Login Scenarios
This page details all of the different login scenarios that LearningBuilder supports.
See also: Login Page Configuration for other ways to configure the Login page
Local login scenarios
Use case | Currently supported? | Notes |
---|---|---|
Log in using LearningBuilder password This is the default approach in which all user data is stored in the LearningBuilder database and users log in with a password managed in LearningBuilder | Yes |
|
Log in using LearningBuilder password Same as above, but certain users are required to confirm a security code sent to their email address during every login. | Yes | Introduced in 11.0.14 / 11.6.0. Can be enabled for specific Roles only/ |
Log in using TOTP Authenticator app (e.g. Microsoft Authenticator) Uses a 3rd party application on a mobile device to provide additional security. | No | This has been designed but not implemented. Alternative is to use a 3rd party Identity Provider that provides the authenticator support. |
Legacy single-sign-on scenarios
See Single Sign-On (SSO) for details on the legacy LearningBuilder SSO integration. This is being slowly phased out in favor of Identity Providers.
Use case | Currently supported? | Notes |
---|---|---|
Redirect all users to 3rd party login screen All unauthenticated users are redirected to a 3rd party login screen specified in App Config. The 3rd party authenticates them and redirects back to LearningBuilder passing a signed access token. | Yes | As of 11.0.14 / 11.6.0, Sys Admins and other Roles (if configured) can bypass this redirect by directly accessing |
SAML / OIDC based single-sign-on
LearningBuilder can use Identity Providers to integrate with 3rd parties without the need for any custom integration coding or engineering support.
As of 11.0.14 / 11.0.6, LearningBuilder only supports a single Identity Provider. Support for multiple concurrent Identity Providers is planned for a future release.
Use case | Currently supported? | Notes |
---|---|---|
Redirect all users to 3rd party login screen All unauthenticated users are redirected to a 3rd party login screen specified in App Config. The 3rd party authenticates them and performs an IdP-initiated authentication flow. This works best when the 3rd party login screen shares branding with LearningBuilder, so the user is not surprised by the automatic redirect. | Yes [11.0.14] | As of 11.0.14 / 11.6.0, Sys Admins and other Roles (if configured) can bypass this redirect by directly accessing |
Manual SAML initiation In this approach unauthenticated users land on the LearningBuilder login page, but there is no login form. Instead, there is a button that says “Log in with <provider>” that begins a SP-initiated authentication flow. | Yes [11.0.14] | Sys Admins and other Roles (if configured) can still log in locally via |
Local login form + SAML / OIDC button Unauthenticated users land on the LearningBuilder login page that displays both a local login form and a button to begin SSO via SAML or OIDC providers. This is useful when local passwords are still desired, but where there is a trusted 3rd party that can be used as a secondary way to authenticate. | Yes [11.0.14] | Via permissions, some Roles can be allowed to log in locally while others are required to log in via SSO. |