Search Results :

×

DNN SAML IDP Single Sign-On Setup Guides

Choose your SAML service provider to configure Single Sign-On (SSO)

Not able to find your service provider? Contact us at dnnsupport@xecurify.com and we will help you setup SSO with your SP in no time.

Couldn't find your IdP?

Reach out to us at dnnsupport@xecurify.com and we will help you setup DotNetNuke (DNN) as SAML Identity Provider with your service provider (SP) in no time.

DotNetNuke (DNN) as SAML Identity Provider - Tableau Online as IDP logo

Tableau Online

DotNetNuke (DNN) as SAML Identity Provider - Tableau Server as IDP logo

Tableau Server

DotNetNuke (DNN) as SAML Identity Provider - Cognito as IDP logo

Cognito

DotNetNuke (DNN) as SAML Identity Provider - Absorb LMS as IDP logo

Absorb LMS

DotNetNuke (DNN) as SAML Identity Provider - Talent LMS as IDP logo

Talent LMS

DotNetNuke (DNN) as SAML Identity Provider - Canvas LMS as IDP logo

Canvas LMS

DotNetNuke (DNN) as SAML Identity Provider - Moodle as IDP logo

Moodle

Steps to Configure DNN as SAML IDP Module

Step 1: Download and extract the package

  • Download DNN SAML Identity Provider (IDP) module.
  • Extract the package and upload the installation package dnn-saml-single-sign-on-sso-idp_xxx_Install by going in Settings > Extension > Install Extension.
  • DNN SAML IDP - dotnetnuke site add extension

Step 2: Adding module on DNN page.

  • Open any of the page on your DNN site (Edit mode) and Click on Add Module.
  • DNN SAML IDP - dotnetnuke site add module
  • Search for moDNNSAMLIDP and click on the moDNNSAMLIDP. Drag and drop the module on the page where you want.
  • DNN SAML IDP - dotnetnuke site search module
  • You have finished with the Installation of the module on your DNN site.

Step 3: Configure Your Service Provider

  • You can share your IDP metadata to the service provider. Either you can share metadata URL or you can download the metadata (XML) file.
  • DNN SSO using DNN SAML IDP - Download IDP Metadata
  • Also you can add the IDP metadata manually by entering IDP Entity ID, Single Sign-On URL and x.509 Certificate:
  • DNN SSO using DNN SAML IDP - Manual IDP Metadata

Step 4: Add SAML application for your Service Provider

  • There are two options to add an application for your Service Provider in the IDP module
  • A] Upload metadata using Upload SP Metadata option
  • IDP module requires SP Entity ID and ACS URL values from your service provider. You may get the metadata file (.xml) or metadata URL.
  • You can upload metadata using Upload SP Metadata option where you can upload metadata using XML file or URL.
  • You may refer to the screenshot below:
  • DNN SAML IDP - add service provider metadata
  • You can choose any one of the options according to the metadata format you have available.
  • B] Configure the Service Provider metadata manually
  • To configure the Service Provider metadata copy SP Entity ID and ACS URL values from service provider metadata and paste them under SP Entity ID and ACS URL fields.
  • DNN SAML IDP - add service provider
  • Once configured service provider metadata, Update the module settings

Step 5: Attribute Mapping

  • In this steps you will map the DotNetNuke user attribute to be sent in the response to the Service Provider.
  • NameID defines what SP is expecting in the subject element of SAML Assertion. Generally, NameID is Username of Email Address. You can select which user attribute you want to send in the NameID.
  • NameID Format defines the format of subject element content, i.e. NameID. For example, Email Address NameID Format defines that the NameID is in the form of an email address, specifically “addr-spec”.
  • An addr-spec has the form local-part@domain, has no phrase (such as a common name) before it, has no comment (text surrounded in parentheses) after it, and is not surrounded by “<” and “>”. If NameID Format is not externally specified by SP, leave it unspecified
  • You can add other attributes to be sent in SAML Assertion to SP. The attributes include user’s profile attributes such as first name, last name, fullname, username, email, custom profile attributes etc.
  • DNN SAML IDP - attribute mapping
  • After saving the attribute mapping, proceed further with the test configuration or perform actual SSO from your service provider.

You can even configure the DNN SAML Single Sign-On (SSO) module with any identity provider such as ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin, SalesForce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with your own custom identity provider. To check other identity providers, click here.

We also provide ASP.NET SAML Single Sign-On module for setting up Single Sign-On to your ASP.NET Custom Applications. Click Here to know more.

miniOrange also provides you modules for integration with legacy apps such as Active Directory, SiteMinder, Radius, Unix and so on. Using SAML, OAuth, OpenID, ADFS, and WSFED protocols, we can also help you add login/authentication to your Umbraco site.

Additional Resources:


Need Help?

Not able to find your service provider? Mail us on dnnsupport@xecurify.com and we'll help you set up SSO with your SP and for quick guidance (via email/meeting) on your requirement and our team will help you to select the best suitable solution/plan as per your requirement.

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com