Guide for Joomla Single Sign On (SSO) using Azure AD as Identity Provider (IdP)

Azure AD Single Sign On (SSO) for Joomla  miniOrange provides a ready to use solution for Joomla. This solution ensures that you are ready to roll out secure access to your Joomla site using Azure AD within minutes.

Step 1: Configuring Azure AD as Identity Provider (IdP)

  • Navigate to Azure AD portal http://portal.azure.com. Proceed to Azure Active Directory and click on App Registrations.
  • Click on New Application Registration and then select Application you’re developing.
  • app-registration
  • Assign a Name and Sign-on URL to application.Sign-on URL will be ACS URL provided in Service Provider Metadata of the plugin. Select Web app/API as Application type and click on Create button.
  • create-app1
  • You’ll see the app on App Registration window. Click on Settings option which will open Settings window and go to Properties section under this window.
  • properties_window
  • Here change APP ID URI value with the SP-Enity ID / Issuer value provided in Service Provider Metadata of the plugin and save.
  • app-properties

Step 2: Configure Application

  • Click on Azure Active Directory Tab display on the leftside of Dashboard.
  • Click on Endpoints on App Registration window and copy Federation Metadata Document endpoint (will be used in step 3).
  • endpoints1
  • You can also save the metadata document by going to this endpoint.
  • endpoints

Step 3: Configuring Joomla as Service Provider (SP)

  • In Joomla SAML plugin, go to Service Provider Setup Tab. There are three ways to configure the plugin:
    • Azure_As_Idp By Azure AD Metadata URL :

      • Click on Upload IDP Metadata.
      • Upload_Metadata_btn
      • Enter Metadata URL (copied in step 2) and click on Fetch Metadata.
      • Upload_Metadata_URL

      Azure_As_Idp By Uploading Azure AD Metadata File:

      • Click on Upload IDP Metadata.
      • Upload_Metadata_btn
      • Choose metadata file and click on Upload.
      • Upload_Metadata_file

      Azure_As_Idp Manual Configuration :

      • Copy SAML Entity ID, SAML Single-Sign-On Endpoint URL and X.509 certificate from Federation Metadata document and paste it in IdP Entity ID or Issuer, Single Sign-on Service URL, X.509 Certificate fields respectively in the plugin.
      IdP Entity ID or Issuer SAML Entity ID in the Federation Metadata document
      Single Sign-On Service URL SAML Single-Sign-On Endpoint URL in the Federation Metadata document
      X.509 Certificate x.509 Certificate in the Federation Metadata document

      Azure_As_Idp Add a button on your site login page with the following URL:

        Signin_Settings-1

Step 4: Attribute Mapping (It is Optional to fill this). This is Premium feature.

  • Attributes are user details that are stored in your Identity Provider.
  • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Joomla user attributes like firstname, lastname etc.
  • While auto registering the users in your Joomla site these attributes will automatically get mapped to your Joomla user details.
  • In Joomla SAML plugin, go to Attribute Mapping tab and fill in all the fields.
  • Username: Name of the username attribute from IdP (Keep NameID by default)
    Email: Name of the email attribute from IdP (Keep NameID by default)
    Group/Role: Name of the Role attribute from Identity Provider(IdP)
    Attribute_Mapping_Tab
  • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

Step 5: Group Mapping (It is Optional to fill this). This is Premium feature.

  • Joomla uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • Role mapping helps you to assign specific roles to users of a certain group in your Identity Provider (IdP).
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • Group_Role_Mapping

Step 6: Redirection & SSO Links.

  • Go to Redirection & SSO Links tab. There are multiple features availabe in this tab like Auto redirect the user to Identity Provider and Enable Backed Login for Super Users. To use these features, click on the respective checkboxes.
  • Signin_Settings

Free Trial

If you don't find what you are looking for, please contact us at info@miniorange.com or call us at +1 978 658 9387.

