SSO Provider Configuration UI
SSO Provider Configuration UI
Version 1.0.58 introduces a self-service admin panel for connecting your organization's identity provider (IdP) to the platform. Once configured, your learners authenticate through your existing SSO system rather than managing separate platform credentials.
Overview
The SSO configuration panel is accessible to organization admins from the admin dashboard. It supports two industry-standard protocols:
| Protocol | Input Required |
|---|---|
| OIDC (OpenID Connect) | Discovery (well-known) URL |
| SAML 2.0 | IdP Metadata XML or Metadata URL |
Configuring an OIDC Provider
- Navigate to Admin → SSO Settings.
- Select OIDC as the protocol.
- Enter your identity provider's Discovery URL (e.g.
https://your-idp.example.com/.well-known/openid-configuration). - Complete the Attribute Mapping fields (see below).
- Click Test Connection to validate the configuration.
- Once the test passes, click Save.
Configuring a SAML Provider
- Navigate to Admin → SSO Settings.
- Select SAML as the protocol.
- Provide your IdP's SAML Metadata — either paste the raw XML or supply a metadata URL.
- Complete the Attribute Mapping fields (see below).
- Click Test Connection to validate the configuration.
- Once the test passes, click Save.
Attribute Mapping
Attribute mapping tells the platform how to translate the claims your IdP sends into the platform's internal user profile fields. Common mappings include:
| Platform Field | Typical IdP Claim (OIDC) | Typical IdP Attribute (SAML) |
|---|---|---|
email | urn:oid:0.9.2342.19200300.100.1.3 | |
| First Name | given_name | urn:oid:2.5.4.42 |
| Last Name | family_name | urn:oid:2.5.4.4 |
| Groups / Roles | groups | (IdP-specific) |
Enter the exact claim or attribute name your IdP uses for each field. These values are case-sensitive and must match what your IdP sends in the token or assertion.
Testing the Connection
Before saving, use the Test Connection button to verify that the platform can reach your IdP and that the configuration is valid. The test will:
- Resolve the discovery document or parse the SAML metadata.
- Confirm endpoint reachability.
- Report a success confirmation or a descriptive error message indicating what needs to be corrected.
Always test the connection before saving to avoid locking out users with a broken configuration.
Notes
- Only one SSO provider can be active per organization at a time.
- Changes to the SSO configuration take effect immediately upon saving.
- Existing sessions are not invalidated when the configuration changes; new login attempts will use the updated settings.
- If the connection test fails, the configuration is not saved, preventing accidental misconfiguration.