Dialpad cloud application

You must be signed in as a super administrator for this task.

Using Security Assertion Markup Language (SAML), your users can use their Google Cloud credentials to sign in to enterprise-cloud applications.

Set up SSO via SAML for Dialpad

Here's how to set up single sign-on (SSO) via SAML for the Dialpad® application.

Step 1: Set up Dialpad as a SAML 2.0 service provider (SP)
  1. Sign in to your Google Admin console.

    Sign in using your administrator account (does not end in @gmail.com).

  2. From the Admin console Home page, go to Security and then Set up single sign-on (SSO).

    To see Security, you might have to click More controls at the bottom. 

  3. Copy the SSO URL and the Entity ID (Issuer ID).
  4. Click the Download button to download the X.509 Certificate.
  5. Open a new incognito browser window.
  6. Go to https://dialpad.com/authentication/saml.
  7. Enter the IDP SSO URL and Entity ID in the appropriate fields.
  8. Paste the copied X.509 Certificate into the box.

    Note: Remove “BEGIN” and “END CERTIFICATE” from the copied X.509 certificate text.
  9. Click Save and proceed to the next section to set up Google as a SAML identity provider (IdP).
Step 2: Set up Google as a SAML identity provider (IdP)
  1. In a new browser tab, 
    Sign in to your Google Admin console.

    Sign in using your administrator account (does not end in @gmail.com).

  2. From the Admin console Home page, go to Apps and then SAML Apps.

    To see Apps on the Home page, you might have to click More controls at the bottom. 

  3. Click the plus (+) icon in the bottom corner.
  4. Select the Dialpad item from the list. The values on the Google IDP Information page automatically populate.
  5. In the Basic application information window, the Application name and Description values automatically populate.
  6. Click Next.
Step 3: Enter service provider details in Google Admin console
  1. In the Service Provider Details section, enter the following URLs into the Entity IDACS URL, and Start URL fields:
            ACS URL: https://dialpad.com/saml/sso/google/your-domain.com
            Entity ID: https://dialpad.com/api/saml/metadata/google/your-domain.com
            Start URL: https://dialpad.com
  2. Leave Signed Response unchecked.
    When the Signed Response checkbox is unchecked, only the assertion is signed. When the Signed Response checkbox is checked, the entire response is signed.
  3. The default Name ID is the primary email. Multi-value input is not supported. You can change the Name ID mapping as per your requirement. Custom attributes of the user schema can also be used after creating them via Google Admin SDK APIs. The custom attributes for the user schema need to be created prior to setting up the Dialpad SAML application. 
  4. The NameID Format field should be Transient.
  5. Click Next.
  6. Under Attribute mapping, first select the Category as Basic Information from the drop down list and then choose a User attribute to map the attribute from the Google profile. You must provide the "Primary Email" [Email], "First Name" [FirstName], and "Last Name" [LastName] attributes.
  7. Click Finish.
Step 4: Enable the Dialpad app
  1. Sign in to your Google Admin console.

    Sign in using your administrator account (does not end in @gmail.com).

  2. From the Admin console Home page, go to Apps and then SAML Apps.

    To see Apps on the Home page, you might have to click More controls at the bottom. 

  3. Select Dialpad.
  4. At the top right of the gray box, click Edit Service Compose.

  5. To apply settings to all organizations, click On for everyone or Off for everyone, and then click Save

  6. To apply settings to individual organizational units, do the following: 

    • At the left, select the organizational unit that contains the users whose settings you want to change.
    • To change the setting, select On or Off.
    • To keep the setting the same, even if the parent setting changes, click Override.
    • If the organization's status is already Overridden, choose an option:
      Inherit—Reverts to the same setting as its parent.
      Save—Saves your new setting (even if the parent setting changes).

    Learn more about the organizational structure.

  7. For Dialpad, choose On for everyone. Ensure that your Dialpad user account email IDs match those in the domain for your Google service.
Step 5: Verify that the SSO is working
  1. Open https://dialpad.com/saml/login/google/your-domain.com.
    You’ll be redirected to https://dialpad.com but you’ll still be logged out.

  2. Navigate to https://dialpad.com and you should be logged in.

  3. After your sign in credentials are authenticated you will be automatically redirected back to Dialpad.
Step 6: Set up user provisioning

As a super administrator, you can automatically provision users in the Dialpad application.

Was this helpful?
How can we improve it?