All Products
Search
Document Center

Identity as a Service:Google Workspace SSO

Last Updated:Mar 31, 2026

Configure single sign-on (SSO) between IDaaS and Google Workspace using OpenID Connect (OIDC) or Security Assertion Markup Language (SAML). The configuration spans two systems — the IDaaS console and the Google Admin console — and ends with a verification step to confirm the SSO flow works end to end.

Prerequisites

Before you begin, ensure that you have:

  • Administrator permissions for the Google Admin console

  • An active IDaaS instance

The user email claim configured in IDaaS must match the primary email address of the Google Workspace user. A mismatch prevents SSO from working.

OIDC protocol configuration

Steps overview:

  1. IDaaS — Configure the Google application

  2. Google Admin console — Create an OIDC configuration

  3. Google Admin console — Assign the SSO policy

Step 1: IDaaS — Configure the Google application

  1. Log on to the IDaaS console, select your IDaaS instance, and click Manage in the Actions column.IDaaS consoleIDaaS console

  2. Click Application > Add Application > Standard Protocol and add an OIDC application.

    image

  3. On the OIDC application details page, open the General tab and copy the client_id and client_secret. You will enter these values in the Google Admin console in Step 2.

    image

  4. Open the Sign-In > SSO tab. In the Application Settings section, copy the Issuer address. You will enter this value in the Google Admin console in Step 2.

    image

  5. Leave the Redirect URIs field blank for now. You will retrieve the redirect URI from the Google Admin console in Step 2 and return here to fill it in.

    image

  6. On the Sign-In > Authorize tab, add the users to grant SSO access. By default, permissions are granted manually.

Step 2: Google Admin console — Create an OIDC configuration

  1. Log on to the Google Admin console. In the left navigation pane, go to Security > Authentication > SSO With Third-party IdPs.

  2. Click ADD OIDC PROFILE (BETA).

    image

  3. Fill in the IDaaS parameters. All values except Change Password URL come from the IDaaS application you configured in Step 1.

    FieldDescriptionSource
    SSO profile nameA name to identify this OIDC configuration. Include the application or business system name for easier management.Define your own
    Client IDThe client_id of the IDaaS OIDC application. Identifies the client on the authorization server.Step 1, step 3
    Client secretThe client_secret of the IDaaS OIDC application. Keep this credential confidential.Step 1, step 3
    Issuer URLThe Issuer address of the IDaaS OIDC application. Used to verify the source of the ID token.Step 1, step 4
    Change Password URL(Optional) A link for users to change their password.N/A

    image

  4. After saving, copy the Google redirect URI displayed on the confirmation page.

    image

  5. Return to the IDaaS OIDC application (Step 1, step 5) and paste the redirect URI into the Redirect URIs field.

Step 3: Google Admin console — Assign the SSO policy

  1. On the SSO With Third-party IdPs page, go to the Manage SSO Profile Assignments section and click Manage.

  2. Select the OIDC SSO profile you created, then click Save in the lower-right corner.

    image

  3. Test the configuration. See Verify the SSO flow.

SAML protocol configuration

Steps overview:

  1. IDaaS — Configure the Google application

  2. Google Admin console — Create a SAML configuration

  3. Google Admin console — Assign the SSO policy

The SAML configuration requires values from both systems. Complete Step 2 first to retrieve the service provider (SP) details from Google, then return to Step 1 to enter those values in IDaaS.

Step 1: IDaaS — Configure the Google application

  1. Log on to the IDaaS console, select your IDaaS instance, and click Manage in the Actions column.

  2. Click Application > Add Application > Standard Protocol and add a SAML 2.0 application.

    image

  3. On the SAML application details page, open the Sign-In > SSO tab and complete the SSO section. By default, permissions are granted manually.

    FieldDescriptionSource
    ACS URLThe Assertion Consumer Service (ACS) URL from the Google Workspace SP configuration.Step 2, step 3
    SP Entity IDThe Entity ID from the Google Workspace SP configuration.Step 2, step 3
    IdP Entity IDThe Identity Provider Entity ID from the Google identity provider (IdP) configuration.Google Admin console
    IdP Sign-In URLThe Sign-in Page URL from the Google IdP configuration.Google Admin console
    CertificateDownload the public key certificate from IDaaS, then upload it to the Verification Certificate field in the Google IdP.IDaaS (download)
  4. On the Sign-In > Application User tab, click Add Application User, then on the Authorize tab, add the users to grant SSO access.

Step 2: Google Admin console — Create a SAML configuration

  1. Log on to the Google Admin console. In the left navigation pane, go to Security > Authentication > SSO With Third-party IdPs.

  2. Click Add SAML Profile and enter the identity provider (IdP) details from the IDaaS SAML application you configured in Step 1. Click Save when finished.

    FieldDescriptionSource
    SSO profile nameA name to identify this SSO configuration. Include the application or business system name for easier management.Define your own
    Identity Provider Entity IDThe IdP Unique Identifier (Entity ID) of the IDaaS SAML application. Matches the identity binding between the SP and IDaaS.IDaaS SAML application
    Sign-in Page URLThe IdP SSO URL (IdP Sign-in URL) from the SSO configuration of the IDaaS SAML application.IDaaS SAML application
    Sign-out Page URL(Optional) The endpoint where the SP accepts SAML single logout requests.N/A
    Change Password URL(Optional) A link for users to change their password.N/A
    Verification CertificateThe public key certificate issued by IDaaS. Used to verify the SAML response signature.Step 1, step 3

    image

  3. In the Service Provider Details section, copy the Entity ID and ACS URL.

    image

  4. Return to the IDaaS SAML application (Step 1, step 3) and enter the Entity ID in SP Entity ID and the ACS URL in ACS URL.

Step 3: Google Admin console — Assign the SSO policy

  1. On the SSO With Third-party IdPs page, go to the Manage SSO Profile Assignments section and click Manage.

  2. Select the SAML SSO profile you created, then click Save in the lower-right corner.

    image

  3. Test the configuration. See Verify the SSO flow.

Verify the SSO flow

  1. Go to the Google Workspace dashboard.

  2. Enter your email address (for example, aliyun@example.com) and click Next.

    image

  3. Google redirects you to the IDaaS logon page.

    image

  4. After a successful logon, you are redirected back to Google Workspace.