Step 1. Download Handshake's Metadata
If you are on InCommon, you should already have our metadata (reference here).
If you are not on InCommon, you can download a copy here.
Step 2: Configure Your SAML Service
Handshake's entityID is: https://app.joinhandshake.com/sp
Handshake's AssertionConsumerService Post URL is: https://app.joinhandshake.com/saml_consume
Attribute or NameID Suggestions
RequestedAttribute: FriendlyName="eduPersonPrincipalName"
Requested Format: NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"
NOTE: The attribute or NameID you specify should return a value matching the format of the auth_identifier field from your student syncs. Also you should specify this value, either a NameID OR an attribute, in your Handshake SSO Preferences (after step 4 HERE), but not both.
ADFS or Azure AD Configuration
We've created a guide to configure your claim rules if you are using ADFS as your Identity Provider, which can be found here. The claim rule configuration for ADFS and Azure AD will be almost identical, so you can use the above guide as a reference if you are using Azure. The main difference between these two Identity Providers is the following setting under your Handshake SSO Preferences page:
You will need to leave this box unchecked (disabled) if you are using an active directory like ADFS, Azure AD or Okta.
Step 3: Login to Handshake to Setup SSO
Setting SSO up on Handshake is self-service! After your career services admin has added you to Handshake you can begin SSO Setup and Testing.
More Questions?
Reach out to our Support Team.
Comments
0 comments
Article is closed for comments.