[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fygHxae2Cxb3QR7iBRmekX4ieXc2Ju_U-_lv9Jx2JvZQ":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":22,"download_link":23,"security_score":24,"vuln_count":25,"unpatched_count":25,"last_vuln_date":26,"fetched_at":27,"vulnerabilities":28,"developer":29,"crawl_stats":26,"alternatives":37,"analysis":133,"fingerprints":219},"wp-saml-auth","WP SAML Auth","2.3.1","Pantheon Systems","https:\u002F\u002Fprofiles.wordpress.org\u002Fgetpantheon\u002F","\u003Cp>SAML authentication for WordPress, using the bundled OneLogin SAML library or optionally installed \u003Ca href=\"https:\u002F\u002Fsimplesamlphp.org\u002F\" rel=\"nofollow ugc\">SimpleSAMLphp\u003C\u002Fa>. OneLogin provides a SAML authentication bridge; SimpleSAMLphp provides SAML plus a variety of other authentication mechanisms. This plugin acts as a bridge between WordPress and the authentication library.\u003C\u002Fp>\n\u003Cp>If your organization uses Google Apps, \u003Ca href=\"https:\u002F\u002Fpantheon.io\u002Fdocs\u002Fwordpress-google-sso\u002F\" rel=\"nofollow ugc\">integrating Google Apps with WP SAML Auth\u003C\u002Fa> takes just a few steps.\u003C\u002Fp>\n\u003Cp>The standard user flow looks like this:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>User can log in via SAML using a button added to the standard WordPress login view.\u003C\u002Fli>\n\u003Cli>When the button is clicked, the user is handed off to the authentication library. With OneLogin, the user is redirected to the SAML identity provider. With SimpleSAMLphp, the user is redirected to the SimpleSAMLphp install.\u003C\u002Fli>\n\u003Cli>Once the user is authenticated with the identity provider, they’re redirected back to WordPress and signed in to their account. A new WordPress user will be created if none exists (although this behavior can be disabled).\u003C\u002Fli>\n\u003Cli>When the user logs out of WordPress, they are also logged out of the identity provider.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>A set of configuration options allow you to change the plugin’s default behavior. For instance, \u003Ccode>permit_wp_login=>false\u003C\u002Fcode> will force all authentication to go through the SAML identity provider, bypassing \u003Ccode>wp-login.php\u003C\u002Fcode>. Similiarly, \u003Ccode>auto_provision=>false\u003C\u002Fcode> will disable automatic creation of new WordPress users.\u003C\u002Fp>\n\u003Cp>See installation instructions for full configuration details.\u003C\u002Fp>\n\u003Ch3>Installing SimpleSAMLphp\u003C\u002Fh3>\n\u003Cp>The plugin supports both SimpleSAMLphp v1.x and v2.x. The autoloader is automatically detected:\u003C\u002Fp>\n\u003Cp>\u003Cstrong>SimpleSAMLphp v2.x\u003C\u002Fstrong> uses \u003Ccode>vendor\u002Fautoload.php\u003C\u002Fcode>\u003Cbr \u002F>\n\u003Cstrong>SimpleSAMLphp v1.x\u003C\u002Fstrong> uses \u003Ccode>lib\u002F_autoload.php\u003C\u002Fcode>\u003C\u002Fp>\n\u003Ch4>Default Search Paths\u003C\u002Fh4>\n\u003Cp>The plugin automatically searches for SimpleSAMLphp in these locations:\u003Cbr \u002F>\n* \u003Ccode>ABSPATH . 'simplesaml'\u003C\u002Fcode>\u003Cbr \u002F>\n* \u003Ccode>ABSPATH . 'private\u002Fsimplesamlphp'\u003C\u002Fcode>\u003Cbr \u002F>\n* \u003Ccode>ABSPATH . 'simplesamlphp'\u003C\u002Fcode>\u003Cbr \u002F>\n* \u003Ccode>ABSPATH . 'vendor\u002Fsimplesamlphp\u002Fsimplesamlphp'\u003C\u002Fcode> (Composer installation)\u003Cbr \u002F>\n* \u003Ccode>plugin_dir_path . 'simplesamlphp'\u003C\u002Fcode>\u003C\u002Fp>\n\u003Cp>For each path, the plugin checks for both \u003Ccode>vendor\u002Fautoload.php\u003C\u002Fcode> (v2.x) and \u003Ccode>lib\u002F_autoload.php\u003C\u002Fcode> (v1.x).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>This means Composer installations work automatically!\u003C\u002Fstrong> If you run \u003Ccode>composer require simplesamlphp\u002Fsimplesamlphp\u003C\u002Fcode> in your site root, the plugin will find it without any additional configuration.\u003C\u002Fp>\n\u003Ch4>Composer Installation (Advanced)\u003C\u002Fh4>\n\u003Cp>If you install SimpleSAMLphp via Composer to a \u003Cstrong>custom location\u003C\u002Fstrong> (not the standard \u003Ccode>vendor\u002Fsimplesamlphp\u002Fsimplesamlphp\u003C\u002Fcode>), you can specify the autoloader path:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>add_filter( 'wp_saml_auth_option', function( $value, $option_name ) {\n    if ( 'simplesamlphp_autoload' === $option_name ) {\n        \u002F\u002F Point to your custom Composer vendor autoloader\n        return '\u002Fcustom\u002Fpath\u002Fvendor\u002Fautoload.php';\n    }\n    return $value;\n}, 10, 2 );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Ch4>Custom Installation Paths\u003C\u002Fh4>\n\u003Cp>If SimpleSAMLphp is installed in a non-default location, you can set custom search paths with the \u003Ccode>wp_saml_auth_simplesamlphp_path_array\u003C\u002Fcode> filter:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>add_filter( 'wp_saml_auth_simplesamlphp_path_array', function( $simplesamlphp_path_array ) {\n    \u002F\u002F Override default paths with custom paths\n    return [ '\u002Fcustom\u002Fpath\u002Fto\u002Fsimplesamlphp' ];\n} );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cp>Or define an explicit autoloader path with the \u003Ccode>wp_saml_auth_ssp_autoloader\u003C\u002Fcode> filter:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>add_filter( 'wp_saml_auth_ssp_autoloader', function( $ssp_autoloader ) {\n    return ABSPATH . 