Google Workspace SSO
This guide walks you through setting up SAML Single Sign-On between Google Workspace (formerly G Suite) and Probo.
Prerequisites
Section titled “Prerequisites”- Google Workspace administrator access
- Probo organization administrator access
- Your Probo domain (e.g.,
probo.example.com) - Access to your DNS settings for domain verification
Prepare Probo Information
Section titled “Prepare Probo Information”Before configuring Google Workspace, gather these Probo service provider details:
| Field | Value |
|---|---|
| ACS URL | https://your-probo-domain.com/auth/saml/acs |
| Entity ID | https://your-probo-domain.com/auth/saml/metadata |
| Start URL | https://your-probo-domain.com (optional) |
Replace your-probo-domain.com with your actual Probo domain.
Domain Verification
Section titled “Domain Verification”Before configuring anything else, you must verify domain ownership:
- Log in to Probo as an organization administrator
- Go to Organization Settings → Authentication → SAML
- Click Verify Domain (if no configurations exist yet, this option will be available)
- Copy the provided TXT record value
- Add a TXT record to your domain’s DNS settings:
Type: TXTName: _probo-domain-verification.your-company.comValue: [Verification token from Probo]TTL: 300 (or your DNS provider's default)
- Wait for DNS propagation (usually 5-15 minutes)
- In Probo, click Complete Verification
- If successful, the domain status will show as “Verified”
Configure Google Workspace
Section titled “Configure Google Workspace”-
Sign in to the Google Admin Console
-
Go to Apps → Web and mobile apps
-
Click Add app → Add custom SAML app
-
Configure the app details:
Field Value App name ProboDescription Probo Compliance Management PlatformUpload logo Download from GitHub (optional) -
Click Continue
-
Save the Google Identity Provider details that appear (you’ll need these for Probo configuration):
Field Example Value Notes SSO URL https://accounts.google.com/o/saml2/idp?idpid=XXXXXXXXXCopy this exact URL Entity ID https://accounts.google.com/o/saml2?idpid=XXXXXXXXXCopy this exact URL Certificate X.509 Certificate text Download the certificate or copy the X.509 certificate text -
Click Continue
-
Configure the service provider details:
Field Value ACS URL https://your-probo-domain.com/connect/saml/consumeEntity ID https://your-probo-domain.com/connect/saml/metadataStart URL [SAML Configuration ID](optional - see note below)Name ID format EMAILName ID Basic Information > Primary emailImportant: The Start URL is optional but if you want to support IdP-initiated login flows, it MUST be set to your exact SAML configuration ID (not a placeholder). If set incorrectly, SSO will not work. You’ll get this ID after creating the SAML configuration in Probo.
-
Click Continue
-
Configure the attribute mappings:
Google Directory attributes App attributes Basic Information > Primary email emailBasic Information > First name firstNameBasic Information > Last name lastName -
Click Finish
-
In the app list, click on your Probo app
-
Click User access
-
Select ON for everyone or configure specific organizational units
-
Click Save
Configure Probo
Section titled “Configure Probo”-
Log in to Probo as an organization administrator
-
Go to Organization Settings → Authentication → SAML
-
Click Add SAML Configuration
-
Configure the basic settings:
Field Value Notes Email Domain your-company.comYour organization’s email domain Enforcement Policy OPTIONALRecommended for initial setup -
Configure the Identity Provider settings with values from Google Workspace:
Field Value Notes IdP Entity ID https://accounts.google.com/o/saml2?idpid=XXXXXXXXXCopy from Google Workspace setup IdP SSO URL https://accounts.google.com/o/saml2/idp?idpid=XXXXXXXXXCopy from Google Workspace setup IdP Certificate [X.509 Certificate text]Paste the certificate from Google -
Configure the attribute mappings:
Field Value Notes Email Attribute emailMaps to user email First Name Attribute firstNameMaps to user first name Last Name Attribute lastNameMaps to user last name Role Attribute [Leave empty]Unless you’ve configured custom attributes -
Configure user settings:
Field Value Notes Auto Signup EnabledAllows new users to sign up automatically via SSO -
Click Save Configuration (the configuration will be created but not yet enabled)
-
Copy the SAML Configuration ID - you’ll see a unique configuration ID (e.g.,
saml_config_1a2b3c4d) that you’ll need for updating the Start URL in Google Workspace
Update Google Workspace Start URL
Section titled “Update Google Workspace Start URL”Now that you have the SAML configuration ID from Probo:
- Return to Google Admin Console
- Go to Apps → Web and mobile apps → Probo
- Click SAML attribute mapping
- Update the Start URL field with your SAML configuration ID (e.g.,
saml_config_1a2b3c4d) - Click Save
This enables IdP-initiated login flows, allowing users to click on Probo from their Google Workspace app launcher.
Troubleshooting
Section titled “Troubleshooting””App isn’t verified” Error
Section titled “”App isn’t verified” Error”- Cause: Google Workspace app not enabled for users
- Solution: Enable the app for all users or specific organizational units in Google Admin Console
”Access blocked” Error
Section titled “”Access blocked” Error”- Cause: User not in allowed organizational units
- Solution: Check Google Workspace user access settings and ensure users are in the correct organizational units
”Invalid SAML Response” Error
Section titled “”Invalid SAML Response” Error”- Cause: Incorrect ACS URL or Entity ID configuration
- Solution: Verify URLs match exactly between Google Workspace and Probo:
- ACS URL:
https://your-probo-domain.com/connect/saml/consume - Entity ID:
https://your-probo-domain.com/connect/saml/metadata
- ACS URL:
Attributes Not Mapping
Section titled “Attributes Not Mapping”- Cause: Incorrect attribute names in Probo configuration
- Solution: Use exact attribute names:
email,firstName,lastName
Debugging Steps
Section titled “Debugging Steps”Check Google Workspace Logs
Section titled “Check Google Workspace Logs”- Go to Google Admin Console → Reporting → Audit and investigation → SAML apps
- Look for failed authentication attempts
- Check error messages and timestamps for debugging clues
Verify Certificate Format
Section titled “Verify Certificate Format”Ensure the certificate is properly formatted without line breaks:
-----BEGIN CERTIFICATE-----[Certificate content without line breaks]-----END CERTIFICATE-----Test Metadata URL
Section titled “Test Metadata URL”If using metadata URL, test it in a browser to ensure it returns valid XML:
https://accounts.google.com/o/saml2/idp?idpid=XXXXXXXXXShould return valid XML metadata response.
Advanced Configuration
Section titled “Advanced Configuration”Custom Attributes
Section titled “Custom Attributes”To map additional Google Workspace attributes:
- In Google Admin Console, go to Directory → Users
- Add custom attributes to user profiles
- In Probo SAML configuration, map these custom attributes
Multiple Domains
Section titled “Multiple Domains”To support multiple email domains:
- Create separate SAML configurations for each domain
- Use the same Google Workspace IdP settings
- Verify each domain separately
Organizational Units
Section titled “Organizational Units”Restrict SSO to specific organizational units in Google Workspace:
- In the Probo app settings, select Limited access
- Choose specific organizational units
- Only users in those units will be able to use SSO