Search Results :

×

DNN OAuth Single Sign-On (SSO) with Okta as OAuth Provider

DNN OAuth Single Sign-On (SSO) authentication provider gives the ability to enable OAuth Single Sign-On for your DotNetNuke site using Okta as the OAuth Provider. Using Single Sign-On you can use only one password to access your DotNetNuke site and services. Our authentication provider is compatible with all the OAuth compliant identity providers. Here we will go through a step-by-step guide to configure Single Sign-On (SSO) between DNN and Okta.

  • Download the DNN Oauth Single Sign On authentication provider with above link.
  • Upload the installation package dnn-oauth-single-sign-on_xxx_Install by going in Settings > Extension > Install Extension.
  • Navigate to the Installed Extensions tab and select Authentication Systems. You will find the miniOrange DNN OAuth Authentication Provider listed there.
DNN OAuth SSO - Authentication Provider

  • Click on the pencil icon (as shown in the image below) to begin configuring the DNN OAuth Authentication Provider.
DNN OAuth SSO - Authentication Provider pencil icon

  • Proceed to the Site Settings tab. Here, you will see the DNN OAuth Authentication Provider Dashboard, where you can manage the configuration.
DNN OAuth SSO - Authentication Provider Dashboard

  • You have now successfully completed the installation of the Authentication Provider on your DNN site.
  • For configuring application in the authentication provider, click on the Add New Provider button in the Identity Provider Settings tab.
DNN OAuth SSO - add new IDP

    Select Okta as Identity Provider from the list. You can also search for your Identity Provider using the search box.
DNN OAuth SSO - Select identity provider

  • Go to the Okta Admin panel. Go to Applications -> Applications.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Add App Shortcut

  • You will get the following screen. Click on Create App Integration button.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Add Application

  • Select sign in method as the OIDC - OpenID Connect option and select Application type as web application, click on Next button.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Select Methods

  • You will be redirected to the app details page. Enter App integration name and Sign-in redirect URIs. you will get that from miniOrange DNN OAuth plugin.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - callbackURL

  • Scroll down and you will see the Assignments section. Choose a controlled access option and uncheck the Enable immediate access with Federation Broker Mode option. Click on Save button.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Unchecked Box

  • Now you will get the Client credentials and okta domain. Copy the credentials and the Okta domain to configure in the DNN OAuth Plugin.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - clientcredentials

  • Go to Applications tab and Click on your application.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Select App

  • Select the Assignments tab.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - assignment

  • Click Assign and select Assign to People.
  • If you want to assign the application to multiple users at the same time then select Assign to Groups [If an app is assigned to a group then, the app will be assigned to all the people in that group]
DNN OAuth Single Sign-On (SSO) using Okta as IDP - select assign people

  • Click Assign next to a user name.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - click on assign

  • Click Save and Go Back.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - go back

  • Click Done.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Click on Done

  • In your Okta admin dashboard, navigate to Security -> API.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Navigate to API

  • Select your SSO application and click on the edit icon.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Click on Edit

  • Go to claims tab and select the ID token option.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Select ID Token

  • Click on Add claim button.
DNN OAuth Single Sign-On (SSO) using Okta as IDP - Add claims

  • Give a Name to your claim/attribute and Select ID Token from the token type dropdown. Now, enter the value user.$attribute in the Value field based on the attribute you want to receive. Keep other settings as default and click on Create button.
DNN OAuth Single Sign-On (SSO) using Okta as IDP -newclient login button setting

  • Follow the similar steps for all the attributes you want to see. You will have a list similar to the below one.
DNN OAuth Single Sign-On (SSO) using Okta as IDP -newclient login button setting

  • Copy the Redirect/Callback URL and provide it to your OAuth provider.
DNN OAuth SSO - DNN OAuth Redirect URL

  • Configure Client ID, Client Secret, update the endpoints if required and save the settings.
DNN OAuth SSO - Configuration

DNN OAuth SSO - Configuration

  • Now go to the Identity Provider Settings tab.
  • Under the select actions click on the Test Configuration button to verify if you have configured the authentication provider correctly.
DNN OAuth SSO - Testing OAuth SSO

  • On successful configuration, you will get Attribute Name and Attribute Values in the Test Configuration window.
DNN OAuth SSO - Testing OAuth SSO

  • For attribute mapping select the Edit Configuration from the select actions dropdown.
  • Map email and username with Attribute Name you can see in Test Configuration window and save the settings.
DNN OAuth SSO - DNN OAuth Attribute Mapping

You can configure the ASP.NET OAuth Single Sign-On (SSO) module with any identity provider such as ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with your own custom identity provider.


Please reach out to us at dnnsupport@xecurify.com, and our team will assist you with setting up the DNN OAuth Single Sign On. Our team will help you to select the best suitable solution/plan as per your requirement.

ADFS_sso ×
Hello there!

Need Help? We are right here!

support