This solution allows you to setup Single Sign-On into Angular 2. It allows setting up JWT SSO. You can allow your users to Single Sign-On into Angular 2 by verifying Identity with your existing compliant Identity Provider. This is done using JSON Web Token (JWT) tokens and it can be easily integrated with Angular 2 built in any framework or language.
In case you need our help with below integration or sample code for JWT for your language, feel free to reach out at info@xecurify.com.
miniOrange provides user authentication from external directories like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc. It also provides user authentication with other IDPs like Shibboleth, PING, Okta, OneLogin, KeyCloak and many more.
Can't find your IDP ? Contact us on idpsupport@xecurify.com. We'll help you set it up in no time.
We are using ADFS to show the setup.
You can directly move to Step 3 if you have already configured an IDP.
IDP Name | Enter Your IDP Name |
IDP Entity ID | http://<YOUR_ADFS_DOMAIN>/adfs/services/trust |
SAML SSO Login URL | http://<YOUR_ADFS_DOMAIN>/adfs/ls/ |
X.509 Certificate | Provide the ADFS signing certificate |
a. Service Provider Entity ID / Issuer: https://login.xecurify.com/moas
b. Assertion Consumption Service (ACS) URL: Find SAML ACS URL option in added Identity Source.
c. Download Metadata: This is required if you want to Download metadata.Download metadata to avoid putting the values manually.
d. Signing Certificate (Optional): This is required if you want to enable signed SAML Auth request. so than IdP can verify that the contents have not been altered in transit. Download the signing certificate with the steps below.
e. Configure miniOrange as a relying party in ADFS:
https://login.xecurify.com/moas/login/broker/login/saml/acs/{YOUR_CUSTOMER_KEY}
in the Relying Party URL textbox and click Next the button.https://login.xecurify.com/moas/login
a. Add Angular 2 app in miniOrange:
In miniOrange dashboard, you can add JWT application with steps below:
https://login.xecurify.com/moas/jwt/mobile
b. Add SSO link in Angular 2:
https://login.xecurify.com/moas/broker/login/jwt/<customer-id>?client_id=<client-id>&redirect_uri=<redirect-url>
customer-id | Customer ID of your miniOrange account which can be found under settings menu.Refer image below. |
client-id | Client Id of JWT application created above(Step 3.a). |
redirect-url | Configured Redirect URL against JWT application. |
c. Verify JWT token and parse user details for SSO:
eg. xxxx.yyyyyyyyyyyy.zzzzzz
d. Perform SSO:
This is an optional step. If you want to ensure that all sessions (SP and IDP) for a user are properly closed, you can configure Single Logout with the steps below.
a. Configure miniOrange with IdP SLO endpoint:
b. Configure IdP with miniOrange SLO endpoint:
https://login.xecurify.in/moas/broker/login/saml_logout/<your-customer-id>
c. Configure your JWT application with SLO endpoint:
https://login.xecurify.in/moas/broker/login/jwt/logout/<your-customer-id>?redirect_uri=<redirect-url>
your-customer-id | You have to add your miniOragne account customer ID here. |
redirect-url | This should be replaced with the logout URL of your JWT application. |
miniOrange provides 24/7 support for all the Secure Identity Solutions. We ensure high quality support to meet your satisfaction.
Try Nowminiorange provides most affordable Secure Identity Solutions for all type of use cases and offers different packages based on customer's requirement.
Request A QuoteWe offer Secure Identity Solutions for Single Sign-On, Two Factor Authentication, Adaptive MFA, Provisioning, and much more. Please contact us at -
+1 978 658 9387 (US) , +91 77966 99612 (India) | info@xecurify.com