Need Help? We are right here!
Thanks for your Enquiry.
If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com
Search Results:
×Webflow Azure AD integration by miniOrange helps customers allow their users to access Azure Ad credentials for seamless access to Webflow using SSO. This solution ensures that you are ready to roll out secure access to Webflow using Azure AD within minutes instead of managing users in Webflow. miniOrange also provides 30-days free trial to test out the solution on your own.
miniOrange Webflow integration is just not limited to Azure AD but you can easily connect with any of your IDP (Okta, Ping, Microsoft, etc), Active & LDAP without migrating your users. Webflow SSO integration helps your organization's time and efforts with improved security to your data present in the cloud or on-premise.
Note: You don't need any enterprise plan or premium feature to enable SSO for Webflow.
miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc), Identity Providers (like Shibboleth, Ping, Okta, OneLogin, KeyCloak), Databases (like MySQL, Maria DB, PostgreSQL) and many more.
Custom App Name | Enter the Application Name of your choice, and add a description if required. |
Redirect-URL | Enter the Redirect-URL (i.e. the endpoint where you want to send/post your JWT token). You can add multiple redirect URLs by separating them with a ‘;’. E.g. abc.com;xyz.com |
Primary Identity Provider (optional) | Select your Identity Source from the dropdown. You can select miniOrange here as default IDP. |
Client ID | If your application provides its own client ID, you can configure it by clicking on the Customize button. |
App Secret | You can find App Secret by clicking on the copy icon. This is used in the HS265 Signature algorithm for generating the signature. |
Signature Algorithm | Select your signature algorithm from the dropdown. |
Primary Identity Provider | Select the default Identity Provider from the dropdown for the application. If not selected, users will see the default login screen and can choose their own IDP. [Choose miniOrange in this case.] |
Redirect URL | Given below is your app URL where you will receive your token. RSA 256 : <your_app-login-url> (Here token will be added by the system) HS256 : <app-login-url/?id_token=> |
3.a. Configuring miniOrange as Service Provider (SP) in Azure AD
Identifier (Entity ID) | Entity ID or Issuer copied from the miniOrange metadata section mentioned in the previous step. |
Reply URL (Assertion Consumer Service URL) | ACS URL copied from the miniOrange metadata section mentioned in the previous step. |
Logout URL | Single Logout URL copied from the miniOrange metadata section mentioned in the previous step. |
3.b. User/Group Assignment
3.c. Configure Azure AD as Identity Provider (IDP) in miniOrange
Domain Mapping | Enable to redirect domain specific user to a specific IDP |
Show IdP to Users | Enable this option if you wish to show this IDP as a button on the login page. Eg : Login with Azure AD. |
Send Configured Attributes | Enable this option if you wish to send user attributes from the IDP to WebFlow while SSO. |
3.d. Test IDP Connection
Yes, our scripts are completely customizable and you can restrict page access based on memberships, groups, company . domain or any other custom attribute of your choice.
We handle this by adding the no script tags in our script file, this enables redirection of your users to a customizable page with instructions to enable javascript.
Our Other Identity & Access Management Products