadata file or copying the metadata details manually, as per your integration requirements.
Service Provider Settings

  • You can also update the Base URL and SP Entity ID if required — simply enter the modified value in the respective field and click the Change button to save the updates.
  • Go to https://portal.azure.com/ and login into Office365.
  • Log into Office365 Admin Console.
  • Click on Azure Active Directory.
Azure Active Directory

  • Click on App Registration -> New Registrations.
App Registration

  • Enter the Application Name and the Redirect URI (ACS URL from the Classic ASP SSO Connector available in the Service Provider Metadata section, as shown above), and then click on Register.
Application Name and Redirect URI

  • Click on API Permissions -> Add Permission then select API as Office 365 Management APIs.
API Permissions

  • Select the ActivityFeed.Read.
Application permissions

  • Navigate to Overview → Endpoints and copy the Federation Metadata Document URL. Keep this metadata URL handy, as it will be required in the later steps of the configuration.
Federation metadata document
  • First, navigate to the Service Provider Settings tab. Provide the SP metadata to your Identity Provider by either downloading the metadata file or copying the metadata details manually, as per your integration requirements.
Service Provider Settings

  • You can also update the Base URL and SP Entity ID if required — simply enter the modified value in the respective field and click the Change button to save the updates.
  • Go to https://portal.azure.com/ and login into Office365.
  • Log into Office365 Admin Console.
  • Click on Azure Active Directory.
Azure Active Directory

  • Click on App Registration -> New Registrations.
App Registration

  • Enter the Application Name and the Redirect URI (ACS URL from the Classic ASP SSO Connector available in the Service Provider Metadata section, as shown above), and then click on Register.
Application Name and Redirect URI

  • Click on API Permissions -> Add Permission then select API as Office 365 Management APIs.
API Permissions

  • Select the ActivityFeed.Read.
Application permissions

  • Navigate to Overview → Endpoints and copy the Federation Metadata Document URL. Keep this metadata URL handy, as it will be required in the later steps of the configuration.
Federation metadata document
  • Now, under Identity Provider Settings, click the Configure IDP button.
Configure IDP

  • The Identity Provider Settings dashboard will now open, where you can provide the required Identity Provider metadata.
  • Enter the Identity Provider Name in the IdP Name field and configure the remaining IdP details manually by filling in the required fields.
  • Alternatively, click on the Upload IdP Metadata button.
Configure IDP

  • A pop-up will appear where you need to enter the IdP Name and upload the IdP metadata using either a Metadata XML file or a Metadata URL.
Upload IDP Metadata

  • After uploading the metadata details, navigate to the Identity Provider Settings section. Hover over the Select Actions dropdown and click on Test Configuration to verify if the connector has been configured correctly with the IDP.
Save Configuration

  • The below Screenshot shows a successful result.
Test Configuration
  • Now, under Identity Provider Settings, click the Add new Idp button.
Add new IDP

  • The Identity Provider Settings dashboard will now open, where you can provide the required Identity Provider metadata.
  • Enter the Identity Provider Name in the IdP Name field and configure the remaining IdP details manually by filling in the required fields.
  • Alternatively, click on the Upload IdP Metadata button.
Upload IDP Metadata

  • A pop-up will appear where you need to enter the IdP Name and upload the IdP metadata using either a Metadata XML file or a Metadata URL.
Metadata XML or Metadata URL

  • After uploading the metadata details, navigate to the Identity Provider Settings section. Hover over the Select Actions dropdown and click on Test Configuration to verify if the connector has been configured correctly with the IDP.
Test Configuration

  • The below Screenshot shows a successful result.
Test Configuration - Successful result

Attribute Mapping
  • In the same Identity Provider Settings tab, locate the Attribute Mapping section on the right-hand side.
  • Map the required IdP attributes (such as Username, Email, Firstname, and Lastname) received in the SAML Response to their corresponding fields.
Test Configuration

Note and Contact Us - Azure B2C SAML SSO with WordPress

Note: Only the mapped IdP attributes will be parsed and included in the JWT token.


  • Save the attribute mapping configuration after completing the required mappings.
Custom Attribute Mapping
  • In the Custom Attribute Mapping section, enter the Attribute Name exactly as received from your Identity Provider and specify the corresponding Attribute Value you want to map within the application.
  • To add multiple attributes (such as company, address, phone number, etc.), click on the “+” icon and provide the additional attribute details accordingly.
  • After entering all the required attribute mappings, click on Save Attribute Mapping to save the configuration.
Custom Attribute Mapping

Group/Role Mapping
  • In the Group/Role Mapping section , enter the Group Attribute Name exactly as configured in your Identity Provider to fetch the user group information.
  • Enter the Group Name received from the Identity Provider and map it to the appropriate Role Name field. In the Role Name field, enter the roles defined in your Classic ASP application.
  • After adding the required mappings, click on Save Role Mapping to save the configuration successfully.
Group/Role Mapping

