This solution allows you to setup Single Sign-On into your application which does not support SAML 2.0 standard, It allows setting up JWT SSO
You can allow your users to Single Sign-On into your application by verifying Identity with your existing SAML 2.0 compliant Identity Provider. This is done using JSON Web Token (JWT) tokens and it can be easily integrated with your application built in any framework or language.
In case you need our help with below integration or sample code for JWT for your language, feel free to reach out at email@example.com
- SAML 2.0 supported Identity Provider (In case you don't have IdP, you can use miniOrange as an Identity Provider)
- Customizations support in your applications to integrate SSO changes below.
This solution can be achieved with an easy setup which includes 2 simple steps,
- Setup your SAML Identity Provider in miniOrange
- Add JWT application and provide SSO link in your application
Step A: Setup your SAML Identity Provider in miniOrange
Configure your Identity Provider settings in miniOrange:
- Login to your miniOrange dashboard
- Go to "Identity Provider" tab and choose "Add Identity Provider" option.
- Select "SAML" tab
- Add configuration details of your IdP with minimum required configuration parameters below.
|IDP Entity ID:
||Entity ID or Issuer of your IdP
|SAML SSO Login URL:
||SSO URL provided by your IdP
||Used to verify that the response from the IdP has not been altered in transit
Configure miniOrange settings in your Identity Provider:
Add configuration details below which will be required by your IdP.
- Service Provider Entity ID / Issuer:
- Assertion Consumption Service (ACS) URL: Find SAML ACS URL option in added Identity Source and choose ACS URL "For SP-Initiated SSO"
- Signing Certificate (Optional): This is required if you want to enable signed SAML AuthN request so than IdP can verify that the contents have not been altered in transit. Download signing certificate with steps below.
- Go to “Identity Providers” tab and find your configured IdP
- Click “Certificate” link to download the certificate.
Step B: Add JWT application and provide SSO link in your application
a. Add JWT application:
- In miniOrange dashboard, you can add JWT application with steps below.
In case you are setting up SSO with Mobile Applications where you can't create an endpoint for Redirect or Callback URL, use below URL.
- Go to Apps > Manage Apps
- Click on "Configure Apps" and select tab "External/JWT"
- Select app "External /JWT App"
- Configure the name for your application and configure Redirect-URL which tells where to send JWT response. Redirect-URL should be an endpoint on your application where you want to achieve SSO.
Copy Client ID of generated application and keep it with you for next steps.
b. Add SSO link on your application:
- You need to replace below values in URL
|customer-id:|| Customer ID of your miniOrange account which can be found under settings menu|
|client-id:||Client Id of JWT application created above|
|redirect-url||Configured Redirect URL against JWT application|
c. Perform SSO:
- Once you have added link above on your application, you can verify SSO setup by clicking a link.
- On successful authentication, you will be redirected to configured Redirect or Callback URL with JWT token
d. Verify JWT token and parse user details for SSO:
On your Callback endpoint, you can read and parse the JWT token.
Structure of JSON Web Token (JWT):
JSON Web Tokens consist of three parts separated by dots (.), which are:
|Header||Contains signature algorithm name used to sign the payload|
|Payload ||Contains user attributes|
|Signature|| Signature value of the payload|
You will need to download a certificate from App > Manage Apps, and clicking Certificate link against your configured application. This certificate will be used for signature validation of JWT response.
Single Logout (SLO):
This is an optional step. If you want to ensure that all sessions (SP and IDP) for a user are properly closed, you can configure Single Logout with steps below.
A. Configure miniOrange with IdP SLO endpoint:
- Go to “Identity Provider” tab and edit the configured Identity Provider
- Find the option “Single Logout URL” and configure SLO URL provided by your IdP.
B. Configure IdP with miniOrange SLO endpoint:
Configure your Identity Provider with below Single logout endpoint.
- You can find “SSO Binding” option to configure logout binding type to either REDIRECT or POST
C. Configure your JWT application with SLO endpoint:
- Configure your JWT application with below Single logout endpoint.
|your-customer-id:|| You have to add your miniOragne account customer ID here|
|redirect-url||This should be replaced with logout URL of your JWT application.|