Single Sign On

€199.00
SKU
Single Sign On

Single Sign-On for Magento 2 Customers or your backend users. Allow them to login directly with your Identity Provider without having to go through the account creation process. 100% Multi-Store friendly and easy to setup.

Compatible with both OAuth2 as SAML2 protocols, our extension can deal with nearly any Identity Provider on the market. You can create multiple integrations from your Magento 2 Backend and select which one is active on the backend and which one is active per website.

When your customer or admin user goes to the login page, they will see the option to login with Single Sign-On. They simply click the button and after logging in he will be redirected to the shop and logged in. If the user does not exist in the shop, an account will be automatically created.

Our Single Sign-On solutions have been implemented in hundreds of webshops world wide, including Nokia, Canon, Castrol, Pearson, Dentons and numerous more. We have learned from every of these implementations and this is where you directly profit from

You can have your customers connect to your Single Sign-On environment in no time and increase the revenue of your webshop by removing barriers.

Extensions, Featured,
Brands:

Compatible with Magento version: 2.4.X - 2.3.X


Your account will have further instructions on how to install our extension in the specific Magento version either with composer or as manual download. After the purchase, go to your account page and click on "My Extensions" for further information on the installation process

Single Sign-On for Magento 2 with nearly ANY SAML2 or OAuth2 Identity Provider

Allow your Magento 2 Customer or your backend users to login directly with your Identity Provider without having to go through the account creation process.

Due to a compatibility with both OAuth2 as SAML2 protocols, our extension can deal with nearly any Identity Provider on the market. You can create multiple connections from your Magento 2 Backend and select which one is active on the backend and which one is active per website.

When your customer or admin user goes to the login page, they will see the option to login with Single Sign-On. They simply click the button and after logging in he will be redirected to the shop and logged in. If the user does not exist in the shop, an account will be automatically created.

Our Single Sign-On solutions have been implemented in hundereds of webshops world wide, including Nokia, Canon, Castrol, Pearson, Dentons and numerous more.

We have learned from every of these implementations and this is where you directly profit from.

You can have your customers connect to your Single Sign-On environment in no time and increase the revenue of your webshop by removing barriers.


Single Sign-On and Single Logout

Magento redirects your customer or backend user to the identity provider to handle the login, which could be  a password authentication, biometrical, voice activated, keycoded or multi-factor. The Identity Provider Manages the login credentials.

100% Multi-Store Compatible

You can create identity provider connections and enable them where you need it. You can easily maintain a corporate and a consumer website where the corporate website could have SSO while the consumer website has no .

Multiple Identity Providers

Add as much identity providers to your Magento 2 installation as needed. Each of them can be enabled per store individually

Easy Mappings

When a new integration is setup, you can easily map all the fields from the Identity Provider to the fields in Magento 2


Frontend Firewall

Enable the Frontend Firewall to disallow access to your website unless the customer is logged in. Useful for Partner stores and other B2B specific environments

Firewall Whitelisting

When the firewall is enabled, this setting can allow certain IP's and pages to bypass the firewall completely so that customers can reach help pages or internal employees can reach the website without the need to be constantly logged in


Automatic Customer Creation

Customers in the frontend who login with SSO are automatically created. The extension allows you to map customers and their address data to automatically create the complete customer if it doesnt exist yet

Automatic Admin User Creation

If you use the admin SSO, users who login are automatically created. Create the mappings for your admin integration and if the user does not exist yet, it will be automatically generated upon first login


A Selection of Identity Providers The Extension Works With


Microsoft Azure Integration


Microsoft ADFS Integration


ForgeRock Integration

Auth0 Integration

Okta Integration


Google Integration


SalesForce Integration











Create multiple Identity Providers

In your Magento 2 Backend you can create as many Identity Providers as needed for your company.

You can create both SAML2 and OAuth2 Identity Providers without a fuss by going to the GoGento item in the left menu and click Connections.

In this example we already created 2 identity providers.

Note: The identifier will be automatically generated when you create a new connection. This unique identifier is used in the URL to tell the extension which SSO we're dealing with. This approach ensures a secure integration is in place and prevents them to login to unintended identity providers which you may have in place in other stores.


