Configure SAML2 with Google Workspace
Steps required for enabling SAML2 sign on for PlaceOS on Google Workspace
PlaceOS uses a Custom SAML App to provide integrated SSO via Google User Authentication. For detailed steps, see Google's guide on setting up SAML
PlaceOS requires:
Organization data
Organization path
Users full name
Email address
Unique identifier
You may need to map these as attribute claims.
Configuring PlaceOS
Parameters required from PlaceOS for Configuration:
ACS URL
Assertion Consumer Service. This is where google will send authentication responses with all the claim information.
Example: https://staffapp.placeos/auth/adfs/callback?id=adfs-XXXXX
Entity ID
The Entity ID is the Audience Restriction. It dictates the intended entity or audience for the SAML Assertion. This field is frequently referred to as the "Entity ID" or "Audience URI" by vendors. It can technically be any string of data up to 1024 characters long. Most commonly it's in the form of a URL that contains the Service Provider's name, and is often the same URL as the ACS.
Start URL
This the URL that will start the authentication flow.
Example: https://staffapp.placeos/auth/adfs?id=adfs-XXXXX
Metadata URL
You can provide this URL to Google to help with the setup process.
Example: https://staffapp.placeos/auth/adfs/metadata?id=adfs-XXXXX
Last updated