Need Help? We are right here!
Thanks for your Enquiry. Our team will soon reach out to you.
If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com
Search Results:
×miniOrange Identity Broker service solution enables cross protocol authentication. You can configure Google Workspace as an IDP for Single Sign-On (SSO) into your applications/websites. Here, Google Workspace will act as an Identity Provider (IDP) and miniOrange will act as a broker.
We offer a pre-built solution for integrating with Google Workspace, making it easier and quick to implement. Our team can also help you set up Google Workspace as SAML or OIDC IDP to login into your applications.
miniOrange offers free help through a consultation call with our System Engineers to configure SSO for different apps using Google Workspace as an IDP in your environment with 30-day free trial.
For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.
Please make sure your organisation branding is already set under Customization >> Login and Registration Branding in the left menu of the dashboard.
Mentioned below are steps to configure Google Workspace as IDP via SAML and OAuth configuration. Follow the steps accordingly based on your requirement (SAML, OAuth and Social login).














Follow the steps to configure Google Workspace as IdP by OAuth configuration.






























| IDP Entity ID | Entity ID of IDP |
| SAML SSO Login URL | Login Url from IDP |
| Single Logout URL | Logout Url from IDP |
| X.509 Certificate | The public key certificate of your IDP. |

| Domain Mapping | Can be used to redirect specific domain user to specific IDP |
| Show IdP to Users | Enable this if you want to show this IDP to all users during Login |
Note: Follow the steps below to configure OAuth for Social Login as well.
| Display Name | Choose appropriate Name |
| OAuth Callback URL | URL where the IDP redirects users after successful authentication. |
| Client ID | From step 1 (in OAuth section) |
| Client secret | From step 1 (in OAuth section) |
| Scope | email public_profile |




You can follow this guide, if you want to configure SAML/WS-FED, OAuth/OIDC, JWT, Radius etc
Note: The customer configure attribute mapping for social login only when he/she has used his/her client credentials.

Maps information, such as email and username, during Just-In-Time (JIT) user creation. Email and Username attributes are necessary to create the user profile.

EXTERNAL mappings help alter incoming attribute names before sending them to apps, ensuring that the data is in the correct format.

You can follow this guide, if you want to configure multiple IDPs (Identity Providers) and give users the option to select the IDP of their choice to authenticate with.