[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fGrC6mJBGXnZxF6CY08dMkwyDW0BD4E6foKB8aSBlGqg":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":24,"download_link":25,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28,"vulnerabilities":29,"developer":30,"crawl_stats":27,"alternatives":36,"analysis":135,"fingerprints":211},"ugrm","Shibboleth With LDAP Authorization","2.0.1","warren.brown","https:\u002F\u002Fprofiles.wordpress.org\u002Fwarrenbrown-1\u002F","\u003Cp>Since this plugin extends the Shibboleth plugin, you must first have the Shibboleth plugin, available from https:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fshibboleth\u002F\u003Cbr \u002F>\ninstalled and activated. Otherwise, the plugin will fail to activate as the shibboleth_user_role filter hook will not be registered.\u003C\u002Fp>\n\u003Cp>To use this plugin, you must already have the following setup on your server:\u003Cbr \u002F>\n1. The above Shibbleth plugin.\u003Cbr \u002F>\n2. A UFAD group created for each of the WordPress roles (administrator, editor, author, contributor, and subscriber).\u003C\u002Fp>\n","This plugin extends the Shibboleth plugin to work with UFAD & Shibboleth at the University of Florida. Developed at the Florida Museum of Natural  &hellip;",10,4316,0,"2018-05-02T18:14:00.000Z","4.9.29","3.2.1","",[19,20,21,22,23],"login","saml","shibboleth","uf","ufad-authentication","http:\u002F\u002Fwww.floridamuseum.ufl.edu\u002Fomtforge","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fugrm.2.0.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":31,"display_name":7,"profile_url":8,"plugin_count":32,"total_installs":11,"avg_security_score":26,"avg_patch_time_days":33,"trust_score":34,"computed_at":35},"warrenbrown-1",1,30,84,"2026-04-04T11:39:02.856Z",[37,58,81,103,120],{"slug":21,"name":38,"version":39,"author":40,"author_profile":41,"description":42,"short_description":43,"active_installs":44,"downloaded":45,"rating":46,"num_ratings":47,"last_updated":48,"tested_up_to":49,"requires_at_least":50,"requires_php":51,"tags":52,"homepage":54,"download_link":55,"security_score":56,"vuln_count":32,"unpatched_count":13,"last_vuln_date":57,"fetched_at":28},"Shibboleth","2.5.3","michaelryanmcneill","https:\u002F\u002Fprofiles.wordpress.org\u002Fmichaelryanmcneill\u002F","\u003Cp>This plugin is designed to support integrating your WordPress site into your existing identity management infrastructure using a \u003Ca href=\"https:\u002F\u002Fincommon.org\u002Fsoftware\u002Fshibboleth\u002F\" rel=\"nofollow ugc\">Shibboleth\u003C\u002Fa> Service Provider.\u003C\u002Fp>\n\u003Cp>WordPress can be configured so that all standard login requests will be sent to your configured Shibboleth Identity Provider or Discovery Service.  Upon successful authentication, a new WordPress account will be automatically provisioned for the user if one does not already exist. User attributes (username, first name, last name, display name, nickname, and email address) can be synchronized with your enterprise’s system of record each time the user logs into WordPress.\u003C\u002Fp>\n\u003Cp>Finally, the user’s role within WordPress can be automatically set (and continually updated) based on any attribute Shibboleth provides.  For example, you may decide to give users with an eduPersonAffiliation value of \u003Cem>faculty\u003C\u002Fem> the WordPress role of \u003Cem>editor\u003C\u002Fem>, while the eduPersonAffiliation value of \u003Cem>student\u003C\u002Fem> maps to the WordPress role \u003Cem>contributor\u003C\u002Fem>.  Or you may choose to limit access to WordPress altogether using a special eduPersonEntitlement value.\u003C\u002Fp>\n\u003Ch4>Contribute on GitHub\u003C\u002Fh4>\n\u003Cp>This plugin is actively maintained by \u003Ca href=\"https:\u002F\u002Fprofiles.wordpress.org\u002Fmichaelryanmcneill\" rel=\"nofollow ugc\">michaelryanmcneill\u003C\u002Fa> and the WordPress community, \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmichaelryanmcneill\u002Fshibboleth\" rel=\"nofollow ugc\">using GitHub\u003C\u002Fa>. Contributions are welcome, via pull request, \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmichaelryanmcneill\u002Fshibboleth\" rel=\"nofollow ugc\">on GitHub\u003C\u002Fa>. Issues can be submitted \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmichaelryanmcneill\u002Fshibboleth\u002Fissues\" rel=\"nofollow ugc\">on the issue tracker\u003C\u002Fa>.\u003C\u002Fp>\n","Allows WordPress to externalize user authentication and account creation to a Shibboleth Service Provider.",3000,58761,86,7,"2026-02-26T13:22:00.000Z","6.9.4","4.0","5.6",[53,19,20,21],"authentication","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fshibboleth\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fshibboleth.2.5.3.zip",100,"2016-03-02 00:00:00",{"slug":59,"name":60,"version":61,"author":62,"author_profile":63,"description":64,"short_description":65,"active_installs":66,"downloaded":67,"rating":68,"num_ratings":69,"last_updated":70,"tested_up_to":49,"requires_at_least":71,"requires_php":51,"tags":72,"homepage":77,"download_link":78,"security_score":68,"vuln_count":79,"unpatched_count":13,"last_vuln_date":80,"fetched_at":28},"miniorange-saml-20-single-sign-on","SAML Single Sign On – SSO Login","5.4.1","miniOrange","https:\u002F\u002Fprofiles.wordpress.org\u002Fcyberlord92\u002F","\u003Cp>\u003Cstrong>Simplify WordPress Login Experience With Our SAML Single Sign On (SSO) Plugin\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>With the \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-single-sign-on-sso?utm_source=readme&utm_medium=saml_lp&utm_campaign=wp_saml_sso\" rel=\"nofollow ugc\">\u003Cstrong>miniOrange WordPress SAML SSO plugin\u003C\u002Fstrong>\u003C\u002Fa>, you can enable Single Sign On (SSO) for your WordPress site. This means users can sign in with their existing accounts from Identity Providers (IDPs) like \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-azure-ad?utm_source=readme&utm_medium=azure_guide&utm_campaign=microsoft_azure\" rel=\"nofollow ugc\">\u003Cstrong>Microsoft Azure AD\u002F Entra ID\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-google-apps?utm_source=readme&utm_medium=g_suite_guide&utm_campaign=google_workspace\" rel=\"nofollow ugc\">\u003Cstrong>Google Apps Login (Gsuite Login)\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-okta?utm_source=readme&utm_medium=okta_guide&utm_campaign=okta\" rel=\"nofollow ugc\">\u003Cstrong>Okta\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-salesforce?utm_source=readme&utm_medium=salesforce_guide&utm_campaign=salesforce\" rel=\"nofollow