Enable SSO for Azure
National Crime Check supports single sign-on (SSO) using Azure.
Single Sign-On connections can be logged in from the NCC website using a direct login link, or login to NCC from the My Applications portal.
The following SAML attributes are supported:
first_name | (empty namespace) | Attribute user.givenname |
last_name | (empty namespace) | Attribute user.surname |
role | (empty namespace) | Used for role-based permissions. Optional. |
There are three steps for integration:
- Get service provider details
- Register application
- Enter the identity provider details
Further details are provided below.
1. Get service provider details
- Navigate to the Staff section and then the SSO tab
- Click the Azure icon
- Click the Download Metadata XML button and save the metadata file
2. Register application
- Sign in to the Azure portal and sign in using one of the roles listed in the prerequisites.
- Browse to Azure Active Directory and select Enterprise ApplicationsThe All Applications pane opens and displays a list of the applications in your Azure AD tenant
- In the Enterprise Applications pane select New Application then select Create your own application
- Enter an application name, e.g. "National Crime Check" and select Integrate with any other application option
- Select Single Sign-On and then SAML option
- Select Upload Metadata File and then select the metadata file which you saved earlier, then click Add button
- Click Edit on Attributes & Claims
- Delete all the additional claims, then add claims for first name and last name
- Find the SAML Signing Certificate and click the Edit button
- In the Signing Option drop-down list, choose Sign SAML response and assertion then click Save
- Download the *Federation Metadata XML * identity provider metadata file by clicking the Download link
3. Enter the identity provider details
- Return to the integration dashboard SSO tab
- In the Identity Provider section, choose the Upload metadata file option
- Select the file using the browse button
- Choose the permissions which are available for single sign-on users
- Click the Enable Single-Sign-On button