Google Workspace
This guide walks you through configuring Google Workspace as your SAML identity provider for the application you are onboarding, enabling secure Single Sign-On for your users. You’ll learn how to set up an enterprise application, configure SAML settings to the host application. By following these steps, your users will be able to seamlessly authenticate using their Google Workspace credentials.
-
Create a custom SAML app in Google Workspace
Section titled “Create a custom SAML app in Google Workspace”Google allows you to add custom SAML applications that connect with Scalekit over the SAML protocol. This is the first step in establishing a secure SSO connection.
- Go to Google Admin Console (
admin.google.com
) - Select Apps → Web and Mobile Apps
- Click Add App → Add custom SAML app
Creating a new custom SAML application in Google Workspace- Provide an App Name (e.g., “YourApp”) and upload an app icon if needed
- Click Continue
Your SSO config portal connects with Google IdP using three essential pieces of information:
- SSO URL
- Entity ID
- Certificate
Copy these values from the Google console and paste them into your config portal.
Essential SAML configuration details from Google Workspace - Go to Google Admin Console (
-
Configure the Service Provider in Google Admin Console
Section titled “Configure the Service Provider in Google Admin Console”In your SSO configuration portal:
- Navigate to Single Sign-On (SSO) → Google Workspace → SAML 2.0
- Select the organization you want to configure
- Copy these critical details from the SSO settings:
- ACS URL (Assertion Consumer Service URL)
- SP Entity ID (Service Provider Entity ID)
- SP Metadata URL
Service Provider configuration details in SSO portalIn Google Admin Console:
- Paste the copied details into their respective fields
- Select “Email” as the NameID format (this serves as the primary user identifier during authentication)
- Click Continue
Configuring Service Provider details in Google Workspace -
Configure Attribute Mapping
Section titled “Configure Attribute Mapping”User profile attributes in Google IdP need to be mapped to your application’s user attributes for seamless authentication. The essential attributes are:
- Email Address
- First Name
- Last Name
To configure these attributes:
- Locate the Attribute Mapping section in your Identity Provider’s application
- Map the Google attributes to your application attributes as shown below
Mapping user attributes between Google Workspace and your application -
Assign Users and Groups
Section titled “Assign Users and Groups”Control access to your application by assigning specific users or groups:
- Go to the User/Group assignment section in your Identity Provider application
- Select and assign the user groups that need access to your application via SSO
Assigning user groups for SSO access -
Configure Identity Provider in SSO Portal
Section titled “Configure Identity Provider in SSO Portal”- From your Google Workspace, copy the IdP details shown during custom app creation:
Identity Provider details from Google Workspace- In your SSO configuration portal:
- Navigate to Identity Provider Configuration
- Paste the Google IdP details into:
- Entity ID
- SSO URL
- x509 certificates
Updating Identity Provider configuration in SSO portal- Click Update to save the configuration
-
Test the Connection
Section titled “Test the Connection”Verify your SAML SSO configuration:
- Click Test Connection in the SSO Configuration Portal
- If successful, you’ll see a confirmation message:
Successful SSO connection testIf there are any configuration issues, the test will identify them and provide guidance for correction.
-
Enable SSO Connection
Section titled “Enable SSO Connection”Once you’ve verified the configuration:
- Click Enable Connection to activate SSO for your users
Enabling the SSO connection
Congratulations! You have successfully configured Google SAML for your application. Your users can now securely authenticate using their Google Workspace credentials through Single Sign-On.