This comprehensive guide is designed to assist you in integrating ALMEFY as your Identity Provider (IdP) for Google Workspace, utilising SAML 2.0, enabling Single Sign-On (SSO). We'll walk you through the necessary steps to ensure a seamless and secure setup. Please also refer to the Google Workspace documentation for further details.
Prerequisites
- Admin access to your ALMEFY Hub at
\<subdomain>.hub.almefy.com
- A Goggle account with access to the Google Admin Console and super admin privileges.
Setup Overview
We try our best to keep these guides updated but can not anticipate when platforms might update interfaces, or change available options for configuring SSO.
Though setting up ALMEFY as your IdP generally follows the same steps for all platforms.
- Configure Endpoint – Set up the specific details of your endpoint in the ALMEFY Hub.
- Configure Platform – Adjust your platform’s settings for compatibility with the ALMEFY endpoint.
- Copy Metadata – Transfer the necessary metadata from your platform to the ALMEFY Hub for secure integration.
Each step corresponds to the options in the left column of the ALMEFY Hub interface.
If you find any inconsistencies in this guide, please let us know via our contact form.
Setup
Please note: the steps in the left column of the Endpoint Creation screen in the ALMEFY Hub correspond to the same as in this guide.
Step 1. ALMEFY SSO Endpoint Configuration
- Create a new Endpoint in the ALMEFY Hub by clicking the
Add Endpoint
button in the top right of theEndpoints
page. - Select the Google Workspace Preset
- (Optional) Rename the endpoint and the endpoint id if you do not want to use the default.
- Press the
Generate Certificate & Private Key
button or paste your own into the textboxes. - Keep the endpoint configuration options open and continue with Step 2.
Step 2. Google Workspace Configuration
More details can be found in the Google Workspace documentation.
- Sign in to your Google Admin console.
- In the Admin console, go to
Menu > Security > Authentication > SSO with third part IdP
. - In Third-party SSO profile for your organization, click
Add SSO profile
. - Check the
Set up SSO with third-party identity provider
box. - Enter
ALMEFY
as the name of the profile. - From the ALMEFY Hub
Step 2.
section copy theSSO URL
and paste it into theSign-in page URL
in the Google settings. - In the ALMEFY Hub, click the
Download X.509 Certificate
button of theStep 2.
section. - Click
Upload certificate
in the Google settings and select yourgoogle_workspace_saml_certificate.crt
file and click save. - In the
SP Details
section of the Google Admin Console, copy theACS URL
- Decide which users should use SSO. Click
Manage SSO profile assignments
. - Click
Get Started
orManage
- On the left, select the organizational unit or group to which you’re assigning the ALMEFY SSO profile.
- Choose ALMEFY for the selected OU or group.
- Click Save.
More details about the assignments can be found here
Step 3. Copy Workspace Metadata
- Navigate back to the ALMEFY Hub Endpoint creation page.
- Paste the copied value in to the
ACS URL
found in theStep 3.
section. - Click "Add Endpoint".
- You are done!
Test & Troubleshoot
To ensure that ALMEFY has been correctly set up as your Identity Provider (IdP), you can test the login in two ways:
- Platform Login Page: Visit Google's login page and check if the ALMEFY Login option is visible and functional by clicking on it and scanning the ALMEFY QR Code with the ALMEFY App.
- ALMEFY SSO Page: Go to
<subdomain>.sso.almefy.com
, sign in with the ALMEFY App, and choose your newly enabled endpoint to test the authentication process.
If you encounter any issues:
- Review this guide to make sure all steps were followed correctly.
- Consult the Google Workspace documentation for specific setup and troubleshooting instructions.
- Try to contact Google support and see if your issue can be resolved.
- If you still need help, please fill out our contact form for support.
Conclusion
Congratulations on successfully setting up SAML 2.0 authentication with ALMEFY as your Identity Provider! You are now equipped to offer users a secure and convenient single sign-on experience.