SAML2 - Trusted by banks

SAML2 is one of the most secure and popular Single Sign-On protocols. No wonder it is used by banks, municipalities and large enterprises all over the world.

Our extension integrates perfectly with any SAML2 Identity Provider. We have SAML2 experts in house and created an open source SAML2 library which our extension and even our competitors use.


OAuth2 and OpenID 

OAuth2 is by far the most used SSO protocol in the market. Nearly every Identity Provider is able to work with OAuth2.

Our extension can work with any OAuth2 and OpenID compatible Identity Provider to create a connection even consumer websites can profit from



Integrations most often used in with our extension


Microsoft Azure Integration
The newer version of Microsoft Active Directory exposure has simplified the integration for both sides of the connection a lot. Being less strict and easier to setup, an integration with Azure is equal to that of ADFS. It's a new interface built on top of the old Active Directory Federation Services.

Microsoft ADFS Integration
The original integration with ADFS is simply the process of setting the right metadata url's, certificates and attributes on both sides. After that it's a very reliable and consistent integration using the super secure SAML2 protocol.


OneLogin Integration
OneLogin has excellent SAML2 support and has a broad spectrum when it comes to mapping the data from your Identity Management to Magento 2. A straight forward but fully functional solution which a multitude of our customers use.


ForgeRock Integration
Formerly known as OpenAM, this identity provider is very suitable for large enterprises. We've implemented OpenAM and Forgerock for a large Australian client in no time.


Auth0 Integration
A Large selection of our customers use Auth0 for both their production environments and for testing. It allows you to setup connections with both SAML2 aswell as OAuth2 quickly and securely. The integrations which Auth0 offers with external solutions are very broad, making this a fine selection for a lot of our customers.

Okta Integration
Enterprise level identity management in the cloud. We've integrated a market leaders to Okta for a few years now and the integration is straight forward. Being one of the largest companies for Identity Management, they've proven themselves to be a powerful solution.


Google Integration
Google is one of the largest Identity Providers in the world today. Integrating with mainly OAuth2 and used by both business and personal users. Nearly every person in the world has a user account, available to login with these days.



SalesForce Integration
Originally a platform to maintain your sales process and customer relations, SalesForce has become a very feature-rich platform with solid integrations. They have a SAML2 integration available which we use.


Professional Magento 2 Support

Our extensions should always work properly out of the box. If you do have issues with our extension, feel free to contact us.

Development Support is always free and is prioritized in the following situations:

  • Our extension is not working properly in the latest version of Magento.
  • Our extension is not working properly in the last previous version of Magento.
  • Our extension causes an issue but you dont understand what happens.
  • Our initial research is free of charge.

Conflicts between our extension and other extensions or your theme is not part of the free support. If you require help with that, we will still be able to solve your issues. We will do an initial research and let you know what the costs will be to get this resolved.

Extension Customizations

There may be situations where the extension requires customizations for your specific case and we're more than willing to scope the customization for you and provide you with a quick indication of the costs involved.

We can also develop completely custom extensions or build integrations with external systems to automate your business.

No matter how hard the case seems, contact us and we'll take a look at the possibilities.

Since asking never costs anything, why not give it a try?

Installation and Upgrade Details

We do not provide direct download links of our extensions as they are not needed and bad practise. Installing and maintaining the latest updates of your extensions using composer is the best and safest solution. If you do need a manual download, feel free to contact us for aid.

Installing an extension is the same process as upgrading an extension. You can run the exact same composer require command as you do with the installation with the new version set, to upgrade the extension


Step 1 - Setup composer authentication

To install our extensions you need to first setup the composer repository for your account.
You don't need to do this after every purchase, just after the very first purchase you make in our webshop. Your composer URL can be found in your account details and can be setup with composer by executing this command on your server in your Magento 2 root:

composer config repositories.gogento composer https://gogento.com/composer/customer/[your-composer-secret]

These instructions can also be found in your account details


Step 2a - Install with composer

Now find the closest version matching your Magento 2 installation and run the composer require command below.