ugc\">\u003Cstrong>Salesforce Login\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fkeycloak-single-sign-on-wordpress-sso-saml?utm_source=readme&utm_medium=keycloak_guide&utm_campaign=keycloak\" rel=\"nofollow ugc\">\u003Cstrong>Keycloak\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-shibboleth-2?utm_source=readme&utm_medium=shibboleth2_guide&utm_campaign=shibboleth\" rel=\"nofollow ugc\">\u003Cstrong>Shibboleth\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-onelogin?utm_source=readme&utm_medium=onelogin_guide&utm_campaign=onelogin\" rel=\"nofollow ugc\">\u003Cstrong>OneLogin\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-adfs?utm_source=readme&utm_medium=supported_idps&utm_campaign=adfs\" rel=\"nofollow ugc\">\u003Cstrong>ADFS\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-auth0?utm_source=readme&utm_medium=supported_idps&utm_campaign=auth0\" rel=\"nofollow ugc\">\u003Cstrong>Auth0 Login\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-office-365-single-sign-on-sso-login?utm_source=readme&utm_medium=supported_idps&utm_campaign=office365\" rel=\"nofollow ugc\">\u003Cstrong>Office 365 Login\u003C\u002Fstrong>\u003C\u002Fa>,  and others without creating separate WordPress usernames and passwords.\u003C\u002Fp>\n\u003Cp>The SAML plugin makes your WordPress site function as a SAML-compliant Service Provider (SP) by using the SAML 2.0 protocol to securely exchange authentication data with your chosen Identity Provider (IDP). Once users are authenticated by the IDP, they automatically gain access to your WordPress site and its resources.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Our WP SSO plugin is designed for you if you need:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Cstrong>Instant Secure Authentication\u003C\u002Fstrong>\u003Cbr \u002F>\nUsers access WordPress immediately using their existing Identity Provider (IDP) credentials without managing WordPress-specific passwords.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Centralized Access Management\u003C\u002Fstrong>\u003Cbr \u002F>\nControl everyone’s WordPress access through your SAML Identity Provider (IDP) security policies.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Organization-Only Access\u003C\u002Fstrong>\u003Cbr \u002F>\nRestrict WordPress access exclusively to verified employees through SAML Identity Provider (IDP) authentication and MFA.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Smart User Provisioning\u003C\u002Fstrong>\u003Cbr \u002F>\nAutomatically create WordPress accounts and assign roles based on Identity Provider (IDP) groups and user data.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Reduced Administrative Overhead\u003C\u002Fstrong>\u003Cbr \u002F>\nEliminate manual user creation, password resets, role assignments, and access management tasks.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Flexibility Across Different Identity Providers (IDP)\u003C\u002Fstrong>\u003Cbr \u002F>\nOur SAML plugin works with 50+ IDPs. Enterprises can set up Azure AD login into WordPress for employees, while universities use WordPress Okta SSO, Google Apps SSO (Gsuite Login), Salesforce SSO, Shibboleth SSO, OneLogin SSO, ADFS SSO, Keycloak SSO, Office 365 Login,  Auth0 SSO, Azure B2C SSO or any other SAML IDPs of their choice.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Quick Links:\u003C\u002Fstrong> \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-single-sign-on-sso?utm_source=readme&utm_medium=saml_lp&utm_campaign=official_website\" rel=\"nofollow ugc\">🌐Official Website\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-saml-guides?utm_source=readme&utm_medium=all_guides&utm_campaign=setup_guide\" rel=\"nofollow ugc\">🛠️Setup Guide\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fsandbox.miniorange.com\u002F?utm_source=readme&utm_medium=sandbox&utm_campaign=free_trial\" rel=\"nofollow ugc\">🎁Free Full-Feature Trial\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-single-sign-on-sso?utm_source=readme&utm_medium=pricing_lp&utm_campaign=pricing_section#pricing\" rel=\"nofollow ugc\"> 💎Pricing Plans\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-single-sign-on-sso-integrations?utm_source=readme&utm_medium=wp_integrations_lp&utm_campaign=integrations_addon\" rel=\"nofollow ugc\">🧩Integrations & Addons\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-azure-office365-integrations?utm_source=readme&utm_medium=azure_365_lp&utm_campaign=office_365_integrations\" rel=\"nofollow ugc\">📧 Office 365 Integrations\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-single-sign-on-sso?utm_source=readme&utm_medium=contact_us&utm_campaign=support#contact-us\" rel=\"nofollow ugc\">🤝Support\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>WordPress SAML SSO Login Explained in Minutes\u003C\u002Fh3>\n\u003Cp>\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FLk6KEKcPTWk?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003C\u002Fp>\n\u003Ch3>WP SAML SSO Plugin Supports All SAML Identity Providers\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-azure-ad?utm_source=readme&utm_medium=supported_idps&utm_campaign=azure_ad_sso\" rel=\"nofollow ugc\">Azure SSO (Microsoft Entra ID)\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-okta?utm_source=readme&utm_medium=supported_idps&utm_campaign=login_okta_sso\" rel=\"nofollow ugc\">Login with Okta SSO\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-google-apps?utm_source=readme&utm_medium=supported_idps&utm_campaign=gsuite\" rel=\"nofollow ugc\">Google Apps Login\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-salesforce?utm_source=readme&utm_medium=supported_idps&utm_campaign=salesforce\" rel=\"nofollow ugc\">Salesforce SSO\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fkeycloak-single-sign-on-wordpress-sso-saml?utm_source=readme&utm_medium=supported_idps&utm_campaign=keycloak\" rel=\"nofollow ugc\">Keycloak SSO\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-adfs?utm_source=readme&utm_medium=supported_idps&utm_campaign=adfs\" rel=\"nofollow ugc\">ADFS\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-azure-b2c?utm_source=readme&utm_medium=supported_idps&utm_campaign=azure_ad_b2c\" rel=\"nofollow ugc\">Login With Azure AD B2C SSO\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-office-365-single-sign-on-sso-login?utm_source=readme&utm_medium=supported_idps&utm_campaign=office365\" rel=\"nofollow ugc\">Office 365 Login\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-onelogin?utm_source=readme&utm_medium=supported_idps&utm_campaign=onelogin\" rel=\"nofollow ugc\">OneLogin