Powered by Adobe Commerce 2.4.3


Single Sign-On



Back to top

Use Single Sign-On to connect Magento to Google+, ADFS, SharePoint, OneLogin, SurfConext, and other Identity Providers, for better verification and a more secure solution to logging in. Single Sign-On replaces the default Magento login procedure for a single sign-on procedure. This will allow Magento to connect with any identity provider using multiple protocols.

It works both on the Magento frontend and the administrative backend, giving it just that extra bit of value. You can map attributes from your external provider, provide default values and even execute basic tasks on the incoming attributes like splitting and regular expressions. The extension allows for the creation of a user when it does not exist yet, and also has the ability to create both the default billing and shipping address. This lowers the barriers for your customers and increases the rate of conversion.

Many leaders already use our extensions to allow their employees, customers or relations to login to their systems with central logins, granting them an easy way to login, maintain address information and to enrich information within Magento without bothering the customer with these details. This simplifies processes, secures the system tightly and makes it easy for customers to purchase items. In commercial systems, this results in a higher conversion rate due to fewer obstacles to take.

It doesn't matter if you work with SAML2 or OAuth2, sometimes the knowledge in the company might not be sufficient to ensure smooth integration with your external identity provider. We also provide a complete integration service found on our website, that is so cheap that our competitors aren't even willing to provide the same service for that price. So if you need our expertise to help you out, we're able to integrate with any SAML2 or OAuth2 provider for a very fair price and can plan it on short notice.



  • Enable Single Sign-On with services like Google+, Microsoft Azure/ADFS, OpenAM, Auth0, ForgeRock, SharePoint, OneLogin, SurfConext, and other Identity Providers
  • Using the super-secure SAML2, OAuth2 or OpenID Connect protocol
  • Allow different servers for different websites
  • Auto-Discovery of Mapping information which you can easily set after the discovery
  • Automatic creation of customer and address data
  • Fully open-source and customization possible
  • Feature-rich
  • Easy to use


Saml2 Protocol

Our module is built atop our own SAML2 library and is one of the most feature-rich libraries all over the world. It will work in any SAML2 situation and this has been done over and over again at numerous market leaders.

Security Assertion Markup Language 2.0 (SAML 2.0) is a version of the SAML standard for exchanging authentication and authorization data between security domains. SAML 2.0 is an XML-based protocol that uses security tokens containing assertions to pass information about a principal (usually an end-user) between a SAML authority, that is, an identity provider, and a SAML consumer, that is, a service provider. SAML 2.0 enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO), which helps reduce the administrative overhead of distributing multiple authentication tokens to the user.


OAuth2 Protocol

The extension can deal with any OAuth2 and OpenID compatible providers and will allow you to make multiple connections in a single store

OAuth is an open standard for authorization, commonly used as a way for Internet users to authorize websites or applications to access their information on other websites but without giving them the passwords. This mechanism is used, for example, by Google, Facebook, Microsoft, Twitter, etc to permit the users to share information about their accounts with third-party applications or websites.


Verified With:

  • Microsoft Azure
  • Microsoft ADFS
  • Auth0
  • SalesForce
  • OpenAM
  • OneLogin
  • SimpleSAMLPhp
  • DigiD
  • E-Herkenning
  • And more


Where Did We Apply Single Sign-On?

This module has been tested and used in Magento 1 and 2, in many situations! This is just a selection of companies all around the world have started to use our extensions

  • Nokia
  • Canon
  • Fuji-Xerox
  • PostNL
  • Juni
  • GraduationSource
  • AwardLetters
  • Comporium
  • Canadian Government
  • British Government
  • Castrol
  • Dentons


Our Documentation

If you are looking on how to install the extension or are curious about the inner workings, please check our documentation.

Technical Specifications

Back to top

Seller profile


Seller contact



Current Version


Magento platform compatibility

Open Source (CE): 2.3 (current), 2.2 (obsolete)


Stable Build


12 March, 2020


Extensions, Sales

Quality Report

Back to top

Installation & Varnish Tests


Coding Standard


Plagiarism Check


Malware Check


Marketing Review


Manual Testing


All tests were conducted on the latest versions of Magento that existed for the compatible release lines at the moment of the extension submission. Latest versions of all other software were used, as applicable.

Release Notes

Back to top


  • Compatible with Open Source (CE) : 2.3
  • Stability: Stable Build
  • Description:

    1. Removing a link to the "Log" page which is non-existent
    2. Removed save/delete/reset functionality on the log page, since thats a view-only page
    3. Fixed the deletion of servers


  • Compatible with Open Source (CE) : 2.2 2.3
  • Stability: Stable Build
  • Description:

    Fixed compatibility with Magento 2.3.3

    Fixed a problem where a change in the way Twig is loaded caused the extension not to work properly. Twig is now properly autoloaded and used again.


  • Compatible with Open Source (CE) : 2.2 2.3
  • Stability: Stable Build
  • Description:

    - Enable Automatic Generation of X509 Certificates, used with SAML2 Connections
    - Autodiscovery for mappings upon login
    - Compliency with the MEQP standards


Back to top

The best place to start if you need help with a specific extension is to contact the developer. All Magento developers have both a contact email and a support email listed.

Contact Vendor

Q & A

Back to top


Back to top