'path\u002Fto\u002Fsimplesamlphp\u002Fvendor\u002Fautoload.php';\n} );\u003Ch3>WP-CLI Commands\u003C\u002Fh3>\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cp>This plugin implements a variety of \u003Ca href=\"https:\u002F\u002Fwp-cli.org\" rel=\"nofollow ugc\">WP-CLI\u003C\u002Fa> commands. All commands are grouped into the \u003Ccode>wp saml-auth\u003C\u002Fcode> namespace.\u003C\u002Fp>\n\u003Cpre>\u003Ccode>$ wp help saml-auth\n\nNAME\n\n  wp saml-auth\n\nDESCRIPTION\n\n  Configure and manage the WP SAML Auth plugin.\n\nSYNOPSIS\n\n  wp saml-auth \u003Ccommand>\n\nSUBCOMMANDS\n\n  scaffold-config      Scaffold a configuration filter to customize WP SAML Auth usage.\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Cp>Use \u003Ccode>wp help saml-auth \u003Ccommand>\u003C\u002Fcode> to learn more about each command.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Note:\u003C\u002Fstrong> The \u003Ccode>scaffold-config\u003C\u002Fcode> command generates a configuration function with default values. The \u003Ccode>simplesamlphp_autoload\u003C\u002Fcode> option is not included in the scaffolded output because the plugin auto-detects SimpleSAMLphp installations. Only add this option manually if SimpleSAMLphp is in a non-standard location.\u003C\u002Fp>\n\u003Ch3>Contributing\u003C\u002Fh3>\n\u003Cp>See \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fpantheon-systems\u002Fwp-saml-auth\u002Fblob\u002Fmain\u002FCONTRIBUTING.md\" rel=\"nofollow ugc\">CONTRIBUTING.md\u003C\u002Fa> for information on contributing.\u003C\u002Fp>\n","SAML authentication for WordPress.",7000,198907,88,7,"2026-03-09T14:46:00.000Z","6.9.4","6.4","7.4",[20,21],"authentication","saml","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwp-saml-auth\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-saml-auth.2.3.1.zip",100,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":30,"display_name":7,"profile_url":8,"plugin_count":31,"total_installs":32,"avg_security_score":33,"avg_patch_time_days":34,"trust_score":35,"computed_at":36},"getpantheon",8,39000,99,30,93,"2026-04-04T08:29:15.054Z",[38,58,78,95,111],{"slug":39,"name":40,"version":41,"author":42,"author_profile":43,"description":44,"short_description":45,"active_installs":46,"downloaded":47,"rating":48,"num_ratings":14,"last_updated":49,"tested_up_to":16,"requires_at_least":50,"requires_php":51,"tags":52,"homepage":54,"download_link":55,"security_score":24,"vuln_count":56,"unpatched_count":25,"last_vuln_date":57,"fetched_at":27},"shibboleth","Shibboleth","2.5.3","michaelryanmcneill","https:\u002F\u002Fprofiles.wordpress.org\u002Fmichaelryanmcneill\u002F","\u003Cp>This plugin is designed to support integrating your WordPress site into your existing identity management infrastructure using a \u003Ca href=\"https:\u002F\u002Fincommon.org\u002Fsoftware\u002Fshibboleth\u002F\" rel=\"nofollow ugc\">Shibboleth\u003C\u002Fa> Service Provider.\u003C\u002Fp>\n\u003Cp>WordPress can be configured so that all standard login requests will be sent to your configured Shibboleth Identity Provider or Discovery Service.  Upon successful authentication, a new WordPress account will be automatically provisioned for the user if one does not already exist. User attributes (username, first name, last name, display name, nickname, and email address) can be synchronized with your enterprise’s system of record each time the user logs into WordPress.\u003C\u002Fp>\n\u003Cp>Finally, the user’s role within WordPress can be automatically set (and continually updated) based on any attribute Shibboleth provides.  For example, you may decide to give users with an eduPersonAffiliation value of \u003Cem>faculty\u003C\u002Fem> the WordPress role of \u003Cem>editor\u003C\u002Fem>, while the eduPersonAffiliation value of \u003Cem>student\u003C\u002Fem> maps to the WordPress role \u003Cem>contributor\u003C\u002Fem>.  Or you may choose to limit access to WordPress altogether using a special eduPersonEntitlement value.\u003C\u002Fp>\n\u003Ch4>Contribute on GitHub\u003C\u002Fh4>\n\u003Cp>This plugin is actively maintained by \u003Ca href=\"https:\u002F\u002Fprofiles.wordpress.org\u002Fmichaelryanmcneill\" rel=\"nofollow ugc\">michaelryanmcneill\u003C\u002Fa> and the WordPress community, \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmichaelryanmcneill\u002Fshibboleth\" rel=\"nofollow ugc\">using GitHub\u003C\u002Fa>. Contributions are welcome, via pull request, \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmichaelryanmcneill\u002Fshibboleth\" rel=\"nofollow ugc\">on GitHub\u003C\u002Fa>. Issues can be submitted \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fmichaelryanmcneill\u002Fshibboleth\u002Fissues\" rel=\"nofollow ugc\">on the issue tracker\u003C\u002Fa>.