SSO\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-auth0?utm_source=readme&utm_medium=supported_idps&utm_campaign=auth0\" rel=\"nofollow ugc\">Auth0 SSO\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-pingone?utm_source=readme&utm_medium=supported_idps&utm_campaign=pingone\" rel=\"nofollow ugc\">PingOne\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsingle-sign-on-sso-between-two-wordpress-sites?utm_source=readme&utm_medium=supported_idps&utm_campaign=2wordpress_sites\" rel=\"nofollow ugc\">WordPress\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-miniorange?utm_source=readme&utm_medium=supported_idps&utm_campaign=miniorange\" rel=\"nofollow ugc\">miniOrange\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-oracle-enterprise-manager?utm_source=readme&utm_medium=supported_idps&utm_campaign=oracle\" rel=\"nofollow ugc\">Oracle\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-jumpcloud?utm_source=readme&utm_medium=supported_idps&utm_campaign=jumpcloud\" rel=\"nofollow ugc\">JumpCloud\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-for-wordpress-using-cyberark?utm_source=readme&utm_medium=supported_idps&utm_campaign=cyberark\" rel=\"nofollow ugc\">CyberArk\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-duo?utm_source=readme&utm_medium=supported_idps&utm_campaign=duo\" rel=\"nofollow ugc\">Duo\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-secureauth?utm_source=readme&utm_medium=supported_idps&utm_campaign=secureauth\" rel=\"nofollow ugc\">SecureAuth\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-absorb-lms?utm_source=readme&utm_medium=supported_idps&utm_campaign=absorb_lms\" rel=\"nofollow ugc\">Absorb LMS\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-adfs?utm_source=readme&utm_medium=supported_idps&utm_campaign=windows\" rel=\"nofollow ugc\">Windows\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-shibboleth-2?utm_source=readme&utm_medium=supported_idps&utm_campaign=shibboleth2\" rel=\"nofollow ugc\">Shibboleth SSO\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-centrify?utm_source=Readme&utm_medium=supported_idps&utm_campaign=Centrify\" rel=\"nofollow ugc\">Centrify SSO\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsaml-single-sign-on-sso-wordpress-using-custom-idp?utm_source=readme&utm_medium=supported_idps&utm_campaign=customidp\" rel=\"nofollow ugc\">Any Custom IDP Supporting SAML\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-saml-guides?utm_source=readme&utm_medium=supported_idps&utm_campaign=and_more\" rel=\"nofollow ugc\">And more\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Set Up Our WP Single Sign On (SSO) Plugin in Three Easy Steps\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>Step 1: Install Our WordPress SAML SSO Plugin\u003C\u002Fstrong>\u003Cbr \u002F>\nDownload the \u003Cstrong>WordPress SAML SSO (Single Sign On) plugin\u003C\u002Fstrong> from the WordPress plugin directory and install it on your WordPress site.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Step 2: Share Your WordPress Site’s Metadata from the WP SAML Plugin with the Identity Provider (IDP)\u003C\u002Fstrong>\u003Cbr \u002F>\nProvide the \u003Cstrong>Service Provider (SP)\u003C\u002Fstrong>, i.e., your WordPress site’s metadata URL or file, to your \u003Cstrong>Identity Provider (IDP)\u003C\u002Fstrong> to register your WordPress site as a trusted \u003Cstrong>Service Provider (SP)\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Step 3: Import Your Identity Provider’s (IDP) Metadata into the SAML SSO Plugin\u003C\u002Fstrong>\u003Cbr \u002F>\nNext, upload the IDP’s metadata URL or file to your WordPress site in the plugin settings to enable secure SAML authentication.\u003C\u002Fp>\n\u003Cp>That’s it! Your WordPress site is now secured with enterprise-grade Single Sign On (SSO) authentication. You can verify the connection by using the \u003Cstrong>Test Configuration button\u003C\u002Fstrong> in the SAML plugin.\u003C\u002Fp>\n\u003Ch3>Watch Our Complete Step-by-Step Installation Video for WordPress SSO SAML Login\u003C\u002Fh3>\n\u003Cp>Follow along with our detailed video walkthrough to see exactly how each step works and ensure your SAML SSO login is configured correctly from start to finish.\u003C\u002Fp>\n\u003Cp>\u003Cspan class=\"embed-youtube\" style=\"text-align:center; display: block;\">\u003Ciframe loading=\"lazy\" class=\"youtube-player\" width=\"750\" height=\"422\" src=\"https:\u002F\u002Fwww.youtube.com\u002Fembed\u002FgilfhNFYsgc?version=3&rel=1&showsearch=0&showinfo=1&iv_load_policy=1&fs=1&hl=en-US&autohide=2&wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\">\u003C\u002Fiframe>\u003C\u002Fspan>\u003C\u002Fp>\n\u003Ch3>Here to Support You, Always\u003C\u002Fh3>\n\u003Cp>Whether you have questions about setup, pricing, or how the WordPress SSO SAML plugin works, our expert team is available 24\u002F7 to assist you. Simply reach out to \u003Ca href=\"mailto:samlsupport@xecurify.com\" rel=\"nofollow ugc\">\u003Cstrong>samlsupport@xecurify.com\u003C\u002Fstrong>\u003C\u002Fa>, and we will ensure you receive timely and reliable guidance.\u003C\u002Fp>\n\u003Ch3>Features of Our WordPress SAML Single Sign On (SSO) Plugin\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>Unlimited User Authentications:\u003C\u002Fstrong> Allows an unlimited number of users to log in through SAML SSO with your IDP authentication while maintaining optimal site performance during peak traffic.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Auto Login:\u003C\u002Fstrong> Automatically logs users into WordPress if they have an active SAML IDP session, without requiring them to re-enter the IDP credentials.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Force Authentication:\u003C\u002Fstrong> Ensures that users authenticate via SAML IDP each time they log in to the WordPress site, regardless of any active IDP session.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Complete Site Protection:\u003C\u002Fstrong> Secures your site’s frontend pages\u002Fposts and backend WP-Admin pages behind SAML SSO (Single Sign On) by redirecting all users to IDP if an active session is not found on the IDP. You can add another security layer using Media Restriction and REST API authentication.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Automatic User Creation:\u003C\u002Fstrong> Creates new WordPress user accounts automatically on the user’s first Single Sign On login if no account exists by syncing their profile details from the IDP.