New Admins: Register for our new Pure Lecture Series!
Pure's logos
Pure Help Center for Pure Administrators

If you are a researcher, or other non-admin at your institution, click here.

  • Home
  • Announcements
  • Release Notes
  • Technical user guides
  • Training
  • Events
  • Support
  • Contact Us
  • Home
  • Training
  • Technical user guides
  • External authentication mechanisms

How Can We Help?

Search Results

Filter By Category

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Contact us

Elsevier Authentication (Pre 5.30.0)Elsevier Authentication (Pre 5.30.0)

Elsevier ID+ is only supported Elsevier authentication mechanism from 5.30.0

 

 

(used only in the Pure hosted edition. Configured by Elsevier)  

A common Elsevier Service Provider that participates in various Shibboleth federations provides federated authentication from multiple Elsevier products. Pure supports this authentication mechanism.

This mechanism, although related to SAML2, described below, uses a custom protocol and local WAYF (Where Are You From) implementations where the user can select a federation and institution, before being redirected to their chosen institution’s login screen. 

Please note that in order to use this method, the organisation must be a member of a known federation.  

To configure Pure to use this mechanism one must perform the following steps:

  1. Go to Administrator -> security
  2. Locate "Elsevier Authentication", click Activate
  3. Configure fields shown in the illustration below.

 

Elsevier Authentication Data Workflow

 

 

The authentication workflow starts when the user is displayed a list of supported institutions to log in to and chooses one.

  1. The user request is routed to the Service Provider (SP) with a set of parameters. The SP validates the parameters entityID and appReturnUrl, which is a URL that was preconfigured to be accepted by the SP.
  2. Using the entityID parameter which is the SAML definition that allows the system know to which Identity Provider (IdP) it must redirect the request, the SP redirects the user to the third party Identity Provider system where she/he is presented with an authentication form.
  3. The user enters the credentials and if the authentication succeeds, it will post a SAML assertion to the SP containing the user attributes and a temporary handle that will identify the browser request with a previously authenticated user.
  4. The SP creates an HTTP POST request to the application identified by the accepted appReturnUrl. In this request the SP sends the attributes: target_id, provider_id, entitlement_attributes and shibboleth_attributes. The last one is an encrypted value that contains information such as eduPersonTargetedID, eduPersonEntitlement, edutPersonPrincipalName, eduCampusPermanentID, etc.
  5. Finally, the information contained in the shibboleth_attributes are evaluated to the expected content. This includes matching the corresponding attribute with information associated with the user attempting to log in. This has to match content from a specified column of the masterlist.

 

 

Published at June 27, 2024

Download
Table of Contents
  1. Elsevier ID+ is only supported Elsevier authentication mechanism from 5.30.0
  2. Elsevier Authentication Data Workflow
Related Articles
  • External authentication mechanisms
  • SAML2 (WAYF, Shibboleth, ADFS)
  • Request header based authentication (Pre 5.30.0)
  • Request remote user based authentication (Pre 5.30.0)
  • Static user authentication (Pre 5.30.0)
Keywords
  • authentication
  • elsevier

Was this article helpful?

Yes
No
Give feedback about this article

    About Pure

  • Announcements

    Additional Support

  • Events
  • Client Community
  • Training

    Need Help?

  • Contact Us
  • Submit a Support Case
  • My Cases
  • Linkedin
  • Twitter
  • Facebook
  • Youtube
Elsevier logo Relx logo

Copyright © 2025 Elsevier, except certain content provided by third parties.

  • Terms & Conditions Terms & Conditions
  • Privacy policyPrivacy policy
  • AccesibilityAccesibility
  • Cookie SettingsCookie Settings
  • Log in to Pure Help CenterLog in to Helpjuice Center

Knowledge Base Software powered by Helpjuice

Expand