\u003C\u002Fp>\n","Allows WordPress to externalize user authentication and account creation to a Shibboleth Service Provider.",3000,58761,86,"2026-02-26T13:22:00.000Z","4.0","5.6",[20,53,21,39],"login","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fshibboleth\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fshibboleth.2.5.3.zip",1,"2016-03-02 00:00:00",{"slug":59,"name":60,"version":61,"author":62,"author_profile":63,"description":64,"short_description":65,"active_installs":66,"downloaded":67,"rating":25,"num_ratings":25,"last_updated":68,"tested_up_to":69,"requires_at_least":70,"requires_php":71,"tags":72,"homepage":75,"download_link":76,"security_score":77,"vuln_count":25,"unpatched_count":25,"last_vuln_date":26,"fetched_at":27},"ugrm","Shibboleth With LDAP Authorization","2.0.1","warren.brown","https:\u002F\u002Fprofiles.wordpress.org\u002Fwarrenbrown-1\u002F","\u003Cp>Since this plugin extends the Shibboleth plugin, you must first have the Shibboleth plugin, available from https:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Fshibboleth\u002F\u003Cbr \u002F>\ninstalled and activated. Otherwise, the plugin will fail to activate as the shibboleth_user_role filter hook will not be registered.\u003C\u002Fp>\n\u003Cp>To use this plugin, you must already have the following setup on your server:\u003Cbr \u002F>\n1. The above Shibbleth plugin.\u003Cbr \u002F>\n2. A UFAD group created for each of the WordPress roles (administrator, editor, author, contributor, and subscriber).\u003C\u002Fp>\n","This plugin extends the Shibboleth plugin to work with UFAD & Shibboleth at the University of Florida. Developed at the Florida Museum of Natural  &hellip;",10,4316,"2018-05-02T18:14:00.000Z","4.9.29","3.2.1","",[53,21,39,73,74],"uf","ufad-authentication","http:\u002F\u002Fwww.floridamuseum.ufl.edu\u002Fomtforge","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fugrm.2.0.zip",85,{"slug":79,"name":80,"version":81,"author":82,"author_profile":83,"description":84,"short_description":85,"active_installs":25,"downloaded":86,"rating":24,"num_ratings":56,"last_updated":87,"tested_up_to":88,"requires_at_least":89,"requires_php":18,"tags":90,"homepage":93,"download_link":94,"security_score":24,"vuln_count":25,"unpatched_count":25,"last_vuln_date":26,"fetched_at":27},"frontegg-saml-sso","Frontegg SAML SSO","1.0.1","Frontegg","https:\u002F\u002Fprofiles.wordpress.org\u002Ffrontegg\u002F","\u003Cp>Frontegg SAML SSO replaces the default WordPress login and logout experiences with seamless SAML authentication via \u003Ca href=\"https:\u002F\u002Ffrontegg.com\" rel=\"nofollow ugc\">Frontegg\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>This plugin is designed for modern SaaS and enterprise WordPress environments where you need to enforce login via an external identity provider (IdP).\u003C\u002Fp>\n\u003Cp>It includes:\u003Cbr \u002F>\n– 🔐 Secure SAML 2.0 login and logout\u003Cbr \u002F>\n– 📋 Admin-friendly configuration of SSO URLs and certificate\u003Cbr \u002F>\n– 📎 Auto-generated SP (Service Provider) values (Entity ID, ACS URL, SLO URL)\u003Cbr \u002F>\n– 🧭 Redirect control after logout\u003Cbr \u002F>\n– 🔄 Auto-redirects from \u003Ccode>wp-login.php\u003C\u002Fcode> to Frontegg\u003Cbr \u002F>\n– ✨ Clean and accessible admin UI using native WordPress components\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is licensed under the GPL v2.0 or later. See LICENSE.txt for details.\u003C\u002Fp>\n","Replace the WordPress login and logout flows with secure SAML-based authentication via Frontegg. Easily configure your SSO app from the admin panel.",320,"2025-04-23T23:01:00.000Z","6.8.5","5.0",[20,53,21,91,92],"single-sign-on","sso","https:\u002F\u002Ffrontegg.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ffrontegg-saml-sso.zip",{"slug":96,"name":97,"version":98,"author":99,"author_profile":100,"description":101,"short_description":102,"active_installs":25,"downloaded":103,"rating":25,"num_ratings":25,"last_updated":71,"tested_up_to":16,"requires_at_least":89,"requires_php":104,"tags":105,"homepage":108,"download_link":109,"security_score":24,"vuln_count":25,"unpatched_count":25,"last_vuln_date":26,"fetched_at":110},"sso-connector-for-jumpcloud","SSO JumpCloud – Enterprise SAML & SCIM","1.1.6","Airton Vancin Junior","https:\u002F\u002Fprofiles.wordpress.org\u002Fairtonvancin\u002F","\u003Cp>SSO JumpCloud – Enterprise SAML & SCIM is a powerful Enterprise-ready plugin that effortlessly connects your WordPress site with JumpCloud using SAML 2.0.\u003C\u002Fp>\n\u003Cp>Designed for security-conscious organizations, it provides seamless single sign-on (SSO), automated user provisioning, and advanced role mapping. With our newly released Enterprise Premium Edition, you can now manage complex access requirements and maintain detailed audit trails.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Key Features:\u003C\u002Fstrong>\u003Cbr \u002F>\n*   \u003Cstrong>Easy Setup:\u003C\u002Fstrong> Connect to JumpCloud in minutes using Entity ID, SSO URL, and Certificate.\u003Cbr \u002F>\n*   \u003Cstrong>Automatic User Creation:\u003C\u002Fstrong> New users from JumpCloud are automatically created in WordPress upon their first login.\u003Cbr \u002F>\n*   \u003Cstrong>Secure Authentication:\u003C\u002Fstrong> Uses verified SAML 2.0 protocols to ensure your data stays safe.