You can integrate your Open edX installation with federated identity solutions that use the SAML 2.0 (Security Assertion Markup Language, version 2.0) standard. An example is Shibboleth, a single sign on system that is used by many educational institutions.
SAML metadata is an XML file that contains the information necessary for secure interactions between identity providers and security providers. You send the URL of your metadata file, created when you configured your installation as a SAML service provider, to each identity provider that you want to add. Similarly, you obtain the metadata URLs from identity providers before you add and enable them for your installation.
To add and enable a SAML 2.0 identity provider, follow these steps.
Log in to the Django administration console for your base URL. For example,
In the Third_Party_Auth section, next to Provider Configuration (SAML IdPs) select Add.
If you want to change the configuration of an existing provider, next to Provider Configuration (SAML IdPs) select Change, and then select Update for the provider that you want to configure.
Enter the following information for the provider.
Specify your selections for any of the other, optional configuration options. For more information about these options, see Configuration Options for SAML Identity Providers.
When you are ready to enable the provider, select Enabled at the top of the page. Alternatively, save your configuration settings and enable the provider at another time.
Select Save or one of the other save options at the bottom of the page.
Next, you can test an enabled provider.
To customize the registration process for IdP, you make selections for these optional fields on the Add Provider Configuration (SAML IdP) page.
Skip Registration Form: If you select this option, users are not asked to confirm the user account data supplied for them by the IdP (name, email address, and so on). Select this option only for providers that are known to provide accurate user information.
By default, users review a registration form with the supplied account details.
Skip Email Verification: If you select this option, users are not required to confirm their email addresses, and their accounts are activated immediately upon registration.
By default, users receive an email message and must select a link in that message to activate their user accounts.
User ID Attribute: Required. This value is used to associate the user’s edX account with the campus account. It is not displayed to users.
By default, uses
Optional user attributes: You can indicate specific URN values for the following user attributes.
By default, the registration form includes all of the following attributes if they are sent by the IdP.
If the identity provider sends a value that you do not want to be included on the the registration form, you can enter a value such as “DISABLED” or “IGNORE” in that field.
To verify the sign in process for an IdP that you have enabled, follow these steps.
On the Django administration console, in the Third_Party_Auth section, select Provider Configuration (SAML IdPs).
Check the icon in the Metadata ready column for the IdP. After the provider’s metadata is fetched successfully from the URL that you provided as the metadata source, a check mark in a green circle appears and the provider is ready for use immediately.
You might need to wait 30-60 seconds for the task to complete, and then refresh this page.
If the check mark does not appear, make sure that celery is configured
correctly and is running. You can also manually trigger an update by running
the management command
./manage.py lms saml --pull --settings=aws on
./manage.py lms saml --pull --settings=devstack on
For additional information about the data fetched from the IdP, on the Django administration console select SAML Provider Data, and then select the provider. The page that opens reports data fetched from the metadata source URL and the date and time it was fetched.
To verify that users can use the IdP for sign in, go to the sign in page for your LMS. The page should include the institutional sign in button.
Select Use my institutional/campus credentials. The list of providers that appears should include the IdP that you enabled.