ORCID Single Sign-On SSO | WordPress Login using ORCID

WordPress OAuth / OpenID connect Single Sign-On plugin enables login into your WordPress site using OAuth and OpenID Connect providers like ORCID and other custom and standard providers. It supports advanced SSO features like user profile attribute mapping, role mapping etc. To know more about other features we provide in WP OAuth Single Sign-On ( OAuth / OpenID Connect Client ) plugin, you can click here.

Download And Installation

  • Log into your WordPress instance as an admin.
  • Go to the WordPress Dashboard -> Plugins and click on Add New.
  • Search for a WordPress OAuth Single Sign On plugin and click on Install Now.
  • Once installed click on Activate.

Step 1: Setup ORCID as OAuth Provider

  • First of all, go to https://orcid.org/signin and log into your ORCID account.
  • ORCID as 
  • Click Developer Tools at the top of your record.
  • ORCID as an Oauth tools
  • Click the "Register for the free ORCID public API" button
  • ORCID as an Oauth Note
  • Review and agree to the terms of service when prompted.
  • ORCID as an Oauth Review
  • After agreeing to the terms of service, you will be directed back to Developer Tools. Complete the form presented to register a new application.
  • ORCID as an Oauth New application
  • Click the Save icon at the bottom of the form to generate your API credentials.
  • ORCID as an Oauth Save
  • To view your API credentials, click Show Details.
  • ORCID as an Oauth Details
  • Your API credentials - Client ID and Client Secret - are shown just beneath your redirect URIs. Below your credentials are sample URLs and API calls with your credentials pre-filled.
  • ORCID as an Oauth pre-filled
    Scope: openid
    Authorize endpoint: https://orcid.org/oauth/authorize
    Access Token endpoint: https://orcid.org/oauth/token
    Custom redirect URL after logout:[optional] https://orcid.org/userStatus.json?logUserOut=true

Step 2: Setup WordPress as OAuth Client

  • Go to Configure OAuth tab and configure App Name, Client ID, Client Secret from provided Endpoints.
  • openid is already filled but if it doesn't work then configure scope as User.Read and for fetching group info use scope is Directory.read.all.
  • Click on Save Settings to save the configuration.
  • OAuth/OpenID Ping Identity Single Sign On SSO WordPress create-newclient configure-endpoints

Step 3: User Attribute Mapping.

  • User Attribute Mapping is mandatory for enabling users to successfully login into WordPress. We will be setting up user profile attributes for WordPress using below settings.
  • Finding user attributes

    • Go to Configure OAuth tab. Scroll down and click on Test Configuration.
    • test congifuration
    • You will see all the values returned by your OAuth Provider to WordPress in a table. If you don't see value for First Name, Last Name, Email or Username, make the required settings in your OAuth Provider to return this information.
    • OAuth/OpenID Ping Identity Single Sign On SSO WordPress create-newclient configuration-test-result
    • Once you see all the values in Test Configuration, go to Attribute / Role Mapping tab, you will get the list of attributes in a Username dropdown.
    • OAuth/OpenID Ping Identity Single Sign On SSO WordPress create-newclient attribute/role mapping

Step 4: Login Settings / Sign In Settings.

  • The settings in SSO Settings tab define the user experience for Single Sign On. To add a login widget on your WordPress page, you need to follow below steps.
  • Sign In Settings

    • Go to WordPress Left Panel > Appearances > Widgets.
    • Select miniOrange OAuth. Drag and drop to your favourite location and save.
    • OAuth/OpenID Ping Identity Single Sign On SSO WordPress create-newclient login button setting
    • Open your WordPress page and you can see the login button there. You can test the SSO now.

Need Help?

Mail us on oauthsupport@xecurify.com for quick guidance(via email/meeting) on your requirement and our team will help you to select the best suitable solution/plan as per your requirement.