You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/google-apps-tutorial.md
+3-6Lines changed: 3 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: tutorial
17
-
ms.date: 09/17/2019
17
+
ms.date: 09/23/2019
18
18
ms.author: jeedes
19
19
20
20
ms.collection: M365-identity-device-management
@@ -133,9 +133,6 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
133
133
| `https://google.com` |
134
134
| `https://google.com/a/<yourdomain.com>` |
135
135
136
-
> [!NOTE]
137
-
> These values are not real. Update these values with the actual Sign-On URL and Identifier. G Suite doesn't provide Entity ID/Identifier value on Single Sign On configuration so when you switch off the **domain specific issuer** option in the G Suite configuration section, the Identifier value will be `google.com`. If you switch on **domain specific issuer** option in the G Suite configuration section, it will be `google.com/a/<yourdomainname.com>`. For more information contact [G Suite Client support team](https://www.google.com/contact/).
138
-
139
136
1. On the **Basic SAML Configuration** section, if you want to configure for the **Google Cloud Platform** perform the following steps:
140
137
141
138
a. In the **Sign-on URL** textbox, type a URL using the following pattern: `https://www.google.com/a/<yourdomain.com>/ServiceLogin?continue=https://console.cloud.google.com`
@@ -150,7 +147,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
150
147
| `https://google.com/a/<yourdomain.com>` |
151
148
152
149
> [!NOTE]
153
-
> These values are not real. Update these values with the actual Sign-On URL and Identifier. G Suite doesn't provide Entity ID/Identifier value on Single Sign On configuration so when you switch off the **domain specific issuer** option in the G Suite configuration section, the Identifier value will be `google.com`. If you switch on **domain specific issuer** option in the G Suite configuration section, it will be `google.com/a/<yourdomainname.com>`. For more information contact [G Suite Client support team](https://www.google.com/contact/).
150
+
> These values are not real. Update these values with the actual Sign-On URL and Identifier. G Suite doesn't provide Entity ID/Identifier value on Single Sign On configuration so when you uncheck the **domain specific issuer** option the Identifier value will be `google.com`. If you check the **domain specific issuer** option it will be `google.com/a/<yourdomainname.com>`. To check/uncheck the **domain specific issuer** option you need to go to the **Configure G Suite SSO** section which is explained later in the tutorial. For more information contact [G Suite Client support team](https://www.google.com/contact/).
154
151
155
152
1. Your G Suite application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but G Suite expects this to be mapped with the user's email address. For that you can use **user.mail** attribute from the list or use the appropriate attribute value based on your organization configuration.
156
153
@@ -244,7 +241,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
244
241
245
242
e. In G Suite, for the **Verification certificate**, upload the certificate that you have downloaded from Azure portal.
246
243
247
-
f. Select **Use a domain specific issuer**. If you select the **Use a domain specific issuer** option, you need to enter domain specific **Identifier** like `https://google.com/a/<yourdomain.com>` or if you do not select the **Use a domain specific issuer** option, then enter `google.com` as **Identifier** value in the **Basic SAML Configuration** section in the Azure AD.
244
+
f. Check/Uncheck the **Use a domain specific issuer** option as per the note mentioned in the above **Basic SAML Configuration** section in the Azure AD.
0 commit comments