Steps to Configure the DNN SAML Single Sign-On (SSO) module
Step 1: Download and Install the module in DotNetNuke.
-
Download
the package for DNN SAML Single Sign-On (SSO) module.
-
Upload the installation package dnn-saml-single-sign-on_xxx_Install by
going in Settings > Extension > Install Extension.
Step 2: Adding Module on DNN page.
-
Open any of the page on your DNN site (Edit mode) and Click on
Add Module.
-
Search for DNNSAMLSSO and click on the DNNSAMLSSO. Drag and drop
the module on the page where you want.
-
You have finished with the Installation of the module on your DNN site.
Step 3: Configure Module for Setting up SAML Single Sign-On (SSO)
- Go to Module Settings >> DNNSAMLSSO Settings .
A] Select your Identity Provider
-
Select your Identity provider from the list. If you don't find
your Identity provider in the list, select Custom IDP. You can also
search for your Identity Provider using the search box.
B] Configure your Identity Provider
-
Under the Service Provider Settings tab, you can download SP metadata as
a XML document or copy the metadata url.
-
Alternatively, copy and paste the SP Entity ID and ACS Url from the SP
metadata Table to your IdP configuration page.
C] Configure your Service Provider
-
To upload IdP's metadata, you can use the
Upload IdP metadata button under the Identity Provider Settings
tab, if you have the IdP metadata URL or the IdP metadata .xml file.
-
Alternatively, you can copy the IDP Entity ID and
Single Sign-On Url values from the IdP and fill them up under the
Identity Provider Settings tab.
Step 4: Testing SAML SSO
-
Click the Test Configuration button to verify if you have
configured the plugin correctly.
-
On successful configuration, you will get Attribute Name and Attribute
Values in the Test Configuration window.
Step 5: Adding Login/SSO Widget on DNN Page
Step 6: Attribute Mapping
-
Attributes are user details that are stored in your Identity Provider.
-
Attribute Mapping helps you to get user attributes from your IdP and map
them to DotNetNuke user attributes like firstname, lastname etc..
-
While auto registering the users in your DotNetNuke site these
attributes will automatically get mapped to your DotNetNuke user
details.
-
Go to
DNNSAMLSSO Settings >> Advanced settings >> Attribute
Mapping.
Step 7: Role mapping (It is Optional to fill this)
-
DotNetNuke uses a concept of Roles, designed to give the site owner the
ability to control what users can and cannot do within the site.
-
DotNetNuke has five pre-defined roles: Administrators, Subscribers,
Registered Users, Translator (en-US) and Unverified Users.
-
Role mapping helps you to assign specific roles to users of a certain
group in your IdP.
-
While auto registering, the users are assigned roles based on the group
they are mapped to.
You can configure the SiteFinity SAML 2.0 Single Sign-On (SSO) module with
any Identity Provider such as
ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta,
OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne,
RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with
your own custom identity provider. The miniOrange ASP.NET SAML 2.0 Connector supports C# and
Visual Basic languages.
We also provide ASP.NET SAML Single Sign-On module for setting up Single
Sign-On to your ASP.NET Custom Applications.
Click Here
to know more.
miniOrange also provides you modules for integration with legacy apps such
as
Active Directory, SiteMinder, Radius, Unix and so on.
Using SAML, OAuth, OpenID, ADFS, and WSFED protocols, we can also
help you add login/authentication to your Umbraco site.
Additional Resources