The transcript has been lightly edited for ease of reading

This article will explain how to integrate Click Travel with your Microsoft Azure for single sign on (SSO). By the end of the video, you'll have Click Travel on your organisation app dashboard so that users can click on the icon and be taken to the Click sign-in page.

When users hit sign in with SSO, they will land within the application signed in as their user.

In order to configure single sign on with SAML, select 'Active Directory' in Azure portal and then 'Enterprise Applications'. From here, select 'New Application' and then 'Create your own application', put Click Travel as the name and then select 'Integrate any other application you don't find in the gallery'.

This will take a couple of seconds. Once the application has been created, you'll be taken to the applications homepage within Azure Active Directory. From here you can set up single sign-on under getting started, or select Single sign-on under the Manage menu, then select SAML from the options given.

From this menu, edit the basic SAML configuration, enter the Identifier, Reply URL and Sign On URL that we have supplied you. It's important to put all of these in as the integration will fail without any one of them. Then hit save.

Once that is saved, close that window and click 'No, I'll test later' as it won't be possible to test until Click Travel have completed our set-up. You'll need to send us the URL under 'App Federation Metadata URL' in the 'SAML Signing Certificate' section to proceed.

Before that, the next stage is to go to Properties under the Manage menu and to select the Click Travel logo that we will provide you, and ensure that both 'User assignment required' and 'Visible to users' are set to Yes. Then click save.

Once you have done this, the Click Travel icon will now appears on your users' dashboards.

It's important to remember to also assign whatever users and groups you wish to use Click Travel to the Click Travel application. To do this, add the users individually or in groups under the 'Users and groups' menu item. If you do not do this, users will get an Azure error page when they attempt to sign in.

Once Click Travel have completed the set-up on our side, users will be able to accept new invitations to join the platform with SSO.

Did this answer your question?