How to set up iHasco SSO with GSuite

Created by Michael Walsh, Modified on Thu, 15 Feb at 2:36 PM by Amanda Lowndes

Supported Features

The GSuite / iHasco Single Sign-On (SSO) integration currently supports the following features:

  • SP-initiated SAML2
  • Just In Time (JIT) Provisioning


Overview

 You will need:

  • Access to the SSO feature within the iHasco Atlas LMS. Tell your iHasco account manager that you want to use SSO and they will enable it.

 What you need to do:

  1. Add the iHascoTraining SAML app to your GSuite account.
  2. Create the GSuite Identity provider(IDP) details in your iHasco Atlas LMS.
  3. Set the Registration method to use your IDP in iHasco AtlasLMS.
  4. Test SSO with iHasco Training using your GSuite account.


Add the iHASCO Training SAML app to your GSuite account

  1. Sign in to your GSuite account.
  2. Click Apps, then click Web and mobile apps.
  3. Click Add app, then click Add custom SAML app to show Step 1 App details.
  4. Find App name and type in ‘iHasco Training’.
  5. Download the iHasco logo with this link: iHasco App Icon.
  6. Upload the iHasco logo as your App icon.
  7. Click Continue to show Step 2 Google IDP details.
  8. Find Option 2. The values of the fields listed in the table below will be required when you create the GSuite IDP details in iHasco LMS. Copy the field names and values into a text editor.
  9. Click Continue to show Step 3 Service provider details.
  10. In a web browser, sign in to iHasco Atlas LMS as an administrator.
  11. Click Settings.
  12. Scroll down to the Advanced card and click Single Sign On.
  13. Scroll down to find SAML2 SERVICE PROVIDER DETAILS and copy and paste the values in the following fields from iHasco to GSuite:
  14. Select ‘PERSISTENT’ as the Name ID format.
  15. Click Continue to show Step 4 Attributes.
  16. Set the following mappings to the values listed:
  17. Click Finish.
  18. Find User access, and assign training users to the iHasco Training app.


 Copy from GSuite: 

 2 Google Identity Provider details 

 SSO URL
 Entity ID
 Certificate file contents



 Copy from iHasco Atlas LMS SSO: 

 SAML2 SERVICE PROVIDER DETAILS  

 Paste to GSuite: 

 3 Service provider details 

 User Login URL Start URL
 Assertion Consumer Service(ACS) URL ACS URL
 Entity ID / Metadata URL Entity ID



 GSuite 

 Google Directory attributes


 Primary Email emailaddress
 First name firstname
 Last name lastname


Create the GSuite IDP details in iHasco Atlas LMS

  1. In your iHasco Atlas LMS, sign in as an administrator.
  2. Click Settings.
  3. Scroll down to the Advanced card and click Single Sign On.
  4. Click Add Provider and select SAML2.
  5. Type your name for this provider in Description.
  6. Scroll to find IDENTITY PROVIDER DETAILS.
  7. Using the values in your text editor from Step 2 Google IDP details, copy and paste the following fields to iHASCO:
  8. Scroll to find USER ATTRIBUTE MAPPING.
  9. Set the following mappings to the values listed:
  10. Click Save.
  11. Click Enable now.


 Copy from GSuite: 

 2 Google Identity Provider details  

 Paste to iHASCO LMS SSO: 

 IDENTITY PROVIDER DETAILS 

 SSO URL Single Sign-on URL
 Entity ID Entity ID
 Certificate file (all file contents) X509 (Public) Certificate


 iHasco Atlas LMS SSO 

 USER ATTRIBUTE MAPPING


 Email address emailaddress
 First name firstname
 Last name lastname



Set the Registration method in iHasco Atlas LMS

  1. Click Settings.
  2. Scroll down to the Advanced card and click Security.
  3. Find Registration Method and select Single Sign On Provider.
  4. Choose your new provider as the Selected Provider.
  5. Click Save changes.


GSuite / iHasco SSO set up is now complete.



Test SSO using GSuite

Note Remember to add users to the iHASCO Training application in GSuite and sign out of any iHASCO administrator accounts before testing.

  1. From your GSuite, click iHasco Training application.
  2. Click TEST SAML LOGIN.

If the test is successful, you will be signed in and taken to the iHasco My Learning screen (or to the iHasco LMS if testing with a pre-registered admin account).


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article