Google Workspace - SAML IDR SSO Configuration - RSA Ready Implementation Guide
Originally Published: 2021-10-30
This article describes how to integrate RSA Cloud Authentication Service with Google Workspace (formerly G Suite) using SAML IDR SSO.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service as IDR SSO to Google Workspace.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Search for G Suite and click Add to add the connector.
- On the Basic Information page, choose Identity Router.
- Enter the name for the application in the Name field and click Next Step.
- On the Connection Profile page, choose IdP-initiated and enter Connection URL in the following format: https://mail.google.com/a/%DOMAIN% - replace %DOMAIN% with the domain name of your Workspace connected domain.
- In the Identity Provider section, perform the following sub-steps:
- Make a note of the Identity Provider URL that is required in the Workspace configuration.
- Under Identity Provider Entity ID, click the Override option and enter https://www.opensaml.org/IDP in the text field.
- Import a private/public key pair to sign and validate SAML assertions. If a key is unavailable, follow the sub-steps to generate a certificate bundle. Otherwise, continue to the next step.
- Click Generate Certificate Bundle in the SAML Response Signature section.
- Enter a common name for your Identity Router domain in the Common Name (CN) field.
- Click Generate and Download, save the certificate bundle zip file to a secure location, and extract its contents. The zip file contains a private key, a public certificate, and a certificate signing request.
- Make a note of the Identity Provider URL that is required in the Workspace configuration.
- Fill in the Service Provider section details in the following format:
- In the Assertion Consumer Service (ACS) URL and Audience (Service Provider Entity ID) fields, enter the URL in this format: https://www.google.com/a/%DOMAIN%/acs - replace %DOMAIN% with the domain name of your Workspace connected domain.
- In the Assertion Consumer Service (ACS) URL and Audience (Service Provider Entity ID) fields, enter the URL in this format: https://www.google.com/a/%DOMAIN%/acs - replace %DOMAIN% with the domain name of your Workspace connected domain.
- In the User Identity section, select Email Address in the Identifier Type drop-down list, select the name of your user Identity Source, and select the Property value as mail.
- On the User Access page, select the access policy that the identity router will use to determine which users can access the Workspace service provider.
- Click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Save and Finish.
- Click Publish Changes and wait for the operation to complete.
Configure Google Workspace
Perform these steps to configure Google Workspace.
Procedure
The configuration is complete.
Return to Google Workspace - RSA Ready Implementation Guide.
Procedure
- Sign in to the Workspace administrator console at https://admin.google.com.
- Go to Security > Authentication > SSO with third-party IdP.
- On the SSO with third-party IdP page, do the following:
- Select the Set up SSO with third-party identity provider check box.
- In the Sign-in page URL field, enter the Identity Provider URL obtained from of RSA Cloud Authentication Service configuration.
- In the Sign-out page URL field, enter https://google.com.
- Verification certificate: Upload the public certificate extracted from RSA Cloud Authentication Service configuration.
- Select the Set up SSO with third-party identity provider check box.
- Click Save.
Note: The domain connected to your Workspace account must be verified before using third-party SAML IdP. If the domain is not verified, follow https://support.google.com/a/answer/60216?hl=en&ref_topic=29190 to get your domain verified before proceeding.
The configuration is complete.
Return to Google Workspace - RSA Ready Implementation Guide.
Related Articles
Google Workspace - SAML Relying Party Configuration - RSA Ready Implementation Guide 33Number of Views Google Workspace - SAML My Page SSO Configuration - RSA Ready Implementation Guide 27Number of Views Google Workspace - RSA Ready Implementation Guide 58Number of Views What causes: SAMLException: No assertion associated with artifact 12Number of Views FIM 2.5: 'local user name attribute value not found in X.509 name' 7Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?