As an admin, you can use these security best practices when integrating Google Workspace with third-party identity providers (IdPs) to connect to Security Assertion Markup Language (SAML) applications.
Best practices for your third-party IdP configuration
- Maintain good password policies, and enforce strong passwords.
- Implement 2-Step Verification (2SV). Google 2SV doesn't integrate with third-party identity providers (IdPs), so implement 2SV on the IdP side.
- Recommend security keys where possible, and recommend mobile-app based solutions over text messages.
Best practices for your Google Workspace configuration
- Disable user access to less secure apps. See Control access to less secure apps. By design, Internet Message Access Protocol (IMAP) and Simple Mail Transfer Protocol (SMTP) don’t offer the level of security that the Google web and OAuth login flows do.
- Disable Post Office Protocol (POP) or Internet Message Access Protocol (IMAP) access. See Turn POP and IMAP off for users.
- Maintain strong passwords for Google Workspace accounts. These passwords are less likely to be used, so they may represent an attack surface. See Manage your users password settings.
Best practices for your user devices
- Use Google mobile apps. In addition to providing the best user experience, these apps offer security protections.
- Update to the latest operating system version and security patches. To ensure the best protection for your users' mobile devices, tell them to accept the latest updates and security patches.
Google, Google Workspace, and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.