Page and Post Restriction for WordPress (WP) banner

Use cases supported with our SSO module

Windows Authentication


DotNetNuke (DNN) SAML Single Sign-On (SSO) module has support for Integrated Windows Authentication(IWA). Integrated Windows Authentication is the preferred approach to authentication whenever users are part of the same Windows domain as the server. Users are authenticated against an existing identity store such as Active Directory which gives seamless login experience.

Single Sign-On (SSO) into Multiple DotNetNuke sites


DotNetNuke SAML Single Sign-On (SSO) module also supports login into multiple DotNetNuke sites with one set of credentials using SAML protocol. Once the user will be logged into one of the DNN sites, he/she will be logged into to other DNN sites automatically that is no need to enter login credentials for other sites again.


Single Sign-On (SSO) into single DotNetNuke (DNN)
site


DotNetNuke(DNN) SAML Single Sign-On (SSO) module helps you to add functionality for Single Sign-On (SSO) to your DotNetNuke site. Our module enables users to securely authenticate with multiple applications and websites by logging in only once—with just one set of credentials (username and password).



Two Factor Authentication (2FA) for passwordless login to your DotNetNuke site


miniOrange Two-Factor Authentication is a highly secure & easy to setup Two-Factor Authentication for your DotNetNuke (DNN) site. Rather than relying on a password alone, which can be phished or guessed, miniOrange Two Factor authentication adds a second layer of security to your DotNetNuke (DNN) accounts. It protects your backend and frontend from hacks and unauthorized login attempts.

IP blocking for your DotNetNuke (DNN)site


miniOrange helps you to add IP blocking/IP restriction to your DotNetNuke (DNN)
site which adds extra security to DotNetNuke (DNN) site. In this, we provide you option for IP blocking which includes both automatic (based on user behavior) and manual IP blocking which includes blacklisting and whitelisting of IP addresses to provide access restriction, the office only access, intranet access & network restriction



Adaptive Authentication


Using Adaptive Authentication you can also restrict the No. of devices the end user can access the Services on. You can allow end users to access services on a fixed no. of devices. The end users will be able to access services provided by us on this fixed no. of devices.



Key Features

Single Sign On

Easy and seamless access to all resources. DotNetNuke (DNN) Single Sign-On (SSO) via any existing SAML 2.0 Identity Provider

Protect Your Complete Site

You can restrict your site to only logged in users by redirecting the users to your IdP if logged in session is not found

Single Logout

Allows a user to logout from all server sessions established via SAML SSO by initiating the logout process once.

Attribute Mapping

Offers you to map the attributes from your IdP to your DotNetNuke user attributes.

Role Mapping

Map your Identity Provider roles to your ASP.NET application and restrict resources to specific roles

Custom Certificate

Add your own custom X.509 Certificate for sending signed Request and verification of signed Response.

Auto-sync IdP Configuration from metadata

Keep your IDP SAML Configuration and Certificates updated and in sync

Plans For Everyone

  • TRIAL


    $ 0
  • DOWNLOAD NOW
  • See the Free Plugin features list below

  • Unlimited Authentications
  • User Auto-Registration
  • Basic Role Mapping
  • Basic Attribute Mapping (Username, Email)
  • Configurable SP Metadata.
  • Widget to add IDP Login Link on your site
  • Step by step guide to setup IDP
  • -
  • -
  • -

  • -
  • -
  • -
  • -
  • -
  •  Support

    Contact Us

  • PREMIUM


    $ 449*
  • Upgrade Now
  • See the Premium Plugin features list below

  • Unlimited Authentications
  • User Auto-Registration
  • Basic Role Mapping
  • Basic Attribute Mapping (Username, Email)
  • Configurable SP Metadata.
  • Widget to add IDP Login Link on your site
  • Protect Complete Site
  • SAML Single Logout
  • Custom Role Mapping
  • Advanced Attribute Mapping (Firstname, Lastname etc.)
  • **Multisite Support
  • Custom Attribute Mapping
  • Use different Binding types
  • Custom Certificates
  • Custom Redirect URL after Login/Logout
  •  Support

    Contact Us

** There is an additional cost for the number of subsites in Multisite Network.

* Cost applicable for one instance only. Licenses are perpetual and the Support Plan includes 12 months of maintenance (support and version updates). You can renew maintenance after 12 months at 50% of the current license cost.

