Search Results :


DNN OAuth Single Sign-On (SSO) banner

Need Help? Schedule a free meeting with our experts right away using Calendly

Book Your Slot

Use cases supported with our SSO module

Windows Authentication (SSO)

DNN Single Sign-On (SSO) authentication provider module for OAuth/JWT has support for Integrated Windows Authentication(IWA). Integrated Windows Authentication is the preferred approach to authentication whenever users are part of the same Windows domain as the server. Users are authenticated against an existing identity store such as Active Directory which gives seamless login experience.

Single Sign-On (SSO) into Multiple DotNetNuke sites

DNN Single Sign-On (SSO) authentication provider module for SAML also supports login into multiple DotNetNuke sites with one set of credentials using SAML protocol. Once the user will be logged into one of the DNN sites, he/she will be logged into to other DNN sites automatically that is no need to enter login credentials for other sites again.

Single Sign-On (SSO) into single DotNetNuke (DNN) site

DNN Single Sign-On (SSO) authentication provider module for SAML helps you to add functionality for Single Sign-On (SSO) to your DotNetNuke site. Our DNN authentication provider enables users to securely authenticate with multiple applications and websites by logging in only once—with just one set of credentials (username and password).

Multi Factor Authentication (MFA) for passwordless login to your DotNetNuke site

Secure your DotNetNuke site from password thefts using multi-factor authentication (MFA) methods with 15+ authentication types provided by miniOrange. Our multi-factor authentication (MFA) methods prevent unauthorized users from accessing information and resources having password alone as an authentication factor. Enabling second-factor authentication or two factor authentication(2FA)for your DotNetNuke site protects you against password thefts.

IP blocking for your DotNetNuke (DNN) site

DNN Single Sign-On (SSO) module helps you to add IP blocking/IP restriction to your DotNetNuke (DNN) site which adds extra security to DotNetNuke (DNN) site. In this, we provide you option for IP blocking which includes both automatic (based on user behavior) and manual IP blocking which includes blacklisting and whitelisting of IP addresses to provide access restriction, the office only access, intranet access & network restriction

Adaptive Authentication

Using Adaptive Authentication you can also restrict the No. of devices the end user can access the Services on. You can allow end users to access services on a fixed no. of devices. The end users will be able to access services provided by us on this fixed no. of devices.

Key Features

Single Sign On

Easy and seamless access to all resources. Login to your DotNetNuke (DNN) site via any existing OAuth / OpenID / JWT provider that conforms to the OAuth 2.0 and OpenID Connect (OIDC) 1.0 standard.

Role Mapping

Map your Identity Provider roles to your DNN roles and restrict resources to specific roles.

Protect complete Site

You can restrict your site to only logged in users by redirecting the users to your IdP if logged in session is not found.

Multiple OAuth / OpenID / JWT Connect Provider Support

Support for adding login with one or more OAuth / OpenID / JWT Connect Providers.

Attribute Mapping

Offers you to map the attributes from your IdP to your DotNetNuke user attributes.

Account Linking

After user SSO to DNN, if user already exists in DNN, then his profile gets updated or it will create a new DNN User.

Multi-Portal Support

Add support for login to your all DoteNetNuke (DNN) parent as well as child portals using your Identity Provider credentials.

Plans For Everyone


    $ 0
  • See the Free Plugin features list below

  • Unlimited Authentications
  • Basic Attribute Mapping (Username, Email)
  • Auto Create Users
  • Account Linking
  • Basic Role Mapping
  • Login Widget
  • -
  • -
  • -

  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  •  Support

    Contact Us


    $ 449*
  • Upgrade Now
  • See the Premium Plugin features list below

  • Unlimited Authentications
  • Basic Attribute Mapping (Username, Email)
  • Auto Create Users
  • Account Linking
  • Basic Role Mapping
  • Login Widget
  • Advanced Attribute Mapping(Firstname Lastname etc.)
  • Multiple OAuth / OpenID / JWT Provider Support
  • Custom Role Mapping
  • Custom Attribute Mapping
  • Force Authentication / Protect Complete Site
  • Custom Redirect URL after Login/Logout
  • -
  • -
  • -
  • -
  • -
  •  Support

    Contact Us

Multiportal Supported

* There is an additional cost for the number of subportals in Multiportal Network. The Multiportal licenses are based on the total number of subportal in your DotNetNuke Network.

10 Days Return Policy -

At miniOrange, we want to ensure you are 100% happy with your purchase. If the premium module you purchased is not working as advertised and you've attempted to resolve any issues with our support team, which couldn't get resolved. We will refund the whole amount within 10 days of the purchase. Please email us at for any queries regarding the return policy.

Steps to Configure DNN OAuth Single Sign-On (SSO) module

Step 1: Download and install module in DNN.

