Have your user data stored in an application which supports only Magento API Authentication ? Looking for a Single Sign-On solution to let your users login using Magento? Don't want the hassle of developing, maintaining and
integrating with your application? miniOrange has the answer for all your queries. miniOrange will help you to implement SSO via the existing Magento API, where miniOrange will act as a broker to verify users identity.
First configure Magento (version 2.0 and up) site as an authentication source and Single Sign-On(SSO) into any other application. You don't need to worry about protocols supported by your application. miniOrange supports OAuth, SAML and JWT all types of protocols to provide magento as Identity Provider service. By performing the given steps you will be able to login to magento as identity provider easily. You can also integrate multiple IDP's (Identity Providers) to increase options for your end-users.
You can configure your Magento ( version 1.5-1.9 ) site as an authentication source and Single Sign-On (SSO) into any other application.
Here are the steps on how to configure Magento as an authentication source:
You can configure your Magento ( version 2.0 and up ) site as an authentication source and Single Sign-On into any other application.
Here we are the steps on how to configure Magento as an authentication source:
|<Your miniOrange Email>|
|Identity Link URL||https://www.miniorange.com (Optional)|
|Your Password||<Your Admin Password>|
|Service Provider Name||Choose appropriate name according to your choice|
|SP Entity ID or Issuer||Your Application Entity ID|
|ACS URL X.509 Certificate (optional)||Your Application Assertion Consumer Service URL|
|NameID Format||Select urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress|
|Client Name||Add appropriate Name|
|Redirect URL||Get the Redirect-URL from your OAuth Client|
|Descrption||Add if required|
|Policy Name||As per your Choice|
Note: Choose the Authorization Endpoint according to the identity source you configure.
In case you are setting up SSO with Mobile Applications where you can't create an endpoint for Redirect or Callback URL, use below URL.
You also have a choice to set multiple IDPS for Single Application. And there are three ways to represent them :
Note :At once you can select either of them.
Few usecases where customers configure multiple IDPs -
|For Cloud IDP -||https://login.xecurify.com/moas/discovery?customerId=<customer_id>|
|For On-Premise IDP -||https://yourdomain.com/discovery?customerId=<customer_id>|
You can see the screenshot below of the IDP Selection Page with a list of IDPs .
Note: To view the IDP in drop-down list ,go to Identity Providers tab > against your configured IDP > Select >Edit , here Enable the Show IdP to Users option.
If you have multiple IDPs and you want a certain set of users to authenticate from one IdP whereas another set of users to authenticate from another IdP, based on their email domains then you can achieve this by using the following steps:- Our domain mapping feature
For your reference , Azure AD and Okta is being used as two different IDPs and WordPress is being used as SP. Follow the guides to set up Okta and WordPress at your end.
If you have multiple IDPs (identity provider) and you want a certain application user to authenticate with one IDP and other application users with another IDP then you can achieve this by our Identity Source Feature.