Search Results :

×

SAML Single Sign-On into TYPO3 using ADFS | ADFS SSO | Login using ADFS


ADFS SAML Single Sign-On (SSO) login for TYPO3 can be achieved by using our Typo3 SAML SP Single Sign-On (SSO) extension. Typo3 will be configured as a SAML 2.0 compliant Service Provider as a result of our SSO solution, which will build trust between the Typo3 site and ADFS SAML in order to securely authenticate and login users to the Typo3 site. Our Typo3 Single Sign-On (SSO) solution helps to secure Typo3 sites behind the SSO login so that users are authenticated using their ADFS login credentials. Seamless support for advanced SSO features like Attribute / Custom Mapping, Role Mapping etc.

Here we will go through a guide to configure SAML Single Sign-On SSO login between Typo3 site and ADFS SAML by considering ADFS SAML as IdP (Identity Provider) and Typo3 as SP (Service Provider). Our Typo3 SAML extension SSO provides Unlimited user authentications from ADFS SAML. To know more about other features we provide in you Typo3 SAML Single Sign-On (SSO) extension, you can click here.

Pre-requisites : Download And Installation

miniorange img Installing SAML extension in TYPO3


  • Use the below command to install the extension using composer:
    composer req miniorange/miniorange-saml
  • Now search for the "miniOrange SAML" in Installed extensions section and activate the extension by clicking on activate button.
  • Typo3 SAML SSO create frontend
  • After installation, click on the newly installed extension "miniOrange SAML SP extension" for TYPO3 SSO and login with your registered miniOrange credentials.
  • Typo3 miniorange OpenIDCconnect settings
  • After entering username and password you will require license key to proceed further if you are a premium customer. (You will get this key from the miniOrange team. After entering license key, you can activate the license and proceed further.)
  • miniorange license SAML login
  • If you are not a premium customer you can direcly login submitting miniOrange credentials.
  • After successful login, you can see the details related to your account.
  • Typo3 saml SSO create frontend
  • Now you are ready to configure your IdP. But, it's important to integrate frontend first.
  • Download the zip file of the SAML SP extension from TYPO3 marketplace
  • Go to your TYPO3 backend, and click on Extensions section at the left side of your screen.
  • Upload the zip file,as represented in the below image.
  • Typo3 SAML SSO setup guide upload plugin
  • Now search for the "miniOrange SAML" in Installed extensions section and activate the extension by clicking on activate button.
  • Typo3 SAML SSO create frontend
  • After installation, click on the newly installed extension "miniOrange SAML SP extension" for TYPO3 SSO and login with your registered miniOrange credentials.
  • Typo3 miniorange OpenIDCconnect settings
  • After entering username and password you will require license key to proceed further if you are a premium customer. (You will get this key from the miniOrange team. After entering license key, you can activate the license and proceed further.)
  • miniorange license SAML login
  • If you are not a premium customer you can direcly login submitting miniOrange credentials.
  • After successful login, you can see the details related to your account.
  • Typo3 saml SSO create frontend
  • Now you are ready to configure your IdP. But, it's important to integrate frontend first.

