Accounts hosted in Google Workspace (formerly known as G Suite, formerly known as Google Apps) can be used to authenticate to Service Providers (SPs) that are a member of SURFconext. This means that Google Workspace can be configured to play the role of a SAML 2.0 Identity Provider (IdP).

This page describes how to configure your Google domain for use as a SAML IdP in SURFconext, and what the possibilities and restrictions are.

It is assumed you already have a Google Workspace domain configured.If not you can find the basics about Google Workspace here : https://support.google.com/a/answer/3035792?hl=en&ref_topic=29157

Here, we will use example.edu as an example. 

Logon to your Admin console at https://admin.google.com/example.edu/Dashboard

Add a custom attribute category for SURFconext

  1. Select Users.
  2. Select Manage user attributes.
  3. Klick "ADD CUSTOM CATEGORY". 
  4. Enter "SURFconext" as the Custom category name and optionally a Description.
  5. For the following attributes, proceed as follows:
  6. For each of the attributes listed below: enter its Attribute name, leave Type to the default (Text), set Multiple values accordingly, and set Private to No

See also https://support.google.com/a/answer/6208725


Add users

  1. Back in the Users Control, click Add user.
  2. Enter First name, Last name, Primary email address.
  3. Click ADDITIONAL INFO.
  4. Optionally, enter Contact Information, and click NEXT.
  5. Optionally, enter Employee details, and click NEXT.
  6. Enter SURFconext attribute values, and click CREATE.


Add SURFconext as a SAML Service Provicer

  1. Click MORE CONTROLS.
  2. Select the Apps control.
  3. Select SAML apps.
  4. Click Enable SSO for a SAML Application.
  5. Click SETUP MY OWN CUSTOM APP.
  6. Download your IDP metadata (option 2). You will need to send this file to SURFconext support.
  7. Enter SURFconext as Application Name, and optionally a Description.
  8. Upload the logo of your organisation.
  9. For ACS URL, enter https://engine.surfconext.nl/authentication/sp/consume-assertion
  10. For Entity ID, enter https://engine.surfconext.nl/authentication/sp/metadata

  11. For Name ID Format, select PERSISTENT.
  12. For Attribute Mapping, add entries according to the table below:


SURFconext attribute nameattribute source
urn:mace:dir:attribute-def:givenNameFirst Name from Basic Information
urn:mace:dir:attribute-def:snLast Name from Basic Information
urn:mace:dir:attribute-def:mailPrimary Email from Basic Information
urn:mace:dir:attribute-def:eduPersonPrincipalNameidem from SURFconext category
urn:mace:terena.org:attribute-def:schacHomeOrganizationidem from SURFconext category
urn:mace:dir:attribute-def:uididem from SURFconext category

See also: https://support.google.com/a/answer/6087519


Send your SAML 2.0 Metadata to the SURFconext operations team

  • Contact SURFconext support at support@surfconext.nl and provide them with the metadata document so they can add this metadata as an IdP in a test environment.

Test the attributes as received by SURFconext

You can test this IdP as follows when you have connected your Google IdP to our Production Environment:

You can test this IdP as follows when you have connected your Google IdP to our Test Environment:

Troubleshooting

SAML audit log

SAML App Error Messages

SAML audit report

Known Issues

n/a

  • No labels