Web Development https://tigosoftware.com/index.php/ en Integrate Magento SSO with your Web https://tigosoftware.com/index.php/integrate-magento-sso-your-web <span class="field field--name-title field--type-string field--label-hidden">Integrate Magento SSO with your Web</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><a title="View user profile." href="/index.php/user/1" lang="" about="/index.php/user/1" typeof="schema:Person" property="schema:name" datatype="" class="username">admin</a></span> <span class="field field--name-created field--type-created field--label-hidden">Sun, 09/19/2021 - 11:07</span> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><strong>Magento 2 SSO or Magento 2 Single Sign-On </strong>module allows the integration of the Magento store with third-party applications. The user can sign-in to the third-party applications through their Magento 2 sign-up credentials.</p> <p>Using Magento 2 Single Sign-On, the admin can easily integrate multiple clients for Single Sign-On using their Magento credentials. The admin can also integrate the UVdesk support portal with the user’s Magento store.</p> <h3 id="features-of-magento-2-sso">Features Of Magento 2 SSO</h3> <ul><li>The admin can allow the users to log-in to third-party applications by their Magento credentials.</li> <li>There is no need for the user to remember multiple login access of other portals like support portal.</li> <li>A user can sign in automatically on a third-party application.</li> <li>The admin can easily integrate multiple clients for client Single Sign-On login.</li> <li>It is easy for the admin to manage (add/view/edit/delete) all the SSO integrations.</li> <li>It helps the admin to integrate the UVdesk support portal with the Magento store.</li> <li>The admin’s UVdesk support portal can be integrated with his Magento Store.</li> <li>It supports the LDAP server integration for Single Sign-On.</li> <li>It also helps synchronize the newly created customers on Magento2 store with LDAP server.</li> </ul><h3 id="installation-of-magento-2-sso">Installation Of Magento 2 SSO</h3> <p>The user will get a <strong>zip folder</strong> and they have to extract the contents of this zip folder on their system. This folder has an <strong>src</strong> folder and inside the <strong>src</strong> folder, there is an <strong>app </strong>folder.</p> <p>User needs to transfer this <strong>app</strong> folder into the Magento2 root directory on the server as shown below.</p> <p><a href="http://cdnblog.webkul.com/blog/wp-content/uploads/2016/09/Move-app-folder-2.png"><img alt="Magento 2 SSO Installation " src="http://cdnblog.webkul.com/blog/wp-content/uploads/2016/09/Move-app-folder-2.png" /></a></p> <p>Thereafter, the user has to <strong>run</strong> the <strong>commands </strong><strong>mentioned </strong><strong>below</strong> in the <strong>Magento2 root</strong> directory:</p> <p><strong>First command</strong> – php bin/magento setup:upgrade<br /><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/06/command1-upgrade-3.png"><img alt="Run command" height="132" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/06/command1-upgrade-3.png" width="601" /></a></p> <p><strong>Second Command – </strong>php bin/magento setup:di:compile<br /><img alt="Run command" height="132" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/06/command2-compile-2.png" width="601" /></p> <p><strong>Third Command – </strong>php bin/magento setup:static-content:deploy<br /><img alt="Magento 2 SSO" height="132" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/06/command3-deploy-1.png" width="601" /></p> <p><strong>Fourth Command </strong>– composer require firebase/php-jwt</p> <p>After moving the <strong>app</strong> folder the user has to flush the cache from the Magento admin panel by navigating through<strong>-&gt;System-&gt;Cache management</strong> as shown below.</p> <p><a href="http://cdnblog.webkul.com/blog/wp-content/uploads/2016/09/Flush-Cache.png"><img alt="Installation Of Magento 2 SSO" height="548" src="http://cdnblog.webkul.com/blog/wp-content/uploads/2016/09/Flush-Cache.png" width="1247" /></a></p> <p> </p> <p><strong>Note</strong>: One must install and enable the PHP Extension LDAP in order to use the LDAP feature in Magento 2 SSO.</p> <h2>LDAP Configuration</h2> <p> </p> <p>Firstly, the user will have to authenticate with the Magento2 LDAP Server.