Search Results :

×

WordPress as IDP

  • Open the WordPress site.
  • Install and activate the Login using WordPress Users ( WP as SAML IDP ) plugin on your WordPress site which is acting as Identity Provider.
  • Go to the WordPress IDP plugin, navigate to the Service Provider tab.
  • Enter the values corresponding to the information from the Service Provider. Refer to the table below.

    Service Provider Name
    Name of your Service Provider.
    SP Entity ID or Issuer Copy and paste the SP-EntityID from the Service Provider.
    ACS URL Copy and paste the ACS URL from the Service Provider.
    NameID Format urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
    Assertion Signed Checked
  • Okta SSO-2
  • Click on the Save button to save your configurations.
  • Go to the IDP Metadata tab. Here you can find information for configuring the Service Provider.
  • You can also download the metadata XML file, by clicking on the download link.
  • wordpress saml upload metadata
  • Open the WordPress site.
  • Install and activate the Login using WordPress Users ( WP as SAML IDP ) plugin on your WordPress site which is acting as Identity Provider.
  • Go to the WordPress IDP plugin navigate to the Service Provider tab.
  • Enter the values corresponding to the information from the Service Provider. Refer to the table below.
    Service Provider Name
    Name of your Service Provider.
    SP Entity ID or Issuer Copy and paste the SP-EntityID from the Service Provider.
    ACS URL Copy and paste the ACS URL from the Service Provider.
    Select Binding type (optional) Select Use HTTP-Redirect Binding for SLO
    Single Logout URL (optional) Enter Single Logout URL given in Service Provider.
    X.509 Certificate (optional) Enter X.509 Certificate.
    NameID Format urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
    Response Signed Checked if you want to sign the SAML Response
    Assertion Signed Checked if you want to sign the SAML Response
    Encrypted Assertion Checked if you want to encrypt the SAML Assertion
    Okta SSO-2
  • Click on the Save button to save your configurations.

Attribute Mapping (optional) :

  • Go to the Attribute/Role mapping tab and navigate to the Attribute mapping section.
  • When the user performs SSO, the NameID value is sent to the Service Provider. This value is
    unique for every user.
  • Okta SSO-2
  • Click on the Save button to save your configuration.

User Attributes (optional) :

  • Go to the Attribute/Role mapping tab and navigate to User Attributes.
  • These are user attributes that can be sent to Service Provider
    (such as first_name and last_name).
  • You can add multiple attributes by click on "+" button.
  • Okta SSO-2
  • Click on the Save button to save your configurations.

Custom Attributes (optional) :

  • Go to the Attribute/Role mapping tab and navigate to Custom Attributes.
  • These are extra static attributes that can be sent to Service Provider.
  • You can add multiple attributes by click on "+" button.
  • Okta SSO-2
  • Click on the Save button to save your configurations.

Role Mapping (optional) :

  • Go to the Attribute/Role mapping tab and navigate to Role Mapping section.
  • User groups are the collection of users having similar access roles and capabilities.
  • To map the Roles in WordPress as user group, please enable this option.
  • You can specify the attribute under which the groups will be passed to the Service Provider.

  • Okta SSO-2
  • Click on the Save button to save your configurations.
  • Go to the IDP Metadata tab. Here you can find information for configuring the Service Provider.
  • You can also download the metadata XML file, by clicking on the download link.
  • wordpress saml upload metadata
Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com