Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

Description

Use this page to configure Single Sign On (SSO) for the Client Portal by entering the company's authentication details.

The following authentication methods are supported:

  1. OAuth 2.0
  2. OpenID Connect

Contents

Table of Contents
minLevel4

Usage

SSO removes the need for users to use a password. Once setup and enabled, the user can login using their company account.

Metadata

An SSO provider may expose some of their configuration. 

...

The Populate Certificate button will only populate the certificate (if available). This is useful for OAuth 2.0 providers.


Options

Enable SSO Once this is checked, all client portal users with a matching Email Suffix 1 or 2 will be able to login by SSO. If this is checked (even if other details are left blank) employees will have a payslip portal user created on commit where they have an email and it's not currently in use as a payslip portal username. The username will be their email address.

...

Validate Issuer This may be checked if the company wished to validate the issuer. They will need to configure their authentication to provide an issuer matching the Issuer


Validation

Image Modified

Issuer If Validate Issuer is checked, the returned issuer must match this value.


Claims

The payslip portal supports two claims. If none are entered or available, the default identity name will attempt to be matched to the users Payslip Portal Email.

...

Unique Id Claim The name of the claim that will contain a unique identifier for the user. This may also contain the users email or a unique id for the user. It will be used to verify the user in addition to the email after the first login.


Identification

Client Id This allows the company's authentication provider to identify the Payslip Portal and use the correct configuration.

Email Suffix Users matching one of the provided suffixes will login by SSO. This allows left users or users without a company account to login with a password.


Security

Certificate The public certificate used to validated the returned token if Validate Audience or Validate Issuer are checked. Not required for OpenID Connect.

...

Client Secret  This is the most sensitive piece of data entered on this page. The company must provide this by secure means (E.G. a Client Portal message). Never share this by unsecure means. After populating this field and saving, it's not possible to view the value.


Endpoints

These may be populated from the Metadata URL or entered.

...

Authorization Endpoint If a username is entered on the login screen of a user that has an email with a suffix matching one of the provided suffixes, they will be sent to this address. They will then log in to their company account and be sent back to InPay with a code.


Sharing Details with Clients and Logging

To easily confirm the correct configuration has been entered with a client. Click the Show Plain Details button.

Once a user is returned from the Authorization Endpoint, the request will be logged showing any issues.


FAQ

Unable to get claims. Ask client to add a claim named UserID to return the users email address.

First try checking Validate Issuer. The claims returned are affected by this setting.

User can't login by SSO

If a user is unable to login by SSO once enabled, first:

...

Once they've completed these steps, set the Email Claim and Unique Id Claim in InPay to email

Do you support SAML or SAML 2.0?

No, but most identity providers can support OAuth 2.0 or OpenId Connect.

...

The client would like some instructions

See Single Sign On, this will be of use even if they are using a different provider.

Message: AADSTS50020: User account 'employeename@company.co.uk' from identity provider 
'live.com' does not exist in tenant 'company name' and cannot access the application 
'identifier'(Payslip Portal) in that tenant. 
The account needs to be added as an external user in the tenant first. 
Sign out and sign in again with a different Azure Active Directory user account.

First confirm the Payslip Portal users saved email address is correct. If so, forward the error messages to the company's internal IT department.

Error message showing token response with no email

This may be that the claim is not being returned. Update the Authorization End Point to request the email scope: scope=openid+email 

The full Authorization End Point would then be similar to https://SSOPROVIDER.COM/oauth2/default/v1/authorize?response_type=code&client_id=000000000000000&scope=openid+email&redirect_uri=https://inpay.es.rsmuk.com/payslipportal4/login.aspx&nonce=&state=

How do I login without entering my username?

Once a user has logged in once, their username will be populated on subsequent attempts (it’s stored in a cookie).

...