SAML Single Sign On ( SSO ) into Drupal using CA Identity as IDP
Drupal SAML CA Identity SSO ( Single Sign-on ) setup will allow your user to login to your Drupal site using their CA Identity Credentials. Drupal SAML module gives the ability to enable SAML Single Sign-on for Drupal. This module is compatible with all SAML Identity Providers ( IDP ). We provide Drupal SAML Single Sign on - Service Provider module which is compatible with Drupal 7, Drupal 8 and Drupal 9. Here we will go through a guide to configure SAML SSO between Drupal and CA Identity Idp. By the end of this guide, users from your Identity Provider should be able to login into the
Know more about Drupal SAML Single Sign On - Service Provider module from here.
You can download the SAML Single Sign On - Service Provider module from here.
This detailed Handbook for the SAML Single Sign On - Service Provider module, gives an in depth explanation of the features of the module. You can refer to the handbook at anytime - it is always available to you, either via This link, or directly from the module for quicker access.
1. Install Drupal SAML SP 2.0 Single Sign On (SSO) module
1.1. Using Composer:
Composer require drupal/miniorange_saml
Navigate to Extend menu on your Drupal admin console and search for miniOrange SAML Service Provider using the search box.
Enable the module by checking the checkbox and click on install button.
Steps to configure Drupal SAML Single Sign-On ( SSO ) Login into CA Identity
2. Configuring Drupal as Service Provider
In miniOrange SAML module, go to Service Provider Setup tab of the module. There are two ways to configure the module:
A. By uploading IDP metadata:
Click on Upload IDP metadata button.
Enter the Identity Provider Name
You can either upload a metadata file and click on Upload button or use a metadata URL and click on Fetch Metadata.
B. Manual Configuration:
Provide the required settings (i.e. Identity Provider Name, IdP Entity ID or Issuer, SAML Login URL, X.509 Certificate) as provided by your Identity Provider and click on the Save button.
3. Configuring CA Identity as Identity Provider
Follow the steps below to configure CA Identity as IdP
Configure CA Identity as IdP
In the miniOrange SAML SP SSO module, navigate to f
Service Provider Metadata tab. Here, you can find the SP metadata such as SP Entity ID and ACS (AssertionConsumerService) URL which are required to configure the Identity Provider.
Note: For Single Sign On, make sure to install and setup CA SSO (formerly known as SiteMinder) with CA Identity Manager.
Log in to your CA SSO portal as a CA Single Sign-On administrator.
Click on Federation tab.
Now go to Partnership FederationEntities.
Create a Local Identity Provider
Click on Create Entity.
To create a local entity, configure the following:
Enter an ID for your local identity provider for identification.
Create a name for your local identity provider.
Enter the fully-qualified domain name for the host service CA SSO Federation Web Services.
Download Metadata XML File from the Service Provider Metadata Tab of the miniOrange SAML SSO module
Click on Import Metadata and upload the downloaded XML metadata file.
For Import As, select Remote Entity.
Provide a name for the Remote Service Provider Entity.
Create a Partnership between SP and IDP
For creating a partnership, configure the following:
Add Partnership Name
Enter a name for your partnership.
Enter a relevant description for your partnership.
Local IDP ID
Enter the Local Identity Provider ID created while adding a Local Entity.
Remote SP ID
Enter the Remote Service Provider ID created while adding a Remote Entity.
This field will be pre-populated.
Enter any skew time required by your environment.
User Directories and Search Order
Select the required directories in the required search order.
On the Federation Users page, add the users you want to include in the partnership.
In the Assertion Configuration section, configure following:
Name ID Format: Email Address
Name ID Type: User Attribute
(Optional) Assertion Attributes: Specify any application or group attributes that you want to map to users
In the SSO and SLO section, perform the following steps:
SSO Binding: HTTP-POST
Transactions Allowed: Both IDP and SP initiated
In the Signature and Encryption section, select Post Signature as Sign Both.
In the Federation Partnership List, expand the Action dropdown for your partnership and click Activate.
To get the IDP metadata, Click the Action button and click Export Metadata. This data will be used to configure the module.
24*7 Active Support:
If you face any issues or if you have any questions, please feel free to reach out to us at firstname.lastname@example.org. In case you want some additional features to be included in the module, please get in touch with us, and we can get that custom-made for you. Also, If you want, we can also schedule an online meeting to help you configure the Drupal SAML SP modules.
If you dont hear from us within 24 hours, please feel free to send a follow up email to email@example.com
This privacy statement applies to miniorange websites describing how we handle the personal
When you visit any website, it may store or retrieve the information on your browser, mostly in the
form of the cookies. This information might be about you, your preferences or your device and is
mostly used to make the site work as you expect it to. The information does not directly identify
you, but it can give you a more personalized web experience.
Click on the category headings to check how we handle the cookies.
Strictly Necessary Cookies
Necessary cookies help make a website fully usable by enabling the basic functions like site
navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any
personal identifiable information. However, some parts of the website will not work properly without
These cookies only collect aggregated information about the traffic of the website including -
visitors, sources, page clicks and views, etc. This allows us to know more about our most and least
popular pages along with users' interaction on the actionable elements and hence letting us improve
the performance of our website as well as our services.