miniOrange Java SAML Single Sign On (SSO) Connector acts as a SAML Service Provider which can be configured to establish the trust between the SSO connector and a SAML capable Identity Provider to securely authenticate the users into your application. The SSO connector uses the SAML protocol for exchanging authentication and authorization data with the Identity Provider.
Easy and seamless access to all resources. Java Single Sign-On (SSO) via any existing SAML 2.0 Identity Provider
You can restrict your site to only logged in users by redirecting the users to your IdP if logged in session is not found
Allows a user to logout from all server sessions established via SAML SSO by initiating the logout process once.
Offers you to map the attributes from your IdP to your Java application
Map your Identity Provider roles to your Java application and restrict resources to specific roles
Support SSO with multiple SAML Identity Providers
Add your own custom X.509 Certificate for sending signed Request and verification of signed Response.
Page based restrictions over users based on their roles and whether they are logged in or not.
Keep your IDP SAML Configuration and Certificates updated and in sync
Provides support for two factor authentication during login via a range of methods (15+ authentication methods), including text message, hardware tokens and many more
Allows users to Single Sign On into the site via their institution that is affiliated with InCommon Federation
You can install the Java SAML SSO Connector using any of the following Java build tools:
<servlet> <description></description> <display-name>SSOServlet</display-name> <servlet-name>SSOServlet</servlet-name> <servlet-class>com.miniorange.app.servlets.SSOServlet</servlet-class> </servlet> <servlet-mapping> <servlet-name>SSOServlet</servlet-name> <url-pattern>/sso</url-pattern> </servlet-mapping>
The variable email will contain the received user attribute.
HttpSession session = request.getSession(false); Map
samlResponseAttributes = (Map ) request.getSession().getAttribute("attributes");
http://<your-domain>/<application-name>/sso?action=login&redirectto=<redirect-url>For Example, you can use it as:
<a href="http://<your-domain>/<application-name>/sso?action=login&redirectto=/<application-name>/dashboard">Log in</a>Your users will be able to SSO in your application by clicking on the Log in link.
Our Java Single Sign On (SSO) Connector provides user authentication from external directories like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc. It also provides user authentication with other IDPs like Shibboleth, PING, Okta, OneLogin, KeyCloak, Salesforce, SimpleSAMLphp, OpenAM, miniOrange, Centrify, RSA, IBM, Oracle, Bitium, WSO2, NetIQ and all SAML 2.0 capable Identity Providers
Our Java Single Sign On (SSO) Connector provides user authentication with any Java Framework like Spring Boot, Wicket, Struts, Tapestry, JSF, Hibernate, Blade, JHipster, Play, Spark, etc
Can't find your IDP ? Contact us on email@example.com. We'll help you set it up in no time.