EZPZ SAML SP turns your wordpress website into a fully functioning SAML
service provider. EZPZ SP then allows you to use your existing Identity
Provider (IdP) to authenticate to your wordpress website. We support all
known SAML 2.0 IdPs such as: ADFS, Athens (Eduserv), AzureAD, Bitium,
Centrify, Google Apps, Okta, OneLogin, OpenAM, Oracle, Ping Identity,
Salesforce, Shibboleth, SimpleSAMLphp, WSO2 and many more.
In the premium version of the plugin you are also able to use IP Based
authentication. The premium version also allows you to configure
authentication to multiple IdPs instead of a single IdP.
You have the power to either switch on authentication for the entire
wordpress website to force Single Sign on site wide. Or you can choose to
enable per post / page authentication and require login for particular
posts and pages.
If you require any Single Sign On help or have any questions about the
plugin please email email@example.com
- SAML Authentication
- Automatic IDP metadata pull (not cached, pulled on every login)
- Upload IDP metadata file
- Protect whole site
- Restrict access to posts or pages
- Redirect wordpress login page to IDP
- Direct IDP login link that can be used anywhere (not currently shown in
- Login via institution link on footer of wordpress login page
- Auto fill username and optionally email from SAML attributes
- SAML Single Logout
- Automatic initial certificate generation
- Custom SP certificate support
- Auto creates missing users on login
- Advanced security options
- Option to disable user auto creation
- Option to append institution name to user to avoid duplicates across IDPs
- Options to select SAML Request binding type
- Customized Role Mapping / Set users default role on creation
- IDP Metadata caching
- Custom Attribute Mapping (Any attribute which is stored in user-meta
- Sub-site specific SSO for Multisite
- Bulk update to enable/disable post and page restrictions
- Granular access controls per institution
- Auto login via IP
- Ability to restrict posts or pages to specific institutions and/or
- File upload protection (new file manager so you can protect PDFs, images
FROM YOUR WORDPRESS DASHBOARD
- Visit Plugins > Add New.
- Search for “EZPZ SAML SP”. Find and Install “EZPZ SAML SP Single Sign On
- Activate the plugin from your Plugins page.
- Download EZPZ SAML SP Single Sign On (SSO) plugin.
- Unzip and upload the ezpz-sp-saml-sso directory to your
- Activate EZPZ SAML SP Single Sign On (SSO) from your Plugins page.
How do I set the plugin up
Please see the installation instructions above or please watch the video
What does the redirect wordpress login option do?
This allows you to make it so that you cannot go to
www.yoursite.com/wp-admin and login with your manual admin account. When
you go there with this option enabled you will be sent to the IdP that has
been configured for this plugin.
I have locked my self out of the admin and cannot login what do i do!?
Have no fear, if you haven’t enabled the redirect wordpress login option
you can just go to www.yoursite.com/wp-admin. If however you have enabled
that option then you can just go to www.yoursite.com/wp-admin?nologin to
bypass the redirect.
How do I protect the whole website and force login via SAML / SSO?
You can do that by going to the EZPZ SP Plugin settings and clicking on
login options tab and then press protect whole website. That will force a
login to any of the pages (please note that doesn’t protect the wp-content
files so all of your media files you’ll need the premium plugin for that).
How do i get support?
If you have any questions then you can email firstname.lastname@example.org
Contributi e sviluppo
“EZPZ SAML SP Single Sign On (SSO)” è un software open source. Le persone che hanno contribuito allo sviluppo di questo plugin sono indicate di seguito.Collaboratori
Traduci “EZPZ SAML SP Single Sign On (SSO)” nella tua lingua.
Ti interessa lo sviluppo?
Esplora il Codice segui il Repository SVN iscriviti al Log delle Modifiche. Puoi farlo tramite RSS con un lettore di feed.
Changelog (registro delle modifiche)
- Allow SAML attributes to use the unfriendly names
- First stable release