
Upload ADFS Metadata to LinkedIn Learningĭownload your ADFS metadata using the following format (replace with your server name). In other words, you (the admin) trigger the IdP-initiated flows by sending the response to this endpoint. This field maps to the Assertion Consumer Service URL, where a SAML response sends a "POST" via the user agent. Open the SP Metadata XML file you downloaded from LinkedIn Learning, locate the AssertionConsumerService URL, and paste it in the Endpoint. To configure SAML SSO in ADFS and LinkedIn Learning, take the following steps: If you select "SHA-256", make sure you also choose "SHA-256" when completing the configuration in LinkedIn Learning. We recommend the values shown below, but you can select the values that align with your organization's needs. Select “Active Directory” in the Attribute Store dropdown.Ĭhoose your mappings. Select Configure Claim Rule, then enter a name in the Claim rule name field. Select “Send LDAP Attributes as Claims” from the dropdown, then click Next. In the Add Transform claim Rule Wizard window, select Choose Rule Type. In the Issuance Transform Rules tab, select Add Rule., then click OK. Select Finish, then select "Open the Edit Claim Rules dialog for this relying party trust when the wizard closes", then click Close. Select Choose Issuance Authorization Rules, then select "Permit all users to access this relying party". Select Configure Multi-factor Authentication Now?, then select "I do not want to configure multi-factor authentication settings for this relying party trust at this time". Select Specify Display Name, then in the Display name field, enter a display name (i.e., "LinkedIn Learning"). In the left-hand side navigation, click Select Data Source, then choose “Import data about the relying party from a file” and select the SP Metadata file downloaded from LinkedIn Learning. In the right hand column, select "Add Relying Party Trust". You should see the previously-added relying party trusts. In ADFS, navigate to Trust Relationships > Relying Party Trusts. LinkedIn Learning downloads the SP metadata as an XML file. In the Authenticate users with SAML SSO screen, under Identity provider settings, click Download. The following steps outline the SSO-ADFS configuration process:ĭownload Service Provider Metadata from LinkedIn LearningĪfter you log in, if you are not already in the Admin screen, select Go to Admin, then select Me > Authenticate.įrom the side navigation menu, select Configure single sign-on and click Add new SSO.

This guide also describes troubleshooting steps for common issues in the SSO-ADFS configuration.

This document outlines the necessary steps for LinkedIn Learning administrators to set up Single Sign-on with ADFS 3.0.