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Account Linking:\u003C\u002Fstrong> Enables users to log into their existing WordPress accounts via their IDP credentials by matching their username or email in WordPress and SAML IDP. This ensures no duplicate accounts are created.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Just-in-Time (JIT) Profile Updation:\u003C\u002Fstrong> Updates WordPress user accounts at each SAML SSO login (Single Sign On) by syncing data from IDP. It maps basic attributes (username, email, first name, last name, etc.) and advanced\u002Fcustom attributes (department, phone, job title, employee ID, etc.) to maintain accurate user profiles.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Role-based Access:\u003C\u002Fstrong> Assigns WordPress roles such as Administrator, Editor, Author, Contributor, or Subscriber to users during WP SSO login. The role assignment is based on the group information provided by the IDP.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Custom Login Buttons and Shortcodes:\u003C\u002Fstrong> Adds SAML SSO login buttons to the WordPress login page or any page on the site using widgets and shortcodes. You can change the text, font, color, and size of these buttons to match your site’s design.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Single Logout (SLO):\u003C\u002Fstrong> Terminates a user’s session on the WordPress site and the IDP simultaneously when logging out of either of them.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Login Using Multiple IDPs:\u003C\u002Fstrong> Allows users to authenticate with different Identity Providers (IDPs) when logging into WordPress. You can also set up email domain mapping so users are automatically directed to the right IDP. For example, an organization can easily set up Azure AD SSO, Azure B2C SSO, Okta SSO, or any other IDP for employees, and use Gsuite SSO (Gsuite Login) for partners or vendors.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Certificate Sync and Multiple Certificates:\u003C\u002Fstrong> Automatically syncs X.509 certificates from the SAML Identity Provider (IDP), managing rollover, replacement, and addition without disrupting the SSO connection. It also supports multiple active certificates from the same IDP, allowing WordPress to work with custom setups or environments where more than one certificate is in use.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WordPress SSO on Multisite Networks:\u003C\u002Fstrong> Applies one SSO configuration to all subsites in a WordPress multisite network. This centralizes SSO management, so you do not need to configure each subsite individually.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Single & Multi‑Tenant Azure AD Login:\u003C\u002Fstrong> Connects both single-tenant (one directory) and multi-tenant (multiple directories) Azure AD(Login with Azure AD) or Office 365 Login to WordPress. Users from different tenants can log in to WordPress through Azure AD SSO using their existing accounts.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Cross-Environment Deployment:\u003C\u002Fstrong> Supports multiple environments such as Development, Test, and Production, allowing IT teams to configure WordPress SSO once and maintain consistent settings across all instances.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WP‑CLI Support:\u003C\u002Fstrong> Provides WP‑CLI commands for activating licenses, configuring WP SSO settings, importing or exporting configurations, and updating the plugin. All key SAML SSO functions can be managed from the command line without using the WordPress dashboard.\u003C\u002Fp>\n\u003Ch3>Extend Your Single Sign On Experience With Our Addons\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-user-provisioning?utm_source=readme&utm_medium=addons&utm_campaign=user_provisioning\" rel=\"nofollow ugc\">\u003Cstrong>Real-time SCIM User Provisioning:\u003C\u002Fstrong>\u003C\u002Fa> Syncs user records between the SAML IDP and WordPress in real time when the user is created, updated, or removed to maintain accurate data and strengthen security and efficiency.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-page-restriction?utm_source=readme&utm_medium=addons&utm_campaign=page_restriction\" rel=\"nofollow ugc\">\u003Cstrong>Page and Post Restriction:\u003C\u002Fstrong>\u003C\u002Fa> Controls access to your content by restricting pages and posts to specific user roles or login status (whether a user is logged in). If an unauthorized person attempts to view protected content, they can be automatically redirected to authenticate via a SAML Identity Provider (IDP), the WordPress login page, or any custom URL you specify.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-media-restriction?utm_source=readme&utm_medium=addons&utm_campaign=media_restriction\" rel=\"nofollow ugc\">\u003Cstrong>Media Restriction:\u003C\u002Fstrong>\u003C\u002Fa> Blocks unauthorized downloads of images, videos, and documents by allowing only SAML SSO–verified users with proper IDP permissions to view or retrieve media files.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-attribute-based-redirection-restriction?utm_source=readme&utm_medium=addons&utm_campaign=redirection_restriction\" rel=\"nofollow ugc\">\u003Cstrong>Attribute-Based Redirection:\u003C\u002Fstrong>\u003C\u002Fa> Directs users to specific URLs after Single Sign On based on IDP attributes such as role or department to ensure tailored access paths.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fguest-user-login?utm_source=readme&utm_medium=addons&utm_campaign=guest_user_login\" rel=\"nofollow ugc\">\u003Cstrong>Guest User Login (Anonymous Login):\u003C\u002Fstrong>\u003C\u002Fa> Allows users to log in to the WordPress site without creating a WordPress user account for them.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsso-session-management?utm_source=readme&utm_medium=addons&utm_campaign=sso_sessions\" rel=\"nofollow ugc\">\u003Cstrong>SSO Session Management:\u003C\u002Fstrong>\u003C\u002Fa> Sets default or role-specific session timeouts for SAML SSO users according to IDP-assigned roles to balance convenience with security.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-sso-login-audit?utm_source=readme&utm_medium=addons&utm_campaign=sso_audit\" rel=\"nofollow ugc\">\u003Cstrong>SSO Login Audit:\u003C\u002Fstrong>\u003C\u002Fa> Records all user login and registration activities on your WordPress site. It generates detailed reports that track essential information for each session, including the user, login time, and source IP address. The addon also includes advanced search filters for quickly locating specific events within the audit logs.