Skip to main content

SAML SSO with Google Workspace

This article describes how to set up SAML Single Sign-on for Semgrep AppSec Platform with Google Workspace, including how to set up the necessary attribute mappings.

This article describes how to set up SAML Single Sign-on for Semgrep AppSec Platform with Google Workspace, including how to set up the necessary attribute mappings.

Ensure that you are an admin for both your Semgrep deployment and your Google Workspace account.

Google Workspace configuration

  1. Set up a custom SAML app in Google Workspace. The default Name ID is the primary email, and this value is optimal for use with Semgrep AppSec Platform.
  2. When you reach the Add mapping step of the instructions to set up a custom SAML app, add the attribute statements that Semgrep AppSec Platform requires:
    NameValue
    iduser.login or user.email
    emailuser.email
    firstNameuser.firstName
    lastNameuser.lastName

Semgrep configuration

  1. Sign in to Semgrep AppSec Platform.
  2. Go to Settings > Access > Login methods. In the Single sign-on (SSO) section, provide a valid Email domain, then click Initialize.
  3. The Configure Single Sign-On dialog appears to guide you through the remaining configuration steps. Begin by selecting Custom SAML.
  4. Follow the instructions provided on the subsequent Configure Single Sign-On dialog pages to complete this process. When you've completed the required steps, use Test sign-in to test the connection.
  5. Once test sign-in has passed, close the test page. Verify that the Connection details shown on the Connection activated screen are correct and close the dialog.
  6. Verify that the Connection status is now active under the Single sign-on (SSO) section in Semgrep AppSec Platform.
  7. To use the new connection, log out of Semgrep, then log back in using SSO.

Not finding what you need in this doc? Ask questions in our Community Slack group, or see Support for other ways to get help.