Search Results :×
miniOrange Joomla SAML SP SSO plugin helps you to integrate your Joomla site to Keycloak using SAML 2.0 protocol. The miniOrange Joomla SAML SP Single Sign-on (SSO) plugin is simple to set up Jboss Keycloak SSO into Joomla and enable secure login into Joomla. As a result, users can access multiple Joomla applications with one login after authenticating with their Keycloak IDP credentials.
Our plugin is compatible with Joomla 4 as well as with all the SAML 2.0 compliant Identity Providers.Here we will go through a step-by-step guide to configure SAML SSO login between the Joomla site and Keycloak by considering Keycloak as IDP (Identity Provider) & Joomla as SP (Service Provider).
This detailed Handbook for the Joomla SAML SP Single Sign On plugin gives an in-depth explanation of the features of the plugin.
If you want any assistance or support while configuring a plugin or integrating Jboss Keycloak with Joomla, then click on the Free Configuration Setup button.
We provide a 7-day full feature trial of our license version of the plugin where you can thoroughly test out all the features of the plugin on your site. Click on the Free Business Trial button if you want us to set up the trial for you.
|Client ID||SP-EntityID/Issuer from Service Provider Metadata|
|Client ID||The SP-EntityID / Issuer from Service Provider Metadata|
|Name||Provide a name for this client (Eg. Joomla)|
|Description (optional)||Provide a description|
|Optimize Redirect signing key lookup||OFF|
|Client Signature Required||OFF|
|Client Signature Required||EXCLUSIVE|
|Force Name ID Format||NO|
|Name ID Format|
|Root URL||Leave empty or Base URL of Service Provider|
|Valid Redirect URIs||The ACS (Assertion Consumer Service) URL from Service Provider Metadata|
|Assertion Consumer Service POST Binding URL||The ACS (Assertion Consumer Service) URL from Service Provider Metadata|
|Logout Service Redirect Binding URL||The Single Logout URL from Service Provider Metadata|
|Identity Provider Name||Provide an Identity Provider name (For Example: Keycloak).|
|IdP Entity ID or Issuer||Search for the entityID from IDP Metadata.Enter the Value in the Entity ID textbox.|
|SAML Login URL||Search for SingleSignOnService Binding ”urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect” from IDP Metadata.Enter the location value in the SAML Login URL textbox.|
|SAML Logout URL (Optional)||Search for SingleLogoutService Binding”urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect” from IDP Metadata.Enter the location value in the SAML Login URL textbox.|
|X.509 Certificate (Optional)||Search for the X.509 Certificate from IDP Metadata.Enter the tag value in Certificate textbox.|
|Enable login with SAML||Checked|
|Signed SSO and SLO Requests||Unchecked|
In Joomla SAML plugin, go to Service Provider Setup Tab. There are three ways to configure the plugin:
|IdP Entity ID or Issuer||SAML Entity ID in the Federation Metadata document|
|Single Sign-On Service URL||SAML Single-Sign-On Endpoint URL in the Federation Metadata document|
|X.509 Certificate||x.509 Certificate in the Federation Metadata document|
|Username:||Name of the username attribute from IdP (Keep NameID by default)|
|Email:||Name of the email attribute from IdP (Keep NameID by default)|
|Group/Role:||Name of the Role attribute from Identity Provider(IdP)|
You have successfully completed your miniOrange SAML 2.0 SP configurations. Still, if you are facing any difficulty please mail us on firstname.lastname@example.org .
Synchronize users, groups & directory with SCIM & REST APIs for Server.
Page Restriction plugin restricts Joomla pages (Articles) based on User Roles and User's Login Status.
Using this Add-on you would be mapping the user details into the CB's comprofilers fields table which contains the values.
If you want Business Trial for FREE Click Here
If you don't find what you are looking for, please contact us at email@example.com or call us at +1 978 658 9387.
Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to firstname.lastname@example.org
Necessary cookies help make a website fully usable by enabling the basic functions like site navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any personal identifiable information. However, some parts of the website will not work properly without the cookies.
These cookies only collect aggregated information about the traffic of the website including - visitors, sources, page clicks and views, etc. This allows us to know more about our most and least popular pages along with users' interaction on the actionable elements and hence letting us improve the performance of our website as well as our services.