Introduction
This guide provides information on how to:
- Set up Beyond Identity as a passwordless authentication solution for your Google Workspace environment.
- Set up Google Workspace to use Beyond Identity as an Identity Provider.
Before you begin
This section enumerates some items you should be aware of before configuring Google as an SSO provider with Beyond Identity.
- Users who are administrators in Google Workspace cannot use IdP Delegation and must always use their Google password as their primary factor of authentication.
- Multi-Factor options are limited in Google Workspace in comparison to most SSO providers. Beyond Identity cannot be used as a multi-factor step-up option for continuous authentication.
- Google does not currently support Beyond Identity for SCIM provisioning. The Beyond Identity team is currently working to get the BI solution into the Google Marketplace to enable this functionality.
Prerequisites
Ensure that you have the following:
-
A Google Administrator account to
- Add/edit users into Google Directory
- Add/edit Identity Providers in Security > Authentication > Set up single-on (SSO) with a 3rd party IdP
Beyond Identity Configuration
Information to provide to the Beyond Identity Field Team:
Your Company Name | |
Beyond Identity Admin Console Application credentials SSO URL SSO Entity ID SSO X.509 Signing Certificate |
|
Beyond Identity User Console Application credentials SSO URL SSO Entity ID SSO X.509 Signing Certificate |
|
(Optional) A logo for your corporation Logo requirements: 300 x 150 pixels or less File size of 10kb or less File types accepted: SVG, PNG, JPG, or GIF |
Information you will receive from the Beyond Identity Field Team:
Beyond Identity Admin Console SAML URLs: Identifier/Entity ID Reply / ACS URL Start URL |
[From Beyond Identity SE] https://admin.byndid.com/auth/saml/<Conn-ID>/sso/metadata.xml https://admin.byndid.com/auth/saml/<Conn-ID>/sso https://admin.byndid.com/auth/?org_id=<bi-tenant-name> |
Beyond Identity Org ID / Tenant Name | [From Beyond Identity SE] |
SCIM API endpoints |
Beyond Identity Configuration
To configure Beyond Identity as the IdP in Google, follow the steps below. Once these steps are taken, you will be ready to enable Beyond Identity for test users.
- Create Groups for Beyond Identity Admins & Test users
- Configure Beyond Identity Admin Console & User Console as Service Provider Apps
-
Set up GOOGLE DIRECTORY Groups
Beyond Identity service assignment is required for IT Admin and End Users. The following steps describe how to create BI_Admins, and BI_Users groups and assign users to those groups.
- Login to Google WorkSpace admin console as an Administrator.
- On the homepage of the Google Workspace Admin console, select Directory > Groups.
- On the Groups page click on “Create group”.
- Create a new Beyond Identity Admins group by selecting the following parameters.
- Name: BI_Admins
- Group Email: bi_admins@<customer-domain-name>
- Description: Beyond Identity Admins
- Group Owner: Select Appropriate member as the group owner.
- Check Security label checkbox
- Click on “Next” to create this group.
-
On the “Group Settings” Page set following parameters:
- Deselect all permissions from “External”, “Entire Organization” and “Group Members” Columns.
- Only “Group Owners” & “Group Manager” should have permissions for Access Settings and Membership settings.
- Who Can join the group: Only Invited Users
- Click “Next” to create this group.
- Add members to the “BI_Admins” group.
- On the Groups page click on “Create group”.
- Create a new Beyond Identity Users group by selecting the following parameters.
- Name: BI_Users
- Group Email: bi_users@<customer-domain-name>
- Description: Beyond Identity Users
- Group Owner: Select Appropriate member as the group owner.
- Check Security label checkbox
- Click on “Create Group”.
-
On the “Group Settings” Page set following parameters:
- Deselect all permissions from “External”, “Entire Organization” and “Group Members” Columns.
- Only “Group Owners” & “Group Manager” should have permissions for Access Settings and Membership settings.
- Who Can join the group: Only Invited Users
- Click on “Create Group”.
