1. Sign in to Azure portal via https://entra.microsoft.com/ and then click on 'Enterprise applications':
2. Within the ‘Enterprise applications’ select ‘+New application’-> '+Create your own application'
3. Enter the name for ClickView or Streamable Learning application, and select the option of ‘Integrate any other application you don't find in the gallery (Non-gallery)’ and click on the ‘Create’ button:
4. You will be presented with the following screen, in which you choose the '2. Set up single sign on' option:
5. Then proceed to click on the 'SAML' option:
6. In step 1 : Basic SAML Configuration - Enter the 'Identifier (Entity ID)' and 'Reply URL (Assertion Consumer Service URL)' and as follows:
7. Then, populate them by clicking on the 'Add identifier' and 'Add reply URL' as shown below, according to your region:

Basic SAML Configuration URLs
Australia | New Zealand | United Kingdom & International | United States & Canada | |
Identifier | https://saml-in5.clickview.com.au/shibboleth | https://shibboleth.clickview.co.nz/shibboleth | https://saml-in3.clickview.co.uk/shibboleth | https://saml-in1.clickview.us/shibboleth |
Reply URL | https://saml-in5.clickview.com.au/Shibboleth.sso/SAML2/POST | https://shibboleth.clickview.co.nz/Shibboleth.sso/SAML2/POST | https://saml-in3.clickview.co.uk/Shibboleth.sso/SAML2/POST | https://saml-in1.clickview.us/Shibboleth.sso/SAML2/POST |
Sign on URL | Leave blank | |||
Logout URL | https://login.windows.net/common/oauth2/logout |
Then, you will see the config URL summary below:
8. Moving on to the 'User Attributes & Claims' section:
The standard four attributes will be displayed by default:
A: givenname
B: surname
C: emailaddress
D: name
An attribute to identify the level of access of users, i.e. staff and the year level of students, we need to add a Group Claim, click on '+ Add a group claim', select 'Groups assigned to the application'. In 'Source attribute' section, select 'Group ID' then 'Save':
9. Assign groups
Security groups of students and staff members can be assigned from the 'Overview' page of the ClickView Enterprise application: https://entra.microsoft.com/ -> Identity -> Applications -> Enterprise applications -> ClickView -> Assign users and groups
Once in the 'Users and Groups' section, add the desired group via the '+Add user/group' button to the ClickView application:
Click on the 'None Selected' option:
Then, you can search for all the required groups, and assign them to the ClickView application as follows:
10. SSO Onboarding
This is the final step of the setup process, for the completion of this setup, please provide us with:
A. App Federation Metadata URL which can be retrieved as follows:
Single sign-on -> SAML Signing Certificate -> App Federation Metadata Url
B. A list of all staff and student Security groups. This will allow us to map users to relevant year group in ClickView. This can be found in: Home -> Groups -> All Groups -> Search for relevant groups
Below is an example shown for staff group and its corresponding 'objectId':
Note: In case that you would like to use the security group from your local AD instead, Azure AD Connect can be used to synchronize these values, as described in the official Microsoft knowledge-based article: Azure AD Connect sync.
C. Adding Group Claims in Azure AD
For synchronizing group claims and avoiding the use of 'ObjectIDs' as described in 6B, group claims can be configured in Azure as per the steps in Add group claims to tokens for SAML applications using SSO configuration.
NOTE:The number of user groups that Azure Active Directory adds to a SAML token is limited to 150. If this limit is exceeded, a link to the Graph API endpoint is returned instead of a group list. ClickView doesn’t support retrieving user groups this way, because it would require additional authentication between ClickView and Azure AD.
If you exceed the 150 limit, consider one of the following options:
- Limit the number of groups that users are assigned to.
- Configure Azure AD to send only security groups.
D.Test student and test staff account credentials that have all attributes (including group membership) correctly populated so that we can test the single sign-on integration and confirm claims are exposed.
SSO Onboarding: Submitting your information
To start a new onboarding form, please click on your region: