DNN SAML Single Sign-On (SSO)
authentication provider gives the ability to enable SAML Single Sign-On for your DotNetNuke
applications. Using Single Sign-On you can use only one password to access
your DotNetNuke application and services. Our authentication provider is compatible with all
the SAML-compliant
identity providers. Here we will go through a step-by-step guide to configure Single Sign-On
(SSO) between DotNetNuke and Auth0 considering Auth0 as IdP.
Pre-requisites: Download And Installation
Download
the package for DNN SAML Single Sign-On (SSO) authentication provider.
Upload the installation package
dnn-saml-single-sign-on_xxx_Install by going in
Settings > Extension > Install Extension.
Steps to configure DNN Single Sign-On (SSO) using Auth0 as IDP
1. Add authentication provider on DNN page
Now under the Installed extensions tab select Authentication Systems.Here you can see the miniOrange DNN SAML Authentication Plugin.
Just Click on the pencil icon as mentioned in the image below to configure the DNN SAML Authentication Provider.
Now go to the site settings tab. Here you can see the DNN SAML Authentication Provider Dashboard.
You have finished with the Installation of the authentication provider on your DNN site.
2. Setup Auth0 as Identity Provider
Select your identity provider Auth0 from the list shown below.
There are two ways detailed below with which you can get the SAML SP
metadata to configure onto your identity provider end.
A] Using SAML metadata URL or metadata file:
Under Service Provider Settings, you can find the metadata URL as
well as the option to download the SAML metadata.
Copy metadata URL or download the metadata file to configure the same on
your identity provider end.
You may refer to the screenshot below:
B] Uploading metadata manually:
Under the Service Provider Settings section, you can manually copy
the service provider metadata like Base URL, SP Entity ID, ACS URL
and share it with your identity provider for configuration.
You may refer to the screenshot below:
Prerequisites:
Copy these values from the Service Provider Info tab of the
SAML plugin.
A new window will pop-up. Enter a name for the application and select
Regular Web App. Click on CREATE button.
Select the Addons tab.
Enable SAML2 option in the addons. It will open up a
Configuration window.
Enter Application Callback URL, Audience, Recipient and
other settings using SP entity ID and
ACS URL copied from the plugin as shown below:
Scroll down and click on Save.
Go to the Usage tab and click on the
Identity Provider Metadata download link. It will download
the metadata XML file which you'll need for setting up the SAML plugin.
You have successfully configured Auth0 as SAML IdP (Identity Provider) for
achieving Auth0 SSO login into your DNN Site.
3. Configure DotNetNuke SAML Authentication Provider as Service Provider
For configuring application in the authentication provider, click on the Add new IdP button in the Identity Provider Settings tab.
A] Select your Identity Provider
Select Auth0 from the list.You can also
search for your Identity Provider using the search box.
B] Configure your Identity Provider
Under the Service Provider Settings tab, you can download SP metadata as
a XML document or copy the metadata url.
Alternatively, copy and paste the SP Entity ID and ACS Url from the SP
metadata Table to your Auth0 configuration page.
C] Configure your Service Provider
To upload IdP's metadata, you can use the
Upload IdP metadata button under the Identity Provider Settings
tab, if you have the IdP metadata URL or the IdP metadata .xml file.
Alternatively, you can copy the IDP Entity ID and
Single Sign-On Url values from the IdP and fill them up under the
Identity Provider Settings tab.
4. Testing SAML SSO
Click the Test Configuration button to verify if you have configured
the plugin correctly.
On successful configuration, you will get Attribute Name and Attribute
Values in the Test Configuration window.
5. Attribute Mapping
For attribute mapping select the Edit Configuration from the select actions dropdown.
Map email and username with Attribute Name you can see in Test
Configuration window and save the settings.
6. Get the Single Sign-On (SSO) link for your application
You can find the SSO Link in the Action dropdown in Applications List of the authentication provider.
You can even configure the
ASP.NET SAML Single Sign-On (SSO)
module with any identity provider such as
ADFS, Microsoft Entra ID (formerly Azure AD), Bitium, centrify, G Suite,
JBoss Keycloak, Okta, OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle,
PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML,
WSO2
or even with your own custom identity provider. To check other identity
providers, click
here.
Not able to find your identity provider? Mail us on
dnnsupport@xecurify.com
and we'll help you set up SSO with your IDP and for quick guidance (via
email/meeting) on your requirement and our team will help you to select the
best suitable solution/plan as per your requirement.
×
Hello there!
Need Help? We are right here!
Contact miniOrange Support
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com