These steps will guide you through setting up the single sign-on functionality between ADSelfService Plus and MangoApps
Log in to ADSelfService Plus as an administrator.
Navigate to Configuration → Self-service → Password Sync/Single Sign-on.
Search for MangoApps and select it.
Click Download SSO Certificate link in the top-right corner of the screen.
MangoApps (Service Provider) configuration steps
Now, log in to your MangoApps administrator account.
Navigate to Admin → Integration → Single Sign-On → SAML.
Enable Allow SAML based federated login for the domain option.
In the Issuer URL and SAML 2.0 Endpoint (HTTPS) fields, enter the Login URL value that you had saved in Step 5 of Prerequisite.
In the Remote Logout URL field, enter the Logout URL value that you had saved in Step 5 of Prerequisite.
In the X.509 Certificate field, paste the content that you had copied in Step 6 of Prerequisite.
Click Save Settings.
ADSelfService Plus (Identity Provider) configuration steps
Now, switch to ADSelfService Plus’ MangoApps configuration page.
In the Domain Name field, enter the domain name of your email address. For example, if you use firstname.lastname@example.org to log in to MangoApps, then thinktodaytech.com is the domain name.
In the SP Identifier field, enter the domain name in the URL. For example, if the MangoApps URL is http://thinktodaytech.mangoapps.com, then thinktodaytech is the SP Identifier.
Enter a Description for the connection.
In the Available Policies field, select the policies for which you wish to enable single sign-on.
Your users should now be able to sign in to MangoApps through ADSelfService Plus.
For MangoApps, both IdP-initiated and SP-initiated flows are supported.