WordPress OSINT, maintenance or security needs? Reach out!
TLDWP

Plugin: miniorange-saml-20-single-sign-on (Used by 553 domains)

SAML Single Sign On – SSO Login

👤 miniOrange 📦 v5.4.1 🔗 Plugin Homepage

SAML SSO (Single Sign On) for WordPress Login with Okta, Entra ID, Azure AD/B2C, G-Suite, Shibboleth, OneLogin, Keycloak, Salesforce [24/7 Support]

SAML Single Sign On (SSO) Plugin to Simplify WordPress Login Experience

With the miniOrange WordPress SAML SSO plugin, you can enable Single Sign On (SSO) for your WordPress site. This means users can sign in with their existing accounts from Identity Providers (IDPs) like Microsoft Azure AD/ Entra ID, Google Apps Login (Gsuite Login), Okta, Salesforce Login, Keycloak, Shibboleth, OneLogin, ADFS, Auth0 Login, Office 365 Login, and others without creating separate WordPress usernames and passwords.

The SAML plugin makes your WordPress site function as a SAML-compliant Service Provider (SP) by using the SAML 2.0 protocol to securely exchange authentication data with your chosen Identity Provider (IDP). Once users are authenticated by the IDP, they automatically gain access to your WordPress site and its resources.

Our WP SSO plugin is designed for you if you need:

  • Instant Secure Authentication
    Users access WordPress immediately using their existing Identity Provider (IDP) credentials without managing WordPress-specific passwords.

  • Centralized Access Management
    Control everyone’s WordPress access through your SAML Identity Provider (IDP) security policies.

  • Organization-Only Access
    Restrict WordPress access exclusively to verified employees through SAML Identity Provider (IDP) authentication and MFA.

  • Smart User Provisioning
    Automatically create WordPress accounts and assign roles based on Identity Provider (IDP) groups and user data.

  • Reduced Administrative Overhead
    Eliminate manual user creation, password resets, role assignments, and access management tasks.

  • Flexibility Across Different Identity Providers (IDP)
    Our SAML plugin works with 50+ IDPs. Enterprises can set up Azure AD login into WordPress for employees, while universities use WordPress Okta SSO, Google Apps SSO (Gsuite Login), Salesforce SSO, Shibboleth SSO, OneLogin SSO, ADFS SSO, Keycloak SSO, Office 365 Login, Auth0 SSO, Azure B2C SSO or any other SAML IDPs of their choice.

Quick Links

🌐Official Website | 🛠️Setup Guide | 🎁Free Full-Feature Trial | 💎Pricing Plans | 🧩Integrations & Addons | 📧 Office 365 Integrations | 🤝Support

WordPress SAML SSO Login Explained in Minutes

WP SAML SSO Plugin Supports All SAML Identity Providers

Set Up Our WP Single Sign On (SSO) Plugin in Three Easy Steps

Step 1: Install Our WordPress SAML SSO Plugin
Download the WordPress SAML SSO (Single Sign On) plugin from the WordPress plugin directory and install it on your WordPress site.

Step 2: Share Your WordPress Site’s Metadata from the WP SAML Plugin with the Identity Provider (IDP)
Provide the Service Provider (SP), i.e., your WordPress site’s metadata URL or file, to your Identity Provider (IDP) to register your WordPress site as a trusted Service Provider (SP).

Step 3: Import Your Identity Provider’s (IDP) Metadata into the SAML SSO Plugin
Next, upload the IDP’s metadata URL or file to your WordPress site in the plugin settings to enable secure SAML authentication.

That’s it! Your WordPress site is now secured with enterprise-grade Single Sign On (SSO) authentication. You can verify the connection by using the Test Configuration button in the SAML plugin.

Watch Our Complete Step-by-Step Installation Video for WordPress SSO SAML Login

Follow along with our detailed video walkthrough to see exactly how each step works and ensure your SAML SSO login is configured correctly from start to finish.

Here to Support You, Always

Whether you have questions about setup, pricing, or how the WordPress SSO SAML plugin works, our expert team is available 24/7 to assist you. Simply reach out to [email protected], and we will ensure you receive timely and reliable guidance.

Features of Our WordPress SAML Single Sign On (SSO) Plugin

Unlimited User Authentications: Allows an unlimited number of users to log in through SAML SSO with your IDP authentication while maintaining optimal site performance during peak traffic.

Auto Login: Automatically logs users into WordPress if they have an active SAML IDP session, without requiring them to re-enter the IDP credentials.

Force Authentication: Ensures that users authenticate via SAML IDP each time they log in to the WordPress site, regardless of any active IDP session.

Complete Site Protection: Secures your site’s frontend pages/posts and backend WP-Admin pages behind SAML SSO (Single Sign On) by redirecting all users to IDP if an active session is not found on the IDP. You can add another security layer using Media Restriction and REST API authentication.

Automatic User Creation: Creates new WordPress user accounts automatically on the user’s first Single Sign On login if no account exists by syncing their profile details from the IDP.

Account Linking: Enables users to log into their existing WordPress accounts via their IDP credentials by matching their username or email in WordPress and SAML IDP. This ensures no duplicate accounts are created.

Just-in-Time (JIT) Profile Updation: Updates WordPress user accounts at each SAML SSO login (Single Sign On) by syncing data from IDP. It maps basic attributes (username, email, first name, last name, etc.) and advanced/custom attributes (department, phone, job title, employee ID, etc.) to maintain accurate user profiles.

Role-based Access: Assigns WordPress roles such as Administrator, Editor, Author, Contributor, or Subscriber to users during WP SSO login. The role assignment is based on the group information provided by the IDP.

Custom Login Buttons and Shortcodes: Adds SAML SSO login buttons to the WordPress login page or any page on the site using widgets and shortcodes. You can change the text, font, color, and size of these buttons to match your site’s design.

Single Logout (SLO): Terminates a user’s session on the WordPress site and the IDP simultaneously when logging out of either of them.

Login Using Multiple IDPs: Allows users to authenticate with different Identity Providers (IDPs) when logging into WordPress. You can also set up email domain mapping so users are automatically directed to the right IDP. For example, an organization can easily set up Azure AD SSO, Azure B2C SSO, Okta SSO, or any other IDP for employees, and use Gsuite SSO (Gsuite Login) for partners or vendors.

Certificate Sync and Multiple Certificates: Automatically syncs X.509 certificates from the SAML Identity Provider (IDP), managing rollover, replacement, and addition without disrupting the SSO connection. It also supports multiple active certificates from the same IDP, allowing WordPress to work with custom setups or environments where more than one certificate is in use.

WordPress SSO on Multisite Networks: Applies one SSO configuration to all subsites in a WordPress multisite network. This centralizes SSO management, so you do not need to configure each subsite individually.

Single & Multi‑Tenant Azure AD Login: Connects both single-tenant (one directory) and multi-tenant (multiple directories) Azure AD(Login with Azure AD) or Office 365 Login to WordPress. Users from different tenants can log in to WordPress through Azure AD SSO using their existing accounts.

Cross-Environment Deployment: Supports multiple environments such as Development, Test, and Production, allowing IT teams to configure WordPress SSO once and maintain consistent settings across all instances.

WP‑CLI Support: Provides WP‑CLI commands for activating licenses, configuring WP SSO settings, importing or exporting configurations, and updating the plugin. All key SAML SSO functions can be managed from the command line without using the WordPress dashboard.

Extend Your Single Sign On Experience With Our Addons

Real-time SCIM User Provisioning: Syncs user records between the SAML IDP and WordPress in real time when the user is created, updated, or removed to maintain accurate data and strengthen security and efficiency.

Page and Post Restriction: Controls access to your content by restricting pages and posts to specific user roles or login status (whether a user is logged in). If an unauthorized person attempts to view protected content, they can be automatically redirected to authenticate via a SAML Identity Provider (IDP), the WordPress login page, or any custom URL you specify.

Media Restriction: Blocks unauthorized downloads of images, videos, and documents by allowing only SAML SSO–verified users with proper IDP permissions to view or retrieve media files.

Attribute-Based Redirection: Directs users to specific URLs after Single Sign On based on IDP attributes such as role or department to ensure tailored access paths.

Guest User Login (Anonymous Login): Allows users to log in to the WordPress site without creating a WordPress user account for them.

SSO Session Management: Sets default or role-specific session timeouts for SAML SSO users according to IDP-assigned roles to balance convenience with security.

