Need Help? We are right here!
Thanks for your Enquiry. Our team will soon reach out to you.
If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com
Search Results:
×miniOrange Identity Broker service solution enables cross protocol authentication. You can configure Google Workspace as an IDP for Single Sign-On (SSO) into your applications/websites. Here, Google Workspace will act as an Identity Provider (IDP) and miniOrange will act as a broker.
We offer a pre-built solution for integrating with Google Workspace, making it easier and quick to implement. Our team can also help you set up Google Workspace as SAML or OIDC IDP to login into your applications.
miniOrange offers free help through a consultation call with our System Engineers to configure SSO for different apps using Google Workspace as an IDP in your environment with 30-day free trial.
For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.
Please make sure your organisation branding is already set under Customization >> Login and Registration Branding in the left menu of the dashboard.
Mentioned below are steps to configure Google Workspace as IDP via SAML and OAuth configuration. Follow the steps accordingly based on your requirement (SAML, OAuth and Social login).













Follow the steps to configure Google Workspace as IdP by OAuth configuration.






























| IDP Entity ID | Entity ID of IDP |
| Single Sign-On (SSO) URL | Login Url from IDP |
| Single Logout (SLO) URL | Logout Url from IDP |
| X.509 Certificate | The public key certificate of your IDP. |
| Domain Mapping | Limit this IdP to specific email domains (comma-separated, e.g. example.com,partner.org). Leave blank to allow all domains. |
| SSO Binding | SAML request binding: how the authentication request is sent to the IdP (commonly HTTP-POST or HTTP-Redirect, depending on the dropdown selection). |
| NameId Format | Format of the SAML NameID in assertions; choose the value that matches Google Workspace and your applications. |
| Override Return URL | When SSO is IdP-initiated and no RelayState is received, override the default return URL with a custom one. |
| Sign SAML request | Enable signing of SAML authentication requests from miniOrange to this IdP. |

| Enable for EndUser Login | Allow end users to log in with this IdP using the SSO link. |
| Show IdP to Users | Show this IdP in the SSO discovery flow (after the user enters username or email). |
| Prompt for User Registration | On first login with this IdP, prompt the user to register in miniOrange if they do not already exist. |

Note: Follow the steps below to configure OAuth for Social Login as well.
| Display Name | Choose appropriate Name |
| OAuth Callback URL | URL where the IDP redirects users after successful authentication. |
| Client ID | From step 1 (in OAuth section) |
| Client secret | From step 1 (in OAuth section) |
| Scope | email public_profile |




You can follow this guide, if you want to configure SAML/WS-FED, OAuth/OIDC, JWT, Radius etc
Note: The customer configure attribute mapping for social login only when he/she has used his/her client credentials.

Maps information, such as email and username, during Just-In-Time (JIT) user creation. Email and Username attributes are necessary to create the user profile.

EXTERNAL mappings help alter incoming attribute names before sending them to apps, ensuring that the data is in the correct format.

You can follow this guide, if you want to configure multiple IDPs (Identity Providers) and give users the option to select the IDP of their choice to authenticate with.