Single Sign On

ASP.NET Single Sign-On module offers an easy way to add support for Single Sign-On (SSO) to your ASP.NET, ASP.NET MVC, ASP.NET Core, ASP Classic, Desktop, and Service applications. The lightweight library helps you provide SSO access to cloud and intranet websites using a single credentials entry.

ASP.NET Single Sign-On module offers an easy way to add support for Single Sign-On (SSO) to your ASP.NET, ASP.NET MVC, ASP.NET Core, VB.NET, ASP Classic, Desktop and Service applications. The lightweight library helps you provide SSO access to cloud and intranet websites using a single credentials entry.

ASP.NET Single Sign-On module offers an easy way to add support for Single Sign-On (SSO) to your ASP.NET, ASP.NET MVC, ASP.NET Core, VB.NET, ASP Classic, Desktop and Service applications. The lightweight library helps you provide SSO access to cloud and intranet websites using a single credentials entry.

ASP.NET SAML Single Sign-On
Slider

Steps to Configure the ASP.NET SAML 2.0 Connector

Step 1: Setup Connector for application on IIS.

  • Extract the downloaded asp-net-saml-sso-connector zip file to get ASP.NET SAML 2.0 Connector.
  • Add the connector as separate application on IIS
  • To Add Application in IIS Manager, copy the extracted folder to the following path: C:\inetpub\wwwroot.
  • Open IIS manager.In left panel right click on your site and click Add Application.
  • ASP.Net SAML Connector iis manager
  • Add Alias Name for your application. For example: ssoapp
  • Give the Physical path where you have copied the Application: C:\inetpub\wwwroot\asp-net-saml-sso-connector-xxx.
  • ASP.Net SAML Connector  add app

Step 2: Steps to give authority/permission to users to use SAML Connector.

  • Go to this path C:\inetpub\wwwroot\
  • Right click the asp-net-saml-sso-connector-xxx and select Properties
  • Select the Security tab and click the Edit button.
  • Select IIS_IUSRS in under Group or Usernames option.
  • Give Full Control permission for IIS_IUSRS container as shown in the figure below:
  • ASP.Net SAML Connector permission

Step 3: Open miniOrange SAML ASP.NET Connector on Browser

  • Open any browser and go to the following link: https://<new-application-base-url>/.
  • Login or Register to SAML connector in order to access the connector's admin dashboard.
  • ASP.Net SAML Connector  mo saml dll register

Step 4: Configure your Identity Provider

  • You need to provide SP Entity ID and ACS URL values while configuring your Identity Provider. Just copy and paste the SP Entity ID and ACS URL from connector to your IdP configuration page.You can refer to the image below.
  • ASP.Net SAML Connector sp settings

Step 5: Configure your Service Provider

  • After configuring your Identity Provider, it will provide you with IDP Entity ID, IDP Single Sign On URL and x.509 Certificate. Configure these values under IDP Entity ID, Single Sign-On Url and SAML X509 Certificate fields respectively.
  • Click Save to Save your IDP details.
  • ASP.Net SAML Connector idp settings

Step 6: Test Configuration

  • Click on Test Configuration button to test whether the connector is configured correctly or not.
  • The below Screenshot shows a successful result.
  • ASP.Net SAML Connector Test Configuration

Step 7: Attribute Mapping

  • Attribute Mapping helps you to get attributes in your ASP.NET application received from your IdP and map them to your user attributes in application.
  • Attributes received in successful test configuration are used for attribute mapping.
  • You can refer to the below image for attribute mapping:
  • ASP.Net SAML Connector attribute mapping

Step 8: Integration Code

  • Connector will POST all the attributes on your ASP.NET application endpoint which are mapped in the connector's Attribute Mapping section .
  • You can find the integration code in Integration Code tab in the connector. Please create an endpoint in your application using this provided integration code.

Step 9: Login Setup

  • Provide the created endpoint URL for your ASP.NET application in Login Setup where you will read the SAML response.
  • Click on the Save button.
  • ASP.Net SAML Connector login Setup

Step 10: Add following link in your application for Single Sign-On (SSO)

  • Use the following URL as a link in your application from where you want to perform SSO:
    https://<application-base-url>/request.aspx
  • For example you can use it as:
    <a href="https://<application-base-url>/request.aspx”>Log in</a>"

Step 11: Add following link in your application for Single Logout (SLO)

  • Use the following URL as a link in your application from where you want to perform SLO:
    https://<application-base-url>/singlelogout.aspx
  • For example you can use it as:
    <a href="https://<application-base-url>/singlelogout.aspx”>Logout</a>"

You can configure the ASP.NET SAML 2.0 Single Sign-On (SSO) connector with any Identity Provider such as ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with your own custom identity provider.

Not able to find your IdP? Contact us at info@xecurify.com and we'll help you set up SSO with your IdP in no time.


The miniOrange ASP.NET SAML 2.0 Connector supports C# and Visual Basic languages.

We also provide DotNet Nuke Single Sign-On SAML Connector. Click Here to know more.

miniOrange also provides you modules for integration with legacy apps such as Active Directory, SiteMinder, Radius, Unix and so on.
miniOrange helps you for adding login/authentication into your ASP.NET site using OAuth, OpenID, ADFS, SAML and WSFED protocols.
Have questions or need clarifications? Please contact us at info@xecurify.com and our experts will be there to help you.

Reference links: