Google SSO SAML configuration
  • 23 Mar 2021
  • 2 Minutes to read
  • Contributors
  • Dark
  • PDF

Google SSO SAML configuration

  • Dark
  • PDF

To configure a Google SAML Single Sign-On with your project, first log in with you Google Workplace account (formerly G Suite). If you don’t have a Google Workplace account, create one by visiting The is used for Google Workspace accounts only. Regular Gmail accounts cannot be used to sign in to

Once you have logged in with your Google workplace account, click on the Admin console at the top (or) you use the link

Pro tip

As you would be connecting Google SAML SSO with your Document360 project, it would be easier to have both the pages in two different tabs/windows of your browser.

Adding a custom SAML app on Google

  1. In the admin console home page, click on the Apps option and select SAML apps option
  2. Click on Add app and in the dropdown select Add custom SAML app
  3. In the App details, enter any name for your app and click on Continue
  4. In Option 2, you would find the information like SSO URL, Entity ID, and Certificate
  5. This information has to be copied to Document360 SSO settings
  6. In the Certificate section click on the Download icon to save the certificate (.pem format) in your computer’s local storage.
  7. This certificate would be required to upload in your Document360 SSO settings page


  1. In User access the Service status would by default be OFF for everyone. You have to manually change it to ON for everyone for it to work.


Here's how your SAML app would look after you've configured on Google side.


Document360 SAML basic configuration

  1. Now in your Document360 portal, click on Settings, select Enterprise SSO
  2. In the SAML tab you would find Setup your application and SAML basic configuration sections
  3. In SAML basic configurations, add the info copied from Google custom SAML app page
Document360 SSO settings Info from Google custom SAML app
Email domains NA (The email domains you want to add for SSO)
Entity id Entity ID
Sign Out URL (Optional) NA
SAML Certificate Certificate (Upload the recent .pem file you downloaded from Google)
  1. When you're done click on Continue

Service Provider details

To configure single sign on, add service provider details such as ACS URL and entity ID.

  1. These details should be obtained from the Document360 Enterprise SSO page
  2. Go to Settings → Advanced → Enterprise SSO → SAML tab
  3. In the Setup your application section, copy the following parameters and paste in the Google custom SAML app page
Google custom SAML app Document360 SSO SAML settings
ACS URL Callback path
Entity ID Service provider entity Id
Start URL (optional)
  1. In Name ID format select EMAIL from the dropdown
  2. In Name ID select Basic Information > Primary email
  3. Click on Continue button


Add and select user fields in Google Directory, then map them to service provider attributes. Add the following attribute.

Google Directory attributes App attributes
Primary email name
Primary email email
Primary email urn:oasis:names:tc:SAML:2.0:nameid

Click on Add Mapping button each time you add an attribute and when you’re done click on the Finish button.

Was this article helpful?