</p> <p><img alt="phpLDAPadmin-1-2-2-1-1" height="707" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/phpLDAPadmin-1-2-2-1-1.png" width="1920" /></p> <p>On logging in to the LDAP admin page, the Login DN and Password is to be provided as shown in the image below and click <strong>Authenticate.</strong></p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-ldap-server-1.png"><img alt="Magento 2 SSO" height="284" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-ldap-server-1.png" width="800" /></a></p> <p>Simply, click <strong>Create new entry here </strong>to create an organisational unit as shown below.</p> <p><img alt="phpLDAPadmin-1" height="943" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/phpLDAPadmin-1.png" width="1920" /></p> <p>Right after, it a page will load up with listed templates. the user needs to select the <strong>Organisational Unit </strong>checkbox.</p> <p><img alt="phpLDAPadmin-1-2-2-organisational-unit-1" height="943" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/phpLDAPadmin-1-2-2-organisational-unit-1.png" width="1898" /></p> <p>Further, you need to enter the name of the organisational unit and click <strong>Create Object.</strong></p> <p><img alt="phpLDAPadmin-1-2-2-1-2" height="609" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/phpLDAPadmin-1-2-2-1-2.png" width="1898" /></p> <p>The <strong>Create LDAP Entry </strong>page will open simply click on the <strong>Commit </strong>and proceed.</p> <p><img alt="phpLDAPadmin" height="624" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/phpLDAPadmin.png" width="1920" /></p> <p><strong>Note: </strong></p> <ul><li>The created organisational unit here at the LDAP server needs to be entered in the admin configuration section.</li> <li>Since the LDAP server is synchronized with the Magento 2 module. Using this we can also create a customer here and that customer will be directly able to log in to the used integration.</li> <li>If the synchronization is turned on the customer created at the admin backend will be visible here as well.</li> </ul><p><img alt="phpLDAP" height="943" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/phpLDAP.png" width="1920" /></p> <p> </p> <p>The user can navigate through <strong>Stores &gt; Sso Connector &gt; LDAP Configuration </strong>so as to set the configurations of the LDAP as shown in the image below.</p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-ldap-configuration-2.png"><img alt="Magento 2 SSO" height="601" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-ldap-configuration-2.png" width="800" /></a></p> <p>The admin can set the configurations for the LDAP as follows:</p> <p><strong>Enabled:</strong> The admin can enable or disable Single Sign-On through the LDAP server.</p> <p><strong>Customer Synchronization:</strong> The admin can enable or disable the customer synchronization of newly created customers on Magento 2 store with the LDAP server.</p> <p><strong>Server IP:</strong> The admin needs to add the IP of the server.</p> <p><strong>Port: </strong>The port number is to be added by the admin.</p> <p><strong>Organizational Unit: </strong>The created organisational unit at the LDAP server needs to be entered here in this section.</p> <p><strong>Domain Component: </strong>It is retrieved from the LDAP admin page.</p> <p><strong>Admin User: </strong>We need to enter the LDAP User name over here.</p> <p><strong>Password: </strong>Add the password for the Admin User.</p> <h3 id="admin-magento-2-sso-integration-management">Admin Magento 2 SSO Integration Management</h3> <p>The admin can manage multiple integrations by simply adding/editing/deleting the integration. The admin can add new integrations by navigating through <strong>Admin Login -&gt; SSO </strong>in the admin panel.</p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-add-new-integration-2.png"><img alt="Magento 2 SSO" height="361" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-add-new-integration-2.png" width="800" /></a></p> <p>The configurations are set by the admin as follows:</p> <ul><li><strong>Add New Integration: </strong>On clicking the “Add New Integration” tab the admin can create a new integration.</li> <li><strong>View</strong> the integrations along with the details such as the <strong>Name</strong> of the client and the <strong>URL</strong>.</li> <li>Edit an integration by clicking the “<strong>Edit</strong>” button in the Action column.