Security Assertion Markup Language (SAML) is the industry standard for secure Single Sign-On (SSO) and is the foundation for identity solutions from providers such as Okta, OneLogin, Microsoft, Bitium, and Ping Identity. EasyCoach fully supports the SAML 2.0 standard.
This applies to:
Authors β accessing EasyCoach to create and manage role plays
Learners β accessing and completing role plays
Why use SAML SSO for EasyCoach?
With SAML SSO enabled:
Secure authentication via your Identity Provider (IdP)
No need to manage separate Easygenerator accounts
Seamless access for both authors and learners
Centralized user management through your organization
Setting up SAML SSO
To proceed with the setup:
π Please fill in "this default form" and contact [email protected] if you want to set up SAML 2.0 integration between your platform and EasyCoach.
SAML 2.0 Configuration Details
Your IT team needs to provide:
entityId β Unique identifier of your Identity Provider
signOnServiceUrl β URL to initiate authentication
signOnServiceBinding β Supported values:
HTTP-Redirect
HTTP-POST
signingCertificate β Token signing certificate
Metadata β Metadata URL from your Identity Provider
Required SAML claims/attributes:
Attribute | Description | Supported attribute names |
User email (as the main user identifier in Easygenerator) | ||
First name | User first name (used only for registration) |
|
Last name | User last name (used only for registration) |
|
As the result, the attribute statement should look as follows:
<AttributeStatement>
<Attribute xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" Name="https://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
<AttributeValue xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
[email protected]
</AttributeValue>
</Attribute>
<Attribute xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" Name="https://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
<AttributeValue xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
User first name
</AttributeValue>
</Attribute>
<Attribute xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" Name="https://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri">
<AttributeValue xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">
User last name
</AttributeValue>
</Attribute>
</AttributeStatement>
Callback (Redirect) URLs
Note: If you require access to a lower/UAT environment to test SSO before implementing it in Production, please contact our Easygenerator Support via chat or by emailing [email protected] to request staging SSO details. UAT is available for Enterprise plan only.
How the setup works
Your IT team will use the form to configure the SSO on your Identity Provider and fills in the same form
Share it with [email protected]
Easygenerator Tech Support team configures the integration
You receive a provider name
SSO is ready to use
Learner Accessing EasyCoach via SAML SSO
What to replace
<provider-name> β Provided by Easygenerator
<roleplay-url> β Learners β Role play link
User experience
User clicks the Role Play containing SAML SSO link
If not logged in, they are redirected to your company login
After authentication, they are taken directly to Role Play
π No separate Easygenerator login is required.
Embedding EasyCoach Role Plays in Your Course
Once your SSO link is ready (whether SAML or OAuth), you can embed the Role Play into your Easygenerator course for learners:
Go to the Page editor of your course.
Open the Content blocks section on the left panel.
Select EasyCoach Beta from the list of embed options.
Paste your Role Play SSO link into the input field.
Click Embed to insert it into your course page.
Note: Learners must have permission to access the embedded Role Play via SSO. Ensure the link is configured correctly with your SAML or OAuth provider.
Need help?
For setup or troubleshooting, contact:
π§ [email protected]

