Connect Google SAML

Learn how to configure a connection to Google Workspace via SAML

Introduction

Each SSO Identity Provider requires specific information to create and configure a new Connection. Often, the information required to create a Connection will differ by Identity Provider.

To create a Google SAML Connection, you'll need three pieces of information: an ACS URL, a SP Entity ID, and an IdP Metadata URL.

Start by logging into your WorkOS Dashboard and selecting "Organizations" from the left hand navigation bar.

Click on the organization you'd like to configure a Google SAML connection for and select "Manually Configure Connection".

Select "Google SAML" from the Identity Provider dropdown, enter a descriptive name for the connection, and then select the "Create Connection" button.

WorkOS Provides

WorkOS provides the ACS URL and the SP Entity ID. It's readily available in your Connection's Settings in the WorkOS Dashboard.

The ACS URL is the location an Identity Provider redirects its authentication response to. In Google's case, it needs to be set by the Enterprise when configuring your application in their Google admin dashboard.

The SP Entity ID is a URI used to identify the issuer of a SAML request, response, or assertion. In this case, the entity ID is used to communicate that WorkOS will be the party performing SAML requests to the Enterprise's Google instance.

Specifically, the ACS URL will need to be set as the "ACS URL" and the SP Entity ID will need to be set as the "Entity ID" in the "Service Provider Details" step of the Google SAML setup:

Overview

And then, you provide the metadata XML file from Google.

Normally, this information will come from your Enterprise customer's IT Management team when they set up your application's SAML 2.0 configuration in their Google admin dashboard. But, should that not be the case during your setup, here's how to obtain it.

1

Log in

Log in to the Google admin dashboard, select "Apps" from the sidebar menu, and then select "Web and Mobile Apps" from the following list. If your application is already created, select it from the list of applications and move to Step 7. If you haven't created a SAML application, select "Add App" and then "Add custom SAML app".

2

Enter Your App's Information

Give the app a descriptive name and upload an icon, if applicable. Click "Continue".

3

Obtain Identity Provider Details

Select the "Download Metadata" button to download the metadata file. Save this file, as you'll upload it to the WorkOS Dashboard in Step 7. Click "Continue".

4

Enter Service Provider Details

Copy and the "ACS URL" from your WorkOS Dashboard and paste it into the "ACS URL" field, and copy the "SP Entity ID" from your WorkOS Dashboard and paste it into the "Entity ID" field in the Google SAML "Service provider details" modal. Select "Contiue."

5

Configure Attribute Mapping

Provide the following Attribute Mappings and select "Finish":

Google SAML does not provide the option to map a user's id attribute claim.

6

Configure User Access

In the created SAML app's landing page, select the "User Access Section".

Turn this service ON for the correct organizational units in your Google Directory setup. Save any changes.

Note that Google may take up to 24 hours to propagate these changes. The connection in WorkOS will be inactive until then.

7

Upload Metadata File

If you haven't already downloaded the metadata file, select your SAML application, and click "Download Metadata". In the modal, again click "Download Metadata".

In the Connection Settings of the WorkOS Dashboard, click "Edit Metadata Configuration".

In the modal, upload the Google Metadata file and then select "Save Metadata Configuration". Once the file is uploaded into WorkOS, your Connection will then be linked and good to go!