DNN OAuth Single Sign-On Setup Guides

Not able to find your IdP? Contact us at dnnsupport@xecurify.com and we will help you setup DNN OAuth SSO with your IdP in no time.

Couldn't find your IdP?

Reach out to us at dnnsupport@xecurify.com and we will help you setup DNN OAuth SSO with your identity provider (IdP) in no time.

DNN OAuth SSO - Ping Federate as IDP logo

Ping Federate

DNN OAuth SSO - AWS Cognito as IDP logo

AWS Cognito

DNN OAuth SSO - Onelogin as IDP logo

Onelogin

DNN OAuth SSO - Keycloak as IDP logo

Keycloak

DNN OAuth SSO - WHMCS as IDP logo

WHMCS

DNN OAuth SSO - IdentityServer3 as IDP logo

IdentityServer3

DNN OAuth SSO - IdentityServer4 as IDP logo

IdentityServer4

Steps to Configure the DNN OAuth Single Sign-On (SSO) module

Step 1: Download and Install the module in DotNetNuke.

  • Download the package for DNN OAuth Single Sign-On (SSO) module.
  • Upload the installation package dnn-oauth-single-sign-on_xxx_Install by going in Settings > Extension > Install Extension.

Step 2: Adding Module on DNN page.

  • Open any of the page on your DNN site (Edit mode) and Click on Add Module.
  • Search for oauthclientsso and click on the oauthclientsso. Drag and drop the module on the page where you want.
  • You have finished with the Installation of the module on your DNN site.
  • If you want to add module on every page of your dnn site, go to Module Settings >> Module Settings >> Advanced Settings.
  • DNN OAuth SSO - oauthclientsso
  • Check the box for Display Module on All Pages and click on Update.

Step 3: Configure Module for Setting up OAuth Single Sign-On (SSO)

  • Go to Module Settings >> oauthclientsso settings.
  • Search your OAuth/OpenID/JWT provider application or click on your OAuth/OpenID/JWT provider application from the given application’s list.
  • If your application/ server name is not there in the default list. You can click on Custom OAuth 2.0 App or Custom OpenID Connect App to add a custom OAuth/OpenID/JWT Connect Server.

Step 4: Configuring OAuth Provider

  • Copy Redirect/Callback Url from the module’s Basic Settings tab.
  • Provide it to your OAuth/OpenID/JWT provider to configure it on their side.
  • selectapplication

Step 5: Configuring OAuth Client

1. If you are using any custom Oauth/JWT provider

    selectapplication
  • Configure your OAuth/JWT provider and you will get Client ID, Client Secret, Authorize Endpoint, Access Token Endpoint and UserInfo Endpoint from your OAuth/OpenID/JWT provider.
  • Add the supported scopes by your OAuth/OpenID/JWT provider.
  • Click on the Save/Update button to save module configurations.

2. If you have selected any of the default OAuth/JWT provider from the given list

  • Note: For Default Applications in the default list, endpoints and scopes are auto-filled. But you can change it if required.
  • Your OAuth/JWT provider will provide you with Client / App ID and Client secret. Copy Client/App ID and Client secret and paste it under Client Id and Client secret in the module configuration window.
  • Confirm you have filled all required fields and click on Update / Save.

Step 6: Test Configuration

  • Click the Test Configuration button to verify if you have configured the plugin correctly.
  • On successful configuration, you will get Attribute Name and Attribute Values in the Test Configuration window.

Step 7: Mapping the basic attributes

  • Go to the oauthclientsso settings >> Advanced Settings >> Attribute Mapping.
  • Map email and username with Attribute Name you can see in Test Configuration window.
  • Click on the Save button to save the settings.

Step 8: Adding login/SSO widget on DNN Page

  • For Adding Button on the DNN page beside the module settings click on the Add Item (Pencil Icon).
  • Click on Add widget option to add the login button.

You also can configure the DNN SAML 2.0 Single Sign-On (SSO) module with any Identity Provider such as ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with your own custom identity provider. The miniOrange ASP.NET SAML 2.0 Connector supports C# and Visual Basic languages.

We also provide ASP.NET SAML Single Sign-On module for setting up Single Sign-On to your ASP.NET Custom Applications. Click Here to know more.

miniOrange also provides you modules for integration with legacy apps such as Active Directory, SiteMinder, Radius, Unix and so on. Using SAML, OAuth, OpenID, ADFS, and WSFED protocols, we can also help you add login/authentication to your Umbraco site.


Additonal Resources:

Need Help?

Not able to find your identity provider? Mail us on dnnsupport@xecurify.com and we'll help you set up SSO with your IDP and for quick guidance (via email/meeting) on your requirement and our team will help you to select the best suitable solution/plan as per your requirement.

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com