Search Results :

×

PHP SAML 2.0 CONNECTOR

PHP SAML 2.0 CONNECTOR

miniOrange PHP SAML 2.0 Connector acts as a SAML Service Provider which can be configured to establish the trust between the PHP application and a SAML capable Identity Provider to securely authenticate the users into your application.

Slider

Key Features

Signed Response and assertion

Configure Signed Response and assertion to determine whether SAML authentication response message is digitally signed by the IDP

Encryption

Choose whether the SAML assertion is encrypted or not. Encryption ensures that only the sender and receiver can understand the assertion

Configurable SP base URL

You can provide custom SP base URL depending upon your Service Provider Configuration.

Auto-redirect to your application after SSO

The admin can provide an application URL, which will be used as a redirect URL after logging in.

Attribute Mapping

Map users attribute to session variables, which can be retrieved and used at the application endpoint.

Single Logout

You can logout of all your applications by a single click

You can configure the miniOrange PHP SAML 2.0 Connector with any Identity Provider.Some of them are listed below

Azure AD

Azure AD B2C

Okta

ADFS

Google Apps

Salesforce

Auth0

One Login

KeyCloak

miniOrange

Shibboleth

PingFederate

Oracle

Centrify

AuthAnvil

Bitium

CA Identity

OpenAM

PingOne

RSA SecureID

SimpleSAML

WSO2

Can't find your IDP ? Contact us on [email protected]. We'll help you set it up in no time.

Licensing Plan

  • CHOOSE YOUR
    PLAN
  • Unlimited Authentications
  • Configurable SAML request binding type
  • Signed Response and Assertion
  • Custom Application URL
  • Configurable Sp base url
  • Auto-redirection
  • Pre-configured IDPs
  • Attribute Mapping
  • Single Logout

Description

miniOrange PHP SAML 2.0 Connector acts as a SAML Service Provider which can be configured to establish the trust between the connector and a SAML capable Identity Provider to securely authenticate the users into your application.
The connector uses the SAML protocol for exchanging authentication and authorization data with the Identity Provider.

Steps to Configure the PHP SAML 2.0 Connector

miniorange img Step 1: Download and Setup the connector on your domain.

  • Install miniOrange PHP SAML 2.0 Connector ( to get plugin Contact us ).
  • Setup the connector on the same domain where you have PHP application running.
  • Access SSO connector from your browser with URL https://<connector-path>/sso
  • Register into SSO connector by providing a valid email address and password.
  • After registration, log in to the dashboard using the credentials you provided during registration.

miniorange img Step 2: Configure the connector using your Identity Provider details

  • In Plugin Settings, use your Identity Provider details to configure the plugin.

    PHP SAML 2.0 authentication connector Identity provider settings
  • You can configure the SP base url or leave this option as it is.

    PHP SAML 2.0 authentication connector Service provider settings
  • You need to provide these SP Entity ID and ACS URL values while configuring your Identity Provider.
  • Click on the Submit button to save your settings.

miniorange img Step 3: Test the Configuration

  • You can test if the plugin is configured properly or not by clicking on the Test Configuration button.
    PHP SAML 2.0 authentication connector Test configuration settings.
  • You should see a Test Successful screen as shown below along with the user's attribute values.

    PHP SAML 2.0 authentication connector Successful authentication.

miniorange img Step 4: Setup the connector to work with your Application

Once the SSO test was successful, you can provide an Application URL, to where the users will be redirected after logging in.
  • To do so, click on the How to Setup? menu in SSO connector.
  • Look for an option called Application URL and provide the url of your application(where you want the users to redirect after logging in).
  • NOTE: The domain of the application URL and the domain where you have setup the miniOrange PHP SAML 2.0 Connector should be same.
  • On this Application Endpoint you need to read Session attributes set by SSO connector and use that to login user into your application.
    if(session_status() === PHP_SESSION_NONE)
    {
    session_start();
    }
    $email = $_SESSION['email'];
    $username = $_SESSION['username'];
    // Use $email and $username variables to find user in your PHP application and start session for the user.
    

    These Variables contain the mapped attribute values. After receiving these values using the above code, you can use the $email and $username variables in your application.
  • Now that the plugin is configured, you're ready to use it in your application.
    Use the following URL as a link in your application from where you want to perform SSO:
    http://<your-domain>/sso/login.php"

    For Example, you can use it as:
    <a href="http://<your-domain>/sso/login.php">Log in</a>
    Your users will be able to SSO in your application by clicking on the Log in link

Note : The miniOrange PHP SAML 2.0 Connector is supported by various PHP Frameworks such as Laravel, CodeIgniter, CakePHP, Symfony, Zend Framework, Phalcon, Yii Framework, Aura, Fat-Free, PHP-MVC, Kohana, FuelPHP, Slim, Flight, Zikula, PHPixie, Li3, Nett, Medoo, POP PHP, PHP Mini, Silex, Agavi, Typo 3 Flow, Prado, Cappuccino, Limonade, Webasyst, Guzzle PHP, YAF, Akelos PHP Framework, Qcodo, evoCore, Stratus, Seagull, Maintainable, Limb, Phocoa, AjaxAC, Zoop, BlueShoes, Recess, PHPDevShell, Ice Framework, QueryPHP, Dash PHP Framework, Zest Framework, Roducks, and many more.




We offer Security Solutions of Single Sign-On, Two Factor Authentication, Fraud Prevention, and much more.

Please call us at +1978 658 9387 (US), +91 77966 99612 (India), or email us at [email protected]


Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to [email protected]

referer: