How to set up ADFS SSO for governing bodies
- Summary
- SAML integration prerequisites
- Verify ADFS organisation metadata
- Install Microsoft ADFS Federation Service
- Configure federation trust with ClickView
- Create claim rules for ClickView SAML integration
- Exposing additional claim rules
- Configure SAML endpoints for ClickView
- Submit onboarding information
- Frequently asked questions


Summary
- Ensure you have a 2048-bit RSA certificate for HTTPS-only SAML integration.
- Verify ADFS organisation metadata in ‘Edit Federation Service Properties’.
- Install ADFS Federation Service and create a new Federation Server Farm.
- Add a Relying Party Trust using ‘ClickView’ as the display name.
- Configure claim rules for Email, Given Name, Last Name, Display Name, and Member Of.
- Set up endpoints with region-specific POST and Artifact URLs.
- Submit onboarding details using the SSO Onboarding form.
SAML integration prerequisites
Before setting up SAML integration between ClickView and Microsoft ADFS, ensure you have a 2048-bit RSA certificate from a recognised certificate authority. SAML integration is a secure, HTTPS-only process.
ClickView supports Single Sign-On (SSO) using the SAML2 protocol with services such as Microsoft ADFS, Shibboleth 2.0, WS-Federation, and PingIdentity.
Verify ADFS organisation metadata
- Right-click on the ‘ADFS’ folder in the top left-hand pane and choose Edit Federation Service Properties.

- In the Organisation tab, check ‘Publish organisation information in federation metadata‘ and fill all ‘Support contact information’ fields with valid data.

Install Microsoft ADFS Federation Service
- Open Start.
- Select Administrative Tools.
- Choose AD FS 2.0 Management or AD FS 3.0 Management.
- Start the AD FS Federation Server Configuration Wizard.
- Create a new Federation Service.

- Choose New Federation Server Farm even for single server deployment.

- Click Next and confirm the SSL Certificate assigned to Default Website (if not pre-populated, assign manually via IIS).
- Ensure the Federation Service Name matches the SSL certificate name.
- Proceed with Next.

- Enter the AD FS service account name and password.

- Continue with Next until setup is complete.
- If you encounter an SPN error, use
setspn.exeto set the proper SPN.
Configure federation trust with ClickView
- Select Relying Party Trusts.

- Click Add Relying Party Trust.

- Choose Start.

- Select Enter data about the relying party manually.

- Set Display name to ClickView. Click Next.

- Select AD FS profile, and continue clicking Next until prompted for identifiers.



- Enter the appropriate ClickView entityID URL for your region:
- Australia: https://saml-in5.clickview.com.au/shibboleth
- New Zealand: https://shibboleth.clickview.co.nz/shibboleth
Click Add, then Next.


- If required, choose your MFA setup and click Next.

- Select Permit all users to access this relying party and click Next.


- Finish by selecting Close.

Create claim rules for ClickView SAML integration
After creating the Relying Party Trust, ClickView requires the following user attributes as claim rules:
- Email Address
- Given Name
- Last Name
- Display Name
- Member Of (Group Membership)
- Choose Add Rule.

- Select Send Claims Using a Custom Rule and click Next.

- For each claim, use the following templates:
| Claim Rule Name | Custom Rule |
|---|---|
| Email Address | c:[Type == “http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname”] => issue(store = “Active Directory”, types = (“urn:oid:0.9.2342.19200300.100.1.3”), query = “;mail;{0}”, param = c.Value); |
| Given Name | c:[Type == “http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname”] => issue(store = “Active Directory”, types = (“urn:oid:2.5.4.42”), query = “;givenName;{0}”, param = c.Value); |
| Display Name | c:[Type == “http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname”] => issue(store = “Active Directory”, types = (“urn:oid:2.16.840.1.113730.3.1.241”), query = “;displayName;{0}”, param = c.Value); |
| Member Of | c:[Type == “http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname”] => issue(store = “Active Directory”, types = (“urn:oid:1.2.840.113556.1.2.102”), query = “;memberOf;{0}”, param = c.Value); |
| Last Name | c:[Type == “http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname”] => issue(store = “Active Directory”, types = (“urn:oid:2.5.4.4”), query = “;SN;{0}”, param = c.Value); |
Exposing additional claim rules
To send extra attributes for school or institution identification, use the following custom templates, replacing placeholders as needed:
I am using the claim urn:oid format
c:[Type == "http://schemas.microsoft.com/ws/ABCD/XY/identity/claims/XXX"]
=> issue(store = "Active Directory", types = ("urn:oid:X.X.X.XX"), query = ";givenName;{0}", param = c.Value);
II. Using the claim name format
c:[Type == "http://schemas.microsoft.com/ws/ABCD/XY/identity/claims/XXX"]
=> issue(store = "Active Directory", types = ("XXX"), query = ";givenName;{0}", param = c.Value);
Refer to Microsoft documentation on claim types for details on schemas and attributes.
- Create a Rule to Send LDAP Attributes as Claims
- Create a Rule to Send Group Membership as a Claim
- Create a Rule to Transform an Incoming Claim
- Create a Rule to Send an Authentication Method Claim
- Create a Rule to Send Claims Using a Custom Rule
Include any additional exposed attributes in the onboarding form.
Configure SAML endpoints for ClickView
- Choose Properties for the ClickView relying party trust and select Endpoints.

- Click Add SAML, set Binding to POST, Index to 1, and enter your region’s POST URL:
- Australia: https://saml-in5.clickview.com.au/Shibboleth.sso/SAML2/POST
- New Zealand: https://shibboleth.clickview.co.nz/Shibboleth.sso/SAML2/POST

- Click Add SAML… again, choose Binding as Artifact, Index as 3, and enter your region’s Artifact URL:
- Australia: https://saml-in5.clickview.com.au/Shibboleth.sso/SAML2/Artifact
- New Zealand: https://shibboleth.clickview.co.nz/Shibboleth.sso/SAML2/Artifact

Submit onboarding information
Complete the SSO Onboarding form to start the process. Continue with the form if you have started it previously.
Frequently asked questions
Get in touch
If you’re having trouble finding the right topics or videos, just reach out! Our team - 


Andrew, Nisch, Janice, Pfreya, or any of us at ClickView - will be happy to help you get sorted.
Give feedback
Was this guide helpful?
Up Next
How to set up Okta SAML SSO with ClickView
This article explains how to configure a SAML 2.0 application in Okta for use with ClickView and submit the required metadata so the SSO instance can be set up.
