The main purpose of establishing a Single Sign-On (SSO) process with Absorb is to allow your users a single point of entry into your system while providing them access to multiple other independent systems. With this process a user logs in with a single ID to gain access to a multitude of other systems without being prompted for different usernames and passwords. Outgoing Single Sign-On enables users to log into an external site from the Absorb Learner Interface without the need to log in a second time.
This article discusses the Service Provider Initiated SAML 2.0 SSO method for outgoing SSO. Absorb acts as Identity Provider and the external service acts as Service Provider.
Please note that SSO is an additional feature that usually involves an additional fee and technical resources on the client side to develop and/or configure the solution.
Disclaimer: Absorb LMS supports Outgoing SAML 2.0 Single Sign-On as a feature, however we do not officially support any specific client-side solution. Although many service providers generally work with our implementation of SAML SSO, it is the client's responsibility to configure/develop and maintain their side of the integration. This will require a client resource who is knowledgeable and familiar with SSO. This guide is provided to our clients as a convenience only, based on our experience working with clients who employ outgoing SSO.
Table of Contents
- Instructions: Absorb Setup
- How it Works
- Service Provider Configuration (Metadata)
Instructions: Absorb Setup
Note: To enlarge thumbnail images, right-click on picture and select "Open image in new tab"
|Login to the Absorb admin portal as a System Admin and navigate to Portal Settings. From Portal Settings, there is a button in the right-side menu labelled Manage SSO Settings. If you can't see this button, please contact your Absorb Client Success Manager to discuss enabling the feature.
|Click Add at the bottom of the page.
|Name the connection something descriptive. This name is only visible to admins.
Key: Your service provider's X509Certificate public key.
If your certificate has spaces, line breaks, or "BEGIN/END", please remove those.
|Set the Id Property to the Absorb user profile field that Absorb should send as the NameID in the SAML assertion. This should be a unique identifier for learners.
|The Assertion Consumer Service Url can be left blank as it should be provided to Absorb via the SAML Request. However if you are experiencing issues, you can hard code an ACS URL here.
|Set the Signature Type to the value that your service/website is expecting.
| Include User Data: You can opt to send user data in addition to the SAML Response by enabling this toggle.
If OFF: No attributes will be included in the response, and there will be no AttributeStatement.
If ON: Absorb will append the following LMS attributes to the SAML Response in the AttributeStatement:
| Include Custom Fields: You can select to include any custom user fields in your portal as part of the attributes returned in the SAML Response.
Note: This field is only visible if Include User Data is on.
Note: To enlarge thumbnail images, right-click on picture and select "Open image in new tab
Learner signs into Absorb by entering their username & password or via incoming SSO.
- Learner signs into Absorb by entering their username & password or via incoming SSO.
- Learner clicks on a dashboard tile or navigates to a course lesson object that has the outgoing service provider initiated URL embedded in them.
- A dashboard tile can be created in the Templates section of the admin interface.
A course object lesson can be created by any admin with permission to create/modify courses:
Absorb Admin Site > Courses > Courses > Add Online Course > Syllabus > Add Learning Object > Object > Add URL into Source field
- Absorb redirects the learner to Service Provider Initiated URL.
- Service provider sends a HTTP POST message with a signed SAML Request (signed with the Service Provider's private key) to the Absorb portal at the following URL: https://company.myabsorb.com/Account/SamlRequest
- A relayState variable can also be added in the POST message (for when special functionality is needed such as launching a course directly)
- Absorb authenticates the SAML request using the X509Certificate public key configured above. If the authentication fails, an appropriate error message is sent back to the service provider.
- Absorb sends a signed SAML Response (signed with Absorb's private key) to Service Provider. The SAML Response contains the learner's Id Property as the NameId property, and other user attributes if Include User Data is on.
- Service provider uses Absorb's public key to verify the response.
- Service provider handles the response appropriately (either by logging the user in, or handling the user's information another way as programmed by the service provider)
The following details may be relevant for proper configuration of a service provider:
- Absorb's IdP Metadata - This includes entity ID for your Absorb portal, and URL to POST SAML Request. See Metadata section below.
- Absorb's Public key to authenticate SAML Response (x509 public certificate found in the IdP Metadata).
Binding - Absorb supports HTTP POST binding.
Absorb's IdP Metadata
You will need to replace the 3 occurrences of "company.myabsorb.com" in the metadata with your LMS URL. These locations are:
- The Entity ID at the top.
- The binding for the HTTP POST at the bottom.
- The binding for the HTTP Redirect at the bottom.
Please advise the following Absorb metadata is not specific to any client portal, which means there are generic URLs that must be edited before you will be able to use it.
Download the IdP metadata for the Production environment by clicking here.
Download the IdP metadata for the Sandbox environment by clicking here.
- If your service provider hosts your courses and you want to send course completions back to Absorb, this can be done using our RESTful API. You can find our RESTful API documentation here. Please note that the RESTful API requires the purchase of a RESTful API license and key.
- Inbound and outbound SSO can be used together. Inbound for SSO login to Absorb, and outgoing SSO for login to third party site. Find our Incoming SSO documentation here.