Learn how to configure Native Google Workspace SSO connections.
Create a Google Workspace Application
- Log in to the Google Developer API Console.
- Select Create Project.
- Fill in your project details, click Create
- Click Create Credentials.
- Click OAuth Client ID. Note that if this is your first time creating a client ID you may be prompted to also configure your consent screen. Learn More
- For application Type, select Web Application.
- Give the client a Name such as "Kandji".
- Input the following URI under Authorized redirect URIs.
- Click Create.
- Copy the Client ID from the new modal and save this for later use.
- Copy the Client Secret from the new modal and save this for later use.
Create a Google Workspace Connection
- Navigate to the Settings.
- Click the Access tab.
- Find the Authentication section. If that section does not currently exist, SSO is not enabled for your instance.
- Click the Add button on the bottom-left of the authentication table.
- In the new blade, click on the Google Workspace connection option.
- Customize or use the default Name for the Azure connection (this will be shown on the login page).
- Enter the Google Workspace Domain that the application is registered within.
- Enter the Client ID you previously copied from Azure AD.
- Enter the Client Secret you previously copied from Google Workspace.
- Click Save.
- After saving, a new dialogue box will appear with a link to authorize your connection. A Google Workspace administrator for your domain will need to click the link and complete this process to authorize the application. This box will not go away after authorization is completed.
- In the new window that launches, sign in, and click accept.
- After clicking Accept, you will be brought to an authorization success page.
- Your connection has now been successfully configured and may be enabled and tested.
Enable the SAML Connection
Once you have configured the SAML connection in both Kandji, and your identity provider, you can now enable the connection. Please refer to our Single Sign-On support article for step by step instructions.
Enforcing Single Sign-On
Once you have configured at least one Single Sign-On connection, you can disable the Standard Authentication connection. Disabling Kandji standard authentication will disable the ability for Kandji administrators in your instance to authentication via Email/Password, Google Sign in, or Office 365 Sign in. Please refer to our Single Sign-On support article for step-by-step instructions.