Skip to main content

Configure Google Workspace as the user directory for Arculix

Organizations using Google Workspace for user management can enhance security by integrating Arculix for multi-factor authentication (MFA). With this setup, users continue to use their Google Workspace credentials for access, while benefiting from Arculix’s advanced features, including MFA, risk-based policies, and support for SAML and OpenID Connect (OIDC).

To configure Google Workspace as the user directory for Arculix, the following is an outline of tasks to complete.

Task A: Configure OAuth Client on Google API and Services

Create an OAuth Client for Arculix in the Google API Console.

You will need the client credentials generated by Google for Arculix configuration.

Task B: Configure Federation Logins for Google Workspace on Arculix

Create a new provider for Google Workspace in Arculix. Configure it as a federated client and enable SSO logins via Google Workspace.

Task C: Configure MFA for New Users in Arculix

Create a Device Enrollment Policy to allow new users to enroll in MFA using the Arculix Mobile app.

Task A: Configure OAuth Client on Google API and Services

In this task, you will create an OAuth client in the Google API console and set its redirect URI to Arculix.

Note

This task is completed in the Google API Console. For up-to-date, detailed instructions, refer to Google's documentation for OpenID Connect and reach out to their support resources.

  1. Log in to the Google API Console and create an OAuth client for Arculix.

  2. In the Authorized redirect URIs section, set the redirect URI to the callback URL for your Arculix tenant.

    For example: https://oidc.acceptto.com/{YOUR_TENANT}/federation/oauth/callback 

    arculix_google_workspace_001.png
  3. Once the OAuth consent page and web application credentials are configured, copy the client's credentials for Arculix configuration.

Task B: Configure federation logins for Google Workspace on Arculix

In this task, you will create a provider for Google Workspace in Arculix, configure it as a federated client, and enable SSO logins via Google Workspace.

  1. Log in to Arculix with an administrative account and go to External IdPs > Providers.

  2. Click Create New Provider.

  3. In the New Provider form, on the General tab, set the following configurations:

    Provider Name

    Set the name of the provider.

    For example, Google Workspace.

    OIDC Discovery/well-known URL

    Enter Google's OpenID configuration file URL:

    https://accounts.google.com/.well-known/openid-configuration

    Click Fetch Configuration to automatically retrieve Google’s OIDC configuration.

    arculix_google_workspace_002.png
  4. Select the Attributes tab and configure the username source.

    In most situations, selecting email as the source will match typical setups.

    arculix_google_workspace_003.png
  5. Select the User tab and set the following configurations:

    Token Attribute

    Select the Other radio button and set to Email Address.

    User Attribute

    Set to Username.

    User Synchronization

    Optional. Configure this section to enable Just-in-Time Provisioning. Arculix will create new user upon first sign in, if they don't already exist.

    arculix_google_workspace_004.png
  6. Save your changes.

  7. Go to External IdPs > Federated Clients.

  8. Click Create New Client and set the following configurations:

    Identity Provider

    Select the provider you created earlier in this section.

    For example, Google Workspace.

    Name

    Enter a unique client name.

    For example, Google Workspace.

    Client ID

    Enter the Client ID for the OAuth Client you created in the Google API Console.

    Client Secret

    Enter the Client Secret for the OAuth Client you created in the Google API Console.

    Grant Type

    Set to Authorization Code.

    Token Type

    Set to ID Token.

    Scopes

    Set to openid email.

    Response Types

    Set to Code.

    Auto Provision User

    Slide the toggle to On.

    arculix_google_workspace_005.png
  9. Save your changes.

  10. Go to Organization Settings.

  11. On the SSO tab, select the check box for SSO logins should only happen using configured external identity providers.

    This ensures Google Workspace is used for username/password authentication during the SSO login flow.

    arculix_google_workspace_006.png
  12. Save your settings.

Task C: Configure MFA for new users in Arculix

In this task, you will create a Device Enrollment Policy that allows new users to enroll in MFA using the Arculix Mobile app.

  1. In Arculix, go to Policies > Advanced.

  2. Click Create New Policy and set the following configurations:

    Policy Name

    Enter Force Device Pairing

    Event

    Set to Enrollment.

    Applications

    Select the Apply to All Applications check box.

    When

    Select the Always checkbox.

    Action

    Select the Require Device Pairing radio button.

    arculix_google_workspace_007.png
  3. Save the policy.

Test your integration

  1. Go to the following URL to test the SSO flow:

    https://sso.acceptto.com/{TENANT} where {TENANT} is your organization’s URL identifier.

    You will be redirected to the Google Workspace sign-in page.

  2. After entering your credentials for the first time, you will be prompted to grant consent to share your email and profile information with Arculix SSO application.

  3. Once consent is granted, Arculix will complete the MFA pairing process. Users will follow this flow for all SAML and OIDC applications integrated with Arculix SSO.