miniOrange has developed a one of a kind plug-and-play SAML Single Sign on ( SSO ) package for Laravel sites that installs and configures just like a plugin with a UI, making the implementation of Laravel Single Sign on ( SSO ) easy and direct, without making any changes or adjustments to your existing website’s code.
Laravel is one of the most popular free PHP Development Framework in the world because of its ability to implement complex web applications fast and in a secure way. Developers love this framework for its well-documented API, availability of guides and tutorials, and a very active community.
But installing and implementing features through traditional packages can get quite messy since it almost always requires the user to modify or make changes to their code. miniOrange Laravel Single Sign on ( SSO ) SP package solves this problem very easily without getting into the nitty-gritty of making changes to existing code.
Laravel Single Sign On ( SSO ) Package
SAML Single Sign on (SSO) for Laravel package acts as a SAML Service Provider (SP) which can be configured to establish the trust between the plugin and SAML capable Identity Providers to securely authenticate the user to the Laravel site.
SAML Single Sign On (SSO) for Laravel allows users sign in to Laravel webapp with your SAML 2.0 capable Identity Provider. We support all known IdPs - miniOrange, Google Apps, ADFS, Okta, OneLogin, Azure AD, Salesforce, Shibboleth, SimpleSAMLphp, OpenAM, Centrify, Ping, RSA, IBM, Oracle, Bitium, WSO2, NetIQ etc.SAML Single Sign on (SSO) acts as a SAML 2.0 Service Provider (SP) and securely authenticate users with your SAML 2.0 Identity Provider.
Features of Laravel SSO Package
- Simple and easy-to-use admin UI [ FREE ]
- Auto-create users in Laravel. [ FREE ]
- Single Sign On button on the Login page [ FREE ]
- Auto-redirect to IdP/ Force Single Sign On [ PREMIUM ]
- Custom Attribute Mapping [ PREMIUM ]
- Select Binding Type [ PREMIUM ]
- Single Logout [ PREMIUM ]
Follow the Step by Step Guide given below for Laravel Single Sign On ( SSO ) using SAML
Step 1: Installing the package using Composer
- Open a Command Prompt window and change the working directory to your Laravel app’s main directory.
- Enter the command composer require miniorange/saml-laravel-free.
- After successful installation of package, go to your Laravel app in the browser and enter https://yourhost/mo_admin in the address bar.
- The package will start setting up your database for you and then redirect you to the admin registration page.
- Login with credentials you registered with.
- Select Plugin Settings from the navigation pane on the left.
Step 2: Configuring the plugin
- In the Plugin Settings tab, under the Identity Provider Settings column, fill the necessary configuration options provided by your Identity Provider (IdP). ( Identity Provider Name, IdP Entity Id, SAML Login URL, SAML x509 Certificate ) and click on “Save”.
- For Example:
- IdP Entity Id https://auth.miniorange.com/moas
- Download the following certificate, then click CHOOSE FILE to locate it and upload it.
- Single Sign On URL https://auth.miniorange.com/moas/idp/samlsso
- Single Logout URL https://auth.miniorange.com/moas/idp/samllogout
- Identity Provider Certificate Upload the certificate downloaded from miniOrange Admin Console
- The Service Provider (SP) Settings column has the data that you will need to provide to your Identity Provider (IdP).
Step 3: Test Configuration
- Click on the Test Configuration button and the User Details will be fetched.
- The below screenshot shows the successful result.
- This screenshot shows the attributes that are received and are mapped by attribute mapping.
Step 4:Attribute Mapping
- In the Plugin Settings tab under the Attribute Mapping column, assign attribute names received in the “Test Configuration” to the user credentials of your Laravel users.
- If you have extra columns in your Users database table that are not included in a standard Laravel installation, you can use Custom Attribute Mapping. Fill column name in the left-hand field and attribute name in the right-hand field. Click “Save Attribute Mapping”.
Step 5:SSO Options
- You can check Force Authentication to force login at IdP regardless of the user being already logged in there.
- You can check Force Single Sign On to force Single Sign On and auto-redirect users when they arrive on the login page.
- You can also refer to the How to Setup ? tab for instructions on configuring the plugin.
For further details refer :
Guide For Single Sign On (SSO)