Set up access to G-suite applications with Digital Access as identity provider
This article describes how to enable multi-factor authentication to the G-suite applications from Google. The configuration is done in two steps: first in Smart ID Digital Access component, and then in Google admin console.
Access rule (called for example Google Apps) set up that requires strong authentication, with for example Smart ID Mobile App as authentication method.
Details for SAML federation:
Signing certificate for the SAML identity provider
EntityID for the service provider and identity provider
Redirect URL for the service provider
Configure G-Suite in Digital Access
In Digital Access, do the settings needed for the G-suite applications from Google.
Log in to Digital Access Admin
Log in to Digital Access Admin with an administrator account.
Check certificate
Go to Manage system > Certificates
Scroll down to Registered Server Certificates
Verify that the certificate to be used is available, for example: idp-cert.
Add SAML federation
Go to Manage Resource Access > SAML Federation.
Click Add SAML Federation...
Enter a Display Name, for example Google IDP.
Check Acting as Identity Provider.
Uncheck Import metadata automatically, since Google doesn’t use metadata as service provider.
Go to the Export tab.
Give a unique Entity ID: for example https://nexusville.com/cloudidp.
Select the Signing Certificate, for example idp-cert.
Add service provider
Go to the Role Identity Provider tab.
Add a service provider, to tell Digital Access where the Google Service Provider is located: Click Add Service Provider…
Verify that SAML 2.0 is checked. Click Next >
Do General Settings, for example enter a Display Name. The Entity ID must be unique within the federation. The Service Provider URL is where the IDP will redirect the user after successful authentication, so this must be an exact match with the google domain.
Example: General settings
Display Name: G Suite Entity ID: google.com/a/nexusville.com Service Provider URL: https://www.google.com/a/nexusville.com/acs
Click Next >
Set email as the unique identifier for the user, since that is what Google uses. This is used when Digital Access sends a SAML ticket to Google. In Subject > Select source of subject: select E-mail. The Manage Access Rules window opens.
Select the already created access rule (for example called Google Apps), to define what authentication methods are allowed: In Available Access Rules: select Google Apps, and click Add >
Click Finish Wizard to finish creating the Service Provider G Suite.
Click Add to add the SAML Federation Google IDP.
Publish updates
Click Publish to publish the updates.
The configuration in Digital Access is ready.
Configure in Google admin console
Set up Google to use Digital Access as a third-party identity provider.