Search Results:
×Identity brokering is a way to establish trust between parties that want to use online identities of one another. Identity Broker is a service which connects multiple service providers with different identity providers. No needs to understand or implement complex Single Sign-On (SSO) protocols like SAML, OpenID, OAuth, CAS or any other.The important reason why we should use Identity Broker is that it supports Cross Protocol i.e. configuring Service Provider following a particular protocol with an Identity Provider following some different protocol. miniOrange Single Sign-On (SSO) as an identity broker service provides secure and easy access to all your services.
Our SAML Identity Broker Service acts as Service Provider to any Identity Providers of your choice following the same protocol. You can configure any Enterprise SAML IDP like ADFS, Azure AD, Shibboleth, Google Apps, Okta, Salesforce, OneLogin, or any other SAML identity provider (IDP).
By using our Identity Broker Services you can configure any OAuth Provider like Slack, Discord, AWS Cognito, Azure AD, keycloak, Okta, Salesforce, etc. and provide Authentication to your users.
OpenID Connect (OIDC) is simple an authentication layer on top of the OAuth protocol. This OIDC allows clients to verify the identity of an end-user and to obtain their basic profile information. We provide multiple OAuth Provider like Atlassian Crowd, Azure AD, AWS Cognito, WHMCS, Ping Federate, Slack, Discord, Keycloak, Okta etc.
CAS is a ticket-based Single Sign-On (SSO) protocol that provides users access to web applications after authentication against a central CAS Server. By configuring CAS protocol, you permit a user to access multiple applications while providing their credentials (such as user id and password) only once. It also allows web applications to authenticate users without gaining access to a user’s security credentials, such as a password.
By configuring our Identity Broker Service, it will be allow users to authenticate against various LDAP implementations like Microsoft Active Directory, OpenLDAP, and other directory systems and provide a login to any of your applications using credentials stored in your LDAP Server.
Connect your existing My SQL, Microsoft SQL, Postgres SQL and other databases with miniOrange and allow your users authentication and Single Sign-On (SSO) without moving into miniOrange.
miniOrange provides secure login to any application via any CMS like WordPress, Moodle, Magento, Oracle Siebel CRM and many more and it allows your users to login to multiple applications via using their CMS credentials.
miniOrange provides secure login to any application via any Human Resource Management System like BambooHR, Workday, SucessFactor, etc and it allows your users to login to multiple applications via using their HRM System credentials.
miniOrange provides Login Login using IDP selection page feature, where you can configure multiple IDPs (identity providers) and give users the option to select the IDP of their choice to authenticate with. For Example - It could be multiple AD domains belonging to different departments or multiple okta organizations. You can also change the look and feel of this page by customizing title, logo, favicon, background, button colour and many more of the login page.
Learn MoreminiOrange provides Login via Domain Mapping feature when you have multiple IDPs and you want a certain set of users to authenticate from one IdP whereas another set of users to authenticate from another IdP based on their email domains. In that case you can achieve this by our our Domain Mapping feature. We have provided a Domain Mapping field under each IdP where admins can enter the domain eg. demo.com , example.com as shown in the screenshot below. So user logging with any domain will be redirected to the specific organisation under for authentication.
Learn MoreminiOrange provides Login via App Identity Provider Mapping feature when you have multiple IDPs (identity provider) and you want a certain application user to authenticate with one IDP and other application users with another IDP. In that case you can achieve this by our Identity Source feature. With this feature, you can configure particular identity source for your selected application. And the users of your selected application would be able to authenticate only by the IDP(Identity Provider) selected from Identity Source dropdown list.
Learn More