Search Results :

×

Drupal Wild Apricot Single Sign-On (SSO) Login using OAuth / OpenID connect


Drupal OAuth/OpenID Connect SSO integration enables SSO between the Drupal site and Wild Apricot. This setup guide helps in configuring Single Sign-On (SSO) between the Drupal site and Wild Apricot using the OAuth/OpenID Connect module. This module is compatible with Drupal 7, Drupal 8, Drupal 9, and Drupal 10. When you incorporate the OAuth/OpenID Connect module with the Drupal site, you can log into the Drupal site seamlessly with Wild Apricot credentials.

Installation Steps:


  • Download the module:
    composer require 'drupal/miniorange_oauth_client'
  • Navigate to Extend menu on your Drupal admin console and search for miniOrange OAuth Client Configuration using the search box.
  • Enable the module by checking the checkbox and click on the Install button.
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc
  • Install the module:
    drush en drupal/miniorange_oauth_client
  • Clear the cache:
     drush cr
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc
  • Navigate to Extend menu on your Drupal admin console and click on Install new module.
  • Install the Drupal OAuth & OpenID Connect Login - OAuth2 Client SSO Login module either by downloading the zip or from the URL of the package (tar/zip).
  • Click on Enable newly added modules.
  • Enable this module by checking the checkbox and click on install button.
  • You can configure the module at:
    {BaseURL}/admin/config/people/miniorange_oauth_client/config_clc

Setup Drupal as OAuth Client:

  • After installing the module, navigate to the Configuration -> miniOrange OAuth Client Configuration -> Configure OAuth tab and select Wild Apricot from the Select Application dropdown list.
  • Copy the Callback/Redirect URL and keep it handy.

    Note: If your provider only supports HTTPS Callback/Redirect URLs and you have an HTTP site, please make sure to enable the 'Enforce HTTPS Callback URL' checkbox at the bottom of the tab.

  • Enter the application name in the Display Name text field. For example, WildApricot
  • Drupal OAuth Client - Configure OAuth tab Select WildApricot and copy the Callback URL

Create SSO Application in Wild Apricot:

  • Log in to your WildApricot Admin panel and create a new app.
  • Click on the Apps tab in the left panel.
  • Wild Apricot SSO Integration - Navigate to Apps from the left side
  • In the Apps tab, navigate to the Integrations section and click on the Authorized Applications card/box, as seen in the illustration below.
  • Wild Apricot SSO Integration Authorized Applications
  • As indicated in the image below, click the Authorize application button.
  • Wild Apricot SSO Authorized Application
  • Select Server application from the list of options under Application authorization and then click Continue.
  • Wild Apricot SSO Server application
  • On the next screen, under Application details, enter the name in the Application name text field.
  • Wild Apricot SSO Server application
  • In the same window, scroll to the bottom of the Authorization page settings section and check the option Authorize users via Wild Apricot single sign-on service.
  • Paste the copied Callback/Redirect URL (from step 1) into the Trusted redirect domains text field.
  • Wild Apricot SSO Server application

Integrating Drupal with Wild Apricot:

  • Navigate to the Wild Apricot portal.
  • Click on Generate client secret button under Application credentials for user authorization.
  • Wild Apricot SSO Application - Click on Generate client secret
  • Now, copy the Client ID.
  • Wild Apricot SSO Application - Copy the Client ID
  • Navigate to the Drupal's Configure OAuth and paste the copied Client ID into the Client ID text field.
  • Drupal OAuth Client Configuration - Paste the copied Client ID
  • Go to the WildApricot Dashboard.
  • Copy the Client secret from the Application credentials for user authorization section.
  • To save the changes, click the Save button in the top header.
  • Wild Apricot SSO Application - Copy the Client Secret
  • Navigate to the Drupal's Configure OAuth and paste the copied secret into the Client Secret text field.
  • Drupal OAuth Client Configuration - Paste the copied Client Secret

How to get Wild Apricot Organization Name:

  • Again, go back to the WildApricot Application.
  • Navigate to the Account tab, in the left side panel.
  • In the top header's right side panel, click on the Organization tab.
  • Copy the Organization name from the Organization details panel's General section.
  • WildApricot Application - Copy the Organization name
  • In the Drupal site, paste the copied Organization name into the Authorize Endpoint text field.
  • paste the Organizaion name in the Authorize Endpoint in Drupal's Configure OAuth tab

How to get Wild Apricot User ID/Member ID (aka Account ID):

When a new user is created in the WildApricot Application, a unique User ID is assigned to the user right away. When using the WildApricot Application, the generated User ID cannot be changed. The User will utilise it to identify which users can be eliminated from the system.