- For both BI_Admins and BI_Users group, click on group name and then group information dropdown. Click to edit the labels and ensure “Security” is checked. (There may be additional labels in there.)
l
-
Google SSO Information for Beyond Identity APPS
- Login to Google WorkSpace admin console (https://admin.google.com) as an Administrator.
- On the homepage of the Google Workspace Admin console, select Security -> SSO with SAML Applications.
- Please note SSO URL, and Entity ID and download certificate or Download Metadata file.
-
Setup Admin Console Access in Beyond Identity Support Console
- Provide “SSO URL”, “Entity ID” and “SAML Signing Certificate” or “IdP Metadata” file collected from the previous step to the Beyond Identity field team. The Beyond Identity team will collect and populate those values using Beyond Identity Support Console.
-
Beyond Identity Field Team: Please configure following fields through Beyond Identity Support Console while updating Admin Console SSO Configuration.
- Click on “Add SAML SSO”
- Upload XML file from the previous step or populate the following fields.
- Name: Google SSO
- IdP Url: https://accounts.google.com/o/saml2/idp?idpid=xxxxx (Provided by the customer as SSO URL)
- IdP Entity Id: https://accounts.google.com/o/saml2?idpid=xxxx (Provided by the customer as Entity ID)
- Name ID Format: emailAddress (select from the pull-down menu)
- Subject User Attribute: UserName
- Request Binding: http redirect
- Upload the Certificate (Base64)
- Please note “SP Single Sign-on URL” and “SP Issuer” field and provide to the customer. This information will be needed in the next step.
-
Setup Beyond Identity Admin Console Application in Google
- On the homepage of the Google Workspace Admin console, select Apps > Web and Mobile Apps
- Select ‘Add App’, and on the drop down, select ‘Add custom SAML app’
-
Name the application and App icon as follows:
- App Name: “Beyond Identity Admin Console”
- App icon: Upload Beyond Identity Logo provided by Beyond Identity field team.
- Click on the “Continue” button in the lower right corner to go to the next step.
- On the Google Identity Provider Details tab Click on the “Continue” button in the lower right corner to go to the next step.
-
On the Service Provider Details tab populate following fields.
- ACS URL: (e.g. https://admin.byndid.com/auth/saml/<Connection-ID>/sso) Enter value provided by Beyond Identity Field team.
- Entity ID: (e.g. https://admin.byndid.com/auth/saml/<Connection-ID>/sso/metadata.xml) Enter value provided by Beyond Identity Field team.
- Start URL: https://admin.byndid.com/auth/?org_id=<BI_Tenant_Name> (Replace BI_Tenant_Name with value provided by BI Field team)
- Ensure Signed Response is unchecked
- Certificate: from pull down select Google certificate used to sign assertion.
- Name ID Format: EMAIL (select from pull down menu)
- Name ID: Basic Information > Primary email (select from pull down menu)
- Click on the “Continue” button in the lower right corner to go to the next step.
- On the “Attribute mapping” tab Select ‘Finish’. There is no need to map any attributes.
-
On the Beyond Identity Admin Console App’s page under “user access” click on the down arrow to configure “service status”.
- Under Organization Units, select “Off for everyone”.
- Under Groups search for “BI_Admins” group and set “Service Status” to ON.
- Click on Save.
- After these values are provisioned, login and confirm that the admin (user from the BI_Admins group) can login to the Beyond Identity Admin Console (https://admin.byndid.com)
-
Setup Beyond Identity User Portal Authentication
- Once logged into Beyond Identity Support Portal UI, click on Settings -> SSO -> User Console SSO Integration and click on Edit.
-
Please configure the following fields for User Console Authentication.
- Click on “Add SAML SSO”
- Click on “Upload XML” or populate the following fields as shown below.
- Name: Google SSO
- IdP Url: https://accounts.google.com/o/saml2/idp?idpid=xxxxx (Provided by the customer as SSO URL)
- IdP Entity Id: https://accounts.google.com/o/saml2?idpid=xxxx (Provided by the customer as Entity ID)
- Name ID Format: emailAddress (select from the pull-down menu)
- Subject User Attribute: UserName
- Upload the Certificate (Base64) (Provided by the customer as Entity ID)
- Click on Save Changes.
