Search Results :

×

Single Sign On (SSO) login into Drupal using Okta as OAuth / OpenID Connect


Drupal OAuth Client module enables Single Sign-On i.e. SSO for a Drupal site with any Identity Provider using OAuth or OpenID connect protocol. Here we will go through the steps to configure the module with the Okta. Once this configuration is done, users will be able to log in to the Drupal site using their Okta credentials.

The integration of Drupal with Okta simplifies and secures the login process, completely removing the need to store, remember, and reset multiple passwords.

Installation Steps:


  • Download the module:
    composer require 'drupal/miniorange_oauth_client'
  • Navigate to Extend menu on your Drupal admin console and search for miniOrange OAuth Client Configuration using the search box.
  • Enable the module by checking the checkbox and click on the Install button.
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc
  • Install the module:
    drush en drupal/miniorange_oauth_client
  • Clear the cache:
     drush cr
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc
  • Navigate to Extend menu on your Drupal admin console and click on Install new module.
  • Install the Drupal OAuth & OpenID Connect Login - OAuth2 Client SSO Login module either by downloading the zip or from the URL of the package (tar/zip).
  • Click on Enable newly added modules.
  • Enable this module by checking the checkbox and click on install button.
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc

Setup Drupal as OAuth Client:

  • After installing the module, navigate to the Configuration -> miniOrange OAuth Client Configuration -> Configure OAuth tab and select Okta from the Select Application dropdown list.
  • Copy the Callback/Redirect URL and keep it handy.

    Note: If your provider only supports HTTPS Callback/Redirect URLs and you have an HTTP site, please make sure to enable the 'Enforce HTTPS Callback URL' checkbox at the bottom of the tab.

  • Enter the application name in the Display Name text field. For example, Okta
  • Drupal OAuth Client - Configure OAuth tab Select Okta and copy the Callback URL

Create SSO Application in Okta:

  • Sign up for or log in to your Okta Developer account.
  • Switch to Classic UI to configure app.
  • Okta SSO Login - Switch to Classic UI
  • From the left side navigation panel, click on Applications -> then select Applications.
  • Okta SSO - Selcct Applications from the left navigation panel
  • Under Application, click on Create App Inetgration button to create new application.
  • Okta SSO - Click on Create App Integration button
  • After clicking on Create App Integration button, Open a popup window Create a new App Integration as below image:
    • In the Sign-in method: Select OIDC-OpenID Connect.
    • Application type: Select Web Application.
    • Click the Next button.
    Create a New App Integration in Okta
  • Enter the following information in the New Web App Integration panel:
    • Enter the name of application in App integration name text field under General Settings. Drupal, for example.
    • Paste the previously copied Callback/Redirect URL into the Sign-in redirect URIs text field.
    • Assignments: Select Allow everyone in your organization to access from the Controlled access option, and unchecked the Enable immediate access with Federation Broker Mode. When you've finished configuring, click on the Save button.
    Okta SSO - New Web App Integration

Integrating Drupal with Okta:

  • Okta assigns a unique Application ID to your application. Navigate to the General tab.
  • Click on the copy Icon to copy the Client ID from Client Credentials.
  • Drupal OAuth 2.0 OIDC Single Sign-on Okta SSO Client Credentials
  • In Drupal’s Configure OAuth tab paste the copied Client ID into the Client ID text field.
  • Drupal OAuth OpenID Single Single On Paste the Client ID
  • Navigate to the Okta portal's General tab.
  • Copy the Secret by clicking the copy Icon in the CLIENT SECRETS section.
  • Okta Client Secret section, copy secret
  • In Drupal’s Configure OAuth tab paste the copied Secret into the Client Secret text field.
  • Drupal OAuth OpenID Single Single On - Paste the Client Secret

How to find your Okta URL/Domain:

  • Go to the Okta Dashboard.
  • Navigate to the Profile Icon in the upper right navigation panel and click on it.
  • Okta dashboard copy the domain url from the profile
  • Now, navigate to the Drupal site and replace the Okta Domain with {yourOktaDomain} in the Authorize Endpoint, Access Token Endpoint, and Get User Info Endpoint text fields that you previously copied. Click the Save Configuration button.
  • Okta dashboard - paste copied okta domain url replace with access token, authorize endpoint itself

    You can refer to the Okta Endpoints and Scope from the table given below:

    Scope openid email profile
    Authorize Endpoint https://{yourOktaDomain}.com/oauth2/default/v1/authorize
    Access Token Endpoint https://{yourOktaDomain}.com/oauth2/default/v1/token
    Get User Info Endpoint https://{yourOktaDomain}.com/oauth2/default/v1/userinfo

Test connection between Drupal and Okta:

  • Click on the Perform Test Configuration button to test the connection between Drupal and Okta.
  • Drupal OAuth OpenID Single Single On - Click on Perform Test Configuration button
  • On a Test Configuration popup, if you don't have any active sessions on the same browser, you will be requested to login into the Okta. After successfully logging into the Okta, you will be provided a list of attributes received from the Okta.
  • Select the Email Attribute from the dropdown menu in which the user's email ID is obtained and click on the Done button.
  • Okta sso login with drupal OAuth OpenID Single Single On - Open a Test Configuration popup window
  • In the Attribute & Role Mapping tab, you can also choose the Username Attribute from the dropdown and click on the Save Configuration button.
  • Okta sso login with drupal OAuth OpenID Single Single On - Select Username Attribute from Attribute and Role Mapping tab

Please note: Mapping the Email Attribute is mandatory for Single Sign-On.

Congratulations! You have successfully configured Okta as OAuth/OpenID Provider and Drupal as an OAuth Client.

How to perform the SSO?

  • Now, open a new browser/private window and go to your Drupal site login page.
  • Click on the Login using the Okta link to initiate the SSO from Drupal.
  • If you want to add the SSO link to other pages as well, please follow the steps given in the image below:
  • Drupal OAuth OpenID Single Single-On - Add login link into different page of the Drupal site

Need Assistance?

If you face any issues during the configuration or if you want some additional features, please contact us at drupalsupport@xecurify.com.

Additional Features:

Troubleshooting:

Getting error: ‘Username not received. Check your Attribute Mapping configuration.’ OR Getting Error: ‘Email not received. Check your Attribute Mapping configuration.’
 

Follow the steps mentioned HERE

I am getting “Client Credentials were not found in the headers or body” when I try to perform test configuration
 

Follow the steps mentioned HERE

After I click on the logout in Drupal, it sends me back to the Drupal homepage. However, when I try to login with other user, it doesn’t ask me to login but automatically logs me in with same user
 

The logout functionality you’ve mentioned here is the default behavior of a module. It’s logging you out of Drupal but not from your Application/Provider. To allow the module to logout from your provider/application account (what you are looking for), you need to make the below configurations: [know more]

I purchased the paid Drupal module and replaced it with the free module, but still I am not able to use paid features.
 

As you have upgraded to one of our paid versions of the Drupal module and replaced the free module with the paid one, you must first activate the paid module. Please refer to the below steps. [Know more]

Frequently Asked Questions (FAQ)
 

[Know more]

 Case Studies
miniOrange has successfully catered to the use cases of 400+ trusted customers with its highly flexible/customizable Drupal solutions. Feel free to check out some of our unique case studies using this link.
 Other Solutions
Feel free to explore other Drupal solutions that we offer here. The popular solutions used by our trusted customers include Two Factor Authentication - 2FA, Website Security, REST & JSON API Authentication, User Provisioning and Sync. 
  24*7 Active Support
The Drupal developers at miniOrange offer quick and active support for your queries. We can assist you from choosing the best solution for your use case to deploying and maintaining the solution.
Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com