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-ip-whitelisting?utm_source=readme&utm_medium=addons&utm_campaign=wp_ip_whitelisting\" rel=\"nofollow ugc\">\u003Cstrong>WordPress IP Whitelisting:\u003C\u002Fstrong>\u003C\u002Fa> Grants WordPress access to users with specific IPs and allows them to bypass IDP redirection and access restricted content.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-profile-picture-map?utm_source=readme&utm_medium=addons&utm_campaign=wp_profile_map\" rel=\"nofollow ugc\">\u003Cstrong>Profile Picture Mapping:\u003C\u002Fstrong>\u003C\u002Fa> Imports avatar images from the IDP into WordPress profiles for authenticated users to personalize the site experience.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-federation-single-sign-on?utm_source=readme&utm_medium=addons&utm_campaign=federation_sso\" rel=\"nofollow ugc\">\u003Cstrong>Federation SSO:\u003C\u002Fstrong>\u003C\u002Fa> Supports logins from multiple federated organizations, such as universities or research consortia, by leveraging standard IDP federation protocols to unify access.\u003C\u002Fp>\n\u003Cp>Our WordPress Single Sign On SAML plugin also integrates with third-party applications such as \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-learndash-integrator?utm_source=readme&utm_medium=addons&utm_campaign=learndash\" rel=\"nofollow ugc\">\u003Cstrong>LearnDash\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-woocommerce-integrator?utm_source=readme&utm_medium=addons&utm_campaign=woocommerce\" rel=\"nofollow ugc\">\u003Cstrong>WooCommerce\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-buddypress-integrator?utm_source=readme&utm_medium=addons&utm_campaign=buddypress\" rel=\"nofollow ugc\">\u003Cstrong>BuddyPress\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-memberpress-integrator?utm_source=readme&utm_medium=addons&utm_campaign=memberpress\" rel=\"nofollow ugc\">\u003Cstrong>MemberPress\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fpaid-membership-pro-integrator?utm_source=readme&utm_medium=addons&utm_campaign=membership_pro\" rel=\"nofollow ugc\">\u003Cstrong>Paid Memberships Pro\u003C\u002Fstrong>\u003C\u002Fa>, and \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-single-sign-on-sso-integrations?utm_source=readme&utm_medium=addons&utm_campaign=more\" rel=\"nofollow ugc\">\u003Cstrong>more\u003C\u002Fstrong>\u003C\u002Fa>, providing a simple SAML Single Sign On (SSO) experience that lets users access courses, online stores, community forums, membership content, and other protected resources with a single login.\u003C\u002Fp>\n\u003Ch3>Top Use Cases of Our WordPress SAML Single Sign On (SSO) Plugin\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>Education: SSO for Schools, Universities, and Federated Institutions\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Our WordPress SAML SSO plugin helps \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fsingle-sign-on-sso-for-education-and-universities-in-wordpress?utm_source=readme&utm_medium=education_sso&utm_campaign=educational_institutions\" rel=\"nofollow ugc\">\u003Cstrong>educational institutions\u003C\u002Fstrong>\u003C\u002Fa> simplify secure access across their WordPress sites. Faculty and staff can log in through Azure SSO, while external collaborators or research partners authenticate using WordPress Okta SSO, Shibboleth SSO, GSuite SSO\u002F Google Apps SSO, and other IDPs. This flexibility ensures universities can accommodate multiple identity providers without creating separate WordPress accounts for every user.\u003C\u002Fp>\n\u003Cp>Along with multiple IDPs, the WordPress SAML plugin also supports academic federations such as InCommon, HAKA, HKAF, etc. These federations connect entire networks of trusted institutions and allow users to authenticate with their home institution credentials, enabling students, faculty, and researchers from partner universities or organizations to access WordPress resources directly.\u003C\u002Fp>\n\u003Cp>With our WordPress SAML plugin, universities can also manage \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-multisite-single-sign-on-sso-login?utm_source=readme&utm_medium=multisite_sso&utm_campaign=sso_multisite_networks\" rel=\"nofollow ugc\">\u003Cstrong>SSO for Multisite Networks\u003C\u002Fstrong>\u003C\u002Fa> more effectively, making it easy to control access across subsites such as library.uni.edu or research.uni.edu. It further provides \u003Cstrong>Guest User Login\u003C\u002Fstrong> for temporary access by external collaborators, ensuring consistent and secure entry to academic resources.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Healthcare: WordPress SSO for Hospitals, Clinics, and Medical Portals\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Healthcare organizations require access controls that protect sensitive data while remaining compliant with regulations. Our \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-single-sign-on-sso-for-healthcare-medical-institutes?utm_source=readme&utm_medium=healthcare_sso&utm_campaign=sso_plugin_healthcare\" rel=\"nofollow ugc\">\u003Cstrong>WordPress SAML SSO plugin for healthcare\u003C\u002Fstrong>\u003C\u002Fa> allows hospitals, clinics, medical portals, and other Healthcare Providers (HCPs) to authenticate users against their existing IDPs.\u003C\u002Fp>\n\u003Cp>The WordPress SAML SSO plugin includes advanced features such as \u003Cstrong>Force Authentication\u003C\u002Fstrong>, which requires users outside the hospital network to authenticate with their IDP to access organizational resources, while allowing on-site users immediate access without re-authentication.\u003C\u002Fp>\n\u003Cp>To further protect sensitive data, healthcare administrators can configure \u003Cstrong>Role‑based Restrictions\u003C\u002Fstrong> that limit access to patient records, laboratory results, research data, administrative content, and other sensitive information. This ensures that only authorized personnel can view or manage sensitive resources while helping institutions stay compliant with HIPAA and other healthcare data protection standards.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WooCommerce: SSO for B2B, Institutional Buyers, and E-Commerce\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>For online stores, the shopping experience depends on security and convenience working together. Our \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-woocommerce-sso-single-sign-on?utm_source=readme&utm_medium=wp_woocommerce_sso&utm_campaign=saml_sso\" rel=\"nofollow ugc\">\u003Cstrong>WordPress SAML SSO\u003C\u002Fstrong>\u003C\u002Fa> plugin integrates WooCommerce with Identity Providers (IDPs) such as Azure AD, Okta, or even other WordPress sites, allowing customers and staff to sign in with the same credentials they already use in their organization.