Guide to Configure Single Sign-On (SSO) between OpenAM as IDP and Moodle as SP
SAML Single Sign-On (SSO) for your Moodle site can be achieved using our miniOrange SAML SSO plugin. Our plugin is compatible with all the SAML compliant Identity providers. Here we will go through a step-by-step guide to configure Single Sign-On (SSO) between OpenAM as Identity Provider (IdP) and Moodle as Service Provider (SP).
Pre-requisites : Download And Installation
To configure OpenAM as IdP with Moodle, you will need to install the miniOrange SAML 2.0 SSO plugin:
miniOrange SAML 2.0 SSO
SSO Single Sign On to Moodle with Azure, Azure B2C, Okta, ADFS, Keycloak, Onelogin, Gsuite, Shibboleth & many SAML IdPs [24/7 SUPPORT]
All the information required to configure OpenAM as IdP i.e. plugin’s metadata is given in the Service Provider Metadata tab of the miniOrange plugin.
Create OpenAM as a Hosted Identity Provider
In the miniOrange SAML 2.0 SSO plugin, navigate to Service Provider Metadata tab. Here, you can find the SP metadata such as SP Entity ID and ACS (AssertionConsumerService) URL which are required to configure the Identity Provider.
Login to the OpenAM admin console.
From the REALMS page, select the realm under which you want to create the SAML application. You will be redirected to the Realm overview page.
Click on Create SAMLv2 Providers in the Realm Overview page.
Click on Create Hosted Identity Provider. You will be redirected to the configuration page.
Configure SAML IDP as given below:
Name: Name of the SAML IDP
Signing Key: Select the Signing key from the dropdown.
New Circle of Trust: Provide a name of the groups of IDP and SP that trust each other.
Attribute Mapping: Configure user profile attributes to be sent to the Service Provider application.
Click on the Configure button on the top right corner.
Configure Remote Service Provider
Go to OpenAM admin dashboard and open Realm Overview page.
Click on Create SAMLv2 Providers.
Now click on Register Remote Service Provider. You will be redirected to the configuration page.
Configure the Service Provider as given below:
Where does the metadata file reside: URL
URL of metadata: Paste the miniOrange plugin’s Metadata URL here. You can get it from the Service Provider Metadata tab
Circle of Trust: Add to existing
Existing Circle of Trust: Select the Circle of Trust (group) in which your hosted IDP is located
Attribute Mapping: Configure user profile attributes for mapping.
Click on the Configure button on the top right corner and then click on OK button.
Verify the configuration of IdP and SP from the Federation tab of OpenAM.
You can download the OpenAM IdP metadata using the URL given below.
For Single Realm: [OpenAM ServerURL]/saml2/jsp/exportmetadata.jsp
For Multiple realms: [OpenAM ServerURL]/saml2/jsp/exportmetadata.jsp?entityid=[IdPentityID]&realm=/realmname
Keep the IDP Metadata handy as it will be used in configuring the miniOrange Plugin.
Step 2: Configuring Moodle site as Service Provider
We will go through the steps to setup Moodle as a Service Provider. Here, we will be adding the IdP metadata to configure the plugin.
In the miniOrange SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two
ways to configure the plugin:
A. By uploading IDP metadata:
Click on the Upload IDP metadata button.
Enter the Identity Provider Name.
You can copy and paste the IdP metadata XML file and click on the Upload Metadata button or
use a metadata URL and click on Fetch Metadata.
Provide the required settings (i.e. Identity Provider Name, IdP Entity ID or Issuer, SAML
Login URL, X.509 Certificate) as provided by your Identity Provider.
Click on the Save button to save your configuration.
Step 3: Attribute Mapping
When the user performs SSO, the NameID value is sent by the Identity Provider. This value is
unique for every user.
To assign by which attribute value the user should authenticate or create, select Email (default) or
Username in Login/Create Moodle account by:
For the plugin to access these attributes, assign the values for Email and
Username as 'NameID' (without quotes).
Click on the Save button to save your configuration.
Step 4: Role Mapping
In the free plugin, you can choose a default role that will be assigned to all the non-admin
users when they perform SSO. [NOTE: Roles will be assigned to new users created by
SSO. Existing Moodle users’ roles will not be affected.]
Go to the Attribute/Role Mapping tab and navigate to the Role Mapping section.
Select the Default Role and click on the Save button to save your configuration.
Step 5: SSO Settings
In the plugin, you can add a login widget to enable SP-Initiated SSO on your site.
Go to the Plugins >> Authentication >> Manage authentication.
If you dont hear from us within 24 hours, please feel free to send a follow up email to firstname.lastname@example.org
This privacy statement applies to miniorange websites describing how we handle the personal
When you visit any website, it may store or retrieve the information on your browser, mostly in the
form of the cookies. This information might be about you, your preferences or your device and is
mostly used to make the site work as you expect it to. The information does not directly identify
you, but it can give you a more personalized web experience.
Click on the category headings to check how we handle the cookies.
Strictly Necessary Cookies
Necessary cookies help make a website fully usable by enabling the basic functions like site
navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any
personal identifiable information. However, some parts of the website will not work properly without
These cookies only collect aggregated information about the traffic of the website including -
visitors, sources, page clicks and views, etc. This allows us to know more about our most and least
popular pages along with users' interaction on the actionable elements and hence letting us improve
the performance of our website as well as our services.