This page describes configuring Google SSO for Lenses authentication.
1
Create a custom attribute for Lenses groups
Google doesn't expose the groups, or organization unit, of a user to a SAML app. This means we must set up a custom attribute for the Lenses groups that each user belongs to.
This will appear in the Google apps menu once the app is enabled
4
Configure SAML
Service provider details
Given the base URL of the Lenses installation, e.g. https://lenses-dev.example.com, fill out the settings:
Setting
Value
ACS URL
Use the base url with the callback path
e.g. https://lenses-dev.example.com/api/v2/auth/saml/callback?client_name=SAML2Client
Entity ID
Use the base url
e.g. https://lenses-dev.example.com
Start URL
Leave empty
Signed Response
Leave unchecked
Name ID format
Leave as UNSPECIFIED
Name ID
Leave as Basic Information > Primary Email
Attribute mapping
Add a mapping from the custom attribute for Lenses groups to the app attribute groups
Enable the app
From the newly added app details screen, select Useraccess
Turn on the service
Lenses will reject any user that doesn't have the groups attribute set, so enabling the app for all users in the account is a good option to simplify ongoing administration.
Download the Federation Metadata XML file with the Google IdP details.
5
Download SAML Certificates
Click Download Metadata and save the metadata file for configuring Lenses.Configure SAML in HQ.
6
Configure SAML in HQ
SAML configuration is set in HQ's config.yaml file. See here for more details.