SecureAuth SAML Single sign-on (SSO) is an authentication method that enables SecureAuth users to access multiple Joomla applications with one login and one set of credentials.
What is SSO ?
SAML allows exchanging of information betweenService ProviderandIdentity provider, SAML isintegration between SP and IDP. When a user tries to log in, your identity provider sends SAML assertions containing facts about the user to Identity Provider. Identity Provider receives the assertion, validates it against your Identity Provider configuration, and allows the user to access your org.
Our plugin is compatible with Joomla 4 as well as with all the SAML 2.0 compliant Identity Providers. Here we will go through a step-by-step guide to configure SAML SSO login between Joomla site and SecureAuth by considering SecureAuth as IdP (Identity Provider & Joomla as SP (Service Provider).
If you want support in configuring the plugin, or to integrate SecureAuth with Joomla, click on Free Configuration Setup button.
We provide a 7 day full feature trial wherein you can fully test out all the features of the plugin, click on Free Business Trial button.
User ID Mapping | Set to Email 1. |
Name ID Format | Set to urn:oasis:names:tc:SAML:2.0:nameid-format-unspecified. |
Encode to Base64 | Set to False. |
WSFed Reply To /SAML Target URL | Enter ACS (Assertion Consumer Service) URL from Service Provider Info tab of the plugin |
SAML Consumer URL | Enter SP Entity ID / Issuer from Service Provider Info tab of the plugin |
WSFed/SAML Issuer | Enter unique name that identifies the SecureAuth IDP to the application (as the SAML ID). This value is shared with the application and can be any word, phrase, or URL, but must match exactly in the SecureAuth IDP and joomla configurations. For example, https://secureauthfqdn/realm12 |
SAML Recipient | Enter Recipient URL from Service Provider Info tab of the plugin |
Sign SAML Assertion | Set Sign SAML Assertion to True. |
Sign SAML Message | Set Sign SAML Message to False. |
You have successfully configured SecureAuth as SAML IDP (Identity Provider) for achieving SecureAuth SSO login into your joomla Site.
IdP Entity ID or Issuer | SAML Entity ID in the Federation Metadata document |
Single Sign-On Service URL | SAML Single-Sign-On Endpoint URL in the Federation Metadata document |
X.509 Certificate | x.509 Certificate in the Federation Metadata document |
IdP Entity ID or Issuer | SAML Entity ID in the Federation Metadata document |
Single Sign-On Service URL | SAML Single-Sign-On Endpoint URL in the Federation Metadata document |
X.509 Certificate | x.509 Certificate in the Federation Metadata document |
Username: | Name of the username attribute from IdP (Keep NameID by default) |
Email: | Name of the email attribute from IdP (Keep NameID by default) |
Group/Role: | Name of the Role attribute from Identity Provider(IdP) |
You have successfully completed your miniOrange SAML 2.0 SP configurations. Still, if you are facing any difficulty please mail us on joomlasupport@xecurify.com .
Synchronize users, groups & directory with SCIM & REST APIs for Server.
Page Restriction plugin restricts Joomla pages (Articles) based on User Roles and User's Login Status.
Using this Add-on you would be mapping the user details into the CB's comprofilers fields table which contains the values.
If you want Business Trial for FREE Click Here
If you don't find what you are looking for, please contact us at joomlasupport@xecurify.com or call us at +1 978 658 9387.
Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com