Need Help? We are right here!
Thanks for your Enquiry. Our team will soon reach out to you.
If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com
Search Results:
×Configure OneLogin as a SAML Identity Provider (IdP) for Single Sign-On (SSO) into your applications. Users can use their OneLogin credentials to authenticate themselves for multiple applications without the need to sign in again, i.e., by OneLogin SSO.
In this setup, SSO configuration using OneLogin as SAML IDP is explained. Here, OneLogin acts as the Identity Provider (IdP), miniOrange as a broker, and other applications act as Service Providers (SPs). This setup eliminates the need to manage different identities as all information is stored in a unified location. OneLogin SSO, simplifies the integration process and enhances overall security.
Additionally, miniOrange's Identity Broker solution facilitates cross-protocol authentication, allowing the user to authenticate using OneLogin as SAML protocol and obtain access to the application, which supports SAML, OAuth and other protocols. This demonstrates how miniOrange identity brokering enables users to authenticate across different protocols, improving the flexibility and interoperability of SSO solutions.
Follow the easy steps given in this guide to login using OneLogin as IDP.
miniOrange offers free help through a consultation call with our System Engineers to configure SSO for different apps using OneLogin as IDP in your environment with 30-day free trial.
For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.
Mentioned below are steps to configure OneLogin as IDP via SAML and OAuth configuration. Follow the steps accordingly based on your requirement (SAML or OAuth).
Follow the steps to configure OneLogin as IdP by OAuth configuration.
IdP Name | Custom Provider |
IdP Display Name | Choose appropriate Name |
OAuth Authorize Endpoint | https://{your-base-url}/as/authorization.oauth2 | OAuth Access Token Endpoint | https://{your-base-url}/as/token.oauth2 | OAuth Get User Info Endpoint (optional) | https://{your-base-url}/idp/userinfo.oauth2 |
Client ID | From step 1 |
Client secret | From step 1 |
Scope | auto |
If you have already configured your application in miniOrange you can skip the following steps.
Service Provider Name | Choose appropriate name according to your choice |
SP Entity ID or Issuer | Your Application Entity ID |
ACS URL X.509 Certificate (optional) | Your Application Assertion Consumer Service URL |
NameID format | Select urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
Response Signed | Unchecked |
Assertion Signed | Checked |
Encrypted Assertion | Unchecked |
Group policy | Default |
Login Method | Password |
Client Name | Add appropriate Name |
Redirect URL | Get the Redirect-URL from your OAuth Client |
Description | Add if required |
Group Name | Default |
Policy Name | As per your Choice |
Login Method | Password |
Note: Choose the Authorization Endpoint according to the identity source you configure.
https://{mycompany.domainname.com}/moas/idp/openidsso
https://{mycompany.domainname.com}/broker/login/oauth{customerid}
In case you are setting up SSO with Mobile Applications where you can't create an endpoint for Redirect or Callback URL, use below URL.
https://login.xecurify.com/moas/jwt/mobile
Our Other Identity & Access Management Products