\u003Cbr \u002F>\n*   \u003Cstrong>Developer Friendly:\u003C\u002Fstrong> Clean code, hooks for customization, and minimalist design.\u003C\u002Fp>\n\u003Ch3>Premium Features\u003C\u002Fh3>\n\u003Cp>Unlock the full power of your enterprise identity management with:\u003Cbr \u002F>\n*   \u003Cstrong>Group-Based Access Control:\u003C\u002Fstrong> Restrict login access to specific JumpCloud groups.\u003Cbr \u002F>\n*   \u003Cstrong>Role-Based Redirects:\u003C\u002Fstrong> Define custom landing pages for different user roles.\u003Cbr \u002F>\n*   \u003Cstrong>Automated Role Mapping:\u003C\u002Fstrong> Dynamically assign WordPress roles based on JumpCloud groups.\u003Cbr \u002F>\n*   \u003Cstrong>Comprehensive Audit Logs:\u003C\u002Fstrong> Track every SSO login attempt with detailed metadata.\u003Cbr \u002F>\n*   \u003Cstrong>Enterprise Support:\u003C\u002Fstrong> Priority assistance for complex deployments.\u003C\u002Fp>\n\u003Ch3>Premium Subscription\u003C\u002Fh3>\n\u003Cp>The Premium features are available via a monthly or annual subscription.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>How to Activate:\u003C\u002Fstrong>\u003Cbr \u002F>\n1. Go to the \u003Cstrong>Premium Features\u003C\u002Fstrong> tab in the plugin settings.\u003Cbr \u002F>\n2. If you don’t have a subscription yet, use the secure Stripe pricing table to subscribe.\u003Cbr \u002F>\n3. Once subscribed, simply click the \u003Cstrong>“Check Subscription Status”\u003C\u002Fstrong> button.\u003Cbr \u002F>\n4. The plugin will automatically verify your subscription using your administrator email and activate all premium features instantly.\u003Cbr \u002F>\n5. You can manage your subscription at any time via the \u003Cstrong>Stripe Customer Portal\u003C\u002Fstrong> link provided in the same tab.\u003C\u002Fp>\n\u003Ch3>Installation & Setup Guide\u003C\u002Fh3>\n\u003Cp>Configuring Enterprise SSO and Provisioning requires a few steps in both JumpCloud and WordPress. Follow this guide for a flawless setup.\u003C\u002Fp>\n\u003Ch3>Part 1: JumpCloud Configuration (SAML 2.0)\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Log in to your \u003Cstrong>JumpCloud Admin Portal\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>Navigate to \u003Cstrong>SSO Applications\u003C\u002Fstrong> and click \u003Cstrong>“+”\u003C\u002Fstrong> to add a new application.\u003C\u002Fli>\n\u003Cli>Search for \u003Cstrong>SAML 2.0\u003C\u002Fstrong> and select \u003Cstrong>Custom SAML App\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>In the \u003Cstrong>General Info\u003C\u002Fstrong> tab, name it “WordPress SSO”.\u003C\u002Fli>\n\u003Cli>In the \u003Cstrong>SSO\u003C\u002Fstrong> tab, enter the following (copy these from your WordPress Plugin settings):\n\u003Cul>\n\u003Cli>\u003Cstrong>IdP Entity ID:\u003C\u002Fstrong> Your unique ID (e.g., \u003Ccode>wp-sso-your-site\u003C\u002Fcode>).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SP Entity ID:\u003C\u002Fstrong> Copy from Plugin (usually your Site URL).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>ACS URL:\u003C\u002Fstrong> Copy from Plugin (usually \u003Ccode>https:\u002F\u002Fyour-site.com\u002F?jumpssco_acs\u003C\u002Fcode>).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SAMLSubject NameID:\u003C\u002Fstrong> Default to \u003Ccode>email\u003C\u002Fcode>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SAMLSubject NameID Format:\u003C\u002Fstrong> \u003Ccode>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress\u003C\u002Fcode>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>In \u003Cstrong>Attributes\u003C\u002Fstrong>, add:\n\u003Cul>\n\u003Cli>\u003Ccode>email\u003C\u002Fcode> -> \u003Ccode>email\u003C\u002Fcode>\u003C\u002Fli>\n\u003Cli>\u003Ccode>firstname\u003C\u002Fcode> -> \u003Ccode>firstname\u003C\u002Fcode>\u003C\u002Fli>\n\u003Cli>\u003Ccode>lastname\u003C\u002Fcode> -> \u003Ccode>lastname\u003C\u002Fcode>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>Click \u003Cstrong>save\u003C\u002Fstrong> and then \u003Cstrong>export Metadata\u003C\u002Fstrong> or copy the \u003Cstrong>SSO URL\u003C\u002Fstrong>, \u003Cstrong>Entity ID\u003C\u002Fstrong>, and download the \u003Cstrong>IDP Certificate\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Part 2: WordPress Plugin Setup\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Install and Activate the plugin.\u003C\u002Fli>\n\u003Cli>Go to \u003Cstrong>Settings > SSO JumpCloud\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>In the \u003Cstrong>General\u003C\u002Fstrong> tab, paste the \u003Cstrong>IDP Entity ID\u003C\u002Fstrong>, \u003Cstrong>IDP SSO URL\u003C\u002Fstrong>, and the \u003Cstrong>X.509 Certificate\u003C\u002Fstrong> obtained from JumpCloud.\u003C\u002Fli>\n\u003Cli>Click \u003Cstrong>Save Settings\u003C\u002Fstrong>.\u003C\u002Fli>\n\u003Cli>Use the \u003Cstrong>“Test Configuration”\u003C\u002Fstrong> button to ensure the connection is established.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Part 3: SCIM Provisioning (Enterprise Feature)\u003C\u002Fh3>\n\u003Cp>\u003Cem>Note: Requires an active Enterprise Premium subscription.