Single Sign On

ASP.NET Single Sign-On module offers an easy way to add support for Single Sign-On (SSO) to your ASP.NET, ASP.NET MVC, ASP.NET Core, ASP Classic, Desktop, and Service applications. The lightweight library helps you provide SSO access to cloud and intranet websites using a single credentials entry.

ASP.NET Single Sign-On module offers an easy way to add support for Single Sign-On (SSO) to your ASP.NET, ASP.NET MVC, ASP.NET Core, VB.NET, ASP Classic, Desktop and Service applications. The lightweight library helps you provide SSO access to cloud and intranet websites using a single credentials entry.

miniOrange DotNetNuke (DNN) SAML 2.0 Single Sign-On(SSO) acts as a SAML Service Provider which can be configured to establish the trust between the connector and a SAML capable Identity Provider to securely authenticate the users into your application. The connector uses the SAML protocol for exchanging authentication and authorization data with the Identity Provider.

DotNetNuke (DNN) SAML Single Sign-On (SSO)
Slider

Use cases supported with our SSO module

Windows Authentication

DotNetNuke (DNN) SAML Single Sign-On (SSO) module has support for Integrated Windows Authentication(IWA). Integrated Windows Authentication is the preferred approach to authentication whenever users are part of the same Windows domain as the server. Users are authenticated against an existing identity store such as Active Directory which gives seamless login experience.

Single Sign-On (SSO) into Multiple DotNetNuke sites

DotNetNuke SAML Single Sign-On (SSO) module also supports login into multiple DotNetNuke sites with one set of credentials using SAML protocol. Once the user will be logged into one of the DNN sites, he/she will be logged into to other DNN sites automatically that is no need to enter login credentials for other sites again.


Single Sign-On (SSO) into single DotNetNuke (DNN) site


DotNetNuke(DNN) SAML Single Sign-On (SSO) module helps you to add functionality for Single Sign-On (SSO) to your DotNetNuke site. Our module enables users to securely authenticate with multiple applications and websites by logging in only once—with just one set of credentials (username and password).



Two Factor Authentication (2FA) for passwordless login to your DotNetNuke site

miniOrange Two-Factor Authentication is a highly secure & easy to setup Two-Factor Authentication for your DotNetNuke (DNN) site. Rather than relying on a password alone, which can be phished or guessed, miniOrange Two Factor authentication adds a second layer of security to your DotNetNuke (DNN) accounts. It protects your backend and frontend from hacks and unauthorized login attempts.

IP blocking for your DotNetNuke (DNN) site


miniOrange helps you to add IP blocking/IP restriction to your DotNetNuke (DNN) site which adds extra security to DotNetNuke (DNN) site. In this, we provide you option for IP blocking which includes both automatic (based on user behavior) and manual IP blocking which includes blacklisting and whitelisting of IP addresses to provide access restriction, the office only access, intranet access & network restriction



Adaptive Authentication


Using Adaptive Authentication you can also restrict the No. of devices the end user can access the Services on. You can allow end users to access services on a fixed no. of devices. The end users will be able to access services provided by us on this fixed no. of devices.



Key Features

Single Sign On

Easy and seamless access to all resources. DotNetNuke (DNN) Single Sign-On (SSO) via any existing SAML 2.0 Identity Provider

Protect Your Complete Site

You can restrict your site to only logged in users by redirecting the users to your IdP if logged in session is not found

Single Logout

Allows a user to logout from all server sessions established via SAML SSO by initiating the logout process once.

Attribute Mapping

Offers you to map the attributes from your IdP to your DotNetNuke user attributes.

Role Mapping

Map your Identity Provider roles to your ASP.NET application and restrict resources to specific roles

Custom Certificate

Add your own custom X.509 Certificate for sending signed Request and verification of signed Response.

Auto-sync IdP Configuration from metadata

Keep your IDP SAML Configuration and Certificates updated and in sync

Plans For Everyone

  • FREE


    $ 0
  • DOWNLOAD NOW
  • See the Free Plugin features list below

  • Unlimited Authentications
  • User Auto-Registration
  • Basic Role Mapping
  • Basic Attribute Mapping (Username, Email)
  • Configurable SP Metadata.
  • Widget to add IDP Login Link on your site
  • Step by step guide to setup IDP
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  •  Support

    Contact Us

  • Enterprise


    $ 449*
  • Upgrade Now
  • See the Premium Plugin features list below

  • Unlimited Authentications
  • User Auto-Registration
  • Basic Role Mapping
  • Basic Attribute Mapping (Username, Email)
  • Configurable SP Metadata.
  • Widget to add IDP Login Link on your site
  • Protect Complete Site
  • SAML Single Logout
  • Custom Role Mapping
  • Advanced Attribute Mapping (Firstname, Lastname etc.)
  • Custom Attribute Mapping
  • Use different Binding types
  • Custom Certificate
  • Custom Redirect URL after Login/Logout
  •  Support

    Contact Us

Steps to Configure the DNN SAML Single Sign-On (SSO) module

Step 1: Download and Install the module in DotNetNuke.

