Search Results :
×If you want to login to your EasyGenerator site using your Joomla username and password, you can simply do it
using our Joomla OAuth Server plugin. Once you configure the Easygenerator with Joomla OAuth Server
plugin, you can login
to your Easygenerator application using Joomla credentials. It also allows you to send custom user attributes
to your Easygenerator site as per your requirements.
To know more about other features we provide in Joomla OAuth Server plugin, you can click here.
Please follow the steps given below to configure your Easygenerator site with Joomla as OAuth Server and setup
the Single Sign-On(SSO).
Client ID : | You can get the Client ID from Configure OAuth Tab in Joomla OAuth Server |
Client Secret : | You can get the Client Secret from Configure OAuth Tab in Joomla OAuth Server |
Scope: | profile openid |
Authorize Endpoint: | https://< your-Joomla-domain >/index.php |
Access Token Endpoint: | https://< your-Joomla-domain >/index.php |
Get User Info Endpoint: | https://< your-Joomla-domain >/plugins/system/miniorangeoauth/miniorangeoauthserver.php |
Method type : | GET |
Example response: |
{"ID":1,"preferred_username":"admin","email":"admin@admin.com", "given_name":"admin","family_name":"admin","name":"admin admin","nickname":"admin"} |
Once the integration is enabled for your accounts, you can use the following link to access your courses from Joomla:
Make sure to replace:
In this Guide, you have successfully configured Single Sign-On (SSO) into Easygenerator app with Joomla as OAuth Provider and Easygenerator as OAuth Client using our Joomla OAuth Server plugin.This solution ensures that you are ready to roll out secure access to your Easygenerator app using Joomla site credentials within minutes.
In Joomla SAML plugin, go to Service Provider Setup tab. There are three ways to configure the plugin:
A. By uploading IDP metadata:
B. By Metadata URL:
C. Manual Configuration:
IdP Entity ID or Issuer | SAML Entity ID in the Federation Metadata document |
Single Sign-On URL | SAML Single-Sign-On Endpoint URL in the Federation Metadata document |
X.509 Certificate Value | X.509 Certificate in the Federation Metadata document |
Username: | Name of the username attribute from IdP (Keep NameID by default) |
Email: | Name of the email attribute from IdP (Keep NameID by default) |
Name: | Name of the name attribute from IdP |
Note: You can see how Attribute Mapping works here.
Note: You can see how Group/Role Mapping works here.
Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com
This privacy statement applies to miniorange websites describing how we handle the personal information. When you visit any website, it may store or retrieve the information on your browser, mostly in the form of the cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not directly identify you, but it can give you a more personalized web experience. Click on the category headings to check how we handle the cookies. For the privacy statement of our solutions you can refer to the privacy policy.
Necessary cookies help make a website fully usable by enabling the basic functions like site navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any personal identifiable information. However, some parts of the website will not work properly without the cookies.
These cookies only collect aggregated information about the traffic of the website including - visitors, sources, page clicks and views, etc. This allows us to know more about our most and least popular pages along with users' interaction on the actionable elements and hence letting us improve the performance of our website as well as our services.