Skip to main content
Version: Next

Google Workspace SSO Setup

This guide walks through configuring SAML 2.0 single sign-on between Google Workspace and SyVault. You will need Google Workspace super admin access and SyVault Owner or Admin privileges.

Prerequisites

  • SyVault organization on a Business or Enterprise plan
  • Google Workspace account with super admin privileges
  • Your SyVault organization slug (found in Admin Console > Settings)

Step 1: Create a Custom SAML Application

  1. Sign in to the Google Admin Console at admin.google.com.
  2. Navigate to Apps > Web and mobile apps.
  3. Click Add app > Add custom SAML app.
  4. Enter SyVault as the app name and optionally upload a logo.
  5. Click Continue.

Step 2: Download Google IdP Metadata

On the Google Identity Provider details page, you will see:

  • SSO URL -- the Google SAML endpoint
  • Entity ID -- Google's issuer identifier
  • Certificate -- the X.509 signing certificate

Click Download Metadata to save the IdP metadata XML file. You will upload this to SyVault in Step 4. Click Continue.

tip

Save the metadata XML file in a secure location. You will need it again if you ever need to reconfigure the SyVault side of the integration.

Step 3: Configure Service Provider Details

On the Service Provider Details page, enter:

FieldValue
ACS URLhttps://api.syvault.com/api/auth/saml/acs
Entity IDsyvault:<your-org-slug> (e.g., syvault:acme-corp)
Start URLhttps://vault.syvault.com/login?sso=<your-org-slug>
Signed ResponseChecked
Name ID FormatEMAIL
Name IDBasic Information > Primary email

Click Continue.

Step 4: Configure Attribute Mapping

Add the following attribute mappings:

Google Directory AttributeApp Attribute
Primary emailemail
First namefirstName
Last namelastName

Click Finish to create the application.

Step 5: Enable the Application for Users

By default, the new SAML app is OFF for everyone. You need to turn it on:

  1. On the SyVault app page in Google Admin, click User access.
  2. Select ON for everyone to enable for all users, or click an organizational unit to enable for specific groups.
  3. Click Save.
warning

Changes to app access in Google Workspace can take up to 24 hours to propagate, though they typically take effect within minutes. Wait at least 15 minutes before testing if access was just enabled.

Step 6: Configure SyVault

  1. Open the SyVault Admin Console > SSO & SCIM > SAML SSO.
  2. Upload the IdP metadata XML file downloaded in Step 2.
  3. SyVault will extract the SSO URL, Entity ID, and X.509 certificate.
  4. Verify the extracted values and click Save Configuration.

Step 7: Test SSO Login

  1. In SyVault Admin Console, click Test Connection to perform a live SAML flow.
  2. Open an incognito browser window, navigate to the SyVault login page, click Login with SSO, and enter your organization slug.
  3. You should be redirected to Google's login page. Authenticate with your Google Workspace credentials.
  4. After successful authentication, you are returned to SyVault and prompted for your master password.

Troubleshooting

SymptomLikely CauseFix
"App is not configured for this user"App not enabled for the user's OUEnable the app for the correct organizational unit in Google Admin
"Invalid audience"Entity ID mismatchVerify the Entity ID in Google matches syvault:<org-slug>
"Signature validation failed"Certificate mismatchRe-download the metadata XML and re-upload to SyVault
403 Forbidden after Google loginUser not a SyVault memberInvite the user to SyVault or enable SCIM
Blank page after redirectACS URL wrongVerify the ACS URL is exactly https://api.syvault.com/api/auth/saml/acs
info

Google Workspace does not natively support SCIM provisioning for custom SAML apps. For automated user lifecycle management, consider using Google's Directory API with a middleware connector, or manage SyVault membership manually.