ASP.NET SAML SP Single Sign-On (SSO) module gives the ability to enable SAML Single Sign-On for your ASP.NET applications. Using Single Sign-On you can use only one password to access your ASP.NET application and services. Our module is compatible with all the SAML compliant Identity providers. Here we will go through a step-by-step guide to configure Single Sign-On (SSO) between ASP.NET and Salesforce considering Salesforce as IdP.
https://<your-application-base-url>?ssoaction=config
Follow the steps below to configure Salesforce as IdP
Entity ID | SP-EntityID / Issuer from Service Provider Metadata tab of the plugin |
ACS URL | ACS (AssertionConsumerService) URL from Service Provider Metadata tab of the plugin |
Subject Type | Username |
Name ID Format | urn:oasis:names:tc:SAML:2.0:nameid-format:persistent |
https://<your-application-base-url>/?ssoaction=login
<a href="https://<your-application-base-url>/?ssoaction=login">Login</a>
https://<your-application-base-url>/?ssoaction=logout
<a href="https://<your-application-base-url>/?ssoaction=logout">Logout</a>
You can configure the ASP.NET SAML 2.0 Single Sign-On (SSO) module with any Identity Provider such as ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin, Salesforce, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID, Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2 or even with your own custom identity provider.
Application | LINK |
SAML SSO into DotNetNuke (DNN) site | Click here |
SAML SSO into SiteFinity site | Click here |
SAML SSO into Umbraco site | Click here |
Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com