Tutorial: Azure Active Directory integration with iLMS
In this tutorial, you learn how to integrate iLMS with Azure Active Directory (Azure AD).
Integrating iLMS with Azure AD provides you with the following benefits:
- You can control in Azure AD who has access to iLMS
- You can enable your users to automatically get signed-on to iLMS (Single Sign-On) with their Azure AD accounts
- You can manage your accounts in one central location - the Azure portal
If you want to know more details about SaaS app integration with Azure AD, see what is application access and single sign-on with Azure Active Directory.
To configure Azure AD integration with iLMS, you need the following items:
- An Azure AD subscription
- An iLMS single-sign on enabled subscription
To test the steps in this tutorial, we do not recommend using a production environment.
To test the steps in this tutorial, you should follow these recommendations:
- You should not use your production environment, unless this is necessary.
- If you don't have an Azure AD trial environment, you can get a one-month trial here.
In this tutorial, you test Azure AD single sign-on in a test environment. The scenario outlined in this tutorial consists of two main building blocks:
- Adding iLMS from the gallery
- Configuring and testing Azure AD single sign-on
Adding iLMS from the gallery
To configure the integration of iLMS into Azure AD, you need to add iLMS from the gallery to your list of managed SaaS apps.
To add iLMS from the gallery, perform the following steps:
In the Azure portal, on the left navigation panel, click Azure Active Directory icon.
Navigate to Enterprise applications. Then go to All applications.
To add new application, click New application button on the top of the dialog.
In the search box, type iLMS.
In the results panel, select iLMS, then click Add button to add the application.
Configuring and testing Azure AD single sign-on
In this section, you configure and test Azure AD single sign-on with iLMS based on a test user called "Britta Simon".
For single sign-on to work, Azure AD needs to know what the counterpart user in iLMS is to a user in Azure AD. In other words, a link relationship between an Azure AD user and the related user in iLMS needs to be established.
This link relationship is established by assigning the value of the user name in Azure AD as the value of the Username in iLMS.
To configure and test Azure AD single sign-on with iLMS, you need to complete the following building blocks:
- Configuring Azure AD Single Sign-On - to enable your users to use this feature.
- Creating an Azure AD test user - to test Azure AD single sign-on with Britta Simon.
- Creating an iLMS test user - to have a counterpart of Britta Simon in iLMS that is linked to the Azure AD representation of her.
- Assigning the Azure AD test user - to enable Britta Simon to use Azure AD single sign-on.
- Testing Single Sign-On - to verify whether the configuration works.
Configuring Azure AD single sign-on
In this section, you enable Azure AD single sign-on in the Azure portal and configure single sign-on in your iLMS application.
To configure Azure AD single sign-on with iLMS, perform the following steps:
In the Azure portal, on the iLMS application integration page, click Single sign-on.
On the Single sign-on dialog, select Mode as SAML-based Sign-on to enable single sign-on.
On the iLMS Domain and URLs section, perform the following steps if you wish to configure the application in IDP initiated mode:
a. In the Identifier textbox, paste the Identifier value you copy from Service Provider section of SAML settings in iLMS admin portal.
b. In the Reply URL textbox, paste the Endpoint (URL) value you copy from Service Provider section of SAML settings in iLMS admin portal having the following pattern
This '123456' is an example value of identifier.
Check Show advanced URL settings, if you wish to configure the application in SP initiated mode:
In the Sign-on URL textbox, paste the Endpoint (URL) value you copy from Service Provider section of SAML settings in iLMS admin portal as
To enable JIT provisioning, iLMS application expects the SAML assertions in a specific format. Configure the following claims for this application. You can manage the values of these attributes from the User Attributes section on application integration page. The following screenshot shows an example for this.
Create Department, Region and Division attributes and add the name of these attributes in iLMS. All these attributes shown above are required.
You have to enable Create Un-recognized User Account in iLMS to map these attributes. Follow the instructions here to get an idea on the attributes configuration.
