Configure OpenID SSO for TalentLMS

These steps show you how to configure the single sign-on (SSO) functionality using OpenID to TalentLMS from ManageEngine ADSelfService Plus.

Prerequisites

  • Do not terminate the session before the configuration is complete in both the identity provider and the service provider.
  • Please enable HTTPS is the product to ensure proper functioning of single sign-on.
  1. Login to ADSelfService Plus as Super admin.
  2. Go to Configuration > Password Sync/ Single Sign On and click Add Application. Select TalentLMS from the list.
  3. Note: You can also use the search bar, in the top-left, to search for the application.
  4. Click on IdP Details and select SSO (OAuth/OpenID Connect) tab.
  5. Copy Client ID, Client Secret, Authorization Endpoint URL, Token Endpoint URL, and User Endpoint URL.
  6. Configure Oauth or OpenID Connect SSO for custom application

TalentLMS (service provider) configuration steps

  1. Login to TalentLMS account with admin credentials.
  2. Go to Home → Account & Settings → Users and click Single Sign-On (SSO).
  3. Configure Oauth or OpenID Connect SSO for custom application Configure Oauth or OpenID Connect SSO for custom application
  4. Select the SSO Integration Type as OpenID Connect from the drop-down list.
  5. Configure Oauth or OpenID Connect SSO for custom application
  6. Enter the following fields with corresponding details copied in the step 4 of Prerequisites:
    • Client id: Client ID
    • Client secret: Client Secret
    • Token endpoint: Token endpoint URL
    • User info endpoint: User Endpoint URL
    • Authorization endpoint: Authorization Endpoint URL
    Configure Oauth or OpenID Connect SSO for custom application
  7. Fill in the following fields as mentioned below:
    • Username: sub
    • First name: first_name
    • Last name: last_name
    • Email: email
    • Scope: openid email profile
  8. Click Save and check your configuration.
  9. Now, you need to copy the Authorized redirect URL from TalentLMS to configure ADSelfService Plus.
  10. Configure Oauth or OpenID Connect SSO for custom application

ADSelfService Plus (identity provider) configuration steps

Switch back to ADSelfService Plus' TalentLMS configuration page.

Configuring SSO information for TalentLMS in ADSelfService Plus

Enter the Application Name and Description as per your preference.

Enter the Domain Name of your TalentLMS account. For example, if your TalentLMS username is johnwatts@thinktodaytech.com, then thinktodaytech.com is your domain name.

  1. In the Assign Policies field, select the policies for which SSO need to be enabled.
  2. Note: ADSelfService Plus allows you to create OU and group-based policies for your AD domains. To create a policy, go to Configuration > Self-Service > Policy Configuration > Add New Policy.
  3. Under the SSO tab, select Enable Single Sign-On.
  4. Choose OAuth/OpenID Connect from the Select Method drop-down.
  5. Enter the TalentLMS portal's login URL in the SP Login Initiate URL field.
  6. Note: TalentLMS requires sign-in to begin from their login page, known as SP-initiated login. Users are first directed to the TalentLMS login page, specified in the SP Login Initiate URL field, after which TalentLMS (the SP) redirects them to ADSelfService Plus (the IdP) for authentication.
  7. Enter the Redirect URL copied in Step 7 of configuring TalentLMS in the SSO Redirect URL field.
  8. Using the Scopes drop-down, select openid, which is the scope required for OIDC authentication. You can also specify scopes such as profile or email to include extra user information in the authorization request.
  9. Note: Scopes specify the level of access the access token has. They are typically included in the authorization request. Specify the scopes for which you wish to allow access to your authorization token, using the drop-down.
  10. Click Add Application to save the configuration.

The Well-known Configuration URL in the IdP details pop-up contains all the endpoint values, supported scopes, response modes, client authentication modes, and client details. This is enabled only after you finish configuring the application for SSO in ADSelfService Plus. You can provide this to your service provider if required.

Go to Top

Copyright © 2025, ZOHO Corp. All Rights Reserved.