SSO Integration - SAML - Technical documentation


The Career Center is the new online Career platform of your university. It’s a website where the students can find information about firms, find internship and job offers. To allow a targeted population to access the Career Center, JobTeaser supports multiple SSO integration. Using a SSO integration means that is your authentication server that authorizes the student to use Jobteaser.

Integration SSO ADFS / SAML


SAML is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML is a XML-based protocol.

   +------------+           +------------+          +-----------+
   |   Service  |           |  Student   |          |   Auth    |
   |  Provider  |           |            |          |  Server   |
   +------------+           +------------+          +-----------+
         |                        |                       |
         | <-  request resource --|                       |
         | --  redirect to IDP -->|                       |
         |                        |                       |
         |                        |----- request IDP ---->|
         |                        |<-- Get SAML payload --|
         |                        |                       |
         |<-- send SAML payload --|                       |
         | redirect to resource ->|                       |

Configuration of your platform

Here are the details needed for the implementation on your side:

  • Issuer URL:
  • Callback URL:
  • Sign-in URL:

Note: the permalink is the subdomain used to access to your Career Center.

Technical Environments

The following IP addresses have to be authorized to request your authentication server:

  • Development: to
  • Production:, and
  • Pre Production:, and

JobTeaser Configuration


  • URL of the SAML metadata of your IDentity Provider (IDP)
  • Test user account for end-to-end validation
  • NameID (must have a persistent format and must not be an email)

User attributes

The following attributes should be transferred to JobTeaser:

  • last name
  • first name
  • email

If you use a Microsoft service or equivalent, you can use these attributes:


Note: The NameID is the unique key (uid) that allows Jobteaser to identify the user. This attribute is included by SAML protocol, so it’s not necessary to add it to the user attributes

Example :

<?xml version="1.0" encoding="UTF-8"?>
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_6a594969-3bb5-4cb5-b282-a3bbef28596f" Version="2.0" IssueInstant="2017-09-26T13:36:11.599Z" Destination="" Consent="urn:oasis:names:tc:SAML:2.0:consent:unspecified" InResponseTo="_89a8d0d0-84ed-0135-a6ff-784f4377ec3a">
   <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"></Issuer>
      <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success" />
   <Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="_f7f62832-87a9-4e4d-84c4-b32896426771" IssueInstant="2017-09-26T13:36:11.598Z" Version="2.0">
      <ds:Signature xmlns:ds="">
            <ds:CanonicalizationMethod Algorithm="" />
            <ds:SignatureMethod Algorithm="" />
            <ds:Reference URI="#_f7f62832-87a9-4e4d-84c4-b32896426771">
                  <ds:Transform Algorithm="" />
                  <ds:Transform Algorithm="" />
               <ds:DigestMethod Algorithm="" />
         <KeyInfo xmlns="">
         <NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent">YT8kKonm3A5sVMOcvWjavJBhi</NameID>
         <SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
            <SubjectConfirmationData InResponseTo="_89a8d0d0-84ed-0135-a6ff-784f4377ec3a" NotOnOrAfter="2017-09-26T13:41:11.599Z" Recipient="" />
      <Conditions NotBefore="2017-09-26T13:36:09.087Z" NotOnOrAfter="2017-09-26T14:36:09.087Z">
         <Attribute Name="">
         <Attribute Name="">
         <Attribute Name="">
      <AuthnStatement AuthnInstant="2017-09-26T13:36:09.022Z" SessionIndex="_f7f62832-87a9-4e4d-84c4-b32896426771">
Was this article helpful?
0 out of 0 found this helpful


1 comment
  • Hey there. Your tutorial on SSO integration using SAML is super helpful. The step-by-step breakdown makes it less intimidating, even for someone like me who's not a tech genius.

    I've had my fair share of struggles with SSO setups in the past, but your guide seems to simplify things. Kudos for that! The visual representation with the diagrams is a nice touch. It gives a quick overview without drowning in technicalities.

    One thing I'd suggest for improvement is maybe a troubleshooting section. You know, common hiccups people might face and how to tackle them. I found that including those can save a ton of time for folks scratching their heads over unexpected errors. An example from personal experience, I had a strange error on this page:, but I contacted their troubleshooting department and everything worked quickly! So, it can save your image in the eyes of your customers.

    By the way, have you considered sharing a real-world scenario from your experience? It's always cool to hear about how others have tackled similar challenges.

    Comment actions Permalink

Article is closed for comments.