  • Download the DNN OAuth Single Sign-On (SSO) module.
  • Extract the package and upload the extension dnn-oauth-single-sign-on_xxx_Install by going to Settings > Extension > Install Extension
  • DNN OAuth Single Sign-On (SSO) - DNN settings

Step 2: Adding Module on DNN page

  • Open any of the page on your DNN site (Edit mode) and Click on Add Module .
  • DNN OAuth Single Sign-On (SSO) - add dnn module
  • Search for oauthclientsso and click on the oauthclientsso. Drag and drop the module on the page where you want.
  • DNN OAuth Single Sign-On (SSO) - Search module in DNN
  • You have finished with the Installation of the module on your DNN site.
  • If you want to add module on every page of your dnn site, go to Module Settings >> Module Settings >> Advanced Settings.
  • DNN OAuth Single Sign-On (SSO) - Display module in DNN
  • Check the box for Display Module on All Pages and click on Update.

Step 3: Select your OAuth/OIDC/JWT Provider

  • Go to Module Settings >> oauthclientsso Settings
  • You can see the Oauth / Openid / JWT providers list.
  • DNN OAuth Single Sign-On (SSO) - Select identity provider
  • Search your OAuth/OpenID/JWT provider application or click on your OAuth/OpenID/JWT provider application from the given application’s list.
  • If your application/ server name is not there in the default list. You can click on Custom OAuth 2.0 App or Custom OpenID Connect App to add a custom OAuth/OpenID/JWT Connect Server.

Step 4: Configuring OAuth/OIDC/JWT Provider

  • Copy Redirect/Callback Url from the module’s Basic Settings tab.
  • Provide it to your OAuth/OpenID/JWT provider to configure it on their side.
  • DNN OAuth Single Sign-On (SSO) - Redirect URL

Step 5: Configuring OAuth Client

1. If you are using any custom Oauth/JWT provider

    DNN OAuth Single Sign-On (SSO) - Configuration
  • Configure your OAuth/JWT provider and you will get Client ID, Client Secret, Authorize Endpoint, Access Token Endpoint and UserInfo Endpoint from your OAuth/OpenID/JWT provider.
  • Add the supported scopes by your OAuth/OpenID/JWT provider.
  • Click on the Save/Update button to save module configurations.

2. If you have selected any of the default OAuth/JWT provider from the given list

  • Note: For Default Applications in the default list, endpoints and scopes are auto-filled. But you can change it if required.
  • Your OAuth/JWT provider will provide you with Client / App ID and Client secret. Copy Client/App ID and Client secret and paste it under Client Id and Client secret in the module configuration window.
  • Confirm you have filled all required fields and click on Update / Save.

Step 6: Testing OAuth SSO

  • Click the Test Configuration button to verify if you have configured the plugin correctly.
  • On successful configuration, you will get Attribute Name and Attribute Values in the Test Configuration window.
  • DNN OAuth Single Sign-On (SSO) - Test OAuth SSO

Step 7: Mapping the basic attributes

  • Go to the oauthclientsso settings >> Advanced Settings >> Attribute Mapping.
  • Map email and username with Attribute Name you can see in Test Configuration window.
  • Click on the Save button to save the settings.
  • DNN OAuth Single Sign-On (SSO) - DNN Attribute Mapping

Step 8: Adding login/SSO widget on DNN Page

  • For Adding Button on the DNN page beside the module settings click on the Add Item (Pencil Icon).
  • DNN OAuth Single Sign-On (SSO) - Add widget
  • Click on Add widget option to add the login button.
  • DNN OAuth Single Sign-On (SSO) - Name widget

List of popular OAuth/JWT Providers we support

  • Azure AD
  • AWS Cognito
  • Ping Federate
  • Slack
  • Discord
  • HR Answerlink / Support center
  • WSO2
  • Wechat
  • Weibo
  • LinkedIn
  • Gitlab
  • Shibboleth
  • Blizzard (Formerly
  • servicem8
  • Meetup
  • Gluu Server


  • Amazon
  • Salesforce
  • PayPal
  • Google
  • AWS Cognito
  • Okta
  • OneLogin
  • Yahoo
  • ADFS
  • Gigya
  • Swiss-RX-Login (Swiss RX Login)
Additional Resources:

Need Help?

Not able to find your identity provider? Mail us on and we'll help you set up SSO with your IDP and for quick guidance (via email/meeting) on your requirement and our team will help you to select the best suitable solution/plan as per your requirement.

Request a Live Demo for DNN SSO Now

Explore the Benefits of Our DNN Single Sign On Plugin with a Live Demo by Our miniOrange Expert

 Thank you for your response. We will get back to you soon.

Something went wrong. Please submit your query again

DNN OAuth SSO | SAML Single Sign-On | 10 Days - Free Trial DNN OAuth SSO | SAML Single Sign-On | 10 Days - Free Trial DNN OAuth SSO | SAML Single Sign-On | 10 Days - Free Trial

Contact us at -  +1 978 658 9387 (US) | +91 97178 45846 (India)

Hello there!

Need Help? We are right here!

Contact miniOrange Support

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to