Search Results :

×

Drupal OneLogin Single Sign-On (SSO) Integration using OAuth / OpenID connect


Drupal Onelogin SSO integration will allow the users to log in to the Drupal site using the Onelogin Credentials. This SSO integration is achieved by the miniOrange OAuth Client module which uses the OAuth 2.0 and OpenID Connect (OIDC) Protocol. This module is compatible with Drupal 7, Drupal 8, Drupal 9, as well as Drupal 10.

In this document, we will help you to configure the single Sign-on login using the OAuth protocol between the Drupal site and the Onelogin.

Installation Steps:


  • Download the module:
    composer require 'drupal/miniorange_oauth_client'
  • Navigate to Extend menu on your Drupal admin console and search for miniOrange OAuth Client Configuration using the search box.
  • Enable the module by checking the checkbox and click on the Install button.
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc
  • Install the module:
    drush en drupal/miniorange_oauth_client
  • Clear the cache:
     drush cr
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc
  • Navigate to Extend menu on your Drupal admin console and click on Install new module.
  • Install the Drupal OAuth & OpenID Connect Login - OAuth2 Client SSO Login module either by downloading the zip or from the URL of the package (tar/zip).
  • Click on Enable newly added modules.
  • Enable this module by checking the checkbox and click on install button.
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc

Setup Drupal as OAuth Client:

  • After installing the module, navigate to the Configuration -> miniOrange OAuth Client Configuration -> Configure OAuth tab and select Onelogin from the Select Application dropdown list.
  • Drupal OAuth Client - Configure OAuth tab Select Onelogin
  • Copy the Callback/Redirect URL and keep it handy.

    Note:- If your provider only supports HTTPS Callback/Redirect URLs and you have an HTTP site, please make sure to enable the 'Enforce HTTPS Callback URL' checkbox at the bottom of the tab.

  • Enter the application name in the Display Name text field. For example, Onelogin
  • Drupal OAuth Client - Configure OAuth tab copy the Callback URL and enter display name

Configure OAuth/OpenID SSO Application in Onelogin:

  • Sign in to your OneLogin Admin console.
  • Navigate to Applications and select Applications on hover.
  • Onelogin OpenID Single Sign-On Login - Click Applications -> Applications
  • Click on the Add App button.
  • Onelogin OpenID Single Sign-On Login - Click on Add App button to build a new application
  • In the search box, enter OpenId Connect and click on the OpenId Connect ( OIDC) link.
  • Onelogin OpenID Single Sign-On Login - Search for OpenId Connect -> Select OpenId Connect (OIDC)
  • By default, the Display Name is pre-filled with OpenId Connect (OIDC). Please Enter an appropriate display name, scroll to the bottom, provide a Description, and click on the Save button.
  • Onelogin OpenID Single Sign-On Login - Enter Display name and click on Save
  • From the left navigation panel, click on the Configuration.
  • Onelogin OpenID Single Sign-On Login - Click on Configuration
  • Paste the copied Callback/Redirect URL into the Redirect URI's text field and click on the Save button.
  • Onelogin OpenID Single Sign-On Login - Paste the copied Callback URL into Redirect URI's field

Integrating Drupal with Onelogin:

  • Navigate to the OneLogin portal.
  • From the left navigation panel, click on the SSO tab.
  • Onelogin OpenID Single Sign-On Login - Click on SSO
  • From the Enable OpenID Connect section copy the Client ID.
  • Onelogin OpenID Single Sign-On Login - On the Enable OpenID Connect section, copy the Client ID
  • Navigate to the Drupal site and paste the copied Client ID into the respective text field.
  • Drupal OAuth OpenID Single Single On - Under Configure OAuth tab, paste the Client ID into respective field
  • Navigate back to the OneLogin portal and click on the Show client secret link. Copy the Client Secret.
  • Onelogin OpenID Single Sign-On Login - Click on Show client secret link -> Copy the Client Secret
  • Head back to the Drupal site, and paste the copied Client Secret into the Client Secret text field.
  • Drupal OAuth OpenID Single Single On - Paste the copied Client Secret into corresponding text field

    Please find the OneLogin Scope and Endpoints from the table below:

    Scope openid
    Authorize EndPoint https://<site-url>.onelogin.com/oidc/auth
    Access Token Endpoint https://<site-url>.onelogin.com/oidc/token
  • In the Endpoint URLs replace ‘’ with the OneLogin subdomain.
  • The 'Send Client ID and Secret in Header or Body' checkbox allows you to specify whether the Client ID and Secret should be included in the header or the body of the Token Endpoint Request. If you're unsure which option to select, you can stick with the default settings.
  • Click on the checkbox to Enable Login with OAuth, scroll down, and click the Save Configuration button.
  • Drupal OAuth OpenID Single Single On - Click on Save Configuration button

