To configure the integration of Litmos into Azure AD, you need to create an application.
To create an application, perform the following steps:
In the Azure portal, on the left navigation panel, click Azure Active Directory icon.
Navigate to Enterprise applications. Then go to All applications.
To add new application, click New application button on the top of dialog.
In the search box, type Litmos, select Litmos from result panel then click Add button to add the application.
Configure Azure AD single sign-on
In this section, you enable Azure AD single sign-on in the Azure portal and configure single sign-on in your Litmos application.
To configure Azure AD single sign-on with Litmos, perform the following steps:
In the Azure portal, on the Litmos application integration page, click Single sign-on.
On the Single sign-on dialog, select Mode as SAML-based Sign-on to enable single sign-on.
- Under basic SAML configuration section, perform the following steps:
a. In the Identifier textbox, type a URL using the following pattern:
b. In the Reply URL textbox, type a URL using the following pattern:
Note :These values are not real. Update these values with the actual Identifier and Reply URL, which are explained later in tutorial or contact Litmos support team to get these values.
4. As part of the configuration, you need to customize the SAML Token Attributes for your Litmos application.
|Attribute Name||Attribute Value|
5. On the SAML Signing Certificate section, download the metadata XML file and then save the certificate file on your computer.
6. In a different browser window, sign-on to your Litmos company site as administrator.
7. In the navigation bar on the left side, click Accounts.
8. Click the Integrations tab and then click SAML 2.0 tab.
9. Open your metadata XML file in notepad, copy the content of it into your clipboard, and then paste it in the SAML Metadata field
Important! Exclude the following first line of the metadata as Litmos gives an error if it is included in the metadata: <?xml version="1.0" encoding="UTF-8"?>.
Assign this application to yourself in Azure portal and test single sign-on
Deep Linking to a course
Deep linking provides a method for efficiently directing a user to a course/Learning path rather sending them to the home page and to utilize this functionality, you will need to use RelayState parameter.
Relaystate parameter can be appended with the user access URL of the application configured in Azure. An example relay state link can be seen below
Here, first part of the URL is the User access URL which is available under application properties page in Azure and second part is the Relay state parameter which contains the actual course Id( 12345). This course Id can be found under course settings page as shown in the below screenshots.