</li> </ul><h3 id="configuring-a-new-integration">Configuring a New Integration</h3> <p>The admin can add new integration by navigating through <strong>SSO -&gt; Add New Integration.</strong></p> <p>On the New Integration page, the admin can configure the <strong>Client Details</strong> and the <strong>Client Credentials</strong>.</p> <p>The admin can configure the ‘Name’ and the ‘Url’ against the <strong>Client Details</strong> tab as shown in the image below.</p> <p>The admin can configure the following details:</p> <ul><li><strong>Name – </strong> The name of the client who can log in using the Magento 2 credentials.</li> <li><strong>Url – </strong>URL link of the website for SSO integration. If the client cancels the authorization process, it redirects the client to this URL.</li> </ul><p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-SSO-client-details-5.png"><img alt="Magento 2 SSO" height="361" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-SSO-client-details-5.png" width="800" /></a></p> <p>As soon as the admin clicks on the “Save” button, it saves the details of the client and generates the credentials, automatically.</p> <p>The admin can view the ‘Consumer Id’ and the ‘Consumer Secret Key’ credentials under the <strong>Client Credentials</strong> tab as shown in the image below.</p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-client-credentials.png"><img alt="magento 2 sso" height="365" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-client-credentials.png" width="800" /></a></p> <ul><li>The admin can simply <strong>“Edit” </strong>the integration and <strong>“View”</strong> it. If need be, the admin can make changes in the integration and save it, or even delete the integration.</li> </ul><h3 id="uvdesk-support-portal-integration">UVdesk Support Portal Integration</h3> <p><strong>Please Note:</strong> To integrate the Magento store with UVdesk the admin must have a <strong>UVdesk</strong> admin account. The admin can <a href="https://uvdesk.com/en/member/signup?utm_source=https://www.google.co.in/&amp;utm_medium=website&amp;utm_content=content">Sign up</a> for free at UVdesk to have the UVdesk admin account.</p> <p>Benefits Of UVdesk Support Portal Integration For SSO</p> <ul><li>The admin can integrate the UVdesk support portal with the Magento Store.</li> <li>The admin’s users can log-in to the UVdesk support portal via Magento login credentials.</li> <li>The users will be automatically signed-in to the UVdesk support portal of the client.</li> <li>After logging in using the Magento credentials, the user can create a ticket for any support query from the UVdesk portal.</li> </ul><p><strong>Please Note:</strong> Download Magento 2 SSO (of UVdesk) for free from the UVdesk admin panel. Click <a href="https://support.uvdesk.com/en/blog/uvdesk-magento-2-single-sign-on">here</a> to learn about Magento 2 SSO (of UVdesk) installation and configuration.</p> <p>UVdesk Integration At Magento 2 Admin Panel</p> <p>The admin can add integration for UVdesk by navigating through <strong>SSO -&gt; Add New Integration -&gt; </strong><strong>Client Details.</strong></p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-SSO-client-details-6.png"><img alt="Magento 2 SSO" height="361" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-SSO-client-details-6.png" width="800" /></a></p> <p> </p> <ul><li><strong>Name – </strong> The name of the user for which the admin shall create the SSO integration.</li> <li><strong>URL – </strong>Add the link of the UVdesk support portal of the admin and save the configurations thereafter.</li> </ul><p>The admin can use the Consumer Id at UVdesk admin panel for configuring the Magento 2 SSO under <strong>SSO -&gt; Add New Integration -&gt; Edit </strong>(required integration)<strong> -&gt; </strong><strong>Client Credentials -&gt; Consumer Id.</strong><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-client-credentials-1.png"><img alt="magento2 sso" height="365" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-client-credentials-1.png" width="800" /></a></p> <p> </p> <p>UVdesk Magento 2 SSO Configuration</p> <p>The admin will have to configure the Magento 2 SSO at UVdesk admin panel.</p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/09/Magento-2-Sso-App-jpg-1301%C3%97629.jpg"><img alt="uvdesk configure sso" height="605" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/09/Magento-2-Sso-App-jpg-1301%C3%97629.jpg" width="1301" /></a></p> <ul><li><strong>Store Name</strong> of the Magento 2.