Hideez Identity Cloud
  • Getting Started Guide
    • Key features of Hideez Identity Cloud
    • Quick Start Guide
      • The Hideez Desktop Client
      • Hideez Authenticator App
    • Tennant manegement
      • User Management
        • Passkey
        • Hideez Authenticator App
        • FIDO Security Key
        • Platform Authentication via Windows Hello
        • Password+OTP
      • Workstation management
  • PC Authorization
    • Passwordless Authorization
      • Active Directory
        • Setting Up the Active Directory Certification Authority
        • Setting Up Workstation Passwordless Logon Settings on Hideez Identity Cloud
      • Microsoft Entra ID
    • Password-based Authorization
  • INTEGRATIONS
    • SAML 2.0
      • GitHub Enterprise
      • Google Workspace
      • Okta
    • OIDC (OpenID Connect)
      • Services that support OIDC and their configuration as Client
    • WS-Federation
      • Login to Exchange Outlook Web Application and Exchange Admin Center via Hideez Identity Cloud
    • Active Directory On-Premises
      • Connect Active Directory to Hideez Identity Cloud
      • ADFS integration
        • Login to Microsoft Exchange OWA Using AD FS and Hideez Identity Cloud as a Third-Party IdP
    • Microsoft Entra ID
      • Synchronization and import employees from Microsoft Entra ID to Hideez Identity Cloud
      • Configuration of Hideez Cloud as an External Authentication Method for Microsoft Entra ID via OIDC
    • Chrome OS
  • USE CASES
    • Passkey Login
    • Hideez Authenticator App login
    • FIDO Security Key login
    • Platform login via Windows Hello
    • Password+TOTP login
  • SUPPORT
    • Get Support
    • FAQ
      • What to do if a user loses their key/device and cannot access the site?
      • Can a custom domain name be created for the tenant instead of the default one?
      • Why am I already logged in Hideez, and no authorization occurs when I access my web application?
      • How long does an open authorization session last?
      • How to log out of the web application?
      • Can I administer multiple tenants simultaneously?
      • Can there be multiple administrators for the Hideez Identity Cloud?
    • Glossary
  • Hideez Documentation Portal
Powered by GitBook
On this page
  • How to Configure SAML 2.0 for Google Workspace
  • 1. Create a User Group or Organizational Unit (OU):
  • 2. Add Users to the Group for SAML Login Access
  • 3. Access Google Admin Console for SAML Setup
  • 4. Create SAML App Integration in Hideez Cloud
  • 5. Complete the SAML Profile in Google Admin Console
  • 6. Assign SSO Profiles for Group
  • Disable Google Workspace Login via Hideez Cloud SAML
  1. INTEGRATIONS
  2. SAML 2.0

Google Workspace

Hideez Identity Cloud - Configuration SAML 2.0 for Google Workspace

Last updated 17 days ago

How to Configure SAML 2.0 for Google Workspace

1. Create a User Group or Organizational Unit (OU):

Define a user group, OU, or select individual users to whom Google Workspace access via Hideez Cloud SAML SSO will apply:

  • Navigate to Menu → Directory → select User, Group, or Organizational Unit (OU).

  • Choose an existing option or create a new group, user, or OU for SAML login via Hideez Cloud.

  • User: An individual Google Workspace account assigned to a specific person, capable of being grouped in OUs and Groups.

  • Organizational Unit (OU): A structured way to organize users by department or role, allowing administrators to apply distinct settings and policies (e.g., security and app access) to specific groups.

  • Group: A collection of users for communication (e.g., email lists) and shared resource access (e.g., Drive files). Groups support multiple users without a hierarchical structure.

Example: Applying SAML Login to a User Group

  • Navigate to Menu → Directory → Group and create group.

  • Enter required group details:

    • Group name

    • Group email (existing or new email for the group)

  • Select Group labels → Security, and proceed to configure Access type (e.g., Public), then click Create Group.

2. Add Users to the Group for SAML Login Access

  • Select the newly created group and add users who will access Google services via SAML through Hideez Identity Cloud.

3. Access Google Admin Console for SAML Setup

  • Navigate to Menu → Show more→Security → Authentication → SSO with third-party IdP.

  • Under Third-party SSO profiles, click Add SAML profile.

  • Enter a profile name (e.g., "Hideez Cloud") and save.

4. Create SAML App Integration in Hideez Cloud

  • In Hideez Cloud, go to Integrations → SAML.

  • Click on Create App Integration and enter:

    • Name: (e.g., Google Multi-IdP SSO Profile).

  • In Google Admin, open the SAML profile and copy the following details:

  • Issuer/SP Entity ID (e.g., https://accounts.google.com/samlrp/unique-id).

  • ACS URL (e.g., https://accounts.google.com/samlrp/unique-id/acs).

  • Click Create.

5. Complete the SAML Profile in Google Admin Console

  • In Google Admin, open the SAML profile and fill in IDP details from Hideez Cloud:

    • IDP entity ID

    • Sign-in page URL

    • Sign-out page URL (optional)

    • Verification certificate

Note: The Logout URL in Hideez Cloud and the Sign-out Page URL in Google Workspace serve different purposes. You have two options for configuration:

  1. Leave the field blank in Google Workspace: Upon logging out of Google Workspace, you will automatically be redirected to the initial email entry page.

  2. Specify a tenant's name in the field: Example: https://tenant_name.us.hideez.io (e.g., https://support-cloud.us.hideez.io). In this case, logging out of Google Workspace will redirect you to the Hideez Cloud End-User Dashboard.

  • Click Save.

6. Assign SSO Profiles for Group

  • Go to Manage SSO profile assignments in Google Admin Console.

  • Assign the new SSO profile to specific OUs or groups as needed.

  • Click Save.

Ensure the profile created in Step 3 has a status of "Complete"; otherwise, it will not appear in the Another SSO profile selection.

Logging into Google Services via Hideez Identity Cloud Users can log in to Google services (e.g., Drive, Gmail) through Hideez Identity Cloud, with options such as:

  • Passwordless login with Passkey or Hideez Authenticator App.

  • Standard login with a second authentication factor (TOTP).

SP-Initiated SSO Links for Google Services These URLs allow direct access to services through SSO:

  • Mail: https://www.google.com/a/your-domain.com/ServiceLogin?continue=https://mail.google.com

  • Drive: https://www.google.com/a/your-domain.com/ServiceLogin?continue=https://drive.google.com

  • Calendar: https://www.google.com/a/your-domain.com/ServiceLogin?continue=https://calendar.google.com

  • Replace your-domain.com with your actual domain.

Summary for Option 2: Multi-IdP SSO Profile

  • Create a user group and add members.

  • Set up a SAML profile in Google Admin and Hideez Cloud.

  • Assign the profile to the specific group.

  • Save all changes.

Disable Google Workspace Login via Hideez Cloud SAML

  • Root Organization SSO Profile: Uncheck Set up SSO with third-party identity provider in Google Admin Console and save.

  • Multi-IdP SSO Profile: Go to Manage SSO profile assignments → select None for SSO profile and save.

Go to .

In .

If you need assistance with server setup or configuring SAML/OIDC, our support team is also available to help. We’ll be happy to assist you!

admin.google.com
admin.google.com
[email protected]