Last updated

Configure Google Workspace as a SAML SSO

Follow the steps to configure Google Workspace SAML SSO integration with Reunite.

Create an app in Google Workspace

  1. In the Google Workspace Admin panel, navigate to Apps > Web and mobile apps.
  2. Select Add app and choose Custom SAML app.
  3. Fill in the form:
    • App name: Redocly Reunite
    • (Optional) Description: provide a description for your app.
    • (Optional) Icon: upload an image as your app's icon.
  4. Click Continue.

Add a SAML 2 identity provider in Reunite

  1. In Reunite, navigate to your organization's Overview page.
  2. Select SSO and login in the navigation menu on the left side of the page.
  3. Click Add in the Guest or Corporate Identity Provider section.
  4. Select SAML2.
  5. Enter a name for your identity provider.
  6. Select the default Organization Role for users who log in with the identity provider.
  7. (Optional) Enter the name of the Default Team.
  8. In Single sign on URL, enter: https://auth.cloud.redocly.com/org/{your-organization-slug}/.
  9. In Issuer ID, enter the unique identifier of the identity provider.
  10. In x509 public certificate, paste the certificate from the identity provider.
  11. Click Save.

Configure attributes in Google Workspace to send to Reunite

  1. In the Google Workspace, in your app's configuration, in App attribute, enter: https://redocly.com/sso/teams.
  2. (Optional) Select groups to transmit to Reunite.
  3. (Optional) To preserve the Owner organization role for assigned users, create a group named redocly.owners and add users that have this organization role.

Resources

  • Learn more about the different IdP types in Reunite and how they apply to projects in the Single Sign-on concept.
  • Follow steps for how to Add an identity provider in Reunite.
  • If you have already added multiple IdP types in Reunite, you can Configure SSO to allow your users to use multiple IdP types for a project,
  • For more complex scenarios where you need to grant access to specific content for specific users, you need Role-based access control (RBAC).