Office 365 Shibboleth SAML 2.0 SSO with LDAP backend

Carl Waldbieser waldbiec at
Thu Mar 22 13:40:49 EDT 2018


We've enabled SAML2 SSO with O365, and we don't have AD (our enterprise directory is OpenLDAP).
We don't use Exchange for email.  We're only really allow the community to use the office tools, OneDrive, and a few other products.

We're a banner school, so we already have the Banner SPRIDEN_ID (aka "L-Number") in our directory.  We just have the IdP release that value as the immutableID attribute.

As far as setting up SSO, there is some black magic that involves running some Windows Powershell commands.  I have notes for what I did, but it looked very similar to this link from Microsoft:

Carl Waldbieser
ITS Identity Management
Lafayette College

----- Original Message -----
From: "Hohberg, Paul" <phohberg at>
To: "Shib Users" <users at>
Sent: Thursday, March 22, 2018 11:54:14 AM
Subject: Office 365 Shibboleth SAML 2.0 SSO with LDAP backend

Has anyone successfully implemented Office 365 Shibboleth SSO using SAML 2.0 (not just ECP) with an LDAP (not AD) authentication backend? Would you be willing to share how it was done, even if at a high level or point me to any related documentation? 

It seems that Office 365 requires an immutableID attribute that is mapped to GUID when AD is used for authentication. We're considering if this can be mapped to an attribute in LDAP that Office 365 would accept. 

Microsoft documentation provides this attribute-resolver example for immutableID and GUID with AD. 
<!-- Use AD objectGUID for ImmutableID -->
<resolver:AttributeDefinition id="ImmutableID" xsi:type="Simple" xmlns="urn:mace:shibboleth:2.0:resolver:ad"
   <resolver:Dependency ref="myLDAP" /> 
[ | ] 

Thanks in advance, 
Paul Hohberg 
Systems Engineer 
UCLA Information Management Services 

For Consortium Member technical support, see
To unsubscribe from this list send an email to users-unsubscribe at

More information about the users mailing list