Overview
This article covers:
Setting up Azure Active Directory (AD) as an Identity Provider (IdP) for Pera Skope.
Configuring Pera Skope to use AD as the IdP.
Testing
Pera Skope supports SSO via SAML2
2.0, an industry standard used to provide Single Sign On by authenticating against an Identity Provider (IdP3
), Azure AD in this case.
Pre-requisites
Admin access to your Azure Active Directory
Access to Pera Skope as an Admin user
1. Setting up Azure Active Directory (AD)
Follow the steps below to complete the setup in Azure AD.
Login to the Azure portal with an Admin account. Navigate to the Azure Active directory.
Select Enterprise Applications in the left side navigation pane to access the applications in your account.
Click on New Application in the header to add Pera Skope.
Select Create your own application from the top header menu.
This will pop up a sidebar window to Create your own application.
Give the application a name e.g. Pera Skope.
Select the "Integrate any other application you don't find in the gallery (Non-gallery)" optionClick on Create at the bottom to create an application. You will be redirected to the application overview.
Now select Set up Single Sign-On followed by SAML, configure as below:
Edit the block, Basic SAML Configuration
4
and enter the following details.Identifier (Entity ID)
5
This is the Pera Skope Identifier(Entity ID) URI, you can copy this from the SSO settings panel in Pera Skope as shown in Step-2.1.aReply URL (Assertion Consumer Service URL)
6
- This is Pera Skope's ACS URI, you can copy this from the SSO settings panel in Pera Skope as shown in Step-2.1.a
Click "Save"
Attributes & Claims
7
Edit the SAML certificates block to enable signing of response and assertion as below
We require a few details to configure the Pera Skope
Within Azure AD navigate to the Groups page and create three groups with the names given below. Note: the groups names must be PERA_Admin, PERA_Manager, PERA_Recruiter.
PERA_Admin - Admin level access
PERA_Manager - Hiring Manager access
PERA_Recruiter - Recruiters access
Assign the groups created above to the Application via the Users and Groups page
Add your Pera Skope users to the groups you created in the above steps.
On the Properties page select "Yes" for "Assignment required"
2. Configuring SSO in Pera Skope
Login to Pera Skope as an admin user and navigate to the SSO settings via the left hand side navigation panel.
Please fill in the details below:
IDP Application ID - Application ID copied from Step-1.5.a
MetaData URL - App Federation Metadata Url Copied from Step-1.5.b
SSO Domain - the email domain used for SSO, e.g. example.com
Turn SSO login on via the "Enable SSO for logging in" switch
If you want to turn-off other ways of logging in (username and password) and user management (in Pera Skope), turn on "Restrict log in to SSO". But note: please test your SSO login first - if the SSO configuration is wrong you will not be able to log in.
Click "Save changes".
3. Testing
If the user configuring Azure also has an account in Pera Skope we can directly test the SSO from Azure.
Click "Test this application" on the SAML based sign-on page to slide over the test panel.
Click "Test sign in"
Verify the sign in works
Glossary
Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID to independent software systems.
Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorisation data between parties, in particular, between an identity provider (IdP) and a service provider (SP).
Identity Provider (IdP) is a system that creates, maintains, and manages identity information for users and service principals
Basic SAML Configuration is used to configure the Pera Skope in your IdP Server
Identifier (Entity ID) is the Pera Skope metadata url that can be found under the SSO settings panel inside Pera Skope. This is required for the user verification with IDP server
Reply URL (Assertion Consumer Service URL) is a unique company url generated with the account. This is required for the IdP integration
Attributes & Claims are the user identification values required for the Pera App for Identifying the user
Group claim is used for role based access to the application and hence we are adding groups in the attributes. Please do not miss to check the Emit groups names options.
App Federation Metadata is a xml file with details to the IDP Application for integration. This url is required in the Pera Skope for authentication.