You can find more information about the Handshake UK implementation process here.
Step 1. Download Handshake's Metadata
If you are a member of the JISC Access Federation, you can pull Handshake's metadata from there.
If you are not a member of the JISC Access Federation, you can download a copy here.
Step 2: Configure Your SAML Service
Handshake's entityID is: https://app.joinhandshake.co.uk/sp
Handshake's AssertionConsumerService Post URL is: https://app.joinhandshake.com/saml_consume
Attribute or NameID Suggestions
RequestedAttribute: FriendlyName="eduPersonPrincipalName"
Requested Format: NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"
NOTE: The attribute or NameID you specify should return a value matching the format of the auth_identifier field from your student syncs. You should specify the value you selected (either a NameID OR an attribute) in your Handshake SSO Preferences (after step 4 here). You should not use both NameID and an attribute.
ADFS or Azure AD Configuration
We've created a guide to configure your claim rules if you are using ADFS as your Identity Provider, which can be found here. The claim rule configuration for ADFS and Azure AD will be almost identical, so you can use the above guide as a reference if you are using Azure. The main difference between these two Identity Providers is the following setting under your Handshake SSO Preferences page:
You will need to leave this box unchecked (disabled) if you are using ADFS or Azure AD.
Step 3: Login to Handshake to Setup SSO
Setting SSO up on Handshake is self-service! After your career services admin has added you to Handshake you can begin SSO Setup and Testing.
More Questions?
Contact our Support Team.
Comments
0 comments
Article is closed for comments.