Search Results :
×
Download and install the Kentico as an OAuth Client plugin
and configure it manually.
Send the essential data of your Kentico application (included in the metadata file/URL) to your identity provider (Azure AD, Okta, Auth0, etc). In exchange, your identity provider will provide you with a similiar metadata file/URL which you can configure in the module. This metadata exchange will be beneficial for a successful SSO connection.
Once you are done with the exchange of metadata, test the Single Sign-On (SSO) configuration between Kentico and your identity provider.
Easy and seamless access to all resources of Kentico via miniOrange Kentico OAuth Single Sign-On (SSO) via any identity providers
OAuth grants like Password grant, User Credentials grant are supported for Kentico Single Sign-On (SSO)
Restrict your site to only logged in users by user redirection to your IdP if logged in session is not found.
Map your identity provider roles to your OAuth application and restrict resources to specific roles
Multiple identity providers like Azure AD, ADFS, Okta, Office365 and many more are supported
Customizable Kentico flow for any OAuth/OpenID Connect identity provider (IdP)
50+
Identity Providers24/7
Support100+
InstallationsSeamlessly configure Kentico OAuth Single Sign-On using identity providers like Azure AD, ADFS, Microsoft365, PingOne, Okta, Auth0, Google, PingFederate, Salesforce and many more. Enable seamless and secure access to Kentico applications and services for users across different departments or organizations using our Kentico SSO plugin.
Can't find your service provider? Contact us at kenticosupport@xecurify.com and we will help you setup Single Sign-On with Kentico with your desired identity provider (IDP) in no time.
For small businesses seeking basic SSO login
Recommended for & opted by below systemsSingle Sign-On with 1 IDP
User Profile Linking
For enterprises seeking SSO with enhanced security
over single or multi-tenant applications
Integrate multiple SAML IDPs
Support for encrypted SAML Tokens
Recommended for enterprises, government agencies with legacy applications
Recommended for & opted by below systemsSupports legacy systems & servers
Use custom SAML certificates
BASIC
$449 Cost of 1 instance |
PROFESSIONAL
$649 Cost of 1 instance |
ENTERPRISE
$749 Cost of 1 instance |
||
---|---|---|---|---|
SAML 2.0 Identity Providers are supported | ||||
Unlimited SSO Authentications | ||||
Basic Attribute Mapping & Account Linking | ||||
Widget to add IDP Login Link on your store | ||||
Setup guide to configure IDP | ||||
Custom Redirect URL after Login and Logout | ||||
Custom Attributing Mapping | ||||
Configurable SP Metadata | ||||
Group + Role Mapping | ||||
Integration Support for Forms Authentication | ||||
Domain Restriction | ||||
Multi-tenant applications support | ||||
Custom SP Certificates | ||||
Multiple SAML Identity Providers are supported |
The plugin licenses are subscription and the support plan includes 12 months of maintenance (support and version updates). You can renew the license after 12 months at 50% of the current license cost.
If you decide to cancel or not renew your license, your plugin will stop working.
Licensing for miniOrange plugins/modules/connectors is application
instance-based and linked to the Fully Qualified Domain Name (FQDN) /
unique URLs of the application(s). ‘Application implies an instance of
software that is hosted and run on a server.
E.g. If you have separate apps for different purposes, both of these
applications can be accessed with any one type of FQDN shown below:
1. domain1.com and domain2.com OR
2. app1.domain.com and app2.domain.com OR
3. domain.com/app1 and domain.com/app2 OR
4. test.domain.com/app1 and test.domain.com/app2
You’ll be required to have two separate licenses for each application.
With pre-production environments (staging, user acceptance testing,
and testing), you'll need separate licenses for each.
No, you only need to pay for the "Active" subsites in your Kentico multisite network. All of the subsites which are in the deactivated or archived state will not be counted.
THE DEMO WILL COVER:
End-to-end setup with the your identity provider
Fixing environmental issues on your end if any
Configuring custom endpoints
Thank you for your response. We will get back to you soon.
Something went wrong. Please submit your query again