Skip to main content
Version: Config V1 (legacy)

Google Identity Provider

Connect ConfigCat with Google via SAML.

Introduction

Each SSO Identity Provider requires specific information to configure a SAML integration. The following guide will walk you through how you can connect ConfigCat with Google as a SAML Identity Provider.

1. Create a SAML Application in Google

  • Log in to Google Admin console, select Apps from the side menu, then select Web and mobile apps.

    Google applications
  • Click Add App, then select Add custom SAML app.

    Google add SAML app
  • Enter a descriptive App name, then click CONTINUE.

    Google SAML app name

The next step will guide you on how to configure ConfigCat with appearing information.

2. Configure ConfigCat with SAML Details from Google

  • Copy the value of SSO URL and Certificate fields and save them for further use.

    Google SSO url
  • Open your organization's authentication settings on the ConfigCat Dashboard.

    ConfigCat authentication settings
  • Click ADD SAML IDENTITY PROVIDER.

    ConfigCat Add Identity Provider
  • Give a name for your Identity Provider, and click Create.

    ConfigCat Name Identity Provider
  • Select the 3. Set up ConfigCat step, click Manual Configuration, then paste the copied values into the appearing fields.

    ConfigCat manual configuration
  • Click CONTINUE on the Google App configuration.

    Google SSO app configuration

The next step will guide you on how to configure the Google App with details provided by ConfigCat.

3. Configure the Google Application with Service Provider Details from ConfigCat

  • Select 2. Set up your Identity Provider step on the ConfigCat configuration dialog, and copy the following values to the Google App.

    • Entity ID -> Entity ID

    • Assertion Consumer Service -> ACS URL

      Google acs url
    • Make sure the Signed response option is checked.

    • Select EMAIL as Name ID format.

    • Select Basic Information > Primary email as Name ID.

    • Click CONTINUE.

      Google meta data
  • Click FINISH.

    Google attribute mapping

4. Select Trusted Domains on the SAML Configuration Dialog

  • Only user accounts from trusted domains can login with SAML SSO. You can bind multiple verified domains to a SAML Identity Provider.

    Select trusted domains
  • Click Save.

5. Give Users Access to the Application

  • Click on View details under the User access section.

    Google user access
  • Select ON for everyone, then click SAVE.

    Google ON for everyone

6. Sign In

  • Go to the ConfigCat Log In page, and click COMPANY ACCOUNT - SAML.

    ConfigCat SAML login
  • Sign in with your company email address used in Google.

    ConfigCat SAML company login
  • ConfigCat will redirect you to Google's sign in page. Type your credentials, and sign in.

    Google SSO login
  • You should be redirected to ConfigCat signed in with your company account.

7. Next Steps