Step 2b - Alternative Direct Install

1. Download the package from your customer account page
2. Execute "mkdir -p app/code/GoGento/"
3. Place the contents of the downloaded file in your newly created directory


Magento 2.4.X

Extension v2.6
composer require gogento/sso "^240.2"

Magento 2.3.X

Extension v2.0
composer require gogento/sso "^235.2"

Step 3 - Post Installation

After the extension installation you can proceed with the default deployment commands which are run after adding a new extension.

1. Upgrading the database schema

bin/magento setup:upgrade
2. Verify your deployment mode
bin/magento deploy:mode:show
3. Run if the above command returns "production"
bin/magento setup:di:compile
bin/magento setup:static-content:deploy [your locales]
4. Wrap up the deployment
bin/magento index:reindex
bin/magento cache:clean


Installing the extension

Composer Installation

Step 1: (Your first GoGento Extension)

After purchasing the extension, go to your profile page on our website then navigate to "My Extensions". Follow the initial composer setup so that you are authenticated against our composer repository. This step only has to be taken if this is your first extension from GoGento. Any followup extensions will automatically work from this point forward.

Step 2: Installing the extension

Go to your Magento root and enter: composer require gogento/sso ^240.2.0

Manual Installation

We do not offer direct downloads, for the simple reason that staying up to date with our extensions is very important. If you do need to install the extension manually in the app/code folder, we suggest to install the extension temporarily in an empty composer project, then copy the contents of the vendor/gogento/sso folder to your app/code/GoGento/Sso project folder.

Magento Marketplace Installation

In case you bought this extension from Marketplace, please follow the installation instructions provided by marketplace. An order at Marketplace is not connected to your profile page on our website and therefor the installation procedure is as instructed by Magento Marketplace.

Post Installation

Upgrade Step: Following the upgrade steps on your project

After you installed the extension you should proceed with the upgrade steps for your project, including bin/magento setup:upgrade and all the necessary steps which you usually run to upgrade your specific project environment



Creating your first connection

After the installation is completed, you should find the Gogento -> Connections item in the left menu.

Click it to open up the grid with configured connections.

In the top right, click the "Create Connection" button.


Connection Details: General

The first tab is General.This is where you give your connection a descriptive name.

Keep in mind that you can create multiple SSO connections, so therefor it is important that you distinguish your connections with descriptive names.


Connection Details: Connection SAML2

The second tab is Connection. You have two types of connections available at this point.

The first selectable type:

SAML2

A Corporate level Single Sign-On protocol used by systems like OneLogin, Azure, Microsoft ADFS, SharePoint, OKTA and many many more.


Its secure and pretty much no configuration has to be made. You have to enter the Metadata URL from your Identity provider and setup a Service Provider Identifier on the side of Magento.

You save the configuration and the greyed out fields in the bottom will be automatically generated for you, including a matching SAML2 Certificate.

You can provide these details to your identity provider to setup the connection.


Connection Details: Connection OAuth2

The second selectable type:

OAuth2

Typically used by open source identity providers and easy to setup custom identity providers, like Google, Facebook, Twitter, Instagram, Twitch, Discord and so on.


Fill in the information as provided by your OAuth2 Identity provider and the connection should work properly.


Connection Details: Mappings

Every connection needs to have mappings which will allow you to configure the fields which are set when a user logs into the identity provider.

There are three types of mappings available:


External Mapping

These are mappings which come from the identity provider providing details on what is available for this customer at the identity provider side

Config Setting

You can enrich your data with config settings, which have the advantage of being able to change their value per store/website. In this example on the right, you will see that we fetch the store locale. With a default value of en_US.

Static Data

Static data can be set for information that is missing in the integration but still requires to be set. In this case a static field named "group_code" was set to value "47".


Magento 2 Store Settings

Navigate to Stores -> Configuration -> GoGento -> SSO - General

General Settings

Send customer registration welcome email on first login - After the customer logs in for the first time, there's an option to send a new welcome mail to the customer

CMS Page for failed login - If the login fails, redirect the user to a CMS page with further information

Frontend Settings

Available Identity Providers - Set which identity providers are available in this specific scope

Website visible for guests - If this is set to no, the guests will automatically be redirected to the login page

Backend Settings

Available Identity Providers - Define which identity providers can be used for connecting with the backend

Admin Login page visible for guests - If this is set to no, the admin is automatically redirected to the first available identity provider.