</li> <li><strong>Consumer Id</strong> which was created at Magento 2 admin panel.</li> <li><strong>Consumer Secret Key</strong> which was created at Magento 2 admin panel.</li> <li><strong>Website URL</strong> of the Magento 2 store login.</li> </ul><p>Front View For The Users</p> <p>After the successful integration of UVdesk to the Magento 2, the user will see an option of “<strong>Continue with Magento 2 User</strong>“. By this option, the user can sign-in to the UVdesk support portal of the admin.</p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-customer-login.png"><img alt="magento2 sso" height="418" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-customer-login.png" width="800" /></a></p> <p>After clicking the “<strong>Continue with Magento 2 User</strong>” button the user will be redirected to <strong>Magento</strong> <strong>store</strong> login.</p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/09/Sign_In-1.png"><img alt="sso front view users magento store login " height="470" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/09/Sign_In-1.png" width="549" /></a></p> <p>Tapping the <strong>Sign In</strong> button brings up the section where the user needs to provide the <strong>authorization</strong> for accessing the profile as shown below in the snapshot.<a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-permission-tab.png"><img alt="magento2 sso" height="463" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-permission-tab.png" width="800" /></a></p> <p>Tapping the respective “<strong>Continue as Demo</strong>” button will redirect the user to the UVdesk portal.</p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-uv-desk-portal.png"><img alt="magento2 sso" height="304" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-uv-desk-portal.png" width="800" /></a>The user may choose to click on the <strong>“Cancel”</strong> tab as shown in the image below. </p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-cancel-login.png"><img alt="magento2 sso" height="541" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-cancel-login.png" width="800" /></a></p> <p>As the user clicks on the <strong>“Cancel”</strong> tab, it redirects the user to the <strong>Sign In</strong> page as shown in the image below.<br /><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-sign-in-page-redirect.png"><img alt="magento2 sso" height="417" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2019/01/webkul-magento2-sso-sign-in-page-redirect.png" width="800" /></a></p> <p> </p> <h3 id="third-party-integration-like-asp-net-java-php-etc">Third-party integration like (asp.net, Java, PHP, etc.)</h3> <p>Follow the below steps to integrate the Magento 2 SSO with third-party integration like asp.net, Java, PHP, etc.</p> <p><strong>1.) </strong>Create a button at the client end (like asp.net) to login from Magento. After hitting that button redirect to the following URL.</p> <p><strong>API to get the token</strong></p> <p>API Resource :</p> <p>magentobaseurl/sso/sso/index/redirect_uri/#value/client_id/#value</p> <p>Method: GET</p> <p>Response: redirecturl?token=#tokenval</p> <p>Description: get the token</p> <p><strong>Note:</strong> that redirect_uri and client_id is mandatory field append to URL</p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/09/webkul-magento2-sso-button-display.png"><img alt="Button Display" height="514" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/09/webkul-magento2-sso-button-display.png" width="707" /></a></p> <p><strong>2.)</strong> After that, at the API end(Magento end) client id will verify that the client is registered at the Magento end or not? If the customer is registered then a login page will appear to log in.</p> <p>After login, a page appears with authorizing and cancel button. If authorized then a token will be provided and append in the redirect URL. But if the client is already login with some account then a page appears with authorizing and cancel button.</p> <p>If the client is not authorized then an error message will be shown or the user cancels to authorize then it redirects to the redirect URL.</p> <p><a href="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/09/webkul-magento2-sso-authorize-cancel.png"><img alt="Authorize or Cancel" height="406" src="https://cdnblog.webkul.com/blog/wp-content/uploads/2017/09/webkul-magento2-sso-authorize-cancel.png" width="831" /></a></p> <p><strong>3.)