Search Results :


DNN SAML Single Sign-On Setup Guides

Choose your SAML identity provider to configure Single Sign-On (SSO)

Not able to find your IdP? Contact us at and we will help you setup DNN SSO with your IdP in no time.

Couldn't find your IdP?

Reach out to us at and we will help you setup DNN SSO with your identity provider (IdP) in no time.

DNN SAML SSO - Onelogin as IDP logo


DNN SAML SSO - Ping Federate as IDP logo

Ping Federate

DNN SAML SSO - Keycloak as IDP logo


DNN SAML SSO - Google as IDP logo


DNN SAML SSO - Salesforce as IDP logo


DNN SAML SSO - Auth0 as IDP logo


DNN SAML SSO - miniOrange as IDP logo


DNN SAML SSO - Office365 as IDP logo


DNN SAML SSO - WordPress as IDP logo


DNN SAML SSO - ClassLink as IDP logo


DNN SAML SSO - Centrify as IDP logo


DNN SAML SSO - miniOrange as Shibboleth logo


Steps to Configure the DNN SAML Single Sign-On (SSO) module

Step 1: Download and Install the module in DotNetNuke.

  • Download the package for DNN SAML Single Sign-On (SSO) module.
  • Upload the installation package dnn-saml-single-sign-on_xxx_Install by going in Settings > Extension > Install Extension.

Step 2: Adding Module on DNN page.

  • Open any of the page on your DNN site (Edit mode) and Click on Add Module.
  • DNN SAML SSO - Add module in DNN
  • Search for DNNSAMLSSO and click on the DNNSAMLSSO. Drag and drop the module on the page where you want.
  • DNN SAML SSO - Search module in DNN
  • You have finished with the Installation of the module on your DNN site.

Step 3: Configure Module for Setting up SAML Single Sign-On (SSO)

  • Go to Module Settings >> DNNSAMLSSO Settings .
  • DNN SAML SSO - DNN Module Setting

    A] Select your Identity Provider

  • Select your Identity provider from the list. If you don't find your Identity provider in the list, select Custom IDP. You can also search for your Identity Provider using the search box.
  • DNN SAML SSO - Select identity provider

    B] Configure your Identity Provider

  • Under the Service Provider Settings tab, you can download SP metadata as a XML document or copy the metadata url.
  • Alternatively, copy and paste the SP Entity ID and ACS Url from the SP metadata Table to your IdP configuration page.
  • DNN SAML SSO - Download DNN as SP metadata

    C] Configure your Service Provider

  • To upload IdP's metadata, you can use the Upload IdP metadata button under the Identity Provider Settings tab, if you have the IdP metadata URL or the IdP metadata .xml file.
  • Alternatively, you can copy the IDP Entity ID and Single Sign-On Url values from the IdP and fill them up under the Identity Provider Settings tab.

Step 4: Testing SAML SSO

  • Click the Test Configuration button to verify if you have configured the plugin correctly.
  • On successful configuration, you will get Attribute Name and Attribute Values in the Test Configuration window.
  • DNN SAML SSO - Test results

Step 5: Adding Login/SSO Widget on DNN Page

  • For Adding Button on the DNN page on beside the module settings click on the Add Item (Pencil Icon).
  • Add Button name and click on Save.
  • DNN SAML SSO - Add button name
  • You can see login button on the page after saving item. (If you are already logged in your site, you will see a "Logout" link).
  • Note : If you want to Enable this button on every page of the DNN site follow below steps

  • Go to the Settings >> Module Settings >> Advanced Settings and Enable option for Display Module On All Page.
  • DNN SAML SSO - DNN module setting DNN SAML SSO - Enable display module
  • Warning: You will lose all your configuration for the module after enabling this option. You can re-configure the module or it is better to enable this option before configuring the module.

Step 6: Attribute Mapping

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your IdP and map them to DotNetNuke user attributes like firstname, lastname etc..
  • While auto registering the users in your DotNetNuke site these attributes will automatically get mapped to your DotNetNuke user details.
  • Go to DNNSAMLSSO Settings >> Advanced settings >> Attribute Mapping.
  • DNN SAML SSO - DNN SAML Attribute Mapping

Step 7: Role mapping (It is Optional to fill this)

  • DotNetNuke uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • DotNetNuke has five pre-defined roles: Administrators, Subscribers, Registered Users, Translator (en-US) and Unverified Users.
  • Role mapping helps you to assign specific roles to users of a certain group in your IdP.
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • DNN SAML SSO - DNN Role Mapping

You can configure the SiteFinity SAML 2.0 Single Sign-On (SSO) module with any Identity Provider such as ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with your own custom identity provider. The miniOrange ASP.NET SAML 2.0 Connector supports C# and Visual Basic languages.

We also provide ASP.NET SAML Single Sign-On module for setting up Single Sign-On to your ASP.NET Custom Applications. Click Here to know more.

miniOrange also provides you modules for integration with legacy apps such as Active Directory, SiteMinder, Radius, Unix and so on. Using SAML, OAuth, OpenID, ADFS, and WSFED protocols, we can also help you add login/authentication to your Umbraco site.

Additional Resources

Need Help?

Not able to find your identity provider? Mail us on and we'll help you set up SSO with your IDP and for quick guidance (via email/meeting) on your requirement and our team will help you to select the best suitable solution/plan as per your requirement.

Hello there!

Need Help? We are right here!

Contact miniOrange Support

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to