  • Download the package for DNN SAML Single Sign-On (SSO) module.
  • Extract the package and upload the installation package dnn-saml-single-sign-on_xxx_Install by going in Settings > Extension > Install Extension.

Step 2: Adding Module on DNN page.

  • Open any of the page on your DNN site (Edit mode) and Click on Add Module.
  • Search for DNNSAMLSSO and click on the DNNSAMLSSO. Drag and drop the module on the page where you want.
  • You have finished with the Installation of the module on your DNN site.

Step 3: Configure Module for Setting up SAML Single Sign-On (SSO)

  • Go to Module Settings >> DNNSAMLSSO Settings >> Basic Settings .
  • A] Configure your Identity Provider

  • You need to provide the SP Entity ID and ACS URL values in the SP Configuration section of the module while configuring your Identity Provider.
  • Just copy and paste the SP Entity ID and ACS URL from the module to your IdP configuration page. You can refer to the image below.
  • After configuring you IDP, use your Identity Provider details to configure the module.
  • B] In Module Settings, use your Identity Provider details to configure the plugin.

  • Provide the required settings (i.e. Identity Provider Name, IdP Entity ID or Issuer, SAML Login URL, X.509 Certificate) and save it by clicking Update button.
  • Identity Provider Name For Example:Miniorange
    IdP Entity ID or Issuer https://login.xecurify.com/moas
    SAML Login URL https://login.xecurify.com/moas/idp/samlsso
    X.509 Certificate X.509 certificate is enclosed in X509Certificate tag in IdP-Metadata XML file. (parent tag: KeyDescriptor use="signing")

Step 4: Test Configuration

  • Click on Test Configuration button to test whether the connector is configured correctly or not.
  • The below Screenshot shows a successful result.

Step 5: Adding Login Widget on DNN Page

  • For Adding Button on the DNN page on beside the module settings click on the Add Item (Pencil Icon).
  • Add Button name and Description for item and click on Save.
  • You can see login button on the page after saving item. (If you are already logged in your site, you will see a "Logout" link).
  • Note : If you want to Enable this button on every page of the DNN site follow below steps

  • Go to the Settings >> Module Settings >> Advanced Settings and Enable option for Display Module On All Page.
  • Warning: You will lose all your configuration for the module after enabling this option. You can re-configure the module or it is better to enable this option before configuring the module.

Step 6: Attribute Mapping

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your IdP and map them to DotNetNuke user attributes like firstname, lastname etc..
  • While auto registering the users in your DotNetNuke site these attributes will automatically get mapped to your DotNetNuke user details.
  • Go to DNNSAMLSSO Settings >> Advanced settings >> Attribute Mapping.
  • >

Step 7: Role mapping (It is Optional to fill this)

  • DotNetNuke uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • DotNetNuke has five pre-defined roles: Administrators, Subscribers, Registered Users, Translator (en-US) and Unverified Users.
  • Role mapping helps you to assign specific roles to users of a certain group in your IdP.
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • >

Risk Based Access

  • miniOrange Fraud Prevention product dynamically analyzes user requests and apply business security policies to application access which minimizes the risks of unauthorized access.
  • miniOrange Fraud Prevention complements the existing traditional access controls by using contextual elements (e.g. device, location, time of access and user behavior) to allow for a more dynamic policy decision.
  • dnn saml single sign on fraud prevention
  • You can configure the SiteFinity SAML 2.0 Single Sign-On (SSO) module with any Identity Provider such as ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with your own custom identity provider.
  • Not able to find your IdP? Contact us at dnnsupport@xecurify.com and we'll help you set up SSO with your IdP in no time.



  • We also provide ASP.NET SAML Single Sign-On module for setting up Single Sign-On to your ASP.NET Custom Applications.
    The miniOrange ASP.NET SAML 2.0 Connector supports C# and Visual Basic languages. Click Here to know more.


    miniOrange also provides you modules for integration with legacy apps such as Active Directory, SiteMinder, Radius, Unix and so on.
    miniOrange helps you for adding login/authentication into your Umbraco site using OAuth, OpenID, ADFS, SAML and WSFED protocols.
    Have questions or need clarifications? Please contact us at info@xecurify.com and our experts will be there to help you.

    Reference links: