Reflektive cloud application

You must be signed in as a super administrator for this task.

With Security Assertion Markup Language (SAML), your users can sign in to enterