Chrome OS
Chrome OS Login via Hideez Identity Cloud using SAML SSO
Prerequisites
Before starting the integration, ensure the following conditions are met:
The user belongs to your organization's domain in Google Workspace. The Google Workspace admin console must manage the user’s account.
SAML SSO must be enabled in Google Workspace. The admin must configure Google Workspace to use a third-party Identity Provider (IdP).
The user exists in Hideez Identity Cloud. The same email address must be present in the Hideez Identity Cloud.
Step 1: Configure Hideez Identity Cloud (IdP)
Log in to the Hideez Server as an administrator.
Go to Settings → Parameters → SAML.
Click Add Service Provider and enter the following:
Issuer / SP Entity ID: use the ACS URL from Google Workspace
ACS (Assertion Consumer Service) URL: from Google Admin (see Step 2)
NameID Format: Email
NameID Value: Email
Upload the SP certificate if available
Save the changes.
Step 2: Configure Google Admin for Chrome OS
Go to admin.google.com → Menu → Security → Authentication → SSO with third-party IdP.
Click Add SAML profile.
Fill in the following:
Profile Name: Hideez Server (IdP)
IdP Entity ID:
https://<your-hideez-server>
Login URL:
https://<your-hideez-server>/saml/login
Logout URL:
https://<your-hideez-server>/saml/logout
Upload IdP Certificate: download it from the Hideez Server and upload here
Save the profile.
Assign the profile to a specific organizational unit (OU) or group of users to enable SSO for them.
For more detailed instructions on configuring SAML SSO in Google Workspace, refer to the official documentation: • Set up SSO via SAML for your organization – Google Workspace Admin Help • Hideez Identity Cloud SAML Configuration Guide
Demo: Chrome OS Login via Hideez Identity Cloud
Last updated