- Please note “SP Single Sign-on URL” and “SP Issuer” field which is required in Step-6.6.
-
Setup Beyond Identity User Console Application in Google
- Login to Google WorkSpace admin console (https://admin.google.com) as an Administrator.
- On the homepage of the Google Workspace Admin console, select Apps > Web and Mobile Apps
- Select ‘Add App’, and on the drop down, select ‘Add custom SAML app’
-
Name the application and App icon as follows,
- App Name: “Beyond Identity User Console”
- App icon: Upload Beyond Identity Logo provided by Beyond Identity field team.
- Click on the “Continue” button in the lower right corner to go to the next step.
- On the Google Identity Provider Details tab Click on the “Continue” button in the lower right corner to go to the next step.
-
On the Service Provider Details tab perform populate following fields.
- ACS URL: (e.g. https://user.byndid.com/auth-user/saml/<connection-id>/sso) Enter value provided by Beyond Identity Field team.
- Entity ID: (e.g. https://user.byndid.com/auth-user/saml/<connection-id>/metadata.xml) Enter value provided by Beyond Identity Field team.
- Start URL: https://user.byndid.com/auth-user/?org_id=<BI_Tenant_Name> (Replace BI_Tenant_Name with value provided by BI Field team)
- Certificate: from pull down select Google certificate used to sign assertion.
- Name ID Format: EMAIL (select from pull down menu)
- Name ID: Basic Information > Primary email (select from pull down menu)
- Click on the “Continue” button in the lower right corner to go to the next step.
- Ensure that “Signed response” is turned off
- On the “Attribute mapping” tab Select ‘Finish’. There is no need to map any attributes
- On the Beyond Identity User Console App’s page under “user access” click on the down arrow to configure “service status”.
- Under Organization Units, select “Off for everyone”.
- Under Groups search for “BI_Users” group and set “Service Status” to ON.
- Click on Save.
-
Setup Beyond Identity Service for USER AUTHENTICATION
- Once logged into Beyond Identity Admin Console UI, click on “Integrations” tab and then click on “SAML”.
-
Click on “Add SAML Connection” and update the fields as following:
- Name: Beyond Identity IdP
- SP Single on URL: https://www.google.com/a/<google-domain-name>/acs (Replace google domain name with customer’s domain name. e.g. zeropw.app
- SP Audience URI: https://google.com
- Name ID Format: emailAddress
- Subject User Attribute: UserName
- Request Binding: http-redirect
- Signed Response: Signed
- Authentication Context Class: x509
- Click on “Save Changes”.
-
Note down the following fields from the recently created SAML Connection. This will be required in the next step.
- IdP Id (Beyond Identity Connection ID)
- IdP Single Sign-On URL: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso
- IdP Issuer: https://auth.byndid.com/saml/v0/<BI-Connection-ID>/sso/metadata.xml
- Download IdP Signature Certificate
-
SETUP Beyond Identity as a 3rd Party IdP in the Google Admin Console
-
In the Google Admin Console, on the top left menu drop down, select Security > Authentication -> SSO with third party IdP -> Third-Party SSO Profile
- Click “Add SSO Profile”
- Enable “Set up SSO with third party Identity Provider”.
- Update “Sign-In page URL” field with “IdP Single Sign-On URL” from the previous step.
- Leave the sign-out page as https://www.google.com (unless there is another preferred sign-out page)
- Select ‘REPLACE CERTIFICATE’ and upload the IdP certificate you uploaded from the Beyond Identity Admin console in the previous step.
- Click “Save”
-
In the Google Admin Console, on the top left menu drop down, select Security > Authentication -> SSO with third party IdP -> Manage SSO Profile Assignments.
- For the top Organization Unit select SSO Profile assignment as follows.
- SSO Profile Assignment: None (User Sign in with Google)
- Click on Save.
-
In the Google Admin Console, on the top left menu drop down, select Security > Authentication -> SSO with third party IdP -> Manage SSO Profile Assignments.
- Under Groups select “BI_Users” group.
- For the “Manage SSO Profile Assignments” select “Organization's third-party SSO profile”
- Click on Override.