SSO Login Audit: Records all user login and registration activities on your WordPress site. It generates detailed reports that track essential information for each session, including the user, login time, and source IP address. The addon also includes advanced search filters for quickly locating specific events within the audit logs.

WordPress IP Whitelisting: Grants WordPress access to users with specific IPs and allows them to bypass IDP redirection and access restricted content.

Profile Picture Mapping: Imports avatar images from the IDP into WordPress profiles for authenticated users to personalize the site experience.

Federation SSO: Supports logins from multiple federated organizations, such as universities or research consortia, by leveraging standard IDP federation protocols to unify access.

Our WordPress Single Sign On SAML plugin also integrates with third-party applications such as LearnDash, WooCommerce, BuddyPress, MemberPress, Paid Memberships Pro, and more, providing a simple SAML Single Sign On (SSO) experience that lets users access courses, online stores, community forums, membership content, and other protected resources with a single login.

Top Use Cases of Our WordPress SAML Single Sign On (SSO) Plugin

Education: SSO for Schools, Universities, and Federated Institutions

Our WordPress SAML SSO plugin helps educational institutions simplify secure access across their WordPress sites. Faculty and staff can log in through Azure SSO, while external collaborators or research partners authenticate using WordPress Okta SSO, Shibboleth SSO, GSuite SSO/ Google Apps SSO, and other IDPs. This flexibility ensures universities can accommodate multiple identity providers without creating separate WordPress accounts for every user.

Along with multiple IDPs, the WordPress SAML plugin also supports academic federations such as InCommon, HAKA, HKAF, etc. These federations connect entire networks of trusted institutions and allow users to authenticate with their home institution credentials, enabling students, faculty, and researchers from partner universities or organizations to access WordPress resources directly.

With our WordPress SAML plugin, universities can also manage SSO for Multisite Networks more effectively, making it easy to control access across subsites such as library.uni.edu or research.uni.edu. It further provides Guest User Login for temporary access by external collaborators, ensuring consistent and secure entry to academic resources.

Healthcare: WordPress SSO for Hospitals, Clinics, and Medical Portals

Healthcare organizations require access controls that protect sensitive data while remaining compliant with regulations. Our WordPress SAML SSO plugin for healthcare allows hospitals, clinics, medical portals, and other Healthcare Providers (HCPs) to authenticate users against their existing IDPs.

The WordPress SAML SSO plugin includes advanced features such as Force Authentication, which requires users outside the hospital network to authenticate with their IDP to access organizational resources, while allowing on-site users immediate access without re-authentication.

To further protect sensitive data, healthcare administrators can configure Role‑based Restrictions that limit access to patient records, laboratory results, research data, administrative content, and other sensitive information. This ensures that only authorized personnel can view or manage sensitive resources while helping institutions stay compliant with HIPAA and other healthcare data protection standards.

WooCommerce: SSO for B2B, Institutional Buyers, and E-Commerce

For online stores, the shopping experience depends on security and convenience working together. Our WordPress SAML SSO plugin integrates WooCommerce with Identity Providers (IDPs) such as Azure AD, Okta, or even other WordPress sites, allowing customers and staff to sign in with the same credentials they already use in their organization.

When deployed with the WooCommerce Integrator, SSO becomes part of the checkout process. Customers adding products to their carts are prompted to authenticate, and once logged in, their account details and order information synchronize automatically.

On the backend, manager and staff roles assigned in the IDP flow directly into WooCommerce, granting specific access to order data, inventory, and dealer portals. With user permissions centralized, businesses avoid duplication errors and maintain consistent security across their e‑commerce operations.

Multiple Site Businesses: SSO (Single Sign On) in WordPress to WordPress sites

Many businesses run multiple WordPress sites: a main site that stores all user accounts and roles (customers, managers, staff), and secondary sites that provide additional services and resources.

To avoid repeated logins and maintain consistent user management, the secondary sites can act as Service Providers (SPs) using our SAML Single Sign On plugin, while the main site serves as the Identity Provider (IDP) using the SAML IDP – Login with Website Users plugin.

When a user tries to access a secondary site, they are redirected to log in on the main site. Upon successful authentication, their credentials, profile details, and roles are passed back to the SP site. This provides seamless access, keeps user data synchronized, and maintains role-based permissions across both sites without manual account duplication.