\u003C\u002Fem>\u003Cbr \u002F>\n1.  In the plugin settings, go to the \u003Cstrong>SCIM Provisioning\u003C\u002Fstrong> tab.\u003Cbr \u002F>\n2.  Toggle \u003Cstrong>“Enable SCIM Provisioning”\u003C\u002Fstrong> to ON.\u003Cbr \u002F>\n3.  Copy the \u003Cstrong>SCIM Base URL\u003C\u002Fstrong> and the \u003Cstrong>Bearer Token\u003C\u002Fstrong>.\u003Cbr \u002F>\n4.  In JumpCloud, go to your Application’s \u003Cstrong>Identity Management\u003C\u002Fstrong> tab.\u003Cbr \u002F>\n5.  Select \u003Cstrong>SCIM 2.0\u003C\u002Fstrong>.\u003Cbr \u002F>\n6.  Paste the \u003Cstrong>Base URL\u003C\u002Fstrong> and \u003Cstrong>Bearer Token\u003C\u002Fstrong>.\u003Cbr \u002F>\n7.  Test the connection in JumpCloud and click \u003Cstrong>Activate\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch3>Part 4: Final Testing\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Open an Incognito\u002FPrivate browser window.\u003C\u002Fli>\n\u003Cli>Go to your WordPress login page.\u003C\u002Fli>\n\u003Cli>Click the \u003Cstrong>“Login with JumpCloud”\u003C\u002Fstrong> button.\u003C\u002Fli>\n\u003Cli>If successful, you will be authenticated and redirected to your dashboard!\u003C\u002Fli>\n\u003C\u002Ful>\n","Securely connect WordPress with JumpCloud for Enterprise SSO via SAML 2.0 and automated user provisioning via SCIM.",332,"7.2",[20,106,21,107,92],"jumpcloud","security","https:\u002F\u002Fairtonvancin.com\u002Fplugin\u002Fsso-connector-for-jumpcloud","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsso-connector-for-jumpcloud.1.1.6.zip","2026-03-15T10:48:56.248Z",{"slug":112,"name":113,"version":114,"author":115,"author_profile":116,"description":117,"short_description":118,"active_installs":119,"downloaded":120,"rating":121,"num_ratings":122,"last_updated":123,"tested_up_to":16,"requires_at_least":89,"requires_php":51,"tags":124,"homepage":129,"download_link":130,"security_score":35,"vuln_count":131,"unpatched_count":25,"last_vuln_date":132,"fetched_at":27},"all-in-one-wp-security-and-firewall","All-In-One Security (AIOS) – Security and Firewall","5.4.6","David Anderson \u002F Team Updraft","https:\u002F\u002Fprofiles.wordpress.org\u002Fdavidanderson\u002F","\u003Ch3>THE TOP RATED WORDPRESS SECURITY AND FIREWALL PLUGIN\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios&utm_creative_format=description\" rel=\"nofollow ugc\">All-in-One Security (AIOS)\u003C\u002Fa> is a WordPress security plugin from the same, trusted team that brought you UpdraftPlus.\u003C\u002Fp>\n\u003Cp>It’s called ‘All-In-One’ because it’s packed full of ways to keep your WordPress website(s) safe and secure.\u003C\u002Fp>\n\u003Cp>It includes:\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Login security features\u003C\u002Fstrong> keep bots at bay. Lock out users based on a configurable number of login attempts, get two-factor authentication and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File and database security.\u003C\u002Fstrong> Get notified of file changes that occur outside of normal operations. Block access to key files and scan files and folders to spot insecure permissions.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Firewall.\u003C\u002Fstrong> Get PHP, .htaccess and 6G firewall rules courtesy of Perishable Press. Spot and block fake Google Bots and more!\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Spam prevention.\u003C\u002Fstrong> Prevent annoying spam comments and reduce unnecessary load on the server. Automatically and permanently block IP addresses that exceed a set number of spam comments.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Audit log.\u003C\u002Fstrong> View events happening on your WordPress website. Find out if a plugin or theme has been added, removed, updated and more.\u003C\u002Fp>\n\u003Ch4>WHY ALL-IN-ONE SECURITY?\u003C\u002Fh4>\n\u003Cp>AIOS has a near-perfect \u003Cstrong>4.7 \u002F 5-star user rating\u003C\u002Fstrong> across more than 1 million installs.\u003C\u002Fp>\n\u003Cp>Great for beginners and experts alike. AIOS guides you logically and clearly through each of its features which are all clearly explained. Security features are marked as basic, intermediate and advanced. Each step increases your security score. Turn them on and watch your protection grow!\u003C\u002Fp>\n\u003Cp>We have a large support team of software developers. That means we have the availability and the skillset to help you with the trickiest of queries.\u003C\u002Fp>\n\u003Cp>We comb the WordPress plugin directory for support tickets daily – most queries are responded to within 24 hours.\u003C\u002Fp>\n\u003Cp>\u003Cem>Excellent plugin with numerous well-thought-out options for making a website more secure. I have been using it for years and am very happy with it. I recently had a small problem setting up a website and – even as a non-premium user – I received support very quickly. Highly recommended!\u003C\u002Fem>\u003C\u002Fp>\n\u003Cp>For even more ways to stay safe and secure, upgrade to \u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002Fpricing?