How to set up Microsoft Entra SSO for your District

Microsoft entra admin center interface

Summary

  • Sign in to the Microsoft Entra admin center.
  • Create a non-gallery Enterprise application named “ClickView”.
  • Go to Single Sign-On and select SAML.
  • Enter your region Identifier and Reply URL in Basic SAML Configuration.
  • Review Attributes & Claims, then add required claims and a Security groups claim.
  • Submit your App Federation Metadata URL and Security group info.
star icon
Quick tip
In Microsoft Entra, where do I find the App Federation Metadata URL ClickView needs for onboarding?
Open your ClickView enterprise application, go to Single sign-on > SAML, then in the SAML Certificates tile copy the App Federation Metadata URL using the copy icon.

Set up ClickView with Microsoft Entra for districts

Follow these steps to integrate ClickView with Microsoft Entra for district-wide Single Sign-On (SSO). This setup is intended for district administrators and central IT teams managing SSO across multiple schools using shared security groups and SAML authentication.

  1. Sign in to the Entra portal. Go to Identity, then Applications, and Enterprise applications.
    Enterprise apps navigation
  2. Within Enterprise applications, select +New application.
    New application navigation
  3. Then select +Create your own application.
    Create new application navigation
  4. Where it asks for ‘What’s the name of your app?’, enter ‘ClickView’. Choose Integrate any other application you don’t find in the gallery (Non-gallery) and click Create.
    Application setup

Configure SAML single sign-on for ClickView

  1. Under the application’s menu, choose Single sign-on.
    Set up single sign on
  2. Then click the SAML tile.SAML navigation
  3. In the Basic SAML Configuration tile, click ‘Edit’.Edit basic SAML configuration

Setup basic SAML configuration

In the Basic SAML Configuration window, enter the following region-specific values:

  1. Identifier: https://saml-in1.clickview.us/shibboleth
  2. Reply URL: https://saml-in1.clickview.us/Shibboleth.sso/SAML2/POST
    Basic SAML configuration interface
    Basic SAML configuration interface
  3. Logout URL (default for all regions): https://login.windows.net/common/oauth2/logoutBasic SAML configuration interface
  4. Leave Sign on URL blank. This is optional and will be provided to you after onboarding.

Set user attributes and claims

  1. Go to the Attributes & Claims tile and click ‘Edit’.
    Attributes and claims navigation
  2. The following attributes will be displayed by default:
    • givenname
    • surname
    • emailaddress
    • name
  3. To add a group claim, click + Add a group claim.
    Add group claims navigation
  4. Select Security groups and the appropriate Source attribute, then click Save.Security groups navigation
  5. To add additional claims, click + Add new claim.
    Add new claim navigation
  6. Select the source Attribute and provide a Name, then click Save.Manage claim navigation
  7. You may configure attributes to identify grade levels for students, campuses, or distinguish staff/admin users.

Complete SSO onboarding with ClickView

This is the final step of the setup process. To complete this, please provide ClickView Product Support with:

  1. Your App Federation Metadata URL.
  2. A list of all staff and student security groups

App Federation Metadata URL

To obtain your App Federation Metadata URL, follow these steps:

  1. Select Single sign-on then go to the SAML Certificates tile to locate App Federation Metadata Url.
    Single sign-on navigation
  2. Click the Copy icon to the right to copy the URL to your clipboard.
    SAML certificates interface

Staff and student security groups

This is required to ensure your school’s grade levels are mapped correctly in ClickView.

  1. In the Microsoft Entra admin center, go to Groups.
    Submit groups navigation
  2. Click on All groups and search for relevant groups.
    All groups navigation

Important points to note

  • If you use local Active Directory groups, synchronize with Microsoft Entra Connect Sync.
  • For SAML group claims setup, see Add group claims to tokens for SAML applications using SSO configuration.
  • Group claim SAML token limit: Microsoft Entra supports up to 150 user groups. If exceeded, ClickView cannot retrieve groups via API. Limit group assignments or send only security groups as needed.
  • Provide test student and staff account credentials with all required attributes and group memberships for SSO testing.

Start your onboarding process

Once you you have completed the above, please start your onboarding process by completing this form.

Frequently asked questions

Microsoft Entra supports up to 150 user groups in a SAML token. If a user exceeds this limit, ClickView cannot retrieve groups via API. Limit assignments or send only the required security groups.
You can add attributes in Microsoft Entra for student grade levels, staff roles, or campus information. Use claims in the User Attributes & Claims section for mapping.
The Sign on URL is optional and will be provided by ClickView once onboarding is complete.
Yes. Provide test staff and student accounts that include all required attributes and the correct security group memberships so ClickView can validate your SSO configuration.

Get in touch

If you’re having trouble finding the right topics or videos, just reach out! Our team - Andrew photoNischal photoJanice photoPfreya photo Andrew, Nisch, Janice, Pfreya, or any of us at ClickView - will be happy to help you get sorted.

Give feedback

Was this guide helpful?

Up Next

How to set up Okta SAML SSO with ClickView

This article explains how to configure a SAML 2.0 application in Okta for use with ClickView and submit the required metadata so the SSO instance can be set up.