Enterprise: SSO with Azure AD (Microsoft Entra ID)

Our SAML SSO plugin supports both Single-Tenant and Multi-Tenant Azure AD SSO, allowing users from different Azure AD (Microsoft Entra ID) tenants, whether they belong to separate organizations, subsidiaries, or business units, to securely log in to WordPress using Azure AD.

To simplify user lifecycle management, the plugin offers full SCIM Provisioning and Deprovisioning, automatically creating, updating, or removing WordPress accounts whenever changes are made in Azure AD. This ensures user data and permissions remain consistent and up to date across systems without manual intervention.

For added reliability, the SAML plugin includes Automatic Certificate Synchronization, handling certificate rotation in Azure AD SSO behind the scenes. This eliminates downtime and prevents login failures, ensuring users can always access WordPress without disruption.

The WordPress SAML plugin also extends beyond authentication by connecting WordPress with core Microsoft applications, including SharePoint, Power BI, Dynamics CRM, Outlook, and more, making it easy to embed files, display dashboards, and synchronize data within WordPress.

Feedback and Support

We’re committed to …

DomainExposuresHeadersLast Checked
t*e*w*1*a*e*b*r*a*f*u*d*t*o*.networkforgood.com A 2026-04-16 12:09:19
s*e*s*l*.com F 2026-04-16 05:08:43
c*r*.delaware.gov (WP 6.9) F 2026-04-16 04:46:37
d*a*v*s*r*.com A 2026-04-16 03:24:33
h*u*e*o*.delaware.gov F 2026-04-16 03:18:41
z*r*t*k*a*.com F 2026-04-15 23:39:18
z*r*t*k.com F 2026-04-15 23:39:18
p*o*i*e.ngpvan.com B 2026-04-15 23:08:08
s*i*o*t*n.salsalabs.org B 2026-04-15 22:53:29
a*e*i*a*c*m*o*e*s.networkforgood.com A 2026-04-15 17:40:52
b*u*e*a*d*i*a*c*a*.com A 2026-04-15 07:24:39
b*j*e*u*a*i*n*l*n*t*a*i*e.networkforgood.com A 2026-04-15 05:59:19
b*s*o*w*a*t*p*a*n*r.com A 2026-04-15 03:07:41
b*s*o*f*n*n*i*l*a*a*e*e*t.com A 2026-04-15 02:26:06
p*5*s*.salsalabs.org B 2026-04-14 20:06:43
h*a*a*d*e*k*a*c*r*l*i*n*e.salsalabs.org B 2026-04-14 17:05:08
e*e*y*c*i*n.com B 2026-04-14 11:49:06
r*a*i*g*l*s.com (WP 6.9.4) B 2026-04-14 10:42:39
e*e*c*r*w*a*t*a*d*r*s*.com B 2026-04-14 08:51:05
b*n*e*r*t*c*.com B 2026-04-14 07:53:31
e*e*t*e*d*r*h*p*n*t*t*t*.com (WP 6.3.2) ⚠️ B 2026-04-14 06:27:34
k*i*o*p*i*a*e*e*l*h.com A 2026-04-14 03:17:14
c*i*i*a*t*i*l*.uwmedicine.org F 2026-04-14 03:04:20
d*n*a*r*u*e.com A 2026-04-14 01:41:50
t*o*e*u*j*u*.fi (WP 6.9.4) F 2026-04-14 00:29:51
n*o*e.salsalabs.org B 2026-04-13 22:27:22
s*s.delaware.gov (WP 6.9) F 2026-04-13 21:40:50
r*v*u*i*e*s*t*.com B 2026-04-13 20:48:34
r*v*r*s*l*e.com B 2026-04-13 20:44:46
r*v*r*s*a*c*.com B 2026-04-13 20:44:46
r*v*m*.com B 2026-04-13 20:08:50
r*v*e*o.com B 2026-04-13 20:03:05
r*v*c*i*i*a*.com B 2026-04-13 20:03:04
b*e*n*f*t*r*u.com (WP 6.9.4) B 2026-04-13 17:46:51
c*a*s*c*i*e*f*u*d*t*o*.salsalabs.org B 2026-04-13 16:00:30
p*r*a*.claritybenefitsolutions.com (WP 5.4.2) ⚠️ F 2026-04-13 12:53:37
n*v*r*c*.com B 2026-04-12 15:00:08