Security and Authentication Settings
  • Tick the checkboxes for Signed Login Request, Signed Logout Request, Force Authentication, and Encrypted Assertion as shown in the image to apply the required security and authentication settings.
  • Signed Login/Logout Request: When this option is enabled, the login/logout request will be signed by the certificate provided by the service provider. This adds an extra layer of security.
  • Force Authentication: When this option is enabled, even if the user session exists on the Identity Provider user has to re-enter the credentials for authentication.
  • Encrypted Assertion: If the Identity provider sends an encrypted response, then this option should be enabled to handle that response.
Security and Authentication Settings

License Activation

Note and Contact Us - Azure B2C SAML SSO with WordPress

Note: You can perform the SSO only for those applications whose license is activated in the miniOrange ASP.NET SAML connector.


  • Navigate to the License Activation tab and click on the “+” (Add Application) button, as shown in the image below.
License Activation - Add Application

  • Enter the required application details in the table fields:
    • App Identifier: A unique identifier used in the SSO request to identify the application configuration and licensing.
    • App FQDN: The domain name of your external application for which the license will be activated and validated.
    • License Key: A valid miniOrange license key that has not been previously used.
      Log in to https://portal.miniorange.com/ using your registered account credentials. After logging in, you can find your license key on the Dashboard.
  • After entering all the required details, click on the Activate button.
License Activation - Activate

  • The application license will be activated successfully and will appear under the Activated Apps section.
License Activation - Activated Apps

Note and Contact Us - Azure B2C SAML SSO with WordPress

Note: If the license is not activated properly, please check the logs.txt file for more information in your application root directory under the path “~/Reference/files/”.


  • Now, under Identity Provider Settings, click the Add new Idp button.
Add new IDP

  • The Identity Provider Settings dashboard will now open, where you can provide the required Identity Provider metadata.
  • Enter the Identity Provider Name in the IdP Name field and configure the remaining IdP details manually by filling in the required fields.
  • Alternatively, click on the Upload IdP Metadata button.
Upload IDP Metadata

  • A pop-up will appear where you need to enter the IdP Name and upload the IdP metadata using either a Metadata XML file or a Metadata URL.
Metadata XML or Metadata URL

  • After uploading the metadata details, navigate to the Identity Provider Settings section. Hover over the Select Actions dropdown and click on Test Configuration to verify if the connector has been configured correctly with the IDP.
Test Configuration

  • The below Screenshot shows a successful result.
Test Configuration - Successful result

Attribute Mapping
  • In the same Identity Provider Settings tab, locate the Attribute Mapping section on the right-hand side.
  • Map the required IdP attributes (such as Username, Email, Firstname, and Lastname) received in the SAML Response to their corresponding fields.
Test Configuration

Note and Contact Us - Azure B2C SAML SSO with WordPress

Note: Only the mapped IdP attributes will be parsed and included in the JWT token.


  • Save the attribute mapping configuration after completing the required mappings.

License Activation

Note and Contact Us - Azure B2C SAML SSO with WordPress

Note: You can perform the SSO only for those applications whose license is activated in the miniOrange ASP.NET SAML connector.


  • Navigate to the License Activation tab and click on the “+” (Add Application) button, as shown in the image below.
License Activation - Add Application

  • Enter the required application details in the table fields:
    • App Identifier: A unique identifier used in the SSO request to identify the application configuration and licensing.
    • App FQDN: The domain name of your external application for which the license will be activated and validated.
    • License Key: A valid miniOrange license key that has not been previously used.
  • After entering all the required details, click on the Activate button.
License Activation - Activate

  • The application license will be activated successfully and will appear under the Activated Apps section.
License Activation - Activated Apps

Note and Contact Us - Azure B2C SAML SSO with WordPress

Note: If the license is not activated properly, please check the logs.txt file for more information in your application root directory under the path “~/Reference/files/”.


  • Go to the JWT Keys tab and click the Download button under SSO Script. The sso.asp script is used to validate the JWT token that is sent during the Single Sign-On (SSO) process.
SSO Script

  • This will download a file named sso.asp.
  • Place this file into the folder where your Classic ASP application is hosted.
  • It checks if the token is valid and then logs the user into your Classic ASP application automatically using the information inside the token.
  • Enter your application's JWT Endpoint URL. This is the URL where the signed JWT token (containing the SAML response) will be sent, which will help set the session in your application and can be used further to log in the user.
  • This helps your application receive the user's login information securely.
    Click Save to finish the configuration.
JWT Endpoint

  • Set the JWT Consumer Endpoint to :
https://<classic-asp-application-base-url>/sso.asp
  • Copy the sso.asp file provided by miniOrange into the root folder of your Classic ASP application.
  • Go to the Login Configuration tab. Here, you will configure the JWT endpoints for each licensed application where you want to validate the JWT token.
  • In the JWT Consumer Endpoint, provide the URL of the sso.asp file in your Classic ASP application where the signed JWT token will be received and validated.
  • Configure the Login Endpoint and Logout Endpoint to define where users should be redirected after successful Single Sign-On (SSO) and Single Logout (SLO) respectively.
Login Configuration

