Before you begin
Please read the SSO and Self Service - Technical Factsheet to see the background and requirements needed for a successful integration.
Introduction
This document specifies the steps required to set up SSO in Self-Service. SSO authentication in Self-Service is provided by SAML2 federated authentication and all SSO integrations will require the customer to have a technical resource that is familiar with SSO and SAML2 concepts and terminology.
Setting up SSO in Self-Service has been designed so that most of the initial configuration and any ongoing changes can be carried out by the customer. Therefore, this guide is written with the customer as the intended audience.
New Customer Implementation Checklist
Step | Description | Who? | Required/Optional |
---|---|---|---|
1 |
IQ and Self-Service site is provisioned |
Cintra |
Required |
2 |
IQ payroll data initialised (including employees) |
Cintra |
Required |
3 |
Enable 'Employee Login ADFS' Web Feature License |
Cintra |
Required |
4 |
Self-Service site URL and System Administrator account credentials provided to customer |
Cintra |
Required |
5 |
Ensure Self-Service SSO Technical Factsheet & SSO Setup Guide URL are provided to customer |
Cintra |
Required |
6 |
Enable SSO in Self-Service |
Customer |
Required |
7 |
Agree the attribute name for the User Identifier GUID (or use the default) |
Both |
Required |
8 |
Create Self-Service SAML2 application in the IdP |
Customer |
Required |
9 |
Add the User Identifier GUID attribute to the IdP application |
Customer |
Required |
10 |
Enter IdP SAML2 configuration data in Self-Service |
Customer |
Required |
11 |
Alter SSO button appearance |
Customer |
Optional |
12 |
Generate & add GUID to the nominated test users IdP profile |
Customer |
Required |
13 |
Provide the test user GUID to Cintra |
Customer |
Required |
14 |
Create the test user SSO account in Self-Service |
Cintra |
Required |
15 |
Test user login attempt |
Customer |
Required |
16 |
Evaluate failed test login attempt(s) in the Testing Error Log |
Customer |
Optional |
17 |
Generate/Link all remaining user GUID to IdP user profiles in the IdP |
Customer |
Required |
- Steps 1 & 2 are not required and can be omitted.
- Step 14 (actioned by Cintra). If the test user already exists with a Self-Service account, they need to be changed to an SSO login
SO Setup Process
1 - 5. Actioned By Cintra
- IQ and Self-Service site is provisioned.
- IQ payroll data is initialised (including employees)
- Web Feature License is enabled.
- To securely provide the customer the Self-Service web application URL and System Administrator login credentials.
- To ensure the customer has been given SSO setup documentation.
6. Enable the SSO feature within Self-Service
- In a browser, visit the Self-Service application URL provided at step 4.
- Log in using the System Administrator credentials provided at step 4.
- Once logged, in the left navigation menu, go to Configuration > SSO Settings. (If the navigation menu is not visible - as in fig.1 below, use the top-left 3-line 'hamburger' icon to show the navigation menu.)
-
You will see the following screen. Click the Enable SSO button.
-
SSO will be enabled, the page will refresh and you will see a screen similar to the following:
7. Agree the attribute name for the User Identifier GUID
Note:
This is a Microsoft claim URI and not a URL for use in a web browser.
8. Create Self-Service SAML2 application in the IdP
9. Add the User Identifier GUID attribute to the IdP application
The value being used is the user_guid parameter on the user profile.
10. Enter IdP SAML2 configuration data in Self-Service
Enter the IdP SAML2 settings
Values can be extracted from an IdP metadata endpoint URL, if the IdP provides one, or the three IdP values and the public certificate can be added/uploaded manually.
File icon
Self-Service does not monitor the IdP metadata URL for changes. Changes to any of the SAML2 values or the certificate in the IdP will require the details to be updated in this tab.
If using the metadata endpoint:
Important
Self-Service does not monitor the IdP metadata URL for changes. Changes to any of the SAML2 values or the certificate in the IdP will require the details to be updated in this tab.
Unique Identifier GUID Attribute
11. Alter SSO button appearance (Optional)
12. Generate & add GUID to the nominated test users IdP profile
13. Provide the test user GUID to Cintra
14. Create the test user SSO account in Self-Service - Actioned By Cintra
15. Test user login attempt
- An date of birth verification page. This can be enabled for first login attempts for users to prove their identity before getting access to Self-Service.
- The main Self-Service application. With additional verification steps disabled, the user will go straight into the Self-Service application.
16. Evaluate failed test login attempt(s) in the Testing Error Log
Message | Description |
---|---|
GUID is not present or in invalid format in SAML2 response
|
The User Identifier GUID attribute value is empty or it is not correctly formatted as a GUID (or a base64 encoded GUID). The value that was found is shown in the 'Saml2 Response Guid / Attribute' column
Impact ( Impact only relates to SSO authentication. Any users using standard username/password and AD logins will not be affected by any failing SSO authentication. )
Critical to the user. Other user GUID values may/may not be in the correct format.
Customer Resolution
Check the User Identifier GUID is being fetched from the IdP users profile and make sure it's in the correct format. See Section 4.6 in the SSO and Self Service - Technical Factsheet
|
No SAML2 settings configured in this Self Service
|
SSO is not enabled or configuration data has been removed from this Self Service instance Impact ( Impact only relates to SSO authentication. Any users using standard username/password and AD logins will not be affected by any failing SSO authentication. ) Critical. No SSO logins will be possible. Customer Resolution Attempt to re-enable SSO and set up configuration in Self-Service - steps 6-10. |
Attribute name not found for this application (ID:1)
|
The expected User Identifier GUID attribute name can't be found in the SAML2 response.
Impact*
Critical. No SSO logins will be possible.
Customer Resolution
Check the Attribute Name specified in Self-Service (step 10) matches the attribute name setup on the IdP application (step 9)
|
17. Generate/Link all remaining user GUID to IdP user profiles in the IdP
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article