Relias Platform SAML Single Sign-On
** Please Note:
The implementation of SAML SSO requires the participation of your internal IT team. If you are using an HRIS interface to the Relias Platform, the group managing this must also be part of the project. Customers who are interested in using this feature should begin by discussing it with their IT leadership, who should be able to proceed with this documentation.
The majority of the configuration required to deploy SAML is performed on the client side. Relias engineering support will assist by providing feedback on logs. IdP vendors may also need to be engaged for configuration and support.
The Relias Platform SAML does not support user provisioning, only single sign-on. Customers must store the shared unique identifier for each user in the GUID field of the Relias user profile. Customers should implement HRIS processes or bulk update their Relias user profiles prior to implementing SAML.
** This document outlines the steps necessary to use the new SAML Single Sign-On in the RLMS.
For the SAML panel to show in the Customer's settings, the checkbox “Show SAML SSO Panel” needs to be checked for the site. A client will specifically need to request SAML to be turned on for them, and a Relias Learning Support representative will toggle this field. This request can be submitted to Relias Learning Support
Now that the SAML Panel is available, a user with the Administrator Role can log in and see it.
They Admin will go to Settings > SAML Single Sign On Settings in the left hand panel
Use SAML SSO – This should be checked if the organization would like their users to log in using SAML SSO. Important - While testing it is recommended you also check 'Allow traditional Log In' to avoid locking users out during configuration.
Allow Traditional Log In – This determines whether the user can log into the Relias Platform with their log in credentials should their SSO credentials fail. When this is checked, the user can bypass SSO and use the traditional login.
User Lookup Key Name – The name of the field in the SAML request that contains the unique identifier of the user (which must exist in the user profile in the GUID field on the RLMS) that is being passed in from the Identity Provider. For example, in the image below, the Identity Provider has mapped the Relias GUID to the SAML Attribute (field) 'emailaddress'. This is required for the Relias Consumer Service to process which user is trying to log in. User Lookup Key Name should be entered in lowercase.
Hosted Metadata File / Upload Metadata File – The Identity Provider has two options:
- Hosted Metadata File – The Identity Provider will publish their Metadata XML file on their server, and provide a link for the Relias Consumer Service to access the file.
- Upload Metadata File – The Identity Provider may upload their Metadata XML file directly into the Relias Platform for the Consumer Service to look up the values locally.
- *Note that once the file is uploaded, the values still need to be saved by clicking the save button at the top of the page.
Assertion Consumer Service URL – This is a read-only field that allows the user to copy and paste the URL. The URL will be needed on the Identity Provider’s side to communicate with the Relias Platform SSO service. Your Organization Id is identified in the ACS URL - example below is Org ID '9199'
Identifier URL - https://login.reliaslearning.com
Logout URL - this is used to log out of all apps tied to SSO. This URL is https://login.reliaslearning.com/SAML/SingleLogoutService.
Metadata File - Your organization’s metadata file containing Relias Certificate Public Key can be found here: https://login.reliaslearning.com/SAML/YourOrgID/Metadata
Metadata XML File
The Metadata XML file is the key piece of communication between the Identity Provider, and the Relias Consumer Service.
Certificate Key – This is the <X509 Certificate> that resides on the Identity Providers server. The SSO transaction will not complete if the key in the XML file does not match the certificate on the server.
TLS - 1.0
When using ADFS:
User lookup Key must be the claim type in Claim Descriptions
To get back to the RLMS How To Manual, please click here: The RLMS How-To-Manual