This article describes how to enable multi-factor authentication to the G-suite applications from Google. The configuration is done in two steps: first in Smart ID Digital Access component, and then in Google admin console.
Deployed Digital Access component, see Deploy Digital Access component
User accounts and authentication methods configured. See also: Set up Smart ID authentication.
Access rule (called for example Google Apps) set up that requires strong authentication, with for example Smart ID Mobile App as authentication method.
Details for SAML federation:
Signing certificate for the SAML identity provider
EntityID for the service provider and identity provider
Redirect URL for the service provider
Configure G-Suite in Digital Access
In Digital Access, do the settings needed for the G-suite applications from Google.
Log in to Digital Access Admin with an administrator account.
Go to Manage system > Certificates
Scroll down to Registered Server Certificates
Verify that the certificate to be used is available, for example:
Go to Manage Resource Access > SAML Federation.
Click Add SAML Federation...
Enter a Display Name, for example
Check Acting as Identity Provider.
Uncheck Import metadata automatically, since Google doesn’t use metadata as service provider.
Go to the Export tab.
Give a unique Entity ID: for example
Select the Signing Certificate, for example
Go to the Role Identity Provider tab.
Add a service provider, to tell Digital Access where the Google Service Provider is located:
Click Add Service Provider…
Verify that SAML 2.0 is checked. Click Next >
Do General Settings, for example enter a Display Name. The Entity ID must be unique within the federation. The Service Provider URL is where the IDP will redirect the user after successful authentication, so this must be an exact match with the google domain.
Example: General settings
Display Name: G Suite
Service Provider URL:
Click Next >
Set email as the unique identifier for the user, since that is what Google uses. This is used when Digital Access sends a SAML ticket to Google.
In Subject > Select source of subject: select E-mail. The Manage Access Rules window opens.
Select the already created access rule (for example called Google Apps), to define what authentication methods are allowed:
In Available Access Rules: select Google Apps, and click Add >
Click Finish Wizard to finish creating the Service Provider G Suite.
Click Add to add the SAML Federation
Click Publish to publish the updates.
The configuration in Digital Access is ready.
Configure in Google admin console
Set up Google to use Digital Access as a third-party identity provider.
Log in to Google admin console:
Go to https://accounts.google.com and log in with an administrator account.
Click Security, to go to the security settings.
Click Set up single sign-on (SSO).
Scroll down, and check Setup SSO with third party identity provider, where Digital Access is the third-party identity provider.
In Sign-in page URL, enter the URL to your Digital Access login page.
In Sign-out page URL, enter the URL to your Digital Access logout resource.
If you use a password-based authentication method: Enter the Change password URL to your Digital Access page for changing or resetting passwords.
Example Google SSO settings
Sign-in page URL: https://ag3.nexusville.com/wa/auth/saml/
Change password URL:
Upload your signing certificate, that is, the certificate that you use to sign the SAML ticket:
Verification certificate, click CHOOSE FILE.
Select (the public part of) the identity provider certificate, for example:
The configuration in the Google admin console is ready.