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios_premium&utm_creative_format=description\" rel=\"nofollow ugc\">AIOS Premium\u003C\u002Fa> – it packs a punch security-wise, whilst being \u003Cstrong>extremely cost-competitive\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch4>LOGIN SECURITY\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication (TFA)\u003C\u002Fstrong> – Require TFA for specific user roles. Supports Google Authenticator, Microsoft Authenticator, Authy, and many more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Detect and manage ‘admin’ usernames\u003C\u002Fstrong> – Identify default ‘admin’ usernames and guide users to change them to protect against brute force attacks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Identify and correct identical login and display names\u003C\u002Fstrong> – Detect cases where the display name matches the username and provide guidance to improve login security.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent user enumeration\u003C\u002Fstrong> – Block unauthorised access to URLs that can reveal sensitive information such as usernames or other details.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control login attempts\u003C\u002Fstrong> – Prevent brute force attacks by limiting the number of failed login attempts. Choose how many login attempts are allowed, set lockout durations, and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Force user logout\u003C\u002Fstrong> – Automatically log out users after a specified period of time. Unattended sessions are closed, reducing the risk of unauthorised access.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manually approve new registrations\u003C\u002Fstrong> – Review and approve new user registrations to prevent spam and fake sign-ups.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enhance WordPress salt security\u003C\u002Fstrong> – Adds 64 extra characters to WordPress salts, rotating them weekly. Makes cracking passwords virtually impossible, even if your database is stolen.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002F\u003Cbr \u002F>\n\u003Cstrong>Monitor and manage active sessions\u003C\u002Fstrong> – If a user is logged in who shouldn’t be, log them out or add them to a blacklist.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>SPAM PREVENTION\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block spam coming from bots\u003C\u002Fstrong> – Reduce the load on your server and improve the user experience by automatically blocking spam comments from bots.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Monitor spam IP addresses\u003C\u002Fstrong> – Monitor the IP addresses of people or bots leaving spam comments. Choose which ones to block based on a configurable number of comments left.\u003C\u002Fp>\n\u003Ch4>FILE \u002F DATABASE Security\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Scan and fix file permissions\u003C\u002Fstrong> – Scan for insecure file permissions. Click once to fix issues and safeguard critical files and folders.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Disable PHP file editing\u003C\u002Fstrong> – Disable editing of PHP files (such as plugins and themes) via the dashboard. It’s often the first tool that attackers use as it allows for code execution.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Protect sensitive files\u003C\u002Fstrong> – Prevent access to files like readme.html that might reveal information about your WordPress installation.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File change scanner\u003C\u002Fstrong> – Get notified of any file changes which occur on your system. Exclude files and folders which change as part of normal operations.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent image hotlinking\u003C\u002Fstrong> – Prevent other websites from displaying your images via hotlinking and protect server bandwidth.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Secure database backups\u003C\u002Fstrong> – Perform a database backup via UpdraftPlus from AIOS. Change the default ‘wp_’ prefix to hide your WordPress database from hackers.\u003C\u002Fp>\n\u003Ch4>FIREWALL\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Get .htaccess firewall rules\u003C\u002Fstrong> – Deny access to the .htaccess and wp-config.php files. Disable the server signature and limit file uploads to a configurable size.**\u003C\u002Fp>\n\u003Cp>Block access to the debug.log file and prevent Apache servers from listing the contents of a directory when an index.php file is not present\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Get PHP firewall rules\u003C\u002Fstrong> – PHP firewall rules prevent malicious users from exploiting well-known vulnerabilities in XML-RPC. Safeguard your content by disabling RSS and Atom feeds and avoid cross-site scripting (XSS) attacks.\u003Cbr \u002F>\nBlock fake Google bots and POST requests made by bots – Block fake Google bots and stop bots from making POST requests by blocking IP addresses where the user-agent and referrer fields are blank.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Utilise 6G firewall rules\u003C\u002Fstrong> – Employ flexible blacklist rules to reduce the number of malicious URL requests that hit your website (courtesy of Perishable Press).