a*d*c*i*n*s*e*l.networkforgood.com A 2026-04-12 14:50:53
j*m*s*a*t*u*d*a*s*n*.com B 2026-04-12 13:23:36
s*c*a*s*l*t*o*s.com B 2026-04-12 12:27:11
t*j*u*n*y.com A 2026-04-12 02:16:52
a*p*a*u*e*i*v*s*m*n*s.com A 2026-04-12 00:50:51
n*r*a*n*i*a*c*a*g*o*p.com A 2026-04-11 17:22:11
s*r*t*g*e*f*r*h*l*r*n.salsalabs.org B 2026-04-11 01:49:55
d*e*m*o*s*p*o*t.com (WP 6.9.4) B 2026-04-11 01:22:21
d*e*m*o*n*t*o*.com (WP 6.9.4) B 2026-04-11 01:22:21
d*e*m*o*l*a*n*n*.com (WP 6.9.4) B 2026-04-11 01:18:25
d*e*m*o*-*a*i*n.com (WP 6.9.4) B 2026-04-11 01:18:25
l*c*c.salsalabs.org B 2026-04-11 01:06:32
c*l*i.salsalabs.org B 2026-04-10 23:42:10
t*m*f*r*h*n*c*.com (WP 6.9.4) B 2026-04-10 23:37:38
c*r*n*v*r*s.delaware.gov (WP 6.9) F 2026-04-10 20:45:38
d*o*l*t*b*e*.com (WP 6.9.4) F 2026-04-10 20:16:06
d*o*l*s*e*l.com (WP 6.9.4) F 2026-04-10 20:16:06
d*o*l*m*t*s.com (WP 6.9.4) F 2026-04-10 20:16:06
s*m*i*p*c*f*c*e*i*a*c*n*e*.networkforgood.com A 2026-04-10 20:12:39
a*p*p.salsalabs.org B 2026-04-10 17:10:52
h*a*-*a.salsalabs.org B 2026-04-10 15:41:21
n*p*e*l*h.com A 2026-04-10 14:18:56
n*w*.com A 2026-04-10 13:34:37
g*o*p*r*e*c*-*e*.com A 2026-04-10 10:24:54
l*g*c*-*n*e*n*t*o*a*.networkforgood.com A 2026-04-10 06:27:57
g*o*g*t*w*m*n*s*r*c*n*e*.salsalabs.org B 2026-04-10 03:30:06
t*e*t*e*t*c*i*n*r*u*.salsalabs.org B 2026-04-10 02:32:00
w*b*n*o*n*a*i*n.salsalabs.org B 2026-04-10 02:30:14
e*g*a*e*e*l*h.com A 2026-04-10 02:23:21
c*n*.networkforgood.com A 2026-04-10 02:03:46
m*i*e*i*i*i*t*v*s.networkforgood.com A 2026-04-10 01:41:17
b*o*e*g*a*s*o*t*.com D 2026-04-10 01:18:41
q*w*a*t*m*n*g*m*n*.com A 2026-04-10 00:13:41
t*e*e*t*o*e*a*d.salsalabs.org B 2026-04-09 21:35:57
h*i*z*r*i*g.networkforgood.com A 2026-04-09 19:01:26
s*e*t*r*o*s*r*t*g*.salsalabs.org B 2026-04-09 18:43:05
p*a*s*.com A 2026-04-09 18:07:13
x*n*i*.com B 2026-04-09 17:13:56
f*t*r*w*s*.salsalabs.org B 2026-04-09 16:41:10
f*m*l*v*l*e*a*w*r*.salsalabs.org B 2026-04-09 13:53:01
s*a*d.salsalabs.org B 2026-04-09 13:10:22
s*a*d*m*r*c*u*.salsalabs.org B 2026-04-09 13:10:22
t*e*t*a*n*n*-*o*r*e.networkforgood.com A 2026-04-09 13:09:07
t*x*s*u*c*d*p*e*e*t*o*.salsalabs.org B 2026-04-09 12:52:55
g*o*p*c*i*m*r*e*.com B 2026-04-09 11:03:00
p*r*l*-*n*g*t.com B 2026-04-09 10:56:13
c*e*c*n*c*p*t*l*o*s*l*i*g.com A 2026-04-09 10:33:00
c*e*t*n*r*c*e*l*v*s.com A 2026-04-09 01:55:33
p*c*n*r*a*t*r*.com (WP 6.9.4) F 2026-04-08 15:46:30
c*v*n*n*m*o.com A 2026-04-08 08:50:35
a*t*-*o*a*i*a.com B 2026-04-07 21:09:55
c*i*l*b*n*u*t.com A 2026-04-07 12:13:15
b*t*e*h*a*t*i*a*t*o*.com (WP 6.9.4) B 2026-04-06 13:38:09
c*m*a*s*c*r*.com C 2026-04-05 17:42:19
c*l*m*c*p*t*l.com A 2026-04-05 08:22:35
c*b*l*s*o*e*a*.com A 2026-04-04 14:44:11
c*a*t*l*l*w.com (WP 6.9.4) C 2026-04-04 13:37:59
c*i*i*a*t*i*l*o*f*c*.com F 2026-04-04 00:28:14
c*i*i*a*d*t*s*u*i*.com B 2026-04-04 00:18:06
c*i*i*a*-*l*u*.com B 2026-04-04 00:12:33
l*a*n*d*.com B 2026-04-03 17:31:58
l*a*n*o*c*.com A 2026-04-03 17:13:27
l*i*n*.com C 2026-04-03 12:44:39

