Configuring SAML 2.0 for Single Sign-On (SSO)

by Skilljar SSE Team


Skilljar supports SAML 2.0 as a SSO method, that can be configured on your training site. In this method, Skilljar acts as SAML Service Provider (SP) and will rely on your SAML Identity Provider (IdP) to authenticate your users.

When enabled, your users will no longer see the native Skilljar sign-in/sign-up pages, and will instead be redirected to the configured SingleSignOnService URL.


Configuring your training site to use SAML 2.0 for SSO will require working with your dedicated Implementation Manager, CSM, or Skilljar Support.

To get started, you'll need to provide the following Identity Provider settings to Skilljar. This information is typically included in the IdP Metadata XML file which you can send to us.

  • IdP x509 Certificate
  • IdP Entity ID (Also referred to as the Issuer)
  • IdP SingleSignOnService URL (The SP Initiated Login URL)
  • IdP SingleLogoutService URL (Optional the IdP's SLO URL, which we'll make a SAML logout request to when the user signs out of Skilljar)
  • SAML Assertion Attribute Names (The attribute names as it will appear in the SAML Assertion)
    • First name
    • Last name
    • Email

Once your domain is configured with the settings you've provided above, you can obtain the SP settings in the SP Metadata XML file, which you can download from the Domains Settings page of the relevant domain in your Skilljar Dashboard.


  • SP Entity ID (This will be your training sites URL, e.g., Note, the trailing slash is required)
  • SP x509 Certificate (Optional, used to verify the SP’s request signature)
  • AssertionConsumerService URL (Your training sites unique endpoint where the IdP will send the SAML Assertion)
  • SingleLogoutService URL (Optional, your Skilljar training site's unique logout URL which can be configured in your IdP to logout the user from Skilljar when SLO is initiated by the IdP)
  • NameIDFormat: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress

Note: Skilljar requires the Assertion of the Response to be signed.

How it Works

SAML 2.0 is an XML-based SSO standard for authentication involving two parties: the Service Provider (in this case, your Skilljar training site) and your Identity Provider. With SAML 2.0 configured on your domain, Skilljar (the Service Provider) relies on the IdP to authenticate your users, and on successful authentication, the IdP sends a SAML assertion (containing the user’s identity) to Skilljar. Here are the two ways SAML 2.0 works as a SSO standard:

Service Provider Initiated Sign On

In this scenario, the user begins the SSO flow from the Service Provider (your Skilljar training site):

  1. On sign in, Skilljar redirects the browser sending a SAML request to the configured SingleSignOnService URL where the user will be prompted to sign in if they aren’t already authenticated
  2. On successful sign in, the Identity Provider will then redirect a SAML assertion (containing the user’s identity) back to Skilljar (specifically, the configured AssertionConsumerService URL)
  3. Skilljar will then parse and process the SAML Assertion and sign the user into your training site


Identity Provider Initiated Sign On

In this scenario, authenticating into the Service Provider (your Skilljar training site) begins in the Identity Provider.  In this explanation, the user is already authenticated with the Identity Provider.

  1. The user will typically click on a link within your Identity Provider, which is the IdP Initiated SSO URL specific to the Service Provider. The Identity Provider generates the SAML Assertion (containing the user’s identity) and sends it back to Skilljar (specifically, the AssertionConsumerService URL).
  2. Skilljar will then parse and process the SAML Assertion and sign the user into your training site.



Troubleshooting SSO can be difficult, so understanding how it works and where in the flow things are breaking can be hugely beneficial in debugging:

  • Misconfigurations in the settings are typically the root cause – start here when dealing with SSO issues.
  • Capturing the network requests/responses using the browser’s developer tools can also help pinpoint where in the SSO flow things are breaking.
  • For example, if the SAML flow errors on the initial redirect to the SingleSignOnService URL, it’s likely that there’s a misconfiguration with either the SP Entity ID or the SingleSignOnService URL itself. 
  • If the SSO flow breaks after the user signs in through the Identity Provider, it’s likely that there’s a setting misconfiguration with the AssertionConsumerService URL, IdP Entity ID (Issuer), Identity Provider’s x509 certificate, or possibly the user doesn’t have the right permissions to access Skilljar.

These are just some things to keep in mind when troubleshooting SSO issues.

Finally, we’re always here to help! You can reach out to Skilljar Support and we can quickly escalate your issue up to our engineers. Additionally, the more information you can provide to us, the better we can help (screenshots, test logins, HAR file).

Powered by Zendesk