Google Workspace SSO
Configure Single Sign-On (SSO) with Google Workspace to secure access to Asset Panda. This setup allows users to sign in using their Google credentials, improving security and simplifying access management.
Prerequisites
To configure SSO between Asset Panda and Google Workspace, ensure the following:
Super Admin access to Google Admin Console
Asset Panda Entity ID and Reply URL (ACS URL)
Access to Apps > Web and Mobile Apps in Google Admin Console
Default Values
Entity ID:
urn:amazon:cognito:sp:us-east-1_4jHsDgxlCACS URL:
https://ap-pioneer-951730251621.auth.us-east-1.amazoncognito.com/saml2/idpresponse
Note: If these values differ for your environment, contact Asset Panda support.
Warning: Google Admin Console interfaces and menu names may change. Refer to Google documentation if options appear different.
Search or Create a SAML Application
To set up SSO, search for or create a custom SAML app in Google Workspace.
Sign in to the Google Admin Console.
Navigate to Apps > Web and Mobile Apps.
Search for the Asset Panda application.
If the application does not exist:
Click Add App.
Select Add custom SAML app.
Enter a name.
Optionally upload an icon.
Click Continue.
Configure SAML Settings
Enter the Service Provider values.
ACS URL (Reply URL):
https://ap-pioneer-951730251621.auth.us-east-1.amazoncognito.com/saml2/idpresponseEntity ID (Identifier):
urn:amazon:cognito:sp:us-east-1_4jHsDgxlCName ID Format: EMAIL
Name ID: Primary Email
Click Continue.
Configure Google as Identity Provider
On the Google IdP Information screen:
Download the IdP Metadata file.
This file will be uploaded to Asset Panda later.
Click Continue.
Configure User Attributes
Ensure the email attribute is mapped.
App Attribute: email
Google Directory Attribute: Primary Email
Map user attributes to pass additional information such as primary email with emailaddress.
Additional attributes such as first and last name can be mapped if supported.
Click Finish.
Assign Users or Groups
After configuration, grant users access to the application.
Open the SAML application.
Go to User Access.
Turn access ON for:
Everyone, or
Specific Organizational Units or Groups.
Click Save.
Users without access enabled here cannot authenticate.
Complete the Google Integration in Asset Panda
After downloading the IdP Metadata file from Google:
Log in to Asset Panda as an admin.
Navigate to Settings > Preferences > Single Sign-On (SSO).
Click Add new SSO.
Choose the Enable Type based on your organization’s requirement:
Enable for all users
Enable for selected domains
Disable for all users
Enter a Connection Name.
Upload the IdP Metadata file.
Click Save to complete configuration.
Validate Assigned Users
Assigned users must:
Exist in Google Workspace
Exist in Asset Panda
Have matching email addresses
If these conditions are not met, login will fail after authentication.
Test the Setup
Open a private or incognito browser window
Go to the Asset Panda login page
Enter the email address
Select Sign in with Google
Confirm the user is redirected successfully to Asset Panda
Last updated

