Search Results :
×Guide to set up Single Sign On between two WordPress sites. To configure Single Sign On for multiple WordPress sites, we’ll first assume one WordPress site as the main source of user authentication (identity provider), and the rest of the sites as the service providers into which users log in after successful authentication. In such a setting, SSO between two WP sites can be set up by using WordPress SAML Service Provider and WordPress SAML Identity Provider plugins. Our WordPress SAML SP Single Sign On (SSO) plugin gives you the ability to use your WordPress (WP) site as SAML SP (Service Provider) and you can configure other WordPress (WP) sites as an SAML IdP (Identity Provider) with Login Using WordPress users (WP as SAML IdP) plugin.
Let’s assume WP site 1 is our main source of authentication. So this WP site will be configured as the IDP where the SAML IDP plugin will be installed. Subsequently, sites 2, 3, etc. will be configured as the SP in which users can seamlessly SSO login once they login into site 1, thus successfully setting up SSO for two or multiple WP sites.
You can configure secure Single Sign On (SSO) between any number of WordPress sites using the miniOrange SSO solution. There are no restrictions on the number of WordPress sites involved in the SSO setup.
Single Sign-On (SSO) login with WordPress Users into any Service Provider like Tableau, Zoho, Zoom, Moodle, Canvas LMS, Absorb LMS, TalentLMS, etc.
WordPress Single Sign On SSO login with Azure, Azure B2C, Okta, ADFS, Keycloak, Salesforce, Ping, Onelogin, Gsuite, Shibboleth & many SAML IdPs [24/7 SUPPORT]
Note: If you have an external Identity Provider and multiple WP sites which need to share credentials, you can configure all your WordPress sites as the Service Providers using our plugin.
We also provide a solution for SSO between subsites of a Multisite network. Please Contact Us for more information.
Follow the steps below to configure 1st Wordpress Site as the IdP (Identity Provider)
Service Provider Name | Name of your Service Provider. |
SP Entity ID or Issuer | Copy and paste the SP-EntityID from the Service Provider |
ACS URL | Copy and paste the ACS URL from the Service Provider. |
NameID Format | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
Assertion Signed | Checked |
Service Provider Name | Name of your Service Provider. |
SP Entity ID or Issuer | Copy and paste the SP-EntityID from the Service Provider. |
ACS URL | Copy and paste the ACS URL from the Service Provider. |
Select Binding type(optional) | Select Use HTTP-Redirect Binding for SLO |
Single Logout URL(optional) | Enter Single Logout URL given in Service Provider. |
X.509 Certificate(optional) | Enter X.509 Certificate. |
NameID Format\ | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
Response Signed | Checked if you want to sign the SAML Response |
Assertion Signed | Checked if you want to sign the SAML Response |
Encrypted Assertion | Checked if you want to encrypt the SAML Assertion\ |
Note: If you intend to set up Attribute Mapping, Role Mapping, and other configurations on the Identity Provider's end, you can find detailed instructions in the provided setup guide, which is linked here.
In the WordPress SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two ways to configure the WordPress SSO plugin:
A. By uploading IDP metadata:
B.Manual Configuration:
In the WordPress SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two ways to configure the WordPress SSO plugin:
A. By uploading IDP metadata:
B.Manual Configuration:
NOTE: If you click on Test Configuration button in Service Provider Setup tab and authenticate with your IDP, you can see a list of attributes sent by the IDP in the Attribute/Role mapping tab. This information can be used to provide the above mapping.
In the standard plugin, you can choose a default role which will be assigned to all the non-admin users when they perform SSO.
In the Standard plugin you can enable SP-initiated SSO using the following options.
NOTE: Please enable the Backdoor login and note down the backdoor URL. This will allow you to access the WordPress login page in case you get locked out of the IDP.
In the WordPress SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two ways to configure the WordPress SSO plugin:
A. By uploading IDP metadata:
B.Manual Configuration:
This feature allows you to assign and manage roles of the users when they perform SSO. Along with the default WordPress roles, this is compatible with any custom roles as well.
In the Premium plugin you can enable SP-initiated SSO using the following options.
NOTE: Please enable the Backdoor login and note down the backdoor URL. This will allow you to access the WordPress login page in case you get locked out of the IDP login.
In this Guide, we configured SAML 2.0 Single Sign On between two WordPress sites, choosing one WordPress website as IdP and another WordPress website as SP enabling SSO for Multiple WordPress WP sites. SSO between two WordPress Sites can be set up using miniOrange plugins - SAML Single Sign On – SSO Login And Login Using WordPress users (WP as SAML IdP). Our Login in Multiple WordPress sites solution ensures that you are ready to roll out secure access to your WordPress(WP) sites using single login credentials.
Allows syncing user's creation, updation and deletion from your IDP to WordPress site
Know more →Restricts WordPress pages and posts based on User Roles and User's Login Status
Know more →Maps SSO users to LearnDash groups as per the group attributes sent by your IDP
Know more →If you are looking for anything which you cannot find, please drop us an email on samlsupport@xecurify.com
miniOrange provides 24/7 support for all the Secure Identity Solutions. We ensure high quality support to meet your satisfaction.
Sign UpEasy and precise step-by-step instructions and videos to help you configure within minutes.
Watch DemoWe offer Secure Identity Solutions for Single Sign-On, Two Factor Authentication, Adaptive MFA, Provisioning, and much more. Please contact us at
 +1 978 658 9387 (US) | +91 97178 45846 (India) samlsupport@xecurify.com
Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com
This privacy statement applies to miniorange websites describing how we handle the personal information. When you visit any website, it may store or retrieve the information on your browser, mostly in the form of the cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not directly identify you, but it can give you a more personalized web experience. Click on the category headings to check how we handle the cookies. For the privacy statement of our solutions you can refer to the privacy policy.
Necessary cookies help make a website fully usable by enabling the basic functions like site navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any personal identifiable information. However, some parts of the website will not work properly without the cookies.
These cookies only collect aggregated information about the traffic of the website including - visitors, sources, page clicks and views, etc. This allows us to know more about our most and least popular pages along with users' interaction on the actionable elements and hence letting us improve the performance of our website as well as our services.