Joomla SAML Single Sign On (SSO) using Azure AD as Identity Provider (IdP)

Azure AD Single Sign On (SSO) for Joomla  miniOrange provides a ready to use solution for Joomla. This solution ensures that you are ready to roll out secure access to your Joomla site using Azure AD within minutes.

You can download SAML single sign-on plugin zip file for Joomla Service Provider from here.

Step 1: Configuring Azure AD as Identity Provider (IdP)

  • Navigate to Azure AD portal http://portal.azure.com. Proceed to Azure Active Directory and click on App Registrations.
  • Click on New Application Registration and then select Application you’re developing.
  • app-registration
  • Assign a Name and Sign-on URL to application.Sign-on URL will be ACS URL provided in Service Provider Metadata of the plugin. Select Web app/API as Application type and click on Create button.
  • create-app1
  • You’ll see the app on App Registration window. Click on Settings option which will open Settings window and go to Properties section under this window.
  • properties_window
  • Here change APP ID URI value with the SP-Enity ID / Issuer value provided in Service Provider Metadata of the plugin and save.
  • app-properties

Step 2: Configure Application

  • Click on Azure Active Directory Tab display on the leftside of Dashboard.
  • Click on Endpoints on App Registration window and copy Federation Metadata Document endpoint (will be used in step 3).
  • endpoints1
  • You can also save the metadata document by going to this endpoint.
  • endpoints

Step 3: Configuring Joomla as Service Provider (SP)

  • In Joomla SAML plugin, go to Service Provider Setup Tab. There are three ways to configure the plugin:
    • Azure_As_Idp By Metadata URL :

      • Click on Upload IDP Metadata.
      • Upload_Metadata_btn
      • Enter Metadata URL (copied in step 2) and click on Fetch Metadata.
      • Upload_Metadata_URL

      Azure_As_Idp By Uploading Metadata File:

      • Click on Upload IDP Metadata.
      • Upload_Metadata_btn
      • Choose metadata file and click on Upload.
      • Upload_Metadata_file

      Azure_As_Idp Manual Configuration :

      • Copy SAML Entity ID, SAML Single-Sign-On Endpoint URL and X.509 certificate from Federation Metadata document and paste it in IdP Entity ID or Issuer, Single Sign-on Service URL, X.509 Certificate fields respectively in the plugin.
      IdP Entity ID or Issuer SAML Entity ID in the Federation Metadata document
      Single Sign-On Service URL SAML Single-Sign-On Endpoint URL in the Federation Metadata document
      X.509 Certificate x.509 Certificate in the Federation Metadata document

      Azure_As_Idp Add a button on your site login page with the following URL:

        Signin_Settings-1

Step 4: Attribute Mapping (It is Optional to fill this). This is Premium feature.

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Joomla user attributes like firstname, lastname etc.
  • While auto registering the users in your Joomla site these attributes will automatically get mapped to your Joomla user details.
  • In Joomla SAML plugin, go to Attribute Mapping tab and fill in all the fields.
  • Username: Name of the username attribute from IdP (Keep NameID by default)
    Email: Name of the email attribute from IdP (Keep NameID by default)
    Group/Role: Name of the Role attribute from Identity Provider(IdP)
    Attribute_Mapping_Tab
  • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

Step 5: Group Mapping (It is Optional to fill this). This is Premium feature.

  • Joomla uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • Role mapping helps you to assign specific roles to users of a certain group in your Identity Provider (IdP).
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • Group_Role_Mapping

Step 6: Redirection & SSO Links.

  • Go to Redirection & SSO Links tab. There are multiple features availabe in this tab like Auto redirect the user to Identity Provider and Enable Backed Login for Super Users. To use these features, click on the respective checkboxes.
  • Signin_Settings

Miniorange Joomla SAML Single sign-on(web SSO) supports multiple known IDPs like ADFS, Azure AD, Salesforce, Shibboleth, Onelogin, Okta, Feide integration, Oracle Access Manager, Redhat, miniorange IDP, SimpleSamlPhp, Google apps, Bitium, OpenAM, Centrify and many more.