Top 50 Plugins

Plugin Count
elementor 2,610,282
contact-form-7 2,337,644
elementor-pro 1,466,093
woocommerce 1,223,104
revslider 876,684
js_composer 572,075
jetpack 492,222
wp-rocket 416,628
essential-addons-for-elementor-lite 395,134
header-footer-elementor 338,692
gutenberg-core 324,845
elementskit-lite 318,307
instagram-feed 298,589
gravityforms 297,893
google-analytics-for-wordpress 296,326
google-site-kit 287,278
complianz-gdpr 285,637
cookie-law-info 281,352
sitepress-multilingual-cms 248,177
wpforms-lite 238,039
bluehost-wordpress-plugin 233,662
astra-sites 230,472
litespeed-cache 208,332
gtranslate 174,637
coblocks 166,711
cookie-notice 164,421
gutenberg 161,748
the-events-calendar 144,897
popup-maker 136,627
premium-addons-for-elementor 127,956
astra-addon 127,895
bb-plugin 127,337
mailchimp-for-wp 124,297
LayerSlider 123,244
wp-smushit 121,831
tablepress 117,305
creame-whatsapp-me 113,186
custom-fonts 111,825
pro-elements 109,681
duracelltomi-google-tag-manager 108,630
click-to-chat-for-whatsapp 107,419
woocommerce-gateway-stripe 107,358
cleantalk-spam-protect 105,299
akismet 103,125
smart-slider-3 102,017
honeypot 100,700
megamenu 100,333
pixelyoursite 99,994
fusion-builder 99,480
formidable 95,673

Top 50 Themes

Theme Count
hello-elementor 839,023
astra 689,331
Divi 688,815
pub 216,748
generatepress 157,433
flatsome 156,461
Avada 150,237
h4 132,621
oceanwp 115,095
kadence 102,323
enfold 87,699
salient 84,687
bb-theme 81,307
twentytwentyfour 78,539
blocksy 76,160
twentytwentyfive 74,865
cocoon-master 72,462
betheme 69,466
twentyseventeen 67,865
woodmart 57,177
dt-the7 57,157
neve 50,179
twentytwentyone 43,364
bridge 42,676
Avada-Child-Theme 39,119
swell 38,644
twentytwenty 37,532
gox 36,812
lightning 36,811
twentytwentythree 35,835
bricks 30,482
Impreza 30,440
Newspaper 28,223
twentytwentytwo 27,764
epik-redesign 23,800
extendable 22,930
pro 22,929
storefront 22,793
uncode 22,342
twentysixteen 21,929
yith-wonder 21,662
sydney 20,796
themify-ultra 20,173
Total 18,592
twentyfifteen 18,182
porto 17,103
hestia 16,520
thrive-theme 15,743
yootheme 15,443
twentynineteen 15,189