</strong>After that client will hit again the Magento SSO module API with the provided token and client id</p> <p><strong>API to get the Magento user email information</strong></p> <p>API Resource :</p> <p>magentobaseurl/sso/sso/accesscustomerdata/client_id/#value/authToken/#value</p> <p>Method: GET</p> <p>Response: JWT encoded string or Array(with error key)</p> <p>Description: get the user email information</p> <p>if client_id and auth token verified we send the customer email and name with the expiration of 2 minutes encoded by JWT using client secret key else error will be provided in $response[‘error] form</p> <p>The client has to decode the data using JWT via the client secret key generated at Magento end with a success or error field.</p> <p><strong>API to check the detail entered at the client end (UVdesk, asp.net) correct or not</strong></p> <p>API Resource :</p> <p>magentobaseurl/sso/sso/checkcredential/client_id/#value/client_secret_key/#value</p> <p>Method: GET</p> <p>Response: Array</p> <p>Description: check the detail entered at the client end is correct?</p> <p>That’s all for <strong>Magento 2 SSO</strong> module. If you still have any issue feel free to add a ticket and let us know your views to make the module better at<a href="http://www.webkul.uvdesk.com/"> webkul.uvdesk.com.</a></p> <p>Current Product Version - 4.0.0</p> <p>Supported Framework Version - Magento 2.0.x, 2.1.x, 2.2.x,2.3.x, 2.4.x</p> </div> <div class="field field--name-field-blog-category field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Category</div> <div class="field__item"><a href="/index.php/taxonomy/term/135" hreflang="en">Web Development</a></div> </div> <div class="field field--name-field-tags field--type-entity-reference field--label-inline clearfix"> <h3 class="field__label inline">Tags</h3> <ul class="links field__items"> <li><a href="/index.php/taxonomy/term/234" hreflang="en">Magento</a></li> </ul> </div> <section class="field field--name-comment field--type-comment field--label-above comment-wrapper"> </section> Sun, 19 Sep 2021 04:07:03 +0000 admin 646 at https://tigosoftware.com https://tigosoftware.com/index.php/integrate-magento-sso-your-web#comments How to set up SAML SSO with Google apps https://tigosoftware.com/index.php/how-set-saml-sso-google-apps <span class="field field--name-title field--type-string field--label-hidden">How to set up SAML SSO with Google apps</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><a title="View user profile." href="/index.php/user/1" lang="" about="/index.php/user/1" typeof="schema:Person" property="schema:name" datatype="" class="username">admin</a></span> <span class="field field--name-created field--type-created field--label-hidden">Sat, 09/18/2021 - 22:36</span> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>The Robin Team</p> <p><img alt="" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284ed4fae4c1bf8_5f19a268b7c9d34679ff038b_saml-app-location-google.png" width="522" /></p> <p><strong>Setting up your Robin account? You’ll find the most up-to-date information in our </strong><a href="https://support.robinpowered.com/hc/en-us"><strong>Help Center</strong></a><strong>.</strong></p> <p><strong>‍</strong>As of October 2015, <a href="http://googleforwork.blogspot.com/2015/10/Google-Apps-expands-identity-services-with-SAML-and-OIDC-to-connect-apps-securely.html">Google Apps can now act as a SAML Identity Provider</a>. This is great news for organizations that haven't implemented SAML yet, because you can set up basic single sign-on authentication without introducing a third party service such as Okta or OneLogin.This guide will show you the basics of setting up a new SAML app for your Google Apps domain. The walkthrough below shows the process of setting up Google as the identity provider, and your service provider (i.e. the app you want people to sign into) will have its own instructions.  </p> <p><img alt="SAML Google apps in office design" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284edb9624c18c4_5f19a24abea6e14f5be09a4e_Guide-CTA.png" /></p> <h2>Where to find SAML Apps in Google</h2> <p>As an administrator on your Google account, go to the admin portal and click through to <strong>Apps &gt; SAML Apps</strong>.