Magento SAML Single Sign-On (SSO) can be achieved by using our Magento SAML Single Sign-On (SSO) extension.
Our SSO solution will make Magento SAML 2.0 compliant Service Provider establishing trust between the Magento site and your Identity Provider (IdP) to securely authenticate and login users to the Magento site. Our Magento Single Sign-On (SSO) solution helps to
secure Magento sites behind the SSO login so that users are authenticated using their Identity Provider login credentials. Seamless support for advanced SSO features like Attribute / Custom Mapping, Role Mapping etc.
SAML allows information to be exchanged between Service Providers and Identity Providers; SAML is the integration of Service Providers and Identity Providers. When a user attempts to log in, your Service provider delivers SAML assertions to Identity Provider, which contain information about the user. The assertion is received by Identity Provider, which validates it against your Service Provider settings before allowing the user access to your org.
Here we will go through a guide to configure SAML Single Sign-On SSO login between Magento site and your Identity Provider by considering Magento as SP (Service Provider). Our Magento SAML SSO extension
provides unlimited user authentications from Identity Provider. To know more about other features we provide in you Magento SAML Single Sign-On (SSO) extension, you can click here.
You can refer how to download and install miniOrange Magento SAML Single Sign-On (SSO) Extension from Magento marketplace
:
Steps to Configure Magento 2 SAML Single Sign-On Extension (Magento SAML)
1. Setup Custom Identity Provider as IdP (Identity Provider)
In miniOrange Magento SAML extension, Navigate to Service Provider Metadata tab. Here you will find all the required settings which you will require to configure your Identity Provider.
2. Configuring Magento 2 as SP (Service Provider)
Go to Service Provider Setup tab of the miniOrange Magento SAML SSO extensions.
Provide the required settings (i.e. Identity Provider Name, IdP Entity ID or Issuer, SAML Login URL, X.509 Certificate) as provided by your Identity Provider and click on the Save button.
By clicking on Test Configuration button in Magento SAML extension you can check whether your IdP connection is successful and what attributes you are getting from IdP.
In free extension you can add a login button on your customer login page. Other options like login link on admin page, auto-redirect user etc. is provided in premium versions of the extension.
Attributes are user details that are stored in your Identity Provider.
Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Magento user attributes like firstname, lastname etc.
While auto registering the users in your Magento site these attributes will automatically get mapped to your Magento user details.
Only NameID can be mapped to Magento's Email and Username characteristics with the free plugin. Multiple user attributes from the IdP, on the other hand, can be mapped to Magento attributes in the premium version of the plugin. You can map custom attributes that you've added to your IdP in addition to the default attributes.
When a user performs SSO, the NameID value sent by the IdP will get mapped to the email and the username of the Magento user.
Username:
Name of the username attribute from IdP (Keep NameID by default)
Email:
Name of the email attribute from IdP (Keep NameID by default)
Group/Role:
Name of the Role attribute from Identity Provider (IdP)
You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.
3.2: Custom Attribute Mapping (Optional). *This is Premium feature.
Enter your table name in Table field.
Enter attribute name as your column name (in the respective table)
Click on Add button for adding custom magento attribute and map the respective field with the attribute receiving from your identity provider
Click on save button for saving the configuration.
You can also delete the configuration by entering the name in attribute name field and then click on delete button.
4.Role Mapping (Optional). *This is Premium feature.
You can specify a default role in the free plugin that will be allocated to all non-admin users when they conduct SSO.
Go to Attribute/Role mapping tab and navigate to Role Mapping section.
Select the Default Role and click on the Save button.