Google SAML Application Setup
Single sign-on (SSO) lets users sign in to all their enterprise cloud applications using their managed Google account credentials. In this scenario, your application will rely on Google to serve as an external Identity Provider (IdP).
This article shows how to create an Google SAML application.
A. Set up your own custom SAML app using Google
Note: You will need a Google super administrator account in order to complete the SAML app setup. If you don't already have one you can setup one by clicking on this link . Or you can go to https://admin.google.com/ for setup.
1. Google Administrator Account Setup: Once you have been setup with a Google super administrator account you can complete the following steps.
a. Click on the Google Apps icon
b. From the dropdown menu select "Admin"
2. Scroll down and select "Apps"
3. Select "Web and Mobile Apps"
4. Web and Mobile Apps:
a. Click "Add App"
b. From the dropdown menu select "Add Custom SAML App"
5. App Details
a. Enter an App Name: "My New SAML App" for this example
b. Click "Continue"
6. Click the "Continue" button
7. Service Provider Details: Copy the following into the associated fields:
a. ACS URL: https://ceaservices3.at-event.com/saml/SSO
b. Entity ID: https://ceaservices3.at-event.com/saml/metadata
c. Click the "Continue" button
8. Attribute Mapping: Click "Finish" button
9. User Access:
a. Current setting is "OFF for everyone". You will want to turn on access for people from your company.
b. Click "View Details"
10. Service Status
a. You have the option of creating separate groups where you can control SSO by using this group setting.
b. In this example we will group everyone together for All Organizational Units and select "ON for everyone"
c. Click "Save"
Note: Changes may take up to 24 hours to propagate to all users
11. Click "Download Metadata"
12. Click "Download Metadata"
With the downloaded XML file you will use this to activate SSO in atEvent.
B. Setup Single Sign-On (SSO) in atEvent
To setup SSO in atEvent you can now use the SAML metadata that you have created in Okta. Here is the article to complete SSO setup in atEvent.