* We provide deep discounts on bulk license purchases and pre-production environment licenses. As the no. of licenses increases, the discount percentage also increases.

Steps to Configure the DNN SAML Single Sign-On (SSO) module

Step 1: Download and Install the module in DotNetNuke.

  • Download the package for DNN SAML Single Sign-On (SSO) module.
  • Upload the installation package dnn-saml-single-sign-on_xxx_Install by going in Settings > Extension > Install Extension.

Step 2: Adding Module on DNN page.

  • Open any of the page on your DNN site (Edit mode) and Click on Add Module.
  • Search for DNNSAMLSSO and click on the DNNSAMLSSO. Drag and drop the module on the page where you want.
  • You have finished with the Installation of the module on your DNN site.

Step 3: Configure Module for Setting up SAML Single Sign-On (SSO)

  • Go to Module Settings >> DNNSAMLSSO Settings .
  • A] Select your Identity Provider

  • Select your Identity provider from the list. If you don't find your Identity provider in the list, select Custom IDP. You can also search for your Identity Provider using the search box.
  • B] Configure your Identity Provider

  • Under the Service Provider Settings tab, you can download SP metadata as a XML document or copy the metadata url.
  • Alternatively, copy and paste the SP Entity ID and ACS Url from the SP metadata Table to your IdP configuration page.
  • C] Configure your Service Provider

  • To upload IdP's metadata, you can use the Upload IdP metadata button under the Identity Provider Settings tab, if you have the IdP metadata URL or the IdP metadata .xml file.
  • Alternatively, you can copy the IDP Entity ID and Single Sign-On Url values from the IdP and fill them up under the Identity Provider Settings tab.

Step 4: Test Configuration

  • Click the Test Configuration button to verify if you have configured the plugin correctly.
  • On successful configuration, you will get Attribute Name and Attribute Values in the Test Configuration window.

Step 5: Adding Login/SSO Widget on DNN Page

  • For Adding Button on the DNN page on beside the module settings click on the Add Item (Pencil Icon).
  • Add Button name and click on Save.
  • You can see login button on the page after saving item. (If you are already logged in your site, you will see a "Logout" link).
  • Note : If you want to Enable this button on every page of the DNN site follow below steps

  • Go to the Settings >> Module Settings >> Advanced Settings and Enable option for Display Module On All Page.
  • Warning: You will lose all your configuration for the module after enabling this option. You can re-configure the module or it is better to enable this option before configuring the module.

Step 6: Attribute Mapping

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your IdP and map them to DotNetNuke user attributes like firstname, lastname etc..
  • While auto registering the users in your DotNetNuke site these attributes will automatically get mapped to your DotNetNuke user details.
  • Go to DNNSAMLSSO Settings >> Advanced settings >> Attribute Mapping.
  • >

Step 7: Role mapping (It is Optional to fill this)

  • DotNetNuke uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • DotNetNuke has five pre-defined roles: Administrators, Subscribers, Registered Users, Translator (en-US) and Unverified Users.
  • Role mapping helps you to assign specific roles to users of a certain group in your IdP.
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • >

Risk Based Access

  • miniOrange Fraud Prevention product dynamically analyzes user requests and apply business security policies to application access which minimizes the risks of unauthorized access.
  • miniOrange Fraud Prevention complements the existing traditional access controls by using contextual elements (e.g. device, location, time of access and user behavior) to allow for a more dynamic policy decision.
  • dnn saml single sign on fraud prevention
  • You can configure the SiteFinity SAML 2.0 Single Sign-On (SSO) module with any Identity Provider such as ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with your own custom identity provider.
  • Not able to find your IdP? Contact us at dnnsupport@xecurify.com and we'll help you set up SSO with your IdP in no time.



  • We also provide ASP.NET SAML Single Sign-On module for setting up Single Sign-On to your ASP.NET Custom Applications.
    The miniOrange ASP.NET SAML 2.0 Connector supports C# and Visual Basic languages. Click Here to know more.


    miniOrange also provides you modules for integration with legacy apps such as Active Directory, SiteMinder, Radius, Unix and so on.
    miniOrange helps you for adding login/authentication into your Umbraco site using OAuth, OpenID, ADFS, SAML and WSFED protocols.
    Have questions or need clarifications? Please contact us at info@xecurify.com and our experts will be there to help you.

    Reference links:

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com