In order to restore access for your users, please perform one of the following options:
Option 1:
Download the new certificate and add to the existing signature certificates list in Identity Provider (IDP).
-
Download the new certificate and add it to the existing signature certificates list in ADFS. (See also Related Tasks section below.)
-
In ADFS, locate Relying Party Trust for LinkedIn Learning and open properties to edit.
-
Click the Signature tab.
-
Click Add.
-
Upload the new certificate and click OK.
Option 2:
Turn off the option to sign authentication requests in the SSO settings for Learning and make the corresponding change in your IDP.
-
Navigate to your ADFS and update the SignedRequestRequired setting to False. View documentation here.
-
From Learning Management, select Me > Authenticate.
-
Locate the SAML connection you would like to update and click the More icon
, then select Edit. Note: Make sure your SSO connection is set to Active before editing your settings.
-
In the pop-up window, select SSO settings, then select No for Sign AuthnRequest.
-
Click Save.
Here's a tip
Option 1:
Download the new certificate and add to the existing signature certificates list in Identity Provider (IDP).
Option 2:
Turn off the option to sign authentication requests in the SSO settings for Learning and make the corresponding change in your IDP.
-
From Learning Management, select Me > Authenticate.
-
Locate the SAML connection you would like to update and click the More icon
, then select Edit. Note: Make sure your SSO connection is set to Active before editing your settings.
-
Scroll down to the SSO Options section, and select No for Sign AuthnRequest.
-
Click Save.
-
Download the new certificate and add to the existing signature certificates list in Identity Provider (IDP).
-
In Cornerstone, navigate to Admin then Tools.
-
Click Edge then Integrations.
-
Locate the LinkedIn Learning integration and open to edit.
-
Scroll down to Service Provider.
-
Open the downloaded certificate in a text editor and copy the text in between the comments. Do not include “-----BEGIN CERTIFICATE-----” or “-----END CERTIFICATE-----.”
-
Paste the certificate you copied into the SP X.509 Certificate field.
-
Save settings.
-
Download the new certificate and add to the existing signature certificates list in Identity Provider (IDP).
-
Log in to PING Federate admin console.
-
Select IDP provider and SP Connection.
-
Click Manage all and enter LinkedIn in search window.
-
Open the LinkedIn Learning connection.
-
In the bottom of the connection, click Signature Verification Certificate.
-
Click Manage Certificate.
-
Click Import to add new LinkedIn Learning certificate.
-
Save and test SP-Initiated SSO attempt.
Verify it’s working. If it's not, reach out to your account rep(s).
Option 1:
Download the new certificate and add to the existing signature certificates list in Identity Provider (IDP).
Option 2:
Turn off the option to sign authentication requests in the SSO settings for Learning and make the corresponding change in your IDP.
-
From Learning Management, select Me > Authenticate.
-
Locate the SAML connection you would like to update and click the More icon
, then select Edit. Note: Make sure your SSO connection is set to Active before editing your settings.
-
In the pop-up window, select SSO settings, then select No for Sign AuthnRequest.
-
Click Save.
When setting up your organization’s SSO (Single Sign-on) integration with our products, a CA-signed certificate was downloaded through the process. Although many customers aren't affected by the expiry of this certificate, the following customers are affected:
-
Customers using ADFS where ADFS is configured with SP certificate signing turned on.
-
Customers using self-built/smaller IDPs or other major IDPs with custom functionality added that turns on SP certificate signing.
We began supporting the new certificate on March 25, 2020 at Noon GMT (8:00 am ET / 5:00 am PT). Not updating the certificate prior to this time may have caused a failure to access LinkedIn Learning for your learners. The new certificate has a ten-year validity.
Related task: