Step 1. Download Handshake's Metadata
If you are on InCommon, you should already have our metadata (reference here).
If you are not on InCommon, you can download a copy here.
Step 2: Configure Your SAML Service
Handshake's entityID is:
Handshake's AssertionConsumerService Post URL is:
Attribute or NameID Suggestions
NOTE: The attribute or NameID you specify should return a value matching the format of the auth_identifier field from your student syncs. Also you should specify this value, either a NameID OR an attribute, in your Handshake SSO Preferences (after step 4 HERE), but not both.
ADFS or Azure AD Configuration
We've created a guide to configure your claim rules if you are using ADFS as your Identity Provider, which can be found here. The main difference between these two Identity Providers and others we support is that you will want to ensure this setting is "un-checked" in your Handshake SSO Preferences page:
You will need to leave this box unchecked (disabled) if you are using an active directory like ADFS, Azure AD or Okta.
If you are configuring an Azure AD SAML integration, in Azure you will only need to enter the Entity ID and Reply URL shown above. Copy the App Federation Metadata URL and import it into the "Import" field of your SSO Preferences page in Handshake. You can leave the NameID Format blank for the purposes of testing(or if you know the format of the attribute you will be assigning as the "auth_identifier" for students, use that), and ensure "Requested authentication context?" is un-checked before testing!
Step 3: Login to Handshake to Setup SSO
Setting SSO up on Handshake is self-service! After your career services admin has added you to Handshake you can begin SSO Setup and Testing.
Reach out to our Support Team.