\u003C\u002Fp>\n\u003Cp>When deployed with the \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-woocommerce-integrator?utm_source=readme&utm_medium=wp_woocommerce&utm_campaign=woocommerce_integrator\" rel=\"nofollow ugc\">\u003Cstrong>WooCommerce Integrator\u003C\u002Fstrong>\u003C\u002Fa>, SSO becomes part of the checkout process. Customers adding products to their carts are prompted to authenticate, and once logged in, their account details and order information synchronize automatically.\u003C\u002Fp>\n\u003Cp>On the backend, manager and staff roles assigned in the IDP flow directly into WooCommerce, granting specific access to order data, inventory, and dealer portals. With user permissions centralized, businesses avoid duplication errors and maintain consistent security across their e‑commerce operations.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Multiple Site Businesses: SSO (Single Sign On) in WordPress to WordPress sites\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Many businesses run multiple WordPress sites: a \u003Cstrong>main site\u003C\u002Fstrong> that stores all user accounts and roles (customers, managers, staff), and \u003Cstrong>secondary sites\u003C\u002Fstrong> that provide additional services and resources.\u003C\u002Fp>\n\u003Cp>To avoid repeated logins and maintain consistent user management, the secondary sites can act as Service Providers (SPs) using our SAML Single Sign On plugin, while the main site serves as the Identity Provider (IDP) using the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fminiorange-wp-as-saml-idp\u002F?utm_source=readme&utm_medium=saml_idp&utm_campaign=website_user_plugin\" rel=\"ugc\">\u003Cstrong>SAML IDP – Login with Website Users plugin\u003C\u002Fstrong>\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>When a user tries to access a secondary site, they are redirected to log in on the main site. Upon successful authentication, their credentials, profile details, and roles are passed back to the SP site. This provides seamless access, keeps user data synchronized, and maintains role-based permissions across both sites without manual account duplication.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enterprise: SSO with Azure AD (Microsoft Entra ID)\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>Our SAML SSO plugin supports both \u003Cstrong>Single-Tenant\u003C\u002Fstrong> and \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-azure-office365-integrations?utm_source=readme&utm_medium=azure365_lp&utm_campaign=multi_tenant_azure\" rel=\"nofollow ugc\">\u003Cstrong>Multi-Tenant Azure AD SSO\u003C\u002Fstrong>\u003C\u002Fa>, allowing users from different Azure AD (Microsoft Entra ID) tenants, whether they belong to separate organizations, subsidiaries, or business units, to securely log in to WordPress using Azure AD.\u003C\u002Fp>\n\u003Cp>To simplify user lifecycle management, the plugin offers full \u003Cstrong>SCIM Provisioning and Deprovisioning\u003C\u002Fstrong>, automatically creating, updating, or removing WordPress accounts whenever changes are made in Azure AD. This ensures user data and permissions remain consistent and up to date across systems without manual intervention.\u003C\u002Fp>\n\u003Cp>For added reliability, the SAML plugin includes \u003Cstrong>Automatic Certificate Synchronization\u003C\u002Fstrong>, handling certificate rotation in Azure AD SSO behind the scenes. This eliminates downtime and prevents login failures, ensuring users can always access WordPress without disruption.\u003C\u002Fp>\n\u003Cp>The WordPress SAML plugin also extends beyond authentication by connecting WordPress with core Microsoft applications, including \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fmicrosoft-sharepoint-wordpress-integration?utm_source=readme&utm_medium=wp_sharepoint_lp&utm_campaign=sharepoint\" rel=\"nofollow ugc\">\u003Cstrong>SharePoint\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fmicrosoft-power-bi-embed-for-wordpress?utm_source=readme&utm_medium=wp_powerbi_lp&utm_campaign=powerbi\" rel=\"nofollow ugc\">\u003Cstrong>Power BI\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-integration-with-dynamics-crm-365-apps?utm_source=readme&utm_medium=wp_dynamic_lp&utm_campaign=dynamic_crm\" rel=\"nofollow ugc\">\u003Cstrong>Dynamics CRM\u003C\u002Fstrong>\u003C\u002Fa>, \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-outlook-calendar-events-integration?utm_source=readme&utm_medium=wp_outlook_lp&utm_campaign=outlook\" rel=\"nofollow ugc\">\u003Cstrong>Outlook\u003C\u002Fstrong>\u003C\u002Fa>, and \u003Ca href=\"https:\u002F\u002Fplugins.miniorange.com\u002Fwordpress-azure-ad-b2c-office-365-integrations?utm_source=readme&utm_medium=azure_b2c_lp&utm_campaign=more\" rel=\"nofollow ugc\">\u003Cstrong>more\u003C\u002Fstrong>\u003C\u002Fa>, making it easy to embed files, display dashboards, and synchronize data within WordPress.\u003C\u002Fp>\n\u003Ch3>Feedback and Support\u003C\u002Fh3>\n\u003Cp>We’re committed to ensuring you have a smooth experience with our \u003Cstrong>WordPress SAML Single Sign On (SSO) plugin\u003C\u002Fstrong>. If you  &hellip;\u003C\u002Fp>\n","SAML SSO (Single Sign On) for WordPress Login with Okta, Entra ID, Azure AD\u002FB2C, G-Suite, Shibboleth, OneLogin, Keycloak, Salesforce [24\u002F7 Support]",10000,485532,98,361,"2026-02-19T07:46:00.000Z","3.7",[73,74,20,75,76],"azure-ad","okta-login","single-sign-on","sso","https:\u002F\u002Fminiorange.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fminiorange-saml-20-single-sign-on.5.4.1.zip",6,"2023-09-05 00:00:00",{"slug":82,"name":83,"version":84,"author":85,"author_profile":86,"description":87,"short_description":88,"active_installs":89,"downloaded":90,"rating":91,"num_ratings":92,"last_updated":93,"tested_up_to":94,"requires_at_least":95,"requires_php":17,"tags":96,"homepage":101,"download_link":102,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"wpuf-login-redirect","WPUF Login Redirect","0.2","Nazmul Hassan","https:\u002F\u002Fprofiles.wordpress.org\u002Fnazmulhassann20\u002F","\u003Cp>In Wp user fronted plugin user can post from fronted. Also user can edit his post from frontend.