Logz.io offers a quick integration for SSO with Google Workspace.
Request SSO access from Logz.io
Only account admins can request single sign-on access for their accounts.
To set up your Google Workspace SSO, you'll first need to email firstname.lastname@example.org and write that you want to set up Google Workspace SAML SSO for Logz.io.
Include these items in the message:
The Support team will respond with the connection information needed to set up your Google Workspace SSO.
Set a custom SAML app in Google Workspace
Log into your Google Workspace panel.
In the sidebar, navigate to Apps > Web and mobile apps. Click on Add app and choose the Add custom SAML app option.
Name your application and click Continue. In the Google Identity Provider details screen, copy the Entity ID and download the certificate.
Continue to the next screen. Enter the ACS URL and Entity ID given to you by Logz.io support; change the Name ID format to EMAIL, and set the Name ID to Basic Information > Primary email.
Continue to the final screen. Edit the Google Directory attributes to Basic Information - Primary email, and set App attributes to email.
Click on Finish to add the custom SAML app.
Send your SAML details to Logz.io
Draft a new email to Support, and include these items:
- Your zipped SAML Signing Certificate (from the previous step).
- Your SAML SIGN-IN URL.
When Support has received the information and created your Google Workspace + Logz.io connection, you’re done! You can start logging in to Logz.io through your Google Workspace account.
Google Workspace SSO groups
When creating access groups for Google Workspace, you need to add a custom attribute to connect it to your Logz.io SAML application.
First, add a custom attribute and link it to your SAML app.
Open your SAML app, navigate to the Add a new custom attribute section, and add the following configuration:
- Name: groups
- Info type: Text
- Visibility: Visible to user and admin
- Number of values: Multi-value
Next, configure the groups attribute to be sent across as part of the SAML login.