SiteMinder SAML Single Sign-On (SSO) in WordPress | SiteMinder SSO Login
Overview
WordPress SAML Single Sign-On (SSO) plugin to achieve SiteMinder SAML SSO for WordPress for secure login into your WordPress using SiteMinder as a SAML provider. In this guide, we will go step-by-step to configure SiteMinder as IdP (Identity Provider) and WordPress as SP (Service Provider) for SSO login.
You can visit our WordPress SSO plugin to know more about the other features we provide.
Pre-requisites : Download And Installation
To configure SiteMinder as SAML IdP with WordPress, you will need to install the miniOrange WP SAML SP SSO plugin.
Read the below steps to setup SiteMinder SAML SSO for WordPress (WP)
Step 1: Configure SiteMinder as IdP (Identity Provider)
Follow the following steps to Configure SiteMinder as IdP:
- In the miniOrange SAML SP SSO plugin, navigate to Service Provider Metadata tab. Here, you can find the SP metadata such as SP Entity ID and ACS (AssertionConsumerService) URL which are required to configure the Identity Provider.
- Log in to your CA SSO portal as a SiteMinder Single Sign-On administrator.
- Click on Federation tab.
- Now go to Partnership Federation -> Entities.
Create a Local Identity Provider
- Click on Create Entity.
- To create a local entity, configure the following:
Entity Location | Local |
Entity Type | SAML2 IDP |
Entity ID | Enter an ID for your local identity provider for identification. |
Entity Name | Create a name for your local identity provider. |
Base URL | Enter the fully-qualified domain name for the host service SiteMinder SSO Federation Web Services. |
Signed Authentication Requests Required | No |
Supported NameID format | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified |
Create a Remote Service Provider
- Download Metadata XML File from the Service Provider Metadata Tab of the miniOrange SAML SSO plugin.
- Click on Import Metadata and upload the downloaded XML metadata file.
- For Import As, select Remote Entity.
- Provide a name for the Remote Service Provider Entity.
Create a Partnership between SP and IDP
- For creating a partnership, configure the following:
- On the Federation Users page, add the users you want to include in the partnership.
- In the Assertion Configuration section, configure following:
- Name ID Format: Email Address
- Name ID Type: User Attribute
- Value: mail
- (Optional) Assertion Attributes: Specify any application or group attributes that you want to map to users
Add Partnership Name | Enter a name for your partnership. |
(Optional) Description | Enter a relevant description for your partnership. |
Local IDP ID | Enter the Local Identity Provider ID created while adding a Local Entity. |
Remote SP ID | Enter the Remote Service Provider ID created while adding a Remote Entity. |
Base URL | This field will be pre-populated. |
Skew Time | Enter any skew time required by your environment. |
User Directories and Search Order | Select the required directories in the required search order. |
- In the SSO and SLO section, perform the following steps:
- SSO Binding: HTTP-POST
- Transactions Allowed: Both IDP and SP initiated
- In the Signature and Encryption section, select Post Signature as Sign Both.
Activate Partnership
- In the Federation Partnership List, expand the Action dropdown for your partnership and click Activate.
- To get the IDP metadata, Click the Action button and click Export Metadata. This data will be used to configure the plugin.
You have successfully configured SiteMinder as SAML IdP (Identity Provider) for achieving SiteMinder SSO login into your WordPress (WP) Site.
Step 2: Configuring WordPress as SP (Service Provider)
- Free
- Standard
- Premium
FAQs
More FAQs ➔How does Single Sign-On (SSO) work?
Multi-Factor Authentication (MFA) is an authentication method that requires the user to authenticate themselves for two or more factors, in order to gain access to company resources, applications, or a VPN (OpenVPN in this case). Enabling Multi-Factor Authentication (MFA) means that users need to provide additional verification factors apart from their username and passwords thus increasing the security of the organization's resources. Checkout more about Multi-Factor Authentication (MFA) here.
What is an SSO Authentication Token?
Multi-Factor Authentication (MFA) is an authentication method that requires the user to authenticate themselves for two or more factors, in order to gain access to company resources, applications, or a VPN (OpenVPN in this case). Enabling Multi-Factor Authentication (MFA) means that users need to provide additional verification factors apart from their username and passwords thus increasing the security of the organization's resources. Checkout more about Multi-Factor Authentication (MFA) here.
What are different Methods of SSO?
Multi-Factor Authentication (MFA) is an authentication method that requires the user to authenticate themselves for two or more factors, in order to gain access to company resources, applications, or a VPN (OpenVPN in this case). Enabling Multi-Factor Authentication (MFA) means that users need to provide additional verification factors apart from their username and passwords thus increasing the security of the organization's resources. Checkout more about Multi-Factor Authentication (MFA) here.
What are the Different Types of Single Sign-On?
Multi-Factor Authentication (MFA) is an authentication method that requires the user to authenticate themselves for two or more factors, in order to gain access to company resources, applications, or a VPN (OpenVPN in this case). Enabling Multi-Factor Authentication (MFA) means that users need to provide additional verification factors apart from their username and passwords thus increasing the security of the organization's resources. Checkout more about Multi-Factor Authentication (MFA) here.