Step 1: Configuring Azure AD as Identity Provider (IdP)

  • Navigate to Azure AD portal http://portal.azure.com. Proceed to the Active Directory tab and navigate to the Enterprise Applications tab
  • enterprise_applications-1
  • Click on New Application
  • new_application-1
  • Click on Non-gallery application section and enter the name for your app and click on Add button.
  • non_gallery_application-1

Step 2: Configure Application

azure_as_idp_sso Single Sign On Configuration

  • Click on Single sign-on from the application's left hand navigation menu. The next screen presents the options for configuring single sign-on. Click on SAML.
  • configure_single_sign_on-4
  • Enter the SP Entity ID for Identifier and the ACS URL for Reply URL from Service Provider Metadata of the plugin.
  • configure_urls-1
  • By default following Attributes will be sent in the SAML token. You can view or edit the claims sent in the SAML token to the application under the Attributes tab.
  • user_attributes_in_saml_token-1
  • Copy App Federation Metadata Url (will be used in step 3).
  • metadata_url

azure_as_idp_sso Assign users and groups to your SAML application

  • As a security control, Azure AD will not issue a token allowing a user to sign into the application unless Azure AD has granted access to the user. Users may be granted access directly, or through a group membership.
  • Click on User and groups from the applications left hand navigation menu. The next screen persents the options for assigning the users/groups to the application.
  • configure_user_groups

Step 3: Configuring Joomla as Service Provider (SP)

  • In Joomla SAML plugin, go to Service Provider Setup Tab. There are three ways to configure the plugin:
    • azure_as_idp_sso By Azure AD Metadata URL :

      • Click on Upload IDP Metadata.
      • Upload_Metadata_btn
      • Enter Metadata URL (copied in step 2) and click on Fetch Metadata.
      • Upload_Metadata_URL

      azure_as_idp_sso By Uploading Azure AD Metadata File:

      • Click on Upload IDP Metadata.
      • Upload_Metadata_btn
      • Choose metadata file and click on Upload.
      • Upload_Metadata_file

      azure_as_idp_sso Manual Configuration :

      • Click on Configure Test to see the application's SAML documentation.
      • configure_sp
      • Copy SAML Entity ID,SAML Single Sign On Service URL and SAML Signing Certificate from applications SAML documentation and paste it in IdP Entity ID or Issuer,Single Sign-On Service URL, X.509 Certificate fields respectively in the plugin.
      • sp_configuration_values
      IdP Entity ID or Issuer SAML Entity ID
      Single Sig-On Service URL SAML Single Sign On Service URL
      X.509 Certificate SAML Signing Certificate

      azure_as_idp_sso Add a button on your site login page with the following URL:

      Signin_Settings-1

      Step 4: Attribute Mapping (It is Optional to fill this). This is Premium feature.

      • Attributes are user details that are stored in your Identity Provider.
      • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Joomla user attributes like firstname, lastname etc.
      • While auto registering the users in your Joomla site these attributes will automatically get mapped to your Joomla user details.
      • In miniOrange SAML plugin, go to Attribute Mapping tab and fill in all the fields.
      • Username: Name of the username attribute from IdP (Keep NameID by default)
        Email: Name of the email attribute from IdP (Keep NameID by default)
        Group/Role: Name of the Role attribute from Identity Provider (IdP)
        Attribute_Mapping_Tab
      • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

Step 5: Group Mapping (It is Optional to fill this). This is Premium feature.

  • Joomla uses a concept of Roles, designed to give the site owner the ability to control what users can and cannot do within the site.
  • Role mapping helps you to assign specific roles to users of a certain group in your Identity Provider(IdP).
  • While auto registering, the users are assigned roles based on the group they are mapped to.
  • Group_Role_Mapping

Step 6: Redirection & SSO Links.

  • Go to Redirection & SSO Links tab. There are multiple features availabe in this tab like Auto redirect the user to Identity Provider and Enable Backed Login for Super Users. To use these features, click on the respective checkboxes.
  • Signin_Settings

Business Trial For Free

If you don't find what you are looking for, please contact us at info@miniorange.com or call us at +1 978 658 9387.