PurelyHR

Before You Begin

Introduction

This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for PurelyHR using SAML.

About PurelyHR

PurelyHR is a cloud-based time and attendance solution suitable for small and midsized companies. PurelyHR offers modules for leave management, a human resource information system (HRIS) module, time tracking, time sheets, and disciplinary infraction tracking.

After integrating PurelyHR with Oracle Identity Cloud Service:

  • Users can access PurelyHR using their Oracle Identity Cloud Service login credentials.
  • Users can start PurelyHR using the Oracle Identity Cloud Service My Apps console.
  • Admins can assign and revoke user access to the PurelyHR app using the Oracle Identity Cloud Service administration console.

What Do You Need?

  • An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).
  • A PurelyHR account with authorization rights to configure federated authentication.

Configuring the PurelyHR App in Oracle Identity Cloud Service

Use this section to register and activate the PurelyHR app, and then assign users to the app.

Prerequisite Step

A dedicated account name is required before you can register and activate the PurelyHR app. You obtain that account name from PurelyHR.

The PurelyHR account name appears in the PurelyHR login URL: https://<Account_Name>.purelyhr.com/.

Registering and Activating the PurelyHR App

  1. Access the Oracle Identity Cloud Service administration console, select Applications, and then click Add.

  2. Click App Catalog.

  3. Search for PurelyHR, and then click Add.

  4. In the App Details section, enter your PurelyHR Account Name, and then click Next.

    Note: This is the account name value that you obtained while performing the steps in the "Prerequisite Step" section.

  5. Click Download Signing Certificate.

    Tip: Use this file later during the PurelyHR configuration in the "Configuring SSO for PurelyHR" section.

  6. Click Download Identity Provider Metadata. To learn about other methods you can use to access SAML metadata, see Access SAML Metadata.

    Tip: Use this file later during the PurelyHR configuration in the "Configuring SSO for PurelyHR" section.

  7. Click Finish. Oracle Identity Cloud Service displays a confirmation message.

  8. Click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Assigning Users to the PurelyHR App

  1. On the PurelyHR app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.

  2. Select users that you want to assign to PurelyHR, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the PurelyHR app is assigned to the users that you selected.

Configuring SSO for PurelyHR

  1. Access PurelyHR as an administrator using the URL: https://<Company_ID>.purelyhr.com. The PurelyHR home page appears.

  2. In the header menu, click SSO Settings. The SSO Settings page appears.

  3. Use the following table to update the federated authentication attributes, and then click Save Changes.

    This table lists the mandatory federated authentication attributes that you must set to complete the SSO configuration.
    Attribute Value
    X.509 Certificate Paste the Oracle Identity Cloud Service Certificate that you downloaded during PurelyHR registration in Oracle Identity Cloud Service. See the "Registering and Activating the PurelyHR App" section.
    IdP Issuer Url Enter the Entity ID/Issuer URL. Use the metadata file that you downloaded earlier to obtain the Entity ID/Issuer URL. The Entity ID/Issuer URL information is located in the first line of the metadata. See the "Registering and Activating the PurelyHR App" section.
    IdP Endpoint Url Enter the Sign-in URL/SSO Endpoint: https://<IDCS-Service-Instance>.identity.oraclecloud.com/fed/v1/idp/sso.
    Auto Create Users Select the check box to enable Just-In-Time provisioning. When selected, PurelyHR can be accessed by a user who is assigned to the PurelyHR app in Oracle Identity Cloud Service, even if the user does not have a PurelyHR account.

    Tip: Clear the Auto Create Users selection to disable Just-In-Time provisioning. In addition, make sure that the email ID of each user in PurelyHR matches the primary email ID of the Oracle Identity Cloud Service account.

Verifying the Integration

Use this section to verify that SSO works when initiated from Oracle Identity Cloud Service (IdP Initiated SSO).

Verifying Identity Provider Initiated SSO from Oracle Identity Cloud Service

  1. Access the Oracle Identity Cloud Service My Profile console using the URL: https://<IDCS-Service-Instance>.identity.oraclecloud.com/ui/v1/myconsole.

  2. Log in using credentials for a user that is assigned to the PurelyHR app. Oracle Identity Cloud Service displays a shortcut to PurelyHR under My Apps.

  3. Click PurelyHR. The PurelyHR home page appears.

  4. In the upper-right corner of the header, confirm that the user that is logged in is the same for both PurelyHR and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from Oracle Identity Cloud Service works.

Troubleshooting

Use this section to locate solutions to common integration issues.

Known Issues

PurelyHR displays the message, "we couldn't log you in because your information within PurelyHR and your SAML connector does not exactly match".

Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in PurelyHR.

Solution: Ensure that the user that you assign to the PurelyHR app has an account in both Oracle Identity Cloud Service and PurelyHR with the same email address. Alternatively, enable Just-In-Time user provisioning while configuring SSO for PurelyHR. See the "Configuring SSO for PurelyHR" section.

Oracle Identity Cloud Service displays the message, "You are not authorized to access the app. Contact your system administrator."

Cause 1: The SAML 2.0 integration between the Oracle Identity Cloud Service PurelyHR app and PurelyHR is deactivated.

Solution 1:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select PurelyHR.
  • In the App Details section, click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Cause 2: The administrator revokes access for the user at the same time that the user tries to access the PurelyHR app using Oracle Identity Cloud Service.

Solution 2:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select PurelyHR.
  • In the App Details section, select Users, and then click Assign to re-assign the user.

Unknown Issues

For unknown issues, contact Oracle Support:

  1. Go to https://support.oracle.com.

  2. Select Cloud Support, and then sign in with your support credentials.

  3. In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.

  4. Select Oracle Identity Cloud Service as the service type.

  5. Complete your service request.