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>And more\u003C\u002Fstrong> – Blacklist (and whitelist) IP ranges and user agents and block unauthorized access to data by disabling REST API access for non-logged-in requests.\u003C\u002Fp>\n\u003Ch4>TWO-FACTOR AUTHENTICATION ENHANCED [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication\u003C\u002Fstrong> is included in the free plugin. Upgrade to Premium if you’d like to:\u003Cbr \u002F>\nRequire TFA after a set time period – Mandate TFA for all admins or other roles after their accounts reach a specified age.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control how often TFA is required\u003C\u002Fstrong> – Set TFA to be required after a certain number of days on trusted devices instead of every login.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Customise design layout\u003C\u002Fstrong> – Adjust the TFA design to match your website’s existing layout and branding.\u003Cbr \u002F>\nEmergency codes – Generate one-time use emergency codes to regain access if you lose your TFA device.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WordPress Multisite Compatible\u003C\u002Fstrong> – Ensure compatibility with WordPress multisite networks and their sub-sites for consistent TFA application.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Integration with login forms\u003C\u002Fstrong> – Integrate TFA with various login forms, including WooCommerce, Affiliates-WP, Elementor Pro, bbPress, and ‘Theme My Login’ without additional coding.\u003C\u002Fp>\n\u003Ch4>SMART 404 BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block IPs based on 404 errors\u003C\u002Fstrong> – Detect hackers probing your URLs via script and bots by the 404 errors they leave behind.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 Configuration\u003C\u002Fstrong> – Set a figure for the maximum number of 404 events allowed before an IP address is blocked. Choose a time period within which the 404 events must occur (e.g., 10 errors within 10 minutes).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 block by URL string\u003C\u002Fstrong> – Instantly block an IP address if a 404 event includes a specific URL string.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 whitelisting\u003C\u002Fstrong> – Prevent particular IP addresses from being permanently blocked due to 404 events.\u003C\u002Fp>\n\u003Ch4>COUNTRY BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block traffic to the entire site or to specific pages or posts\u003C\u002Fstrong> – Useful if you’re an e-commerce site and you want to block sales to some countries for shipping or tax reasons.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Whitelist some users from blocked countries\u003C\u002Fstrong> – Whitelist IP addresses or IP ranges even if they are part of a blocked country.\u003C\u002Fp>\n\u003Ch4>MALWARE SCANNING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Automatic malware scanning\u003C\u002Fstrong> – Detect and protect against the latest malware, trojans, and spyware.\u003Cbr \u002F>\nAlerts you to blacklisting by search engines – Monitor your site for blacklisting by search engines due to malicious code.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Response time monitoring\u003C\u002Fstrong> – Keep track of your website’s response time to identify and address any performance issues.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Uptime monitoring\u003C\u002Fstrong> – Checks your website’s uptime every 5 minutes and alerts you immediately if your site or server goes down.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Advice and malware removal\u003C\u002Fstrong> – Need hands-on advice and support for malware removal? Our team of genuine cybersecurity experts is here to help.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Notification if something’s amiss\u003C\u002Fstrong> – Receive notifications about any issues with your site so you can address problems before they escalate.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cp>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u003C\u002Fp>\n\u003Ch4>Developers\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you are a developer and you need some extra hooks or filters for this plugin then let us know.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Translations\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>All-In-One Security plugin can be translated to any language.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Currently available translations:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>English\u003C\u002Fli>\n\u003Cli>German\u003C\u002Fli>\n\u003Cli>Spanish\u003C\u002Fli>\n\u003Cli>French\u003C\u002Fli>\n\u003Cli>Hungarian\u003C\u002Fli>\n\u003Cli>Italian\u003C\u002Fli>\n\u003Cli>Swedish\u003C\u002Fli>\n\u003Cli>Russian\u003C\u002Fli>\n\u003Cli>Chinese\u003C\u002Fli>\n\u003Cli>Portuguese (Brazil)\u003C\u002Fli>\n\u003Cli>Persian\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Privacy Policy\u003C\u002Fh4>\n\u003Cp>This plugin may collect IP addresses for security reasons such as mitigating brute force login threats and malicious activity.