Tableau Server Single Sign-On using DNN SAML as IDP
DotNetNuke (DNN) SAML IDP
module acts as a SAML 2.0 Identity Provider which can be configured to
establish the trust between the module and various SAML-compliant
to securely authenticate the user using the DotNetNuke (DNN) site credentials.
miniOrange provides a ready to use solution for SAML 2.0 Login using
DotNetNuke credentials. Here we will go through a step-by-step guide to configure Single Sign-On (SSO) between DotNetNuke(DNN) and Tableau Server considering DotNetNuke(DNN) as IDP.
To know more about the other features we provide, click here.
Pre-requisites : Download And Installation
the DNN SAML Identity Provider (IDP) module.
Upload the installation package
dnn-saml-single-sign-on-sso-idp_xxx_Install by going in
Settings > Extension > Install Extension.
Open any of the page on your DNN site (Edit mode) and Click on
Search for moDNNSAMLIDP and click on the moDNNSAMLIDP. Drag and drop
the module on the page where you want.
You have finished with the Installation of the module on your DNN site.
1. Configure Tableau Server as SP
From the list of service providers given below, select
There are two options in the module to share your IDP metadata to the
service provider. Either you can share metadata URL or you can download the
metadata (XML) file.
Login to your Tableau Services Manager as Admin.
In the Configuration tab, select User Identity Access, then
click on Authentication Method tab.
To configure Tableau Server follow the given steps.
In Authentication Method, select SAML and provide the data
from the IDP Metadata tab of the plugin.
Tableau Server return URL
Enter the URL that Tableau Server users will access.
SAML Entity ID
The entity ID uniquely identifies your Tableau Server installation
to the IDP. You can enter your Tableau Server URL again here.
SAML certificate and key files
Click on Select File to upload the SAML certificate and SAML key.
You can generate the self-signed certificate using
OpenSSL using the following command openssl req -x509 -sha256 -nodes -newkey rsa:2048 -keyout
cert.key -days 365 -out cert.crt
Click on Download XML Metadata File, this will be required for
configuring the IDP.
Navigate to the IDP Metadata tab of the DNN SAML IDP Plugin and download the
IDP metadata file.
Now, you can upload the Metadata XML File of the Identity Provider.
Note: In some cases, you may need to change the assertion values in
the Tableau Server configuration to match the assertion names that are
passed by your IDP.
Enter the assertion values that you want to map during SSO.
You can check or uncheck the checkbox if you wish to enable or disable the
SAML Single Logout.
Click on Save Pending Changes and then click on
Pending Changes at the top of the page.
Click Apply Changes and Restart to restart your Tableau server.
2. Configure DNN as SAML IDP
There are two options to add an application for your Service Provider in the IDP module
A] Upload metadata using Upload SP Metadata option
IDP module requires SP Entity ID and ACS URL values from your service
provider. You may get the metadata file (.xml) or metadata URL.
You can upload metadata using Upload SP Metadata option where
you can upload metadata using XML file or URL.
You may refer to the screenshot below:
You can choose any one of the options according to the metadata format you
B] Configure the Service Provider metadata manually
Once configured service provider metadata, Update the module
3. Attribute Mapping
In this steps you will map the DotNetNuke user attribute to be sent in the
response to the Service Provider.
NameID defines what SP is expecting in the subject element of SAML
Assertion. Generally, NameID is Username or Email Address. You can select
which user attribute you want to send in the NameID.
You can add other attributes to be sent in SAML Assertion to SP. The
attributes include user’s profile attributes such as first name, last name,
fullname, username, email, custom profile attributes etc.
After saving the attribute mapping, proceed further with the test configuration or perform actual SSO from your service provider.
4. Testing SSO
In the Incognito browser window, enter the Tableau Server URL.
The browser will redirect you to the DNN Login screen.
Enter the DNN Credentials and click on Log in.
If you are redirected back to your Tableau Server start page and logged in successfully, then your configuration is correct.
You have successfully configured DNN as SAML IDP ( Identity Provider) for achieving DNN SSO login into your Tableau Server.
You can configure the DNN SAML IDP module with any service provider such as
Azure AD, Azure B2C, Google Apps, Zoho Desk, Salesforce, WordPress,
Cognito, Moodle, Zapier, Zoho, Zoom, Tableau Server, Hubspot, TalentLMS,
or even with your own custom service providers. You can find more
Not able to find your identity provider? Mail us on
and we'll help you set up SSO with your service provider and for quick
guidance (via email/meeting) on your requirement and our team will help you
to select the best suitable solution/plan as per your requirement.
Need Help? We are right here!
Contact miniOrange Support
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to firstname.lastname@example.org
This privacy statement applies to miniorange websites describing how we handle the personal
When you visit any website, it may store or retrieve the information on your browser, mostly in the
form of the cookies. This information might be about you, your preferences or your device and is
mostly used to make the site work as you expect it to. The information does not directly identify
you, but it can give you a more personalized web experience.
Click on the category headings to check how we handle the cookies.
Strictly Necessary Cookies
Necessary cookies help make a website fully usable by enabling the basic functions like site
navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any
personal identifiable information. However, some parts of the website will not work properly without
These cookies only collect aggregated information about the traffic of the website including -
visitors, sources, page clicks and views, etc. This allows us to know more about our most and least
popular pages along with users' interaction on the actionable elements and hence letting us improve
the performance of our website as well as our services.