This is a guide to setting up the SSO integration. TheEmply People platform is built so you as an Emply People customer can set up SSO using the SAML method, without having to contact Emply People Support.
Requirements for the setup
-
Federation metadata URL.
-
Right and access to change your AD FS configuration.
-
Knowledge of how to set claims of your AD.
Make sure your IT staff has access to + .
Create an 'IT' role in Emply People under +++ and enter the title and select IT under Import settings.
Setup in Emply People
Usually, the HR department or the platform administrator(s) can set up rights and roles. Log into your Emply People solution and go to + find the Single Sign On integration and click on .
Preparation for setup
A new window will open as shown below:
Copy the Emply People SAML 2.0 Federation Metadata URL. This will be used when setting up Emply People as Relying Party Trust on your ADFS server/provisioning tool.
-
-
Default user role: Should the role with the fewest rights, which is usually Recruitment team. If you have Onboarding or Talent Management, this should be Employee.
-
Require signle sign-on: If this is enabled, you can only log in from your own domain/IP or via VPN.'
-
Show claims from SAML server: Turn on test mode while setting up/troubleshooting if you encounter problems after setting up. This mmust be turned off again afterwards.
-
AD FS setup
-
Open AD FS and go to Server Manage.
-
Click on Tools.
-
Choose AD FS Management.
-
Under Actions, click on ..
-
In the tab, choose and then click .
-
In the , insert the Emply People SAML 2.0 Federation Metadata URL.
-
Click on
-
In the next tab called Specify Display Name, enter a name in the field Display Name.
-
Under Notes, you can enter a description of your Relying Party Trust and then click on .
-
Under Choose Access Control Policy, choose who should have access.
-
Under Ready to Add Trust, you will have the opportunity to review the settings. Your Emply People federation metadata URL should appear.
-
To add the Relying Party Trust, click .
-
You will then see the Finish tab where you can click on .
-
Emply People is now added as a Relying Party Trust, it can be found in the Relying Party Trust folder.
Setting up the claim rule
-
In the Relying Party Trust folder, click on .
-
Here you click and continue by clicking .
-
The Choose Rule Type tab will open and choose Send LDAP Attributes as Claims.
-
Click on to continue.
-
The Configure Claim Rule tab, where you can choose E-mail-Addresses for both LDAP Attribute and Outgoing Claim Type.
-
Click on .
-
You will be redirected to Edit Claim I Policy for IssuanceEmply People. Click on +.
You can now test your login on your [customer].emply.com solution.
Important
Be aware that the AD user should also be a user in Emply People.
Trouble shooting
-
Test on your login on the Emply People website.
-
AD user must also be a user in Emply People.
-
Set up claims in the SSO application.
-
Log in with the user and, in case of error, a message similar to the one below will appear. Fix the issue and remember to disable claims in my Emply People on SSO.