How to Assign Users in the OneLogin Application:

  • Go to the Onelogin Dashboard.
  • Navigate to the Users tab in the top menu and select Users on hover.
  • Onelogin OpenID Single Sign-On Login - Navigate to Users -> Select Users
  • Search for users in the search box, and then select the user to whom you want to grant access.
  • Onelogin OpenID Single Sign-On Login - Search for users and select the user to whom you want to assign access
  • From the left navigation menu, click on the Applications.
  • Onelogin OpenID Single Sign-On Login - Click on Applications
  • Under Applications, click the Plus (+) sign button.
  • Onelogin OpenID Single Sign-On Login - Under Application -> Click on Plus(+) sign
  • On the popup, select the application from the dropdown list for which you want to enable SSO for that assigned user, and then click the Continue button.
  • Onelogin OpenID Single Sign-On Login - Select the app from the dropdown for which you want to enable single sign-on for that assigned user
  • On the next screen, check the box to Allow the user to sign in and then click on the Save button.
  • Onelogin OpenID Single Sign-On Login - Enabling the checkbox Allow the user to sign in -> click on Save

The user has been assigned to your application.

Test connection between Drupal and OneLogin:

  • Navigate to the Drupal site and click on the Perform Test Configuration button.
  • Testing the Single Sign-on Connection between the Drupal and Onelogin - Click Perform Test Configuration
  • On a Test Configuration popup, if you don't have an active session in OneLogin on the same browser, you'll be prompted to sign in to OneLogin. Once successfully logged in, you'll receive a list of attributes retrieved from OneLogin.
  • Drupal OAuth/OpenID Single Sign-On Login - Recieved the list of Attribute from Onelogin Application
  • Scroll down and click on the Configure Attribute / Role Mapping button.
  • On the Attribute & Role Mapping tab, please select the attribute under which the email of the user is received from the Email Address drop-down menu. Similarly, you can select the suitable option from the Name Attribute drop-down menu.
  • Drupal OpenID Single Sign-On Login - Under Attribute & Role Mapping -> Select the Email Attribute for Single Sign-On
  • Scroll to the bottom and click on the Save Configuration button.

Please note: Mapping the Email Attribute is mandatory for Single Sign-On.

Congratulations! You have successfully configured OneLogin as OAuth/OpenID Provider and Drupal as an OAuth Client.

How to perform the SSO?

  • Now, open a new browser/private window and go to your Drupal site login page.
  • Click on the Login using the Onelogin link to initiate the SSO from Drupal.
  • If you want to add the SSO link to other pages as well, please follow the steps given in the image below:
  • Drupal OAuth OpenID Single Single-On - Add login link into different page of the Drupal site

Need Assistance?

If you face any issues during the configuration or if you want some additional features, please contact us at drupalsupport@xecurify.com.

Additional Features:

Troubleshooting:

Getting error: ‘Username not received. Check your Attribute Mapping configuration.’ OR Getting Error: ‘Email not received. Check your Attribute Mapping configuration.’
 

Follow the steps mentioned HERE

I am getting “Client Credentials were not found in the headers or body” when I try to perform test configuration
 

Follow the steps mentioned HERE

After I click on the logout in Drupal, it sends me back to the Drupal homepage. However, when I try to login with other user, it doesn’t ask me to login but automatically logs me in with same user
 

The logout functionality you’ve mentioned here is the default behavior of a module. It’s logging you out of Drupal but not from your Application/Provider. To allow the module to logout from your provider/application account (what you are looking for), you need to make the below configurations: [know more]

I purchased the paid Drupal module and replaced it with the free module, but still I am not able to use paid features.
 

As you have upgraded to one of our paid versions of the Drupal module and replaced the free module with the paid one, you must first activate the paid module. Please refer to the below steps. [Know more]

Frequently Asked Questions (FAQ)
 

[Know more]

 Case Studies
miniOrange has successfully catered to the use cases of 400+ trusted customers with its highly flexible/customizable Drupal solutions. Feel free to check out some of our unique case studies using this link.
 Other Solutions
Feel free to explore other Drupal solutions that we offer here. The popular solutions used by our trusted customers include Two Factor Authentication - 2FA, Website Security, REST & JSON API Authentication, User Provisioning and Sync. 
  24*7 Active Support
The Drupal developers at miniOrange offer quick and active support for your queries. We can assist you from choosing the best solution for your use case to deploying and maintaining the solution.
Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com