</p> <p><img alt="SAML App setup in Google Apps" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284ed4fae4c1bf8_5f19a268b7c9d34679ff038b_saml-app-location-google.png" /></p> <p>You will see a list of any existing SAML apps. Click the big plus sign in the bottom right to add a new one.</p> <h2>Add a new service app</h2> <p>Click "Setup my own custom app" near the bottom of the window.</p> <p><img alt="SAML app list" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284ed9b354c1bd6_5f19a269bea624287d7e25d4_saml-app-list-google.png" /></p> <h3>Google IDP Information</h3> <p><img alt="IDP info for Google SAML" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284eddaf54c1bd0_5f19a268866be8cbc3b3d3bd_idp-info-google-saml.png" /></p> <p>You'll then see your specific Identity Provider information. You will need the info in Option 1 to configure your service provider in a moment. Open a new browser window so you can keep both handy.</p> <h3>Basic App Information</h3> <p>Add some descriptive information about the new SAML app. This is used to identify the app for everyone on your Google Apps domain.</p> <p><img alt="Basic app information for Google SAML" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284ed52ca4c1bdb_5f19a26805a5427e86f6279e_customize-saml-app-info.png" /></p> <h3>Attribute Mapping</h3> <p>In the final step, you will need to map metadata attributes to your Google Apps users. They are case sensitive, and tell the service provider which fields to use for user data. Example:</p> <ul><li> <strong>Email</strong>: Basic Information &gt; Primary Email</li> <li> <strong>FirstName</strong>: Basic Information &gt; First Name</li> <li> <strong>LastName</strong>: Basic Information &gt; Last Name</li> </ul><p><img alt="SAML Attribute map" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284ed305d4c1bd9_5f19a269b8b71d8ddfd52e05_robin-saml-attribute-map-google.png" /></p> <h2>Adding your IDP to a service app</h2> <p>Now that you've added your service provider to your identity provider, you'll want to complete the connection by configuring your service provider directly. Most service providers want to know your Entity ID and SSO URL, but your service provider's documentation will have more information.</p> <h2>Enable the app for everyone</h2> <p>Once the app is configured, it will not work until you turn it on for your domain. You can turn in on for everyone in your organization or for specific organizations.</p> <p><img alt="Turn on SAML app in Google" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284ed514e4c1b68_5f19a269a682bb32e3796bab_turn-on-robin-saml-app-google.png" /></p> <p>When turned on, your new app will show up in everyone's app dropdown along with existing SAML apps. You may need to click "More" first to see the complete list of available apps. Clicking on this link starts an IDP-initiated workflow, and will open your app with the current user authenticated.</p> <p><img alt="SAML app in Google dropdown" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284edcaf04c1bd5_5f19a268f75cb5d4637e8c29_robin-in-google-apps.png" /></p> <h2>Sample Workflow</h2> <p><img alt="Sample SAML Authentication Workflow" src="https://assets-global.website-files.com/5ff621612284ed73d44c11f3/5ff621612284ed24204c1bd2_5f19a269996e1b4f9297c12a_robin-saml-flow-with-google-apps.gif" /></p> <p>Via robinpowered</p> </div> <div class="field field--name-field-blog-category field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Category</div> <div class="field__item"><a href="/index.php/taxonomy/term/135" hreflang="en">Web Development</a></div> </div> <div class="field field--name-field-tags field--type-entity-reference field--label-inline clearfix"> <h3 class="field__label inline">Tags</h3> <ul class="links field__items"> <li><a href="/index.php/taxonomy/term/220" hreflang="en">SSO</a></li> </ul> </div> <section class="field field--name-comment field--type-comment field--label-above comment-wrapper"> </section> Sat, 18 Sep 2021 15:36:46 +0000 admin 634 at https://tigosoftware.com What is ASP.NET Boilerplate? https://tigosoftware.com/index.php/what-aspnet-boilerplate <span class="field field--name-title field--type-string field--label-hidden">What is ASP.NET Boilerplate?