Setting Up Google Workspace SAML for Single Sign-On
PlaidCloud supports Single Sign-On (SSO) via SAML 2.0. This guide walks through configuring Google Workspace as a SAML identity provider so your organization's users can authenticate through Google when accessing PlaidCloud.
Prerequisites
- A Google Workspace account (Business Starter or higher)
- A Google Workspace account with the Super Admin role
- Contact with PlaidCloud support to coordinate the setup and exchange configuration values
Overview
The setup process involves two parties exchanging SAML metadata:
- You configure a custom SAML app in Google Workspace and provide PlaidCloud with your IdP Metadata URL.
- PlaidCloud provides you with the Service Provider (SP) Entity ID and ACS URL (Assertion Consumer Service URL) needed to complete your Google Workspace configuration.
Coordinate with PlaidCloud support to obtain the SP values before completing Step 3 below.
Step 1: Create a Custom SAML App
- Sign in to the Google Admin console as a Super Admin.
- Navigate to Apps > Web and mobile apps.
- Click Add app > Add custom SAML app.
- Enter a name for the app (e.g.,
PlaidCloud SSO) and optionally add a description and icon. - Click Continue.
Step 2: Retrieve the IdP Metadata URL
On the Google Identity Provider details screen, Google displays the identity provider information needed by PlaidCloud.
- Copy the SSO URL, Entity ID, and download the Certificate — or
- Click Copy next to the IDP metadata URL (formatted as
https://accounts.google.com/o/saml2/idp?idpid=XXXXXXXXX).
Send this IdP Metadata URL to PlaidCloud support. This is the Entity Descriptor URL that PlaidCloud needs to configure the trust relationship on the identity provider side. Once PlaidCloud receives this URL, the team will complete the Keycloak configuration and notify you when SSO is ready to test.
- Click Continue to proceed to the Service Provider configuration.
Step 3: Configure Service Provider Details
- In the ACS URL field, enter the ACS URL provided by PlaidCloud.
- In the Entity ID field, enter the SP Entity ID provided by PlaidCloud.
- Leave Start URL blank unless PlaidCloud support instructs otherwise.
- Set Name ID format to EMAIL.
- Set Name ID to Basic Information > Primary email.
- Click Continue.
Step 4: Configure Attribute Mapping
Google Workspace passes user attributes to PlaidCloud in the SAML assertion. At minimum, map the user's email address. If your PlaidCloud configuration uses group-based security role assignments, also map group membership.
Basic Attribute Mapping
Add the following attribute mappings on the Attribute mapping screen:
| Google Directory attribute | App attribute |
|---|---|
| Primary email | email |
| First name | firstName |
| Last name | lastName |
Click Add mapping to add each row.
Group Membership (Optional)
If you want PlaidCloud to automatically assign users to security groups based on their Google group membership:
- Click Add mapping.
- Under Google Directory attributes, select Group membership and choose the relevant Google Groups.
- Set the App attribute name to
groups(confirm the expected name with PlaidCloud support).
Click Finish.
Step 5: Enable the App for Users
By default, a new SAML app is disabled for all users. Enable it for the appropriate organizational units or groups.
- On the app detail page, click User access.
- Select the organizational unit or groups that should have SSO access to PlaidCloud.
- Set the service status to ON.
- Click Save.
Testing the Integration
After PlaidCloud confirms the configuration is complete:
- Navigate to your organization's PlaidCloud Workspace (e.g.,
https://my-workspace.plaid.cloud). - You will be redirected to the Google sign-in page.
- Sign in with your Google Workspace credentials.
- Upon successful authentication, you will be redirected back to PlaidCloud.
If you encounter errors, verify that:
- The SP Entity ID and ACS URL match exactly what PlaidCloud provided
- The user attempting to log in belongs to an organizational unit or group with the app enabled
- The Name ID format is set to EMAIL and mapped to Primary email
- The IdP Metadata URL you sent to PlaidCloud is accessible