Umbraco SAML Single Sign-On (SSO)
plugin gives the ability to enable SAML Single Sign-On for your Umbraco
applications. Using Single Sign-On you can use only one password to access
your Umbraco application and services. Our plugin is compatible with all the
SAML compliant identity providers. Here we will go through a step-by-step
guide to configure Single Sign-On (SSO) between Umbraco and Salesforce
considering Salesforce as IdP. To know more about the features we provide for
Umbraco SSO, click
here.
Pre-requisites : Download And Installation
-
Download
Umbraco SAML Single Sign-On (SSO) module.
-
For Setting up the module, extract the
umbraco-saml-sso-connector.zip, you will find a DLL file
miniorange-saml-sso.dll, a configuration file saml.config and
a integration.md file which contain the steps for adding the module
into your application.
1. Add module in Umbraco Application
-
Add miniorange-saml-sso.dll in the bin folder (where your other DLL
files exist) for your Umbraco site.
-
Register miniorangesamlsso module for your umbraco SSO according to
the provided steps in the integration.md file.
-
Add the provided configuration file saml.config in the root directory
for your umbraco site.
-
After integration open browser and browse the module dashboard with URL
below:
https://<umbraco-base-url>/?ssoaction=config
-
If it pops up the registration page or login page, you have successfully
added the miniOrange saml sso module for your application.
- Register or Login for configuring the module.
2. Configure Salesforce as IDP
There are below two ways with which you can get the SAML SP metadata to
configure on your identity provider end.
A] Using SAML metadata URL or metadata file:
-
Under the Service Provider Settings section, you can find the metadata URL
as well as the option to download the SAML metadata
-
Copy metadata URL or download metadata file to configure the same on your
identity provider end.
-
You can refer to the below screenshot:
B] Uploading metadata manually:
-
From the Service Provider Settings section, you can copy the service
provider metadata manually like SP Entity ID, ACS Url, Single Logout Url,
and provide it to your identity provider for configuration.
-
You can refer to the below screenshot:
-
Log into your
Salesforce
account as admin.
-
Switch to Salesforce Lightning mode from profile menu and
then go to the Setup page by clicking on setup button.

-
From the left pane, select Settings Tab and click on
Identity Provider.

- Click on Enable Identity Provider.
-
In the Service Provider section, click on the link to
create the Service Provider using
Connected Apps.

-
Enter Connected App Name, API Name and
Contact Email.
Connected App Name |
Provide a name for Connected App |
API Name |
Provide a API name |
Contact Email |
Provide a Contact Email |

-
Under the Web App Settings, check the
Enable SAML checkbox and enter the following values:
Enable SAML |
Checked |
Entity ID |
SP-EntityID / Issuer from
Service Provider Metadata tab of the Plugin
|
ACS URL |
ACS (AssertionConsumerService) URL from
Service Provider Metadata tab of the Plugin
|
Subject Type |
Username |
Name ID Format |
urn:oasis:names:tc:SAML:2.0:nameid-format:unspecified |
- Click on Save to save the configuration.
-
Now from the left pane, under Platform Tools section select
Connected Apps.
-
Then select Manage Connected Apps and click on the app you
just created.

-
In the Profiles section click
Manage Profiles button.
-
Assign the Profiles you want to give access to log in
through this app.

-
Under SAML Login Information, click on
Download Metadata.

-
Keep this metadata handy for configuring the
Service Provider.
You have successfully configured Salesforce as SAML IdP (Identity Provider)
for achieving Salesforce SSO login into your Umbraco application.
3. Configure Umbraco as SP
There are below two ways with which you can configure your SAML identity
provider metadata in the module.
A] Upload metadata using the Upload IDP Metadata button:
-
If your identity provider has provided you with the metadata URL or metadata
file (.xml format only) then you simply configure the identity provider
metadata in the module using the
Upload IdP Metadata option.
-
You can refer to the below screenshot
-
You can choose any one of the options according to the metadata format you
are available with.
B] Configure the identity provider metadata manually:
-
After configuring your Identity Provider, it will provide you with
IDP Entity ID, IDP Single Sign On URL and x.509 Certificate.
Configure these values under IDP Entity ID, Single Sign-On Url and
SAML X509 Certificate fields respectively.
- Click Save to save your IDP details.
4. Test Configuration
-
Click on Test Configuration button to test whether the SAML
configuration you’ve done is correct or not.
- The below screenshot shows a successful result.
5. Attribute Mapping
-
Map your umbraco attributes with the Identity Provider (IdP) attributes.
- Click on Save Attribute Mapping button to save the settings.
6. Login Settings
-
Use the following URL as a link in your Umbraco site from where you want to
initiate SSO:
https://umbraco-base-url/?ssoaction=login
-
For example you can use it as:
<a
href="https://umbraco-base-url/?ssoaction=login”>Login</a>"
7. Logout Settings
-
Use the following URL as a link in your Umbraco from where you want to
perform SLO:
https://umbraco-base-url/?ssoaction=logout
-
For example you can use it as:
<a
href="https://umbraco-base-url/?ssoaction=logout”>Logout</a>"
You can configure the Umbraco SAML 2.0 Single Sign-On (SSO) module with any
Identity Providers such as
ADFS, Azure AD, Bitium, Centrify, G Suite, JBoss Keycloak, Okta, OneLogin,
WordPress, AWS Cognito, OpenAM, Oracle, PingFederate, PingOne, RSA SecureID,
Shibboleth-2, Shibboleth-3, SimpleSAML, WSO2
or even with your own custom identity provider. Check the list of identity
providers
here.
8. Additional Resources
Need Help?
Not able to find your identity provider? Mail us on
umbracosupport@xecurify.com
and we'll help you set up SSO with your IDP and for quick guidance (via
email/meeting) on your requirement and our team will help you to select the
best suitable solution/plan as per your requirement.