Skip to content

Conversation

@mstrivens
Copy link
Contributor

@mstrivens mstrivens commented Oct 14, 2025

Resolves #291

Created comprehensive SSO configuration guides for popular Identity Providers based on EasyLlama best practices to configure custom lms_user_id attributes for Learning Management System integrations.

Changes

  • Added Okta SSO configuration guide with SAML/OIDC setup and custom user attributes
  • Added Azure AD/Entra ID configuration with extension attributes and claims
  • Added Google Workspace configuration with custom attributes and SAML mappings
  • Added Auth0 configuration with user metadata and custom claims
  • Created comprehensive overview document explaining SSO user ID mapping concepts
  • Updated integration configuration concepts index with new LMS section

Benefits

  • Provides generic documentation that can be linked from specific LMS guides
  • Covers the most popular enterprise Identity Providers
  • Incorporates best practices from EasyLlama's excellent documentation
  • Includes comprehensive troubleshooting and testing guidance

🤖 Generated with Claude Code


Summary by cubic

Adds comprehensive IDP SSO configuration guides to help admins map a stable lms_user_id for LMS integrations. Includes guides for Okta, Azure AD/Entra ID, Google Workspace, and Auth0, plus an overview and an LMS index section.

  • New Features
    • Provider guides covering SAML/OIDC setup, custom attributes/claims for lms_user_id, and testing/troubleshooting.
    • SSO user ID mapping overview explaining concepts and common LMS identifier patterns.
    • Updated integration concepts index with a new LMS section linking to all guides.

Written for commit 5aa6054. Summary will update automatically on new commits.

Created detailed documentation for configuring custom SSO attributes (lms_user_id)
across popular Identity Providers based on EasyLlama best practices:

- Okta SAML 2.0 and OIDC configuration with custom user attributes
- Azure AD/Entra ID SAML and OIDC setup with extension attributes
- Google Workspace SAML configuration with custom user schema
- Auth0 SAML and OIDC setup with Rules/Actions for custom claims
- Comprehensive overview document explaining SSO user ID mapping concepts

Added LMS section to integration-configuration-concepts.mdx index.

These guides provide generic documentation that can be referenced from
specific LMS integration guides with the appropriate lms_user_id value.

Co-authored-by: Max Strivens <[email protected]>
Copilot AI review requested due to automatic review settings October 14, 2025 08:25
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR adds comprehensive SSO configuration guides for Learning Management System (LMS) integrations, focusing on how to configure popular Identity Providers to include custom user attributes like lms_user_id for seamless user mapping between identity systems and LMS platforms.

  • Creates detailed configuration guides for four major Identity Providers (Okta, Azure AD/Entra ID, Google Workspace, and Auth0)
  • Provides a comprehensive overview document explaining SSO user ID mapping concepts and best practices
  • Adds new LMS section to the integration configuration concepts index

Reviewed Changes

Copilot reviewed 6 out of 6 changed files in this pull request and generated 5 comments.

Show a summary per file
File Description
integration-configuration-concepts/lms/sso-user-id-configuration.mdx Overview guide explaining SSO user ID mapping concepts for LMS integrations
integration-configuration-concepts/lms/okta-sso-configuration.mdx Step-by-step Okta SAML/OIDC configuration with custom attributes
integration-configuration-concepts/lms/google-workspace-sso-configuration.mdx Google Workspace SAML configuration with custom user attributes
integration-configuration-concepts/lms/azure-ad-sso-configuration.mdx Azure AD/Entra ID configuration with extension attributes and claims
integration-configuration-concepts/lms/auth0-sso-configuration.mdx Auth0 configuration using Rules/Actions for custom claims
integration-configuration-concepts.mdx Updated index to include new LMS section with links to all guides

Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.

Comment on lines +29 to +35
| ID Type | Description | Example | Common LMS Platforms |
|---------|-------------|---------|---------------------|
| **Email Address** | User's email address | `[email protected]` | Blackboard, some Canvas instances |
| **Employee ID** | Numeric employee identifier | `123456` | Cornerstone, Docebo, Workday Learning |
| **Student ID** | Academic student identifier | `STU789123` | Canvas, Moodle (academic) |
| **Username** | Login username | `jdoe` | Moodle, custom LMS platforms |
| **External ID** | External system identifier | `EXT_ABC123` | Multi-system integrations |
Copy link

Copilot AI Oct 14, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Corrected spelling of 'recieve' to 'receive'.

Copilot uses AI. Check for mistakes.
Comment on lines +8 to +10
<Warning>
This configuration requires admin access to your Okta instance and should be tested in a non-production environment first.
</Warning>
Copy link

Copilot AI Oct 14, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Corrected spelling of 'recieve' to 'receive'.

Copilot uses AI. Check for mistakes.
Comment on lines +8 to +10
<Warning>
This configuration requires Google Workspace admin privileges and should be tested in a non-production environment first.
</Warning>
Copy link

Copilot AI Oct 14, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Corrected spelling of 'recieve' to 'receive'.

Copilot uses AI. Check for mistakes.
Comment on lines +8 to +10
<Warning>
This configuration requires admin access to your Azure Active Directory tenant and should be tested thoroughly before production deployment.
</Warning>
Copy link

Copilot AI Oct 14, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Corrected spelling of 'recieve' to 'receive'.

Copilot uses AI. Check for mistakes.
Comment on lines +8 to +10
<Warning>
This configuration requires admin access to your Auth0 tenant and should be tested thoroughly before production deployment.
</Warning>
Copy link

Copilot AI Oct 14, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Corrected spelling of 'recieve' to 'receive'.

Copilot uses AI. Check for mistakes.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

IDP SSO Configuration

2 participants