\u003C\u002Fp>\n\u003Cblockquote>\n\u003Cp>This plugin gives you the ability to redirect user of Wp user frontend (free\u002Fpro) to specific page. You can set specific page from the parent \u003Ca href=\"https:\u002F\u002FWordPress.org\u002Fplugins\u002Fwp-user-frontend\" rel=\"ugc\">\u003Cstrong>WP User Frontend\u003C\u002Fstrong>\u003C\u002Fa> plugin settings to redirect your user.\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Cp>Author:  \u003Ca href=\"https:\u002F\u002Ftwitter.com\u002FnayemDevs\" rel=\"nofollow ugc\">@nayemDevs\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Features:\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Redirect user to specific page after login through WP User Fronted login page.\u003C\u002Fli>\n\u003Cli>Admin can see the page list to select one of them to redirect\u003C\u002Fli>\n\u003C\u002Fol>\n","In Wp user fronted plugin user can post from fronted. Also user can edit his post from frontend.",50,4018,74,3,"2015-09-19T15:11:00.000Z","4.3.34","3.3",[19,97,98,99,100],"redirect","user-redirect","wp-user-frontend","wpuf","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwpuf-login-redirect","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwpuf-login-redirect.zip",{"slug":104,"name":105,"version":106,"author":104,"author_profile":107,"description":108,"short_description":109,"active_installs":110,"downloaded":111,"rating":13,"num_ratings":13,"last_updated":17,"tested_up_to":112,"requires_at_least":113,"requires_php":114,"tags":115,"homepage":17,"download_link":118,"security_score":56,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":119},"logto","Logto – User Authentication and Authorization","1.0.1","https:\u002F\u002Fprofiles.wordpress.org\u002Flogto\u002F","\u003Cp>Thank you for choosing \u003Ca href=\"https:\u002F\u002Flogto.io\u002F?ref=wpp\" rel=\"nofollow ugc\">Logto\u003C\u002Fa>! By integrating Logto into your WordPress site, you are not only enhancing the security and user experience of your site, but also enabling a unified login experience across all your applications.\u003C\u002Fp>\n\u003Ch3>Why Logto?\u003C\u002Fh3>\n\u003Cp>Logto is an open-source Auth0 alternative and a modern authentication and authorization solution for all your applications, including your WordPress sites. With Logto, you can:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Enable passwordless login, social login, single sign-on (SSO), and multi-factor authentication (MFA) for your WordPress site.\u003C\u002Fli>\n\u003Cli>Use role-based access control (RBAC) to manage user permissions.\u003C\u002Fli>\n\u003Cli>Support generic OAuth2, OpenID Connect, and SAML protocols.\u003C\u002Fli>\n\u003Cli>Customize the login and registration pages to match your brand.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>In addition, Logto offers dozens of out-of-the-box integrations with popular social login providers, including Google, GitHub, Entra ID (Azure AD), Facebook, and more. Check out the \u003Ca href=\"https:\u002F\u002Fdocs.logto.io\u002Fintegrations\" rel=\"nofollow ugc\">full list of built-in integrations and social login providers\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>Get started\u003C\u002Fh3>\n\u003Cp>If you are new to Logto, we recommend checking out our \u003Ca href=\"https:\u002F\u002Fdocs.logto.io\u002F\" rel=\"nofollow ugc\">introduction page\u003C\u002Fa> to have a quick overview of Logto concepts and features.\u003C\u002Fp>\n\u003Cp>If you are looking for a step-by-step guide to set up Logto, please refer to our \u003Ca href=\"https:\u002F\u002Fdocs.logto.io\u002Fquick-start\u002Fwordpress-plugin\" rel=\"nofollow ugc\">WordPress plugin quick start guide\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>If you have any questions or feedback, please feel free to:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fdiscord.com\u002Finvite\u002FUEPaF3j5e6\" rel=\"nofollow ugc\">Join our Discord server\u003C\u002Fa> to get help from the community.\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fgithub.com\u002Flogto-io\u002Fwordpress\u002Fissues\" rel=\"nofollow ugc\">Open an issue on GitHub\u003C\u002Fa> to report bugs or request features.\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Flogto.io\u002F\" rel=\"nofollow ugc\">Subscribe to a paid plan\u003C\u002Fa> to get access to official support and more features.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>From WordPress admin panel\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Go to \u003Cstrong>Plugins\u003C\u002Fstrong> > \u003Cstrong>Add New\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>Search for “Logto”.\u003C\u002Fli>\n\u003Cli>Click \u003Cstrong>Install Now\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>Click \u003Cstrong>Activate\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>Go to \u003Cstrong>Settings\u003C\u002Fstrong> > \u003Cstrong>Logto\u003C\u002Fstrong> to configure the plugin.\u003C\u002Fli>\n\u003Cli>Follow the \u003Ca href=\"https:\u002F\u002Fdocs.logto.io\u002Fquick-start\u002Fwordpress-plugin\" rel=\"nofollow ugc\">quick start guide\u003C\u002Fa> to set up Logto.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>From WordPress.org\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Search for “Logto” in the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002F\" rel=\"ugc\">WordPress.org plugin directory\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>Download the plugin ZIP file.\u003C\u002Fli>\n\u003Cli>Go to \u003Cstrong>Plugins\u003C\u002Fstrong> > \u003Cstrong>Add New\u003C\u002Fstrong> in your WordPress admin panel.\u003C\u002Fli>\n\u003Cli>Click \u003Cstrong>Upload Plugin\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>Select the downloaded ZIP file and click \u003Cstrong>Install Now\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>Click \u003Cstrong>Activate\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>Go to \u003Cstrong>Settings\u003C\u002Fstrong> > \u003Cstrong>Logto\u003C\u002Fstrong> to configure the plugin.\u003C\u002Fli>\n\u003Cli>Follow the \u003Ca href=\"https:\u002F\u002Fdocs.logto.io\u002Fquick-start\u002Fwordpress-plugin\" rel=\"nofollow ugc\">quick start guide\u003C\u002Fa> to set up Logto.