  • To locate the User ID (Account ID) from the WildApricot Application, follow these steps:
    • Navigate to the WildApricot Dashboard.
    • From the left navigation panel, click on Account
    • In the right side top header, click on the Billing tab.
    • Copy the Account # from the General section.
    • WildApricot Application - Copy the Account ID from the Biling tab
  • Navigate to the Drupal site and replace the copied Account # in the {account-id} with the Get User Info Endpoint URL.
  • Drupal OAuth OpenId connect - Paste the copied Account # with account_id
  • Click on the Save Configuration button.

You can also find the Wild Apricot Endpoints and Scope in the table below:

Authorization Endpoint https://{organization_name}.wildapricot.org/sys/login/OAuthLogin
Access Token Endpoint https://oauth.wildapricot.org/auth/token
Get User Info Endpoint https://api.wildapricot.org/v2.1/accounts/<account_id>/contacts/me
Scope auto

Test connection between Drupal and Wild Apricot:

  • Click on the Perform Test Configuration button to test the connection between Drupal and Wild Apricot.
  • Wild Apricot sso login with drupal OAuth OpenID Single Single On DeviantArt test Configuration
  • On a Test Configuration popup, if you don't have any active sessions on the same browser, you will be requested to login into the Wild Apricot. After successfully logging into the Wild Apricot, you will be provided a list of attributes received from the Wild Apricot.
  • Select the Email Attribute from the dropdown menu in which the user's email ID is obtained and click on the Done button.
  • Wild Apricot sso login with drupal OAuth OpenID Single Single On DeviantArt test Configuration successfully
  • On the Attribute & Role Mapping tab, please select the Username Attribute from the dropdown list and click on the Save Configuration button.
  • Wild Apricot sso login with drupal OAuth OpenID Single Single On DeviantArt test Configuration successfully

Please note: Mapping the Email Attribute is mandatory for Single Sign-On.

Congratulations! You have successfully configured Wild Apricot as OAuth/OpenID Provider and Drupal as an OAuth Client.

How to perform the SSO?

  • Now, open a new browser/private window and go to your Drupal site login page.
  • Click on the Login using the Wild Apricot link to initiate the SSO from Drupal.
  • If you want to add the SSO link to other pages as well, please follow the steps given in the image below:
  • Drupal OAuth OpenID Single Single-On - Add login link into different page of the Drupal site

Need Assistance?

If you face any issues during the configuration or if you want some additional features, please contact us at drupalsupport@xecurify.com.

Additional Features:

Troubleshooting:

Getting error: ‘Username not received. Check your Attribute Mapping configuration.’ OR Getting Error: ‘Email not received. Check your Attribute Mapping configuration.’
 

Follow the steps mentioned HERE

I am getting “Client Credentials were not found in the headers or body” when I try to perform test configuration
 

Follow the steps mentioned HERE

After I click on the logout in Drupal, it sends me back to the Drupal homepage. However, when I try to login with other user, it doesn’t ask me to login but automatically logs me in with same user
 

The logout functionality you’ve mentioned here is the default behavior of a module. It’s logging you out of Drupal but not from your Application/Provider. To allow the module to logout from your provider/application account (what you are looking for), you need to make the below configurations: [know more]

I purchased the paid Drupal module and replaced it with the free module, but still I am not able to use paid features.
 

As you have upgraded to one of our paid versions of the Drupal module and replaced the free module with the paid one, you must first activate the paid module. Please refer to the below steps. [Know more]

Frequently Asked Questions (FAQ)
 

[Know more]

 Case Studies
miniOrange has successfully catered to the use cases of 400+ trusted customers with its highly flexible/customizable Drupal solutions. Feel free to check out some of our unique case studies using this link.
 Other Solutions
Feel free to explore other Drupal solutions that we offer here. The popular solutions used by our trusted customers include Two Factor Authentication - 2FA, Website Security, REST & JSON API Authentication, User Provisioning and Sync. 
  24*7 Active Support
The Drupal developers at miniOrange offer quick and active support for your queries. We can assist you from choosing the best solution for your use case to deploying and maintaining the solution.
Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com