  • To validate the JWT token securely, navigate to the JWT Keys tab where you can manage the public and private key pairs used for token signing and verification.
  • You can use the existing keys provided by the connector under JWE Configuration.
  • Alternatively, click on Generate New Keys to create a new Private Key and Private IV
JWE Configuration

  • Copy the Private key under ekey and the Private IV under eiv from the JWE Configuration and paste them into the sso.asp file, then save the file.
ekey and eiv
  • Copy the sso.asp file provided by miniOrange into the root folder of your Classic ASP application.
  • Go to the Login Configuration tab. Here, you will configure the JWT endpoints for each licensed application where you want to validate the JWT token.
  • In the JWT Consumer Endpoint, provide the URL of the sso.asp file in your Classic ASP application where the signed JWT token will be received and validated.
  • Configure the Login Endpoint and Logout Endpoint to define where users should be redirected after successful Single Sign-On (SSO) and Single Logout (SLO) respectively.
Login Configuration

  • To validate the JWT token securely, navigate to the JWT Keys tab where you can manage the public and private key pairs used for token signing and verification.
  • You can use the existing keys provided by the connector under JWE Configuration.
JWE Configuration

  • Copy the Private key under ekey and the Private IV under eiv from the JWE Configuration and paste them into the sso.asp file, then save the file.
ekey and eiv
  • Hover on Select Actions and click on Copy SSO Link.
Copy SSO Link

  • Use the following URL as a link in your application from where you want to perform SSO:
http://<application-base-url>/Request?IdPName=<Your-IDP-Name>&appid=default_app
  • Hover on Select Actions and click on Copy SSO Link.
Copy SSO Link

  • Append your Classic ASP application name (the same one activated in the License Activation tab) to the Appid query parameter in the copied SSO link.
  • To initiate SSO for a specific application, ensure that a valid license is activated for that application. The SSO request must include the corresponding Appid parameter in the request URL.
http://<application-base-url>/Request?IdPName=<Your-IDP-Name>&appid=default_app
License Deactivation
  • If you want to deactivate, delete, or reactivate your Classic ASP application license, follow the steps below :
  • In the License Activation tab, locate the application you want to deactivate under the Activated Apps section.
  • Click on the Deactivate button corresponding to the required application.
License Deactivation

  • A confirmation dialog box will appear. Click Yes to proceed with deactivation or No to cancel the process.
License Deactivation - confirmation dialog box

  • After completion, a success or error message will be displayed indicating the status of the deactivation.
License Deletion
  • License deletion is only available for deactivated applications.
  • In the License Activation tab, select the Deactivated Apps view from the dropdown menu to display all deactivated licenses.
  • Click on the Delete button corresponding to the application identifier you want to remove.
License Deletion

  • Confirm the deletion in the dialog box to permanently remove the license.
License Deletion - dialog box

License Reactivation
  • Applications can be reactivated while retaining their existing configuration.
  • In the License Activation tab, select the Deactivated Apps view from the dropdown menu.
  • Locate the required application and click on the Activate button against the application identifier.
License Reactivation
  • Hover on Select Actions and click on Copy SSO Link.
Copy SSO Link

  • Append your Classic ASP application name (the same one activated in the License Activation tab) to the Appid query parameter in the copied SSO link.
  • To initiate SSO for a specific application, ensure that a valid license is activated for that application. The SSO request must include the corresponding Appid parameter in the request URL.
http://<application-base-url>/Request?IdPName=<Your-IDP-Name>&appid=default_app
License Deactivation
  • If you want to deactivate, delete, or reactivate your Classic ASP application license, follow the steps below :
  • In the License Activation tab, locate the application you want to deactivate under the Activated Apps section.
  • Click on the Deactivate button corresponding to the required application.
License Deactivation

  • A confirmation dialog box will appear. Click Yes to proceed with deactivation or No to cancel the process.
License Deactivation - confirmation dialog box

  • After completion, a success or error message will be displayed indicating the status of the deactivation.
License Deletion
  • License deletion is only available for deactivated applications.
  • In the License Activation tab, select the Deactivated Apps view from the dropdown menu to display all deactivated licenses.
  • Click on the Delete button corresponding to the application identifier you want to remove.
License Deletion

  • Confirm the deletion in the dialog box to permanently remove the license.
License Deletion - dialog box

License Reactivation
  • Applications can be reactivated while retaining their existing configuration.
  • In the License Activation tab, select the Deactivated Apps view from the dropdown menu.
  • Locate the required application and click on the Activate button against the application identifier.
License Reactivation

 Thank you for your response. We will get back to you soon.

Something went wrong. Please submit your query again

We'll Reach Out to You at the Earliest!


ADFS_sso ×
Hello there!

Need Help? We are right here!

support