nopCommerce SAML Single Sign-On (SSO) using Okta as IDP | Okta SSO


nopCommerce SAML Single Sign-On (SSO) plugin gives the ability to enable SAML Single Sign-On for your nopCommerce applications. Using Single Sign-On you can use only one password to access your nopCommerce application and services. Our plugin is compatible with all the SAML compliant identity providers. Here we will go through a step-by-step guide to configure Single Sign-On (SSO) between nopCommerce and Okta considering Okta as IdP. To know more about the features we provide for nopCommerce SSO, click here.

Pre-requisites : Download And Installation

    Download from nopCommerce Dashboard
  • To download the plugin zip, login as admin into your nopCommerce store. In the admin dashboard, go to Configuration Tab > All Plugins and Themes or search for All Plugins and Themes in the Admin search bar.
  • Search for the SAML Single Sign-On (SSO) - miniOrange plugin and click the Download button to get the zip.
  • nopCommerce Single Sign-On (SSO) - install plugin
    From nopCommerce marketplace
  • You can download the plugin zip file from nopCommerce store - nopCommerce SAML Single Sign-On (SSO)
  • To install the plugin, login as admin into your nopCommerce website. In the admin dashboard, go to Configuration Tab >> Local plugins.
  • On the top right corner of the page select the Upload plugin or theme button to upload the downloaded plugin zip. Follow the instructions further to install the plugin.

Steps to configure nopCommerce Single Sign-On (SSO) using Okta as Identity Provider

1. Configure Okta as IDP

  • You need to send your SP metadata to identity provider, Okta. For SP metadata, use the SP metadata URL or download the SP metadata as a .xml file and upload it at your IdP end. You can find both these options under the Service Provider Metadata tab.
  • nopcommerce Single Sign On (SSO) service provider spmetadata
  • Alternatively, you can manually add the SP Entity ID and ACS URL from Service Provider metadata tab in the plugin to your IdP configurations.
  • nopcommerce Single Sign On (SSO) service provider sptable
  • Login into your Okta Admin dashboard.
  • Then navigate to Applications tab and select Applications.
  • nopCommerce SAML Single Sign-On (SSO) - add_application
  • Click on the Create App Integration button to create new app.
  • nopCommerce SAML Single Sign-On (SSO) - SAML 2.0 Configure
  • Select SAML 2.0 as Sign-On method and Click on Next button.
  • nopCommerce SAML Single Sign-On (SSO) - SAML 2.0 Configure
  • In General Settings tab, enter App Name and click on Next button.
  • nopCommerce SAML Single Sign-On (SSO) - SAML 2.0 Configure
  • In Configure SAML tab, enter the required details:
  • Single Sign On
    URL
    ACS (AssertionConsumerService) URL from the Service Provider Metadata tab of the
    Plugin
    Audience URL
    (SP Entity ID)
    SP Entity ID / Issuer from the Service Provider Metadata tab of the Plugin
    Default
    Relay State
    Relay State from the Service Provider Metadata tab of the Plugin
    Name ID
    Format
    Select E-Mail Address as a Name Id from dropdown list
    Application
    Username
    Okta username
    nopCommerce SAML Single Sign-On (SSO) - SAML_SETTINGS
  • Configure Group Attribute Statements (Optional) and click on Next button.
  • nopCommerce SAML Single Sign-On (SSO) - Add_Attributes
Assigning Groups/People
  • Navigate to the application you created and click on the Assignments Tab in Okta.
  • nopCommerce SAML Single Sign-On (SSO) - Assign_groups
  • Click on Assign button to Assign People and Assign Groups.
  • nopCommerce SAML Single Sign-On (SSO) - Assign_groups
  • Once you Assign the user, click on Done button.
  • nopCommerce SAML Single Sign-On (SSO) - Assign_groups
  • Navigate to Sign On tab and under SAML Signing SAML Certificates, click on View SAML setup instructions to get Okta Metadata.
  • You will need this to configure the Service Provider.
  • nopCommerce SAML Single Sign-On (SSO) - Assign_groups
  • You have successfully configured Okta as SAML IdP (Identity Provider) for achieving Okta Single Sign-On (SSO) Login, ensuring secure Okta Login into nopCommerce application.

2. Configure nopCommerce as SP (SSO Plugin)

  • After configuring SP metadata in IDP, you will have to configure IDP metadata in the plugin.
  • To configure the IDP metadata, there are two methods:
  • To upload IdP's metadata, you can use the Upload IdP metadata button, if you have the IdP metadata URL or the IdP metadata .xml file.
  • nopCommerce Single Sign On (SSO) - upload IDP metadata
  • Alternatively, you can copy the IDP Entity ID and Single Sign-On Url values from the IdP and fill them up under the Identity Provider Settings tab.
  • nopCommerce Single Sign On (SSO) - IDP Settings

3. Test Configuration

  • Click the Test Configuration button to verify if you have configured the plugin correctly.
  • On successful configuration, you will get Attribute Name and Attribute Values in Test Configuration window.
  • nopCommerce Single Sign On (SSO) - Test Configuration

4. Attribute Mapping

  • Map Attribute Names provided by your IdP with your store attributes, under Attribute/Role Mapping tab.
  • Click on Save button.
  • nopCommerce Single Sign On (SSO) - Attribute Mappings

5. Enabling SSO in your nopCommerce store

  • Under the Redirection & SSO link tab, use the URL labeled as Your Store SSO Link in your store to initiate the SSO.
  • Please make sure the Enable SSO checkbox is enabled under the Identity Provider Tab.
  • nopCommerce Single Sign On (SSO) - Add SSO functionality

Additional Resources

Need Help?

Not able to find your identity provider? Mail us on nopcommercesupport@xecurify.com and we'll help you set up SSO with your IDP and for quick guidance (via email/meeting) on your requirement and our team will help you to select the best suitable solution/plan as per your requirement.

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com