Configuring SGNL for SSO with Google Workspace

Prerequisites

  • A SGNL user with an Admin role
  • User accounts created in SGNL for any user wanting to perform SSO
  • An understanding of the ‘Authentication’ steps detailed for Google Workspace
  • A user with permissions in Google Workspace to configure OAuth Consent and an OAuth Client, as detailed in the above guide

Configuring Google Workspace

Google Workspace details the steps necessary to get going with Authentication for users in your Workspace domain, however we’ll cover them briefly in this guide for completeness

  1. As a first step, you’ll need to create a Google Cloud Project
  2. You’ll then need to configure the OAuth Consent Screen for your project
  3. Continue to configure your OAuth Scopes
  4. You need only two, non-sensitive scopes to integrate with SGNL, these are the /auth/userinfo.profile and openid scopes
  5. Verify your configuration and go back to the Dashboard
  6. Next, you should configure your OAuth Client, this will involve creating a new OAuth Client with the below suggested details:
  7. Save the configuration and download or save your Client Id and Client Secret, you’ll need these in a moment

Configuring SGNL

  1. In SGNL, using the navigation pane, browse to Admin → Security

  2. Test the connection to verify your configuration was successful

    Admin - SGNL

  3. Save your settings

Testing

  1. Once SSO is configured, that will be the only way to sign-in, so if you want to do additional testing beyond the Test Sign-In button, you can do so with a new browser window
  2. Browse to your SGNL Sign-On Page, e.g. https://console.sgnl.cloud/WholesaleChips
  3. Click to ‘Sign-in with your Identity Provider’, you will be redirected to your Identity Provider to authenticate
  4. After authentication, you should be redirected to SGNL and be signed-in, by default onto the dashboard