Before we begin, we highly recommend that you ensure that your Identity Provider Application be configured before continuing. If this step(Step 3 of the SAML SSO Configuration Guide) then there is a possibility that the Metadata Certificate will not be valid and you will experience errors when attempting to log in.
Another prerequisite is that you should secure your Application Metadata URL in your IDP, this will require your IDP Administrator’s involvement.
Where can I find my Application Metadata URL?
Azure Active Directory
You can locate your Federated Application Metadata URL in Section 3 of the Single Sign-on Tab of your Enterprise Application.
You can locate your IDP Metadata URL in the Single Sign-on Tab of your Application under the SAML 2.0 section.
You can locate your IDP Metadata URL under the Configuration Tab of your Application.
You can locate your Issuer Metadata URL in the SSO Tab of your application.
Steps to Follow
Proceed to the Configuration section of your Living Security Training Platform application.
Select the SAML SSO Configuration tab
Make sure your application is set to Metadata URL Mode
Paste the IDP Metadata URL from your Organization’s Identity Provider Application
If your Metadata URL is valid, you should see a new attribute populate with the Certificate Expiration date. If you can see this, congratulations! You have formed a SAML SSO Connection between your IDP and Living Security Training Platform!