Fluent Commerce Logo
Docs
Sign In

SSO: Configure Google Workspace connection via SAML

How-to Guide

Author:

Fluent Commerce

Changed on:

14 Nov 2024

Key Points

  • This guide covers setting up an SSO connection between PingOne and Google Workspace using SAML.
  • Ensure you have admin access in PingOne and a Google Workspace account with an active subscription.
  • You need to register the application in Google Workspace to configure it as an external identity provider.

Steps

Step arrow right iconOverview

You can use the generic SAML configuration to add any external identity provider that complies with the SAML standard. To set up an external identity provider through SAML, you'll need to complete the following steps.

Google Workspace Configuration

Step arrow right iconSign in to Google Admin console

Step arrow right iconAccess the Apps Page

Go to Apps > Web and mobile apps.

Step arrow right iconAdd a Custom SAML App

Select Add App and then Add custom SAML app. Enter a name for the app and, optionally, upload an icon. This icon will display in the Web and mobile apps list, on the app settings page, and in the app launcher. If no icon is uploaded, one will be automatically generated using the first two letters of the app name.

No alt provided

Then, click Continue to proceed.

No alt provided

Step arrow right iconDownload Metadata

On the Google Identity Provider details page, click Download the IDP metadata. You will need this file later. 

No alt provided

Then, click Continue to proceed.

No alt provided



 

Step arrow right iconComplete Service Provider Details

Next, you’ll arrive at the Service Provider Details window, where two fields need to be completed:

  • ACS URL—The Assertion Consumer Service URL of the service provider, which receives the SAML response. This URL must begin with
    `https://`
    .
  • Entity ID—The unique global identifier.

Instructions for filling in these fields are provided in the following steps.
 

No alt provided

PingOne Configuration

Step arrow right iconCreate an External IDP in PingOne

To enter the values from the previous steps, create an External IDP in PingOne by navigating to Integrations > External IDPs, clicking + Add Provider, and selecting SAML.

No alt providedNo alt provided

Step arrow right iconEnter Profile Details

On the Create Profile screen, enter the following information:

  • Name: A unique identifier for the identity provider.
  • Description (optional): A brief description of the identity provider.
  • Icon (optional): An image to represent the identity provider, up to 1MB in JPG, JPEG, GIF, or PNG format.
  • Login button (optional): An image for the login button visible to the end user, sized at 300 x 42 pixels.

Then, click Continue.

No alt provided


Step arrow right iconConfigure PingOne and Google Workspace Connection Details

On the Configure PingOne Connection screen, copy the PingOne (SP) Entity ID and paste it into the Entity ID field on the Service Provider Details page in Google Workspace. Then, click Continue.

No alt provided

On the Configure IDP Connection screen, copy the ACS Endpoint and paste it into the ACS URL field on the Service Provider Details page in Google Workspace. Next, use the Choose button on the same screen to upload the IDP metadata file downloaded earlier.

No alt provided

Click Save and Continue.

Finally, on the Map Attributes screen, click Save & Finish.

No alt provided

Final Steps

Step arrow right iconComplete Google Workspace Configuration

Return to the Google Workspace configuration and click Continue.

No alt provided

Click Finish to complete the setup in Google Workspace.

No alt provided

Step arrow right iconConfigure User Access for the New Application

Next, you need to grant access to the newly created application, as it is not available to all users by default. Navigate to the User access tab.

No alt provided

To provide access to all users, select "On" for everyone and click Save.

No alt provided

If you prefer to grant access to a specific group or organizational unit, locate the group/organizational unit in the left-hand menu, select it, then toggle it to ON and Save.

No alt provided


Do not Forget

Step arrow right iconEnable and Configure Authentication Policy

  • Start by enabling the external identity provider in the system.
  • Create an Authentication Policy and associate the newly configured External Identity Provider with it.
No alt provided
  • Apply the policy to your application to finalize the authentication configuration.
No alt provided
Fluent Commerce

Fluent Commerce

Copyright © 2024 Fluent Retail Pty Ltd (trading as Fluent Commerce). All rights reserved. No materials on this docs.fluentcommerce.com site may be used in any way and/or for any purpose without prior written authorisation from Fluent Commerce. Current customers and partners shall use these materials strictly in accordance with the terms and conditions of their written agreements with Fluent Commerce or its affiliates.

Fluent Logo