Configuring Google Single Sign-On Integration with SAML

Using Security Assertion Markup Language (SAML), a user can use their managed account credentials to sign in to enterprise cloud applications via Single Sign-On (SSO). An Identity Provider (IdP) service provides administrators with a single place to manage all users and cloud applications. You don't have to manage individual user IDs and passwords tied to individual cloud applications for each of your users. An IdP service provides your users with a unified sign-on across all their enterprise cloud applications.

How to Configure Google Single Sign-On Integration with SAML

  1. Log in to your Google account and navigate to the Admin console.
  2. Click Apps.
  3. Click SAML. The SAML Apps settings window is displayed.
  4. Click Add a service/App to your domain. The Enable SSO for SAML Application window is displayed.

  1. Click SETUP MY OWN CUSTOM APP. The Google IdP Information window is displayed.

  1. Take a note of the IdP Information: SSO URL, Entity ID and Certificate. (You will need them in a later step.)
  2. In IDP metadata, click DOWNLOAD.
  3. Click NEXT. The Basic information for your Custom App window is displayed.

  1. Enter an Application Name and click NEXT. The Service Provider Details window is displayed.

  1. In the ACS URL field, copy and paste in the contents of the SAML 2.0 Service URL field from Netsparker Enterprise's Single Sign-On window.
  2. In the Entity ID field, copy and paste in the contents of the Identifier field (URL) from Netsparker SSO configuration window.
  3. Click NEXT. The Attribute Mapping window is displayed.

  1. Click FINISH.
  2. Return to the SAML Settings window.
  3. From the More Options (ellipsis), select ON for everyone.
  4. In the IdP Information note panel:
  • Copy the URL from the Entity ID field.
  • Then log in to Netsparker Enterprise, and from the main menu, click Settings, then Single Sign-On. Select the Google tab, and paste the URL into the Idp Identifier field.
  • Next, copy the URL from the SSO URL field.
  • Then in Netsparker Enterprise's Single Sign-On window, paste the URL into the SAML 2.0 Endpoint field.
  • Finally, copy the content from the downloaded X.509 Certificate field.
  • Then in Netsparker Enterprise's Single Sign-On window, paste it into the X.509 Certificate field.

  1. In Netsparker Enterprise's Single Sign-On window, click Save Changes.
Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO