Single sign-on (SSO)
Enable single sign-on to allow students and staff to access Reading Steps using their existing school credentials.Supported providers
Reading Steps supports SSO with:- Google Workspace for Education
- Microsoft Azure AD / Entra ID
- ClassLink
- Clever
- SAML 2.0 (custom providers)
Google Workspace
Prerequisites
- Google Workspace for Education account
- Admin access to Google Admin Console
- Reading Steps admin access
Setup
- Go to Admin Panel > Integrations > SSO
- Select Google Workspace
- Click Configure
- Copy the provided Redirect URI
- Go to Apps > Web and mobile apps
- Click Add app > Add custom SAML app
- Enter “Reading Steps” as the app name
- Paste the Redirect URI from Reading Steps
- Configure attribute mapping:
| Google attribute | Reading Steps attribute |
|---|---|
| Primary email | |
| First name | first_name |
| Last name | last_name |
- Save and enable for your organizational units
- Enter your Google Workspace domain
- Click Test Connection
- Enable SSO
Microsoft Azure AD
Prerequisites
- Microsoft 365 Education subscription
- Azure AD admin access
- Reading Steps admin access
Setup
- Go to Admin Panel > Integrations > SSO
- Select Microsoft Azure AD
- Click Configure
- Copy the provided Redirect URI and Entity ID
- Go to Azure Active Directory > Enterprise applications
- Click New application > Create your own application
- Name it “Reading Steps” and select Integrate any other application
- Go to Single sign-on > SAML
-
Configure Basic SAML Configuration:
- Identifier (Entity ID): Paste from Reading Steps
- Reply URL: Paste Redirect URI from Reading Steps
- Configure attribute mapping:
| Azure attribute | Reading Steps attribute |
|---|---|
| user.mail | |
| user.givenname | first_name |
| user.surname | last_name |
- Download the Federation Metadata XML
- Upload the Federation Metadata XML
- Click Test Connection
- Enable SSO
ClassLink
Setup
- Go to Admin Panel > Integrations > SSO
- Select ClassLink
- Click Configure
- Enter your ClassLink tenant ID
- Click Connect to ClassLink
- Authorize Reading Steps in ClassLink
- Configure roster sync options
- Enable SSO
Roster sync
ClassLink can automatically sync:- Students
- Teachers
- Classes
- Enrollments
Clever
Setup
- Go to Admin Panel > Integrations > SSO
- Select Clever
- Click Configure
- Click Connect to Clever
- Log in to your Clever dashboard
- Authorize Reading Steps
- Select which schools to sync
- Enable SSO
Data sharing
Clever shares:- Student information
- Teacher information
- Class rosters
- School information
Custom SAML 2.0
For other identity providers supporting SAML 2.0:Reading Steps SAML configuration
| Setting | Value |
|---|---|
| Entity ID | https://app.readingsteps.uk/saml/metadata |
| ACS URL | https://app.readingsteps.uk/saml/acs |
| SLO URL | https://app.readingsteps.uk/saml/slo |
| Name ID Format | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
Required attributes
| Attribute | Required | Description |
|---|---|---|
| Yes | User’s email address | |
| first_name | Yes | User’s first name |
| last_name | Yes | User’s last name |
| role | No | student, teacher, or admin |
Setup
- Go to Admin Panel > Integrations > SSO
- Select Custom SAML
- Enter your IdP metadata URL or upload metadata XML
- Configure attribute mapping
- Click Test Connection
- Enable SSO
User provisioning
Just-in-time (JIT) provisioning
When enabled, users are automatically created on first login:- Go to SSO Settings > Provisioning
- Enable Just-in-time provisioning
- Configure default settings:
- Default role for new users
- Default class assignment
- Auto-assign reading level
SCIM provisioning
For automatic user lifecycle management:- Go to SSO Settings > SCIM
- Enable SCIM provisioning
- Copy the SCIM endpoint URL and token
- Configure SCIM in your identity provider
https://app.readingsteps.uk/scim/v2
Troubleshooting
Common issues
| Issue | Solution |
|---|---|
| ”User not found” | Enable JIT provisioning or pre-create users |
| ”Invalid signature” | Re-download and upload IdP certificate |
| ”Attribute missing” | Check attribute mapping in IdP |
| ”Session expired” | Increase session timeout in SSO settings |
Testing SSO
- Go to SSO Settings > Test
- Click Start Test
- Complete authentication with your IdP
- Review the returned attributes
- Fix any mapping issues
Logs
View SSO authentication logs:- Go to Admin Panel > Logs > SSO
- Filter by date, user, or status
- Click on entries for detailed information
Security
Session management
Configure session settings:| Setting | Default | Description |
|---|---|---|
| Session timeout | 8 hours | Time before re-authentication required |
| Idle timeout | 1 hour | Time of inactivity before logout |
| Force re-auth | Off | Require IdP authentication each login |
Access control
Restrict SSO access by:- Email domain
- User groups
- Organizational units