</span> <span class="field field--name-uid field--type-entity-reference field--label-hidden"><a title="View user profile." href="/index.php/user/1" lang="" about="/index.php/user/1" typeof="schema:Person" property="schema:name" datatype="" class="username">admin</a></span> <span class="field field--name-created field--type-created field--label-hidden">Sun, 08/29/2021 - 14:05</span> <div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>This is a simple startup template based on ASP.NET Boilerplate framework and Module Zero. If you need an enterprise startup project, check <a href="http://aspnetzero.com/?ref=abptmpl">ASP.NET ZERO </a>.</p> <h3>What is ASP.NET Boilerplate?</h3> <p>ASP.NET Boilerplate is an application framework built on latest <strong>ASP.NET Core</strong> framework. It makes easy to use authorization, dependency injection, validation, exception handling, localization, logging, caching, background jobs and so on. It's built on already familiar tools like Entity Framework, AutoMapper, Castle Windsor...</p> <p>ASP.NET Boilerplate implements <strong>NLayer architecture</strong> (Domain, Application, Infrastructure and Presentation Layers) and <strong>Domain Driven Design</strong> (Entities, Repositories, Domain/Application Services, DTO's...). Also implements and provides a good infrastructure to implement common software development <strong>best practices</strong>.</p> <p><img src="https://i.imgur.com/cO2LMns.png" /></p> <h3>What is Module Zero?</h3> <p>ASP.NET Boilerplate framework is designed to be independent of any database schema and to be as generic as possible. Therefore, It leaves some concepts <strong>abstract</strong> and <strong>optional</strong> (like audit logging, permission and setting stores) which requires some <strong>data store</strong>.</p> <p><strong>Module Zero </strong>implements all fundamental concepts of ASP.NET Boilerplate framework such as <a href="http://www.aspnetboilerplate.com/Pages/Documents/Zero/Tenant-Management">tenant management</a> (<strong>multi-tenancy</strong>), <a href="http://www.aspnetboilerplate.com/Pages/Documents/Zero/Role-Management">role management </a>, <a href="http://www.aspnetboilerplate.com/Pages/Documents/Zero/User-Management">user management</a>, <a href="http://www.aspnetboilerplate.com/Pages/Documents/Authorization">authorization</a> (<a href="http://www.aspnetboilerplate.com/Pages/Documents/Zero/Permission-Management"> permission management </a>), <a href="http://www.aspnetboilerplate.com/Pages/Documents/Setting-Management">setting management</a>, <a href="http://www.aspnetboilerplate.com/Pages/Documents/Zero/Language-Management">language management </a>, <a href="http://www.aspnetboilerplate.com/Pages/Documents/Audit-Logging">audit logging</a> and so on.</p> <p>Module-Zero defines entities and implements <strong>domain logic</strong> (domain layer) and leaves application and presentation layers to you.</p> <h4>Based on Microsoft ASP.NET Core Identity</h4> <p>Module Zero is based on Microsoft's <a href="https://docs.microsoft.com/en-us/aspnet/core/security/authentication/identity">ASP.NET Core Identity</a> library. It extends user and role managers and implements user and role stores using generic repositories.</p> <h3>Documentation</h3> <ul><li><a href="https://www.aspnetboilerplate.com/Pages/Documents/Zero/Startup-Template-Core">Documentation for this template</a></li> <li><a href="http://www.aspnetboilerplate.com/Pages/Documents">ASP.NET Boilerplate documentation</a></li> </ul><h3>Source code</h3> <p>This template is developed open source on Github. You can contribute to the template. <a href="https://github.com/aspnetboilerplate/module-zero-core-template">https://github.com/aspnetboilerplate/module-zero-core-template</a></p> </div> <div class="field field--name-field-blog-category field--type-entity-reference field--label-inline clearfix"> <div class="field__label">Category</div> <div class="field__item"><a href="/index.php/taxonomy/term/135" hreflang="en">Web Development</a></div> </div> <div class="field field--name-field-tags field--type-entity-reference field--label-inline clearfix"> <h3 class="field__label inline">Tags</h3> <ul class="links field__items"> <li><a href="/index.php/taxonomy/term/221" hreflang="en">.NET</a></li> <li><a href="/index.php/taxonomy/term/222" hreflang="en">.NET Core</a></li> <li><a href="/index.php/taxonomy/term/118" hreflang="en">ASP.NET Boilerplate</a></li> </ul> </div> <section class="field field--name-comment field--type-comment field--label-above comment-wrapper"> </section> Sun, 29 Aug 2021 07:05:08 +0000 admin 595 at https://tigosoftware.com