In the User Attributes section on the Single sign-on dialog, configure SAML token attribute as shown in the image above and perform the following steps:
Attribute Name Attribute Value division user.department region user.state department user.jobtitle
a. Click Add attribute to open the Add Attribute dialog.
b. In the Name textbox, type the attribute name shown for that row.
c. From the Value list, type the attribute value shown for that row.
d. Click Ok
On the SAML Signing Certificate section, click Metadata XML and then save the XML file on your computer.
Click Save button.
In a different web browser window, log in to your iLMS admin portal as an administrator.
Click SSO:SAML under Settings tab to open SAML settings and perform the following steps:
a. Expand the Service Provider section and copy the Identifier and Endpoint (URL) value.
b. Under Identity Provider section, click Import Metadata.
c. Select the Metadata file downloaded from Azure Portal from SAML Signing Certificate section.
d. If you want to enable JIT provisioning to create iLMS accounts for un-recognize users, follow below steps:
Check Create Un-recognized User Account.
Map the attributes in Azure AD with the attributes in iLMS. In the attribute column, specify the attributes name or the default value.
e. Go to Business Rules tab and perform the following steps:
Check Create Un-recognized Regions, Divisions and Departments to create Regions, Divisions, and Departments that do not already exist at the time of Single Sign-on.
Check Update User Profile During Sign-in to specify whether the user’s profile is updated with each Single Sign-on.
If the “Update Blank Values for Non Mandatory Fields in User Profile” option is checked, optional profile fields that are blank upon sign in will also cause the user’s iLMS profile to contain blank values for those fields.
Check Send Error Notification Email and enter the email of the user where you want to receive the error notification email.
Click Save button to save the settings.
You can now read a concise version of these instructions inside the Azure portal, while you are setting up the app! After adding this app from the Active Directory > Enterprise Applications section, simply click the Single Sign-On tab and access the embedded documentation through the Configuration section at the bottom. You can read more about the embedded documentation feature here: Azure AD embedded documentation
Creating an Azure AD test user
The objective of this section is to create a test user in the Azure portal called Britta Simon.
To create a test user in Azure AD, perform the following steps:
In the Azure portal, on the left navigation pane, click Azure Active Directory icon.
Go to Users and groups and click All users to display the list of users.
At the top of the dialog click Add to open the User dialog.
On the User dialog page, perform the following steps:
a. In the Name textbox, type BrittaSimon.
b. In the User name textbox, type the email address of BrittaSimon.
c. Select Show Password and write down the value of the Password.
d. Click Create.
Creating an iLMS test user
Application supports Just in time user provisioning and after authentication users are created in the application automatically. JIT will work, if you have clicked the Create Un-recognized User Account checkbox during SAML configuration setting at iLMS admin portal.
If you need to create an user manually, then follow below steps :
Log in to your iLMS company site as an administrator.
Click “Register User” under Users tab to open Register User page.
On the “Register User” page, perform the following steps.
a. In the First Name textbox, type the first name Britta.
b. In the Last Name textbox, type the last name Simon.
c. In the Email ID textbox, type the email address of Britta Simon account.
d. In the Region dropdown, select the value for region.
e. In the Division dropdown, select the value for division.
f. In the Department dropdown, select the value for department.
g. Click Save.
You can send registration mail to user by selecting Send Registration Mail checkbox.
Assigning the Azure AD test user
In this section, you enable Britta Simon to use Azure single sign-on by granting her access to iLMS.
To assign Britta Simon to iLMS, perform the following steps:
In the Azure portal, open the applications view, and then navigate to the directory view and go to Enterprise applications then click All applications.
In the applications list, select iLMS.
In the menu on the left, click Users and groups.
Click Add button. Then select Users and groups on Add Assignment dialog.
On Users and groups dialog, select Britta Simon in the Users list.
Click Select button on Users and groups dialog.
Click Assign button on Add Assignment dialog.
Testing single sign-on
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
When you click the iLMS tile in the Access Panel, you should get automatically signed-on to your iLMS application.