\u003C\u002Fp>\n\u003Cp>The collected information is stored on your server. No information is transmitted to third parties or remote server locations.\u003C\u002Fp>\n\u003Ch4>Usage\u003C\u002Fh4>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n\u003Ch3>Usage\u003C\u002Fh3>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n","Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.",1000000,36139406,94,1693,"2026-01-28T22:15:00.000Z",[125,126,127,107,128],"firewall","login-security","malware-scanning","two-factor-authentication","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fall-in-one-wp-security-and-firewall\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fall-in-one-wp-security-and-firewall.5.4.6.zip",26,"2024-02-08 00:00:00",{"attackSurface":134,"codeSignals":204,"taintFlows":212,"riskAssessment":213,"analyzedAt":218},{"hooks":135,"ajaxHandlers":200,"restRoutes":201,"shortcodes":202,"cronEvents":203,"entryPointCount":25,"unprotectedCount":25},[136,143,148,151,153,157,160,164,168,172,176,180,184,189,193,197],{"type":137,"name":138,"callback":139,"priority":140,"file":141,"line":142},"action","init","action_init_early",9,"inc\\class-wp-saml-auth-options.php",28,{"type":144,"name":145,"callback":146,"priority":140,"file":141,"line":147},"filter","wp_saml_auth_option","filter_option",41,{"type":144,"name":145,"callback":149,"priority":25,"file":141,"line":150},"wpsa_filter_option",69,{"type":144,"name":145,"callback":146,"priority":140,"file":141,"line":152},72,{"type":137,"name":154,"callback":154,"file":155,"line":156},"admin_init","inc\\class-wp-saml-auth-settings.php",64,{"type":137,"name":158,"callback":158,"file":155,"line":159},"admin_menu",65,{"type":137,"name":138,"callback":161,"file":162,"line":163},"action_init","inc\\class-wp-saml-auth.php",50,{"type":137,"name":165,"callback":166,"file":162,"line":167},"plugins_loaded","load_textdomain",51,{"type":137,"name":169,"callback":170,"file":162,"line":171},"login_head","action_login_head",153,{"type":137,"name":173,"callback":174,"file":162,"line":175},"login_message","action_login_message",154,{"type":137,"name":177,"callback":178,"file":162,"line":179},"wp_logout","action_wp_logout",155,{"type":144,"name":181,"callback":182,"file":162,"line":183},"login_body_class","filter_login_body_class",156,{"type":144,"name":185,"callback":186,"priority":187,"file":162,"line":188},"authenticate","filter_authenticate",21,157,{"type":137,"name":190,"callback":191,"file":162,"line":192},"admin_notices","action_admin_notices",158,{"type":144,"name":194,"callback":195,"priority":56,"file":162,"line":196},"login_redirect","closure",353,{"type":144,"name":145,"callback":149,"priority":25,"file":198,"line":199},"wp-saml-auth.php",27,[],[],[],[],{"dangerousFunctions":205,"sqlUsage":206,"outputEscaping":208,"fileOperations":210,"externalRequests":25,"nonceChecks":25,"capabilityChecks":56,"bundledLibraries":211},[],{"prepared":25,"raw":25,"locations":207},[],{"escaped":34,"rawEcho":25,"locations":209},[],3,[],[],{"summary":214,"deductions":215},"The \"wp-saml-auth\" v2.3.1 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of unprotected entry points across AJAX, REST API, shortcodes, and cron events is a significant strength. Furthermore, the code adheres to best practices by using prepared statements for all SQL queries and ensuring proper output escaping for all detected outputs. The lack of identified dangerous functions and external HTTP requests also contributes to a reduced attack surface. \n\nHowever, the analysis does reveal a couple of areas that warrant attention. The presence of 0 nonce checks across the entire plugin is a notable weakness, especially since nonce checks are crucial for preventing Cross-Site Request Forgery (CSRF) attacks on any functionality that modifies data. While the current data shows no specific vulnerabilities or taint flows, the absence of nonce checks represents a potential gap that could be exploited if any user-facing functionality were to be added or modified in the future. The single capability check, while present, doesn't fully mitigate the risk posed by the missing nonces.\n\nGiven the clean vulnerability history with no known CVEs or past issues, the plugin appears to have been developed with security in mind. The lack of critical or high severity taint flows further reinforces this. The overall conclusion is that the plugin is currently in a good security state, with its primary weakness being the absence of nonce checks for its entry points, a fundamental security mechanism.",[216],{"reason":217,"points":66},"Missing nonce checks","2026-03-16T17:58:48.089Z",{"wat":220,"direct":229},{"assetPaths":221,"generatorPatterns":224,"scriptPaths":225,"versionParams":226},[222,223],"\u002Fwp-content\u002Fplugins\u002Fwp-saml-auth\u002Fcss\u002Fwp-saml-auth.css","\u002Fwp-content\u002Fplugins\u002Fwp-saml-auth\u002Fjs\u002Fwp-saml-auth.js",[],[223],[227,228],"wp-saml-auth\u002Fcss\u002Fwp-saml-auth.css?ver=","wp-saml-auth\u002Fjs\u002Fwp-saml-auth.js?ver=",{"cssClasses":230,"htmlComments":231,"htmlAttributes":232,"restEndpoints":233,"jsGlobals":234,"shortcodeOutput":235},[],[],[],[],[],[]]