miniorange img Integrate extension with TYPO3

  • Click on the Pages from the left navigation.
  • Then you need to create a folder to store the frontend users in it by right clicking on the Home page and select New subpage.
  • Typo3 saml SSO create frontend
  • Select Folder type from the dropdown. Name the folder as Website Users.
  • Typo3 saml SSO create frontend
  • Go to the Behaviour tab and add Website Users (fe_users) and click on Save.
  • Typo3 saml SSO create frontend
  • If you see a hyphen sign in red on the created folder, it means that the folder is not enabled. You can then enable it by right clicking on that folder and clicking Enable.
  • You need to add two STANDARD pages within the HOME page. If you are using Premium Plugin you can create three pages.
  • Here we will consider Page Names as: FESAML, RESPONSE, LOGOUT (Logout is optional for premium customers).
  • To create a FESAML page, right click on Home page then select New subpage and select STANDARD type from dropdown.
  • Typo3 saml SSO create frontend
  • Add Page Title as FESAML and click Save.
  • Typo3 saml SSO create frontend
  • Then again Click on FESAML Page and click on Add content. Go to plugins and add FESAML Plugin and click on the Save.
  • Typo3 saml SSO create frontend
  • Navigate to plugin tab and select FESAML plugin. Add website users in Record Storage Page and save the settings.
  • Typo3 login add website users Typo3 login add website users
  • You can enable the FESAML page by right clicking and selecting Enable option.
  • Typo3 saml SSO create frontend
  • If you need to make changes in URL segment, which will also be your initial SSO URL, right click on FESAML page, select edit and click on "toggle URL" button to set URL according to your way.
  • Follow the same steps to create and configure Standard pages of Response.
  • Ensure you will be selecting Response Plugin for Response page.
  • Keep the FESAML and RESPONSE page urls handy as you will need them while configuring the SAML SP.

Steps to configure ADFS SAML SAML Single Sign-On (SSO) Login into Typo3

1. Setup ADFS SAML as IdP (Identity Provider)

Follow the steps below to configure ADFS SAML as IdP for Typo3

miniorange img Configure ADFS SAML as IdP
  • On ADFS, search for ADFS Management application.
  • Typo3 SSO ADFS SAML SSO Single Sign-On Admin Dashboard
  • Select Relying Party Trust and then Add Relying Party Trust after launching AD FS Management.
  • Typo3 SAML SSO login using ADFS Add Relying Party Trust
  • From the Relying Party Trust Wizard, click the Start button. But first, make sure that Claims aware is selected.
  • login using ADFS, Integration with ADFS SAML SSO Claims Aware
  • Add a relying party trust by selecting the appropriate options.
    • miniorange img Using Metadata URL

      • In Select Data Source: Import data about the relying party from the internet or a local network, and then add the URL to the Federation metadata address. (To obtain the SP Meatadata URL, go to the Service Provider Info tab of the plugin).
      • ADFS SAML SSO, login using ADFS, support for the SAML 2.0 Wizard Metadata
      • Skip step-5 to step-8 & start configuring from step-9.

      miniorange img Using Metadata XML file

      • In Select Data Source: Import data about the relying party from a file option & then browse the metadata file(You can download the SP metadata file from the plugin under the Service Provider Metadata tab).
      •  Typo3 SSO Single Sign-On for Wizard metadata file
      • Skip step-5 to step-8 & start configuring from step-9.

      miniorange img Using Manual configuration

      • In Select Data Source: Enter Data about the relying party manually & Click on Next.
      • Typo3 SAML Single Sign-On SSO SAML 2.0 Wizard Metadata manual
    • Enter Display Name & Click Next.
    • Upload the certificate & Click Next. Download the certificate from the plugin and upload it to ADFS.
    • Select Enable support for the SAML 2.0 WebSSO protocol & Enter ACS URL from the plugins Service Provider Info Tab. Click Next.
    • Typo3 SSO Single Sign-On, login using ADFS for the SAML 2.0 Wizard_Enable SAML
    • Add Entity ID as Relying party trust identifier from the plugin's Service Provider Info Tab, then click Add and Next.
    • Typo3 SSO ADFS SAML SSO, Single Sign-On, login using ADFS,  - Entity ID
    • Also, download the Signing certificate from Service Provider Info Tab from the plugin.
    • Click Next after selecting Permit everyone as an Access Control Policy.
    • Typo3 SAML login using ADFS, permit everyone
    • Click the Next button from Ready to Add Trust and click on the Close button.
    • The list of Relying Party Trusts will be displayed. Click Edit Claim Issuance Policy after selecting the appropriate application.
    • ADFS SAML SSO edit Claim Issuance policy
    • Click on Add Rule button.
    • Typo3 ADFS SAML SSO, login using ADFS add rule
    • Click Next after selecting Send LDAP Attributes as Claims.
    •  ADFS SAML SSO, Single Sign-On, login using ADFS,  LDAP attributes
    • Enter the following details & click on Finish.
    • Claim rule name: Attributes
      Attribute Store: Active Directory
      LDAP Attribute: E-Mail-Addresses
      Outgoing Claim Type: Name ID
      attribute store ADFS SAML Single Sign-On Typo3 SSO
    • Click Apply and then click on Ok button.
    • Select property of the application & add the certificate downloaded from the add-on.
    •  ADFS SAML SSO, Single Sign-On, login using ADFS, add certificate
    • You have successfully configured ADFS as SAML IdP (Identity Provider) for achieving ADFS Single Sign-On (SSO) Login, ensuring secure ADFS Login into Typo3 Site.