Free Trial

If you don't find what you are looking for, please contact us at info@xecurify.com or call us at +1 978 658 9387.

You can download SAML single sign-on plugin zip file for Joomla Service Provider from here.

Step 1: Configuring Azure AD as Identity Provider (IdP)

  • Navigate to Azure AD portal http://portal.azure.com. Proceed to the Active Directory tab and navigate to the Enterprise Applications tab
  • Azure AD enterprise applications
  • Click on New Application
  • Azure AD sso
  • Click on Non-gallery application section and enter the name for your app and click on Add button.
  • Azure AD IDP

Step 2: Configure Application

Azure AD configure Single Sign On Configuration

  • Click on Single sign-on from the application's left hand navigation menu. The next screen presents the options for configuring single sign-on. Click on SAML.
  • Azure AD Single Sign On
  • Enter the SP Entity ID for Identifier and the ACS URL for Reply URL from Service Provider Metadata of the plugin.
  • Azure AD ACS URL
  • By default following Attributes will be sent in the SAML token. You can view or edit the claims sent in the SAML token to the application under the Attributes tab.
  • Azure AD saml token
  • Copy App Federation Metadata Url (will be used in step 3).
  • Azure AD metadata url

Azure AD groups Assign users and groups to your SAML application

  • As a security control, Azure AD will not issue a token allowing a user to sign into the application unless Azure AD has granted access to the user. Users may be granted access directly, or through a group membership.
  • Click on User and groups from the applications left hand navigation menu. The next screen persents the options for assigning the users/groups to the application.
  • Azure AD user groups

Step 3: Configuring Joomla as Service Provider (SP)

  • In Joomla SAML plugin, go to Service Provider Setup Tab. There are three ways to configure the plugin:
    • Azure AD metadata file By Azure AD Metadata URL :

      • Click on Upload IDP Metadata.
      • Azure AD upload metadata
      • Enter Metadata URL (copied in step 2) and click on Fetch Metadata.
      • Azure AD idp entity id

      Azure AD idp sso By Uploading Azure AD Metadata File:

      • Click on Upload IDP Metadata.
      • Azure AD idp metadata
      • Choose metadata file and click on Upload.
      • Azure AD issuer

      Azure AD configuration Manual Configuration :

      • Click on Configure Test to see the application's SAML documentation.
      • Azure AD sp configuration
      • Copy SAML Entity ID,SAML Single Sign On Service URL and SAML Signing Certificate from applications SAML documentation and paste it in IdP Entity ID or Issuer,Single Sign-On Service URL, X.509 Certificate fields respectively in the plugin.
      • Azure AD config
      IdP Entity ID or Issuer SAML Entity ID
      Single Sig-On Service URL SAML Single Sign On Service URL
      X.509 Certificate SAML Signing Certificate

      Azure AD sso url Add a button on your site login page with the following URL:

      Azure AD signin settings

      Step 4: Attribute Mapping (It is Optional to fill this). This is Premium feature.

      • Attributes are user details that are stored in your Identity Provider.
      • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Joomla user attributes like firstname, lastname etc.
      • While auto registering the users in your Joomla site these attributes will automatically get mapped to your Joomla user details.
      • In miniOrange SAML plugin, go to Attribute Mapping tab and fill in all the fields.
      • Username: Name of the username attribute from IdP (Keep NameID by default)
        Email: Name of the email attribute from IdP (Keep NameID by default)
        Group/Role: Name of the Role attribute from Identity Provider (IdP)
        Azure AD Attribute mapping
      • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

Step 5: Group Mapping (It is Optional to fill this). This is Premium feature.

  • Joomla uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • Role mapping helps you to assign specific roles to users of a certain group in your Identity Provider(IdP).
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • Azure AD Group mapping

Step 6: Redirection & SSO Links.

  • Go to Redirection & SSO Links tab. There are multiple features availabe in this tab like Auto redirect the user to Identity Provider and Enable Backed Login for Super Users. To use these features, click on the respective checkboxes.
  • Azure AD enterprise

Business Trial For Free

If you don't find what you are looking for, please contact us at info@xecurify.com or call us at +1 978 658 9387.