Search Results :


Talent LMS SAML Single Sign-On using DNN SAML as IDP

DotNetNuke (DNN) SAML IDP module acts as a SAML 2.0 Identity Provider which can be configured to establish the trust between the module and various SAML-compliant service providers to securely authenticate the user using the DotNetNuke (DNN) site credentials. miniOrange provides a ready to use solution for SAML 2.0 Login using DotNetNuke credentials. Here we will go through a step-by-step guide to configure Single Sign-On (SSO) between DNN and Talent LMS considering DNN as IDP. To know more about the other features we provide, click here.

Pre-requisites : Download And Installation

  • Download DNN SAML Identity Provider (IDP) module.
  • Upload the installation package dnn-saml-single-sign-on-sso-idp_xxx_Install by going in Settings > Extension > Install Extension.
  • Talent LMS SSO using DNN SAML IDP - Install Extension
  • Open any of the page on your DNN site (Edit mode) and Click on Add Module.
  • Talent LMS SSO using DNN SAML IDP - Add Module
  • Search for moDNNSAMLIDP and click on the moDNNSAMLIDP. Drag and drop the module on the page where you want.
  • Talent LMS SSO using DNN SAML IDP - Search for DNN SAML IDP
  • You have finished with the Installation of the module on your DNN site.

1. Configure Talent LMS as SP

  • From the list of service providers given below, select Talent LMS.
  • Talent LMS SSO using DNN SAML IDP - Select Service Provider
  • There are two options in the module to share your IDP metadata to the service provider. Either you can share metadata URL or you can download the metadata (XML) file.
  • Talent LMS SSO using DNN SAML IDP - Download IDP Metadata
  • Also you can add the IDP metadata manually by entering IDP Entity ID, Single Sign-On URL and x.509 Certificate:
  • DNN SSO using DNN SAML IDP - Talent IDP Metadata
  • Sign in to your TalentLMS account as Administrator, go to Home > Account & Settings > Users
  • Talent LMS SSO using DNN SAML IDP - account settings
  • Now select users tab.
  • DNN SSO using DNN SAML IDP - Talent User Tab
  • Click On Single Sign On(SSO) option.
  • Talent LMS SSO using DNN SAML IDP - Single Sign On(SSO) option
    Enter the following values in resepctive fields:
  • SSO integration type: From the drop-down list, select SAML2.0.
  • Identity provider (IdP): Type the domain of SAML 2.0 identity provider.  
  • Certificate fingerprint: Download the Certificate from IDP Metadata Open it in notepad. Copy and paste the content here.
  • Remote sign-in URL: You can find this in IDP Metadata as SAML Login URL.
  • Remote sign-out URL: You can find this in IDP Metadata as SAML Logout URL.
  • The remaining fields are used for naming the SAML variables that contain the user data required by Talent LMS and provided by DNN IdP. Those are optional, and they can be left blank for most SAML IdP deployments. In that case, their default values are applied.

    You have successfully configured Talent LMS as Service Provider.

2. Configure DNN as SAML IDP

  • There are two options to add an application for your Service Provider in the IDP module
  • A] Upload metadata using Upload SP Metadata option
  • IDP module requires SP Entity ID and ACS URL values from your service provider. You may get the metadata file (.xml) or metadata URL.
  • You can upload metadata using Upload SP Metadata option where you can upload metadata using XML file or URL.
  • You may refer to the screenshot below:
  • DNN SAML IDP - add service provider metadata
  • You can choose any one of the options according to the metadata format you have available.
  • B] Configure the Service Provider metadata manually

    DNN SAML IDP - add service provider
  • Enter the values corresponding to the information from Talent LMS. Refer to the table below.

  • Service Provider Name: TalentLMS
    SP Entity ID or Issuer: <your-domain-name>
    ACS URL: https://<my-domain-name><my-domain-name>
    Single Logout URL (optional): https://<my-domain-name><my-domain-name>
    NameID Format: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
    Assertion Signed Check to sign the SAML Assertion.
  • Once configured service provider metadata, Update the module settings

3. Attribute Mapping

  • In this steps you will map the DotNetNuke user attribute to be sent in the response to the Service Provider.
  • NameID defines what SP is expecting in the subject element of SAML Assertion. Generally, NameID is Username or Email Address. You can select which user attribute you want to send in the NameID.
  • You can add other attributes to be sent in SAML Assertion to SP. The attributes include user’s profile attributes such as first name, last name, fullname, username, email, custom profile attributes etc.
  • DNN SAML IDP - attribute mapping

4. Testing SSO

  • In the Incognito browser window, enter the Talent LMS URL.
  • The browser will redirect you to the DNN Login screen.
  • Enter the DNN Credentials and click on Log in.
  • If you are redirected back to your Talent LMS start page and logged in successfully, then your configuration is correct.

You have successfully configured DNN as SAML IDP ( Identity Provider) for achieving DNN SSO login into your Talent LMS.

You can configure the DNN SAML IDP module with any service provider such as Azure AD, Azure B2C, Google Apps, Zoho Desk, Salesforce, WordPress, Cognito, Moodle, Zapier, Zoho, Zoom, Tableau Server, Hubspot, TalentLMS, WSO2 or even with your own custom service providers. You can find more service providers here.

Additional Resources

Need Help?

Not able to find your identity provider? Mail us on and we'll help you set up SSO with your service provider and for quick guidance (via email/meeting) on your requirement and our team will help you to select the best suitable solution/plan as per your requirement.

Hello there!

Need Help? We are right here!

Contact miniOrange Support

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to