\u003C\u002Fli>\n\u003C\u002Fol>\n","Enable beautiful and secure user authentication, including passwordless, social login, single sign-on, multi-factor authentication (MFA), and more.",20,846,"6.7.5","6.0","8.1",[19,116,117,20,76],"oauth","oidc","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Flogto.1.0.1.zip","2026-03-15T10:48:56.248Z",{"slug":121,"name":122,"version":123,"author":124,"author_profile":125,"description":126,"short_description":127,"active_installs":11,"downloaded":128,"rating":13,"num_ratings":13,"last_updated":129,"tested_up_to":49,"requires_at_least":130,"requires_php":131,"tags":132,"homepage":133,"download_link":134,"security_score":56,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"authress","SSO Login – Universal (OAuth + SAML)","0.2.107","Authress","https:\u002F\u002Fprofiles.wordpress.org\u002Fauthress\u002F","\u003Cp>This plugin upgrades the standard \u003Cstrong>WordPress login\u003C\u002Fstrong> forms with one powered by \u003Ca href=\"https:\u002F\u002Fauthress.io\" rel=\"nofollow ugc\">Authress\u003C\u002Fa> that enables:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Universal authentication\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>Over 40 social login providers\u003C\u002Fli>\n\u003Cli>Enterprise connections (SAML, Office 365, Google Apps, and more)\u003C\u002Fli>\n\u003Cli>Customer configurable SSO connections\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Ultra secure\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>User identity\u003C\u002Fli>\n\u003Cli>Security access policies\u003C\u002Fli>\n\u003Cli>Mitigate brute force attacks\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Which includes:\u003Cbr \u002F>\n– Azure AD and B2C\u003Cbr \u002F>\n– Office 365\u003Cbr \u002F>\n– WSO2\u003Cbr \u002F>\n– Ping Identity\u003Cbr \u002F>\n– Okta\u003Cbr \u002F>\n– Auth0\u003Cbr \u002F>\n– Keyclock\u003Cbr \u002F>\n– LinkedIn\u003Cbr \u002F>\n– Salesforce\u003Cbr \u002F>\n– Twitter\u003Cbr \u002F>\n– Google Workspace\u003Cbr \u002F>\n– Yahoo\u003Cbr \u002F>\n– Salesforce\u003Cbr \u002F>\n– Hubspot\u003Cbr \u002F>\n– Steam\u003Cbr \u002F>\n– Slack\u003Cbr \u002F>\n– And any custom OAuth2.1, OpenID, or SAML provider\u003C\u002Fp>\n\u003Cp>With \u003Cstrong>SSO Login\u003C\u002Fstrong>, you can automatically support business and enterprise customers that have important security requirements for their users to use your site and platform.\u003C\u002Fp>\n\u003Ch3>Technical Notes\u003C\u002Fh3>\n\u003Cp>By using this plugin you are delegating the site authentication and profile handling to Authress. That means that you won’t need to use the WordPress database to authenticate users and the default WordPress login forms will be upgraded to support the new SSO Login flow.\u003C\u002Fp>\n\u003Cp>Please see our \u003Ca href=\"https:\u002F\u002Fauthress.io\u002Fknowledge-base\u002F\" rel=\"nofollow ugc\">knowledge base\u003C\u002Fa> for more information on how Authress authenticates and manages your users.\u003C\u002Fp>\n\u003Ch4>Migrating Existing Users\u003C\u002Fh4>\n\u003Cp>Authress allows multiple authentication providers. You can have social providers like Facebook, Twitter, Google+, a database of users and passwords (just like WordPress), or you can use an Enterprise directories like, Office365, Google Apps, SAML, OpenID, OAuth2.1. All those authentication providers are supported and more.\u003C\u002Fp>\n\u003Ch3>How to customize this plugin\u003C\u002Fh3>\n\u003Cp>This plugin provides extension points to make it easier to configure it exactly as you need. Check out the full docs:\u003Cbr \u002F>\n* \u003Ca href=\"https:\u002F\u002Fgithub.com\u002FAuthress\u002Fwordpress-sso-login\u002Fblob\u002Fmain\u002Fdocs\u002Fcustomizations.md\" rel=\"nofollow ugc\">SSO Login customizations\u003C\u002Fa>\u003C\u002Fp>\n","SSO Login provides user login, business authentication, SSO, Social login, and Single Sign-On for all sites.",5181,"2025-11-29T18:03:00.000Z","5.5","8.2",[19,116,20,75,76],"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fauthress","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fauthress.0.2.107.zip",{"attackSurface":136,"codeSignals":158,"taintFlows":179,"riskAssessment":205,"analyzedAt":210},{"hooks":137,"ajaxHandlers":154,"restRoutes":155,"shortcodes":156,"cronEvents":157,"entryPointCount":13,"unprotectedCount":13},[138,144,150],{"type":139,"name":140,"callback":141,"file":142,"line":143},"action","admin_menu","UGRM_Menu","options.php",2,{"type":145,"name":146,"callback":147,"file":148,"line":149},"filter","shibboleth_user_role","UGRM_munge_UFAD_Groups2Roles","UGRM.php",72,{"type":145,"name":151,"callback":152,"file":148,"line":153},"shibboleth_session_initiator_url","UGRM_munge_return_target_to_HTTPS",88,[],[],[],[],{"dangerousFunctions":159,"sqlUsage":160,"outputEscaping":162,"fileOperations":32,"externalRequests":13,"nonceChecks":13,"capabilityChecks":32,"bundledLibraries":178},[],{"prepared":13,"raw":13,"locations":161},[],{"escaped":13,"rawEcho":47,"locations":163},[164,167,169,171,173,175,177],{"file":142,"line":165,"context":166},44,"raw output",{"file":142,"line":168,"context":166},49,{"file":142,"line":170,"context":166},54,{"file":142,"line":172,"context":166},59,{"file":142,"line":174,"context":166},64,{"file":142,"line":176,"context":166},69,{"file":142,"line":91,"context":166},[],[180,197],{"entryPoint":181,"graph":182,"unsanitizedCount":13,"severity":196},"UGRM_page_builder (options.php:12)",{"nodes":183,"edges":193},[184,188],{"id":185,"type":186,"label":187,"file":142,"line":165},"n0","source","$_SERVER['REQUEST_URI']",{"id":189,"type":190,"label":191,"file":142,"line":165,"wp_function":192},"n1","sink","echo() [XSS]","echo",[194],{"from":185,"to":189,"sanitized":195},true,"low",{"entryPoint":198,"graph":199,"unsanitizedCount":13,"severity":196},"\u003Coptions> (options.php:0)",{"nodes":200,"edges":203},[201,202],{"id":185,"type":186,"label":187,"file":142,"line":165},{"id":189,"type":190,"label":191,"file":142,"line":165,"wp_function":192},[204],{"from":185,"to":189,"sanitized":195},{"summary":206,"deductions":207},"The ugrm plugin v2.0.1 exhibits a generally good security posture with no recorded vulnerabilities or critical taint flows. The absence of known CVEs and the use of prepared statements for all SQL queries are strong indicators of secure coding practices.  However, a significant concern arises from the lack of output escaping on all identified outputs. This presents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the website.  While the plugin has a clean vulnerability history, this single unaddressed issue of unescaped output significantly weakens its overall security.  The minimal attack surface and a capability check on a file operation are positive signs, but the unescaped output issue requires immediate attention to mitigate potential XSS risks.",[208],{"reason":209,"points":110},"No output escaping","2026-03-17T01:02:14.239Z",{"wat":212,"direct":217},{"assetPaths":213,"generatorPatterns":214,"scriptPaths":215,"versionParams":216},[],[],[],[],{"cssClasses":218,"htmlComments":219,"htmlAttributes":220,"restEndpoints":221,"jsGlobals":222,"shortcodeOutput":223},[],[],[],[],[],[]]