Steps to Configure the DNN SAML Single Sign-On (SSO) Authentication Provider
Step 1: Download and Install the SAML Authentication Provider in DotNetNuke.
-
Download
the package for DNN SAML Single Sign-On (SSO) Authentication Provider.
-
Upload the installation package dnn-saml-single-sign-on_xxx_Install by
going in Settings > Extension > Install Extension.
Step 2: Adding Authentication Provider on DNN page.
- Now under the Installed extensions tab select Authentication Systems.Here you can see the miniOrange DNN SAML Authentication Plugin.
- Just Click on the pencil icon as mentioned in the image below to configure the DNN SAML Authentication Provider.
- Now go to the site settings tab. Here you can see the DNN SAML Authentication Provider Dashboard.
-
You have finished with the Installation of the module on your DNN site.
Step 3: Configure Authentication Provider for Setting up SAML Single Sign-On (SSO)
- For configuring application in the authentication provider, click on the Add new IdP button in the Identity Provider Settings tab.
A] Select your Identity Provider
-
Select your Identity provider from the list. If you don't find
your Identity provider in the list, select Custom IDP. You can also
search for your Identity Provider using the search box.
B] Configure your Identity Provider
-
Under the Service Provider Settings tab, you can download SP metadata as
a XML document or copy the metadata url.
-
Alternatively, copy and paste the SP Entity ID and ACS Url from the SP
metadata Table to your IdP configuration page.
C] Configure your Service Provider
-
To upload IdP's metadata, you can use the
Upload IdP metadata button under the Identity Provider Settings
tab, if you have the IdP metadata URL or the IdP metadata .xml file.
-
Alternatively, you can copy the IDP Entity ID and
Single Sign-On Url values from the IdP and fill them up under the
Identity Provider Settings tab.
Step 4: Testing SAML SSO
-
Click the Test Configuration button to verify if you have
configured the plugin correctly.
-
On successful configuration, you will get Attribute Name and Attribute
Values in the Test Configuration window.
Step 5: Attribute Mapping
-
For attribute mapping select the Edit Configuration from the select actions dropdown.
-
Map email and username with Attribute Name you can see in Test
Configuration window and save the settings.
Step 6: Get the Single Sign-On (SSO) link for your application
-
You can find the SSO Link in the Action dropdown in Applications List of the authentication provider.
You can configure the SiteFinity SAML 2.0 Single Sign-On (SSO) module with
any Identity Provider such as
ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta,
OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne,
RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with
your own custom identity provider. The miniOrange ASP.NET SAML 2.0 Connector supports C# and
Visual Basic languages.
We also provide ASP.NET SAML Single Sign-On module for setting up Single
Sign-On to your ASP.NET Custom Applications.
Click Here
to know more.
miniOrange also provides you modules for integration with legacy apps such
as
Active Directory, SiteMinder, Radius, Unix and so on.
Using SAML, OAuth, OpenID, ADFS, and WSFED protocols, we can also
help you add login/authentication to your Umbraco site.
Additional Resources