Search Results :

×

Talent LMS SAML Single Sign-On using DNN SAML as IDP

DotNetNuke (DNN) SAML IDP module acts as a SAML 2.0 Identity Provider which can be configured to establish the trust between the module and various SAML-compliant service providers to securely authenticate the user using the DotNetNuke (DNN) site credentials. Here we will go through a step-by-step guide to configure Single Sign-On (SSO) between DotNetNuke(DNN) and Talent LMS considering DotNetNuke(DNN) as IDP.

  • Download DNN SAML Identity Provider (IDP) module.
  • Upload the installation package xxx_dnn-saml-single-sign-on-sso-idp_xxx_Install by going in Settings > Extension > Install Extension.
DNN SAML IDP - Install Extension

  • Open any of the page on your DNN site (Edit mode) and Click on Add Module.
DNN SAML IDP - Add Module

  • Search for moDNNSAMLIDP and click on the moDNNSAMLIDP. Drag and drop the module on the page where you want.
DNN SAML IDP - moDNNSAMLIDP module

  • After successfully installing the module on your DNN site, click the gear icon of the module, and select Settings from the dropdown menu.
DNN SAML IDP - Settings

  • Navigate to the moDNNSAMLIDP Settings tab to configure the module.
DNN SAML IDP - moDNNSAMLIDP Settings Tab

  • To activate the module, enter the license key received via email in the provided input field.
  • If you haven’t received the license key, click on the Click Here link to download it, and then upload the license file using the Choose File button.
DNN SAML IDP - license key

  • Then, accept the terms and conditions by checking the box, and click on the Activate License button to activate the module.
DNN SAML IDP - Activate License

  • Navigate to the IDP Configurations tab in the DNN SAML IDP module.
  • You can share your DNN SAML IDP Metadata with the Service Provider in either of the following ways:
    • Metadata URL : Share the metadata URL with your Service Provider.
    • OR

    • Download Metadata XML : Download the metadata XML file and upload it to your Service Provider.
DNN SAML IDP Metadata

  • You can also manually share the DNN SAML IDP metadata by copying the IdP Entity ID, Single Sign-On URL, SAML SLO URL, NameID Format, and x.509 Certificate.
DNN SAML IDP Manual Configuration

  • Sign in to your TalentLMS account as Administrator, go to Home > Account & Settings > Users.
TalentLMS account

  • Now select users tab.
TalentLMS account

  • Click On Single Sign On(SSO) option.
TalentLMS account

Enter the following values in respective fields:

  • SSO integration type: From the drop-down list, select SAML2.0.
  • Identity provider (IdP): Type the domain of SAML 2.0 identity provider.
  • Certificate Fingerprint : Copy the certificate from the DNN SAML IDP Metadata (Manual Configuration) section and paste it here.
  • Remote Sign-In URL : You can find this in the DNN SAML IDP Metadata under Single Sign-On URL.
  • Remote Sign-Out URL : You can find this in the DNN SAML IDP Metadata under SAML SLO URL.

The remaining fields are used for naming the SAML variables that contain the user data required by Talent LMS and provided by DNN SAML IDP. Those are optional, and they can be left blank for most DNN SAML IDP deployments. In that case, their default values are applied.


You have successfully configured Talent LMS as Service Provider.

  • Navigate to the SP Configurations tab and click on the Add Application button.
DNN SAML IDP Add Application

  • From the list of service providers given below, select Talent LMS.
DNN SAML IDP - Talent LMS

There are two options to add an application for your Service Provider in the DNN SAML IDP module

A] Upload Metadata using the “Upload Metadata” option

  • You can upload the Service Provider metadata directly using the Upload Metadata button.
DNN SAML IDP Upload Metadata

  • The IDP module requires the SP Entity ID and ACS URL values from your Service Provider.
  • You may receive these values either through a metadata file (.xml) or a metadata URL from your SP.
  • Upload the metadata by selecting the appropriate option — via XML file or URL — as shown in the screenshot below.
DNN SAML IDP Upload Metadata

B] Configure the Service Provider metadata manually

  • If you prefer to configure the Service Provider manually, copy the SP Entity ID and ACS URL from your Service Provider’s metadata and paste them into the corresponding fields.
DNN SAML IDP Upload Metadata

  • Once you have entered all required details, click on Save Settings to save the configuration.
DNN SAML IDP Save Settings

  • In this steps you will map the DotNetNuke user attribute to be sent in the response to the Service Provider.
  • NameID defines what SP is expecting in the subject element of SAML Assertion. Generally, NameID is Username of Email Address. You can select which user attribute you want to send in the NameID.
  • You can add other attributes to be sent in SAML Assertion to SP. The attributes include user’s profile attributes such as first name, last name, fullname, username, email, custom profile attributes etc.
  • After completing the attribute mapping, click on the Save Settings button to save your configurations.
DNN SAML IDP Attribute Mapping

  • Check your configuration. If everything is correct, you’ll get a success message that contains all the values pulled from your IdP.
Testing SSO
  • After successfully testing the SSO connection, you can also use the DNN IdP-initiated SSO link to directly log in to Talent LMS from your DNN site.
  • After adding your Service Provider, click on Select Actions → Copy SSO Link.
    For DNN (IdP) initiated SSO, you can use the SSO link provided by the DNN SAML IdP module.
DNN SAML IDP Copy SSO Link

  • If you face any issues or get any errors duing the setup. Click on the Troubleshoot button and Enable logs.
DNN SAML IDP Troubleshooting

DNN SAML IDP Troubleshooting



Please reach out to us at dnnsupport@xecurify.com, and our team will assist you with setting up SAML Single Sign-On (SSO) for Talent LMS using DNN as the Identity Provider (IDP). We will also help you choose the most suitable solution or plan based on your requirements.

ADFS_sso ×
Hello there!

Need Help? We are right here!

support