How to set up Single Sign On (SSO) in Job Ready

mceclip0.png

Why is this important?

One-click access to everything!
SAML Single sign-on (SSO) enables users to log in to Job Ready and all related systems, whilst maintaining a central identity.
With SSO, users can access all of the applications they need with one set of login credentials, eliminating the need to remember a unique password for each different account.

SAML SSO provides the following benefits:

  • Improved experience for users:

    Reduces time having to sign on multiple times.
  • Improved security:

    Asking your users to only remember one password decreases their chance of making risky decisions, such as reusing passwords across multiple platforms.
  • Ability set the password change cycle 

    Job Ready requires users to renew their passwords annually meeting standard requirements. However, SAML SSO lets you decide if you want a more frequent password expiry to meet your preferences.

How it works

Job Ready provides a SAML 2.0 compliant Service Provider interface.
This allows your users to login to Job Ready via authentication with your corporate Identity Provider. The SAML assertion returned to Job Ready will include the user’s email; if that email is associated with a valid user account, the user is logged in.
 

How to set up SAML SSO

You will need:

  • SAML SSO enabled by Job Ready - contact Freshdesk Support to facilitate this. 
  • Azure Active Directory, or Azure AD Premium (license required)
  • Job Ready Administrator privileges

  1. Log in to your Azure Active Directory.

  2. Select Enterprise Applications in the left-hand main menu> All Applications > New Application > Non-gallery application.

  3.  Give your application a name related to the Application that you will be configuring.

    Example:

    Job Ready
  4. In the application record you just created, under Manage, click Single Sign-on.
  5. Select SAML-based Sign-on.
  6. In Job Ready, navigate to Admin Settings > SAML SSO. In Azure Active Directory, click the Edit button next to Basic SAML Configuration to Copy and Paste the Service Provider Entity ID, Assertion Consumer Service URL and the Sign-on URL field from Job Ready into Azure.
    mceclip2.png

    Copy from Service Provider DetailsPaste into 1. Basic SAML Configuration
    Service Provider Entity ID URL Identifier (Entity ID) field
    Assertion Consumer Service URLReply URL field
    *Job Ready URLSign-on URL field

    *Enter this as your Job Ready URL with /saml on the end.
    Example:

    https://organisationname.jobreadylive.com.au/saml

  7. In the Preview window, under 3. SAML Signing Certificate, click Download on 'Federation XML Data'.
  8. Go back to Admin Settings > SAML SSO in Job Ready.
  9. Select Choose File, to upload the Azure Federation XML Data file you just downloaded to the Job Ready SAML SSO Identity Provider Metadata (IdP) field.mceclip1.png
  10. Select Force SSO, if applicable.
    The Force SSO button restricts users to only log in using SSO. If the button is not selected, users will have both options to log in using password/username, as well as via Single Sign on. 
  11. Go back to Azure Active Directory, navigate to the left-hand menu, and select Users and Groups.
  12. Add your users that correspond to your existing Job Ready user list, with matching emails.


You are ready to start using SSO!
The Single Sign-on button on the Job Ready login portal should now be visible.

When a user clicks on this link, they will be redirected to authenticate with Azure. They will not need to authenticate again once this is complete. 

 

Troubleshooting

Is Job Ready returning an Invalid Signature on SAML Response error when attempting to sign in using SSO? Try these steps:

  1. Open the Job Ready Enterprise Application in your Azure Active Directory.

  2. Open the SAML Signing Certificate list by selecting the SAML Signing Certificate heading's Edit icon (a pencil).

  3. Ensure there is only one active signing certificate on that list. Back up and delete any extra certificates.

  4. Download the Federated Metadata XML file and upload it in the Job Ready SAML SSO admin section.

  5. Ensure that the remaining steps are completed according to the Job Ready SAML SSO Configuration guide.

  6. Log in to Job Ready via SAML SSO.

If you continue to experience issues after attempting these troubleshooting steps, please contact our team at Zendesk Support where we can investigate the issue further.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.