Google Workspace offers two ways to set up Single Sign-On (SSO) with Google as a Relying Party to your Identity Provider:
- Legacy SSO profile — Allows you to configure only one IdP for your organization.
- SSO profiles — The newer, recommended way to set up SSO. Lets you apply different SSO settings to different users in your organization, supports both SAML and OIDC, has more modern APIs, and will be Google's focus for new features.
We advise all customers to migrate to SSO profiles to take advantage of these benefits. SSO profiles can coexist with the SSO profile for your organization, so you can test new SSO profiles before transitioning your whole organization.
Overview of the migration process
- In the Admin console, create an SSO profile for your IdP and register the new profile with your IdP.
- Assign test users to use the new profile to confirm that it works.
- Assign your top organizational unit to the new profile.
- Update domain-specific URLs to use the new profile.
- Clean up: unregister your old Service provider, verify that automatic user provisioning still works.
Step 1: Create an SSO profile
- Follow these steps to create a new SAML SSO profile. Your new profile should use the same IdP as your existing SSO profile for your organization.
- Register the new SSO profile with your IdP as a new Service Provider.
Your IdP will see the new profile as a distinct Service Provider (it may call these "Apps" or "Relying Parties"). How you register the new Service Provider will vary with your IdP, but it typically requires configuring the Entity ID and Assertion Consumer Service (ACS) URL for the new profile.
Step 2: Assign test users to the profile
It's a good idea to initially test your new SSO profile on users in a single group or organizational unit before switching over all users. Use an existing group or organizational unit, or create a new one as needed.
If you have managed ChromeOS devices, we recommend organizational unit-based testing, as you can assign ChromeOS devices to organizational units, but not to groups.
- (Optional) Create a new organizational unit or configuration group and assign test users to it.
- Follow these steps to assign users to the new SSO profile.
Step 3: Assign your top organizational unit and update service URLs
After successfully testing the new SSO profile on a test group or organizational unit, you're ready to switch other users.
- Go to Security
SSO with third-party IDPs
Manage SSO profile assignments.
- Click Manage.
- Select your top-level organizational unit and assign it to the new SSO profile.
- (Optional) If other organizational units or groups are assigned to the SSO profile for your organization, assign those to the new SSO profile.
Step 4: Update domain-specific URLs
If your organization uses domain-specific URLs (for example, https://mail.google.com/a/your_domain.com), update that setting to use the new SSO profile:
- Go to Security
SSO with third-party IDPs
Domain-specific service URLs.
- Under Automatically redirect users to the third-party IdP in the following SSO profile, select the new SSO profile from the dropdown list.
Step 5: Clean up
- At Security
SSO with third-party IDPs
SSO profiles, click the Legacy SSO profile to open profile settings.
- Uncheck Enable legacy SSO profile to disable the legacy profile.
- Confirm that automatic user provisioning set up with your IdP functions correctly with your new SSO profile.
- Unregister the old Service Provider from your IdP.