Recruitment MarketingPublic
The following guide explains how Entra ID (formerly Azure AD) can be configured for Single sign-on using SAML. This needs to be completed before PageUp can configure any further.
- Navigate to the Azure Portal.
- Navigate to Enterprise applications.
- Click Create your own application.
-
Enter a meaningful Name e.g. PageUp Internal Careers.
- Click Create.
-
Navigate to Single single-on.
- Click the SAML single-sign on method.
- In the Basic SAML Configuration section, click Edit.
-
Enter the Identifier (Entity ID), ensuring it is the exact match with the SP Entity ID configured in Company > Settings > SAML 2.0 - Candidates > Edit. We recommend having it in the following format:
https://internal-careers.org-name.com/ OR https://internal-careers.careerpages.rec-marketing.dcx.pageuppeople.comFor example:
https://internal-careers.careerpages.rec-marketing.dc4.pageuppeople.comNote:
- For multiple companies, ensure that the SP Entity ID is not duplicated across. This is to mitigate if they need to be set up in one SSO vendor, as one could not have multiple "apps" with identical SP Entity IDs.
- The SP Entity ID must be verbatim matched between what’s set up in the Organisation SAML settings and in your (the customer's) SSO platform.
- Enter the Reply URL (Assertion Consumer Service URL) as found in Recruitment Marketing > Company > Settings > SAML 2.0 - Candidates > Assertion Consumer Service URL.
- Set the Attributes & Claims to send:
- Send the App Federation Metadata URL to your PageUp representative.
- In Entra ID, obtain the User access URL for the user to log in.
Comments
Article is closed for comments.