Configure Google Workspace to manage your directory of users in Cloud Secure Edge

  • Updated on Sep 11, 2025

Google Workspace IDP allows Google org users to sign into any of their apps using their managed Google account credentials. Cloud Secure Edge (CSE) integrates with Google Workspace IDP to authenticate users that need access to CSE-protected services.

Diagram

Pre-requisites

  • Admin access to Google Workspace and permissions to add a new SAML app.

Steps

1.1 Navigate from Settings > Identity and Access tab > End User tab. Under Provider Name, select Other and enter Google Workspace in the field below. Under Provider Protocol, select SAML.

Diagram

Diagram

1.2 Note the Redirect URL and the Entity Issuer provided in the configuration fields; these values will be required for the custom SAML app configuration in Google Workspace in Step 4.

2.1 Log into your Google Workspace Admin account.

2.2 In the Google Workspace Admin Console, navigate from Apps > Web and mobile apps > Add app > Add custom SAML app.

Diagram

Diagram

3.1 On the Add custom SAML app page, enter an App Name: use CSE TrustProvider.

Diagram

3.2 Select Continue.

3.3 Copy the SSO URL. This will be pasted in the CSE admin console, in your IDP config, under IDP Settings in the IDP SSO Url field).

Diagram

Diagram

3.4 Back in the Google Workspace Admin Console, copy or download the Google Certificate. This will be pasted or uploaded in the CSE admin console, in your IDP config, under IDP Settings in the IDP CA Certificate field.

Diagram

3.5 Back in Google Workspace Admin Console, select Continue.

4.1 Copy the Redirect URL value in CSE. Paste this value in the ACS URL field in Google (on your custom SAML app config, under Service provider details).

4.2 Copy the Entity Issuer value in CSE. Paste this value in the Entity ID field in Google (on your custom SAML app config, under Service provider details).

Diagram

5.1 In the Name ID format field, select EMAIL.

5.2 Select Continue.

6.1 Under Attributes, select ADD MAPPING.

6.2 Under Google Directory attributes, select Primary email. Map this to email under App attributes.

6.3 Select ADD MAPPING again: Under Google Directory attributes, select Last name. Map this to name under App attributes.

Diagram

6.4 Select FINISH.

Diagram

7.1 Select User access.

Diagram

7.2 Under Service Status, select ON for everyone. This will allow CSE to federate authentication of all users in your organization to your SAML IDP.

Diagram

7.3 Select SAVE.

8.1 Under IDP Settings, complete the attribute configurations: under Username, enter name; under Email, enter email; under Groups, enter groups.

Diagram

8.2 Save your configuration.