-
In the Google Admin Console, on the top left menu drop down, select Security > Authentication -> SSO with third party IdP -> Domain-specific Service URLs.
- Click “Require users to enter their username on Google’s sign-in page first”.
- Click “Save”.
-
In the Google Admin Console, on the top left menu drop down, select Security > Authentication -> SSO with third party IdP -> Third-party SSO Profiles
- Click on Beyond Identity
- Copy SP Details Entity ID and SP Details ACS URL.
- Go to Beyond Identity Admin Console configuration Step 7.2 and modify SP SSO URL and SP Audience URI and Save the changes.
Note: SP Entity ID from Google goes in the SP Audience URI field in BI and SP ACS URL from Google goes in the SP SSO URL field in BI (these values are in opposite order in the 2 screens).
-
Configure SCIM for User & Group Provisioning
Google Workspace does not support SCIM for non-gallery applications currently. We are working with Google to enable this feature for Beyond Identity.
-
Turn on 2-step verification (Optional)
If you wish to turn on 2-step verification in addition to BI passwordless, here are the steps:
- First, turn on 2-step verification for the Admin account by going to Account > Security settings.
- As an end-user, turn on 2-step verification for one of the users by going to Account > Security settings.
- As an Admin, go to Authentication > 2-step verification, select correct OU, select "Allow users to turn on 2-Step Verification", Enforcement "on", select other options as desired, SAVE
- As an Admin, go to Login Challenges > Select Correct OU, Post SSO verification, select "Logins using SSO are subject to additional verifications (if appropriate) and 2-Step Verification (if configured)", OVERRIDE.
- Test.
-
Setting up test users
10.1 User Enrollment
- To enroll a user in the Beyond Identity experience, assign the user to the “BI_Users” Group.
- Click on Directory -> Groups
- Select the “BI_Users” group.
- Click on “Add Members”.
- Find Users and assign them to this group.
- Click “Add to Group”.
-
Create Users in Beyond Identity Directory with following Parameters:
- External ID (e.g. same as username)
- Username
- Display Name
-
Enrolled users will receive an email from Beyond Identity welcoming them to the new Identity Provider.
- See image below for reference:
-
Each enrolled user will be asked to follow the two steps below:
-
Step 1: Download the Beyond Identity Authenticator to their device.
- When the user clicks “View Download Options”, the Beyond Identity Authenticator downloads page will open in a browser with all supported platforms displayed. The user should download and install the Beyond Identity Authenticator on their device if they have not already.
- Now that the user has the Authenticator installed on their device, they should proceed to Step 2 as there is not yet a user credential associated with the Authenticator on that device.
- Step 2: Register their Credential in the Beyond Identity IdP.
- By clicking on Step 2 “Register New Credential”, the user’s credential will get enrolled in the Beyond Identity service on the back end. On the front end, users who click Step 2 will be taken to the Beyond Identity Authenticator where they will see the progress of their credential registration. Once completed, the user will see the credentials in the Authenticator.
- See example image below:
-
Step 1: Download the Beyond Identity Authenticator to their device.
10.2 User Authentication (Signing in)
- Each enrolled user can visit any application supported by your SSO to sign into their corporate applications.
- The SSO-supported application will ask the user to enter their username.
- Once the username is submitted, a prompt to use or open the Beyond Identity app for authentication will display for the user.
- The user should click affirmatively on the prompt to be signed into their application, without the use of a password. The Beyond Identity app along with a success notification will display.
10.3 User Deprovisioning
- To deprovision a user from the Beyond Identity experience, remove the user from the “BI_Users” Group.
- Click on Directory -> Groups
- Select the “BI_Users” group.
- Click on “Manage Members”.
- Click on the “-” sign next to the user's name in the column titled “Members”.
- Click “Remove Members”.
-
To remove or suspend users from Beyond Identity cloud, login to the admin console and go to the Users tab.
- Select the user by clicking on their name.
- Once on the user specific page, click deactivate to suspend the user or “Delete User” to permanently delete the user from Beyond Identity cloud.
Comments
0 comments
Please sign in to leave a comment.