    2. Configure Typo3 as SP (Service Provider)

    • In Typo3 SSO extension, go to the SP settings tab and enter Fesaml Plugin Page URL, Response Page URL, ACS URL, Entity ID and all other required details.
    • Typo3 SAML SSO Single Sign-On(SSO) SP settings
    • Now, go to the IdP settings tab of the extension. There are two ways to configure the Typo3 SSO extension.
    • A. By uploading IDP metadata:

    • Enter the Identity Provider Name
    • Click on Upload IDP metadata button.
    • You can either upload a metadata file and click on Upload button or use a metadata URL to fetch the metadata.
    • Typo3 SAML Single Sign-On(SSO) upload metadata

      B. Manual Configuration:

    • Copy SAML Entity ID, SAML Single-Sign-On Endpoint URL and x.509 certificate from Federation Metadata document and paste it in IdP Entity ID or Issuer, Single Sign-on Service URL, x.509 Certificate fields respectively in the extension.
    • IdP Entity ID or Issuer SAML Entity ID obtained from the IdP
      Single Sign-On Service URL SAML Single-Sign-On Endpoint URL obtained from the IdP
      X.509 Certificate x.509 Certificate obtained from the IdP
    • Click on Save button to save all your settings.
    • Typo3 SAML SSO Single Sign-On(SSO) Login in Typo3 Save IdP settings
    • To check if your Typo3 as SP is configured correctly, click the Test Configuration button.
    • Test configuration for typo3 saml SSO extension

    3. Attribute / Custom Mapping (Optional). *This is Premium feature.

    • Attributes are user details that are stored in your Identity Provider.
    • Attribute Mapping helps you to get user attributes from your Identity Provider (IdP) and map them to Typo3 user attributes like firstname, lastname and so on.
    • While auto registering the users in your Typo3 site these attributes will automatically get mapped to your Typo3 user details.
    • Only NameID can be mapped to Typo3 Email and Username characteristics with the free extension. Multiple user attributes from the IdP, on the other hand, can be mapped to Typo3 attributes in the premium version of the extension. You can map custom attributes that you've added to your IdP in addition to the default attributes.
    • When a user performs SSO, the NameID value sent by the IdP will get mapped to the email and the username of the Typo3 user.
    • Login in typo3 attribute mapping typo3 SAML SSO
    • You can check the Test Configuration Results under Service Provider Setup tab to get a better idea of which values to map here.

    4. Group Mapping (Optional). *This is Premium feature.

    • You can specify a default Group in the free extension that will be allocated to all non-admin users when they conduct SSO.
    • Go to Group mapping tab and navigate to Group Mapping section.
    • Select the Default Group and click on the Save button.
    • Typo3 SAML SSO Single Sign-On(SSO) Login in Typo3 - Group mapping

    In this Guide, you have successfully configured ADFS SAML SAML Single Sign-On (ADFS SAML SSO Login) choosing ADFS SAML as IdP and Typo3 as SP using Typo3 SAML Single Sign-On (SSO) extension .This solution ensures that you are ready to roll out secure access to your Typo3 site using ADFS SAML login credentials within minutes.

    Additional Resources


    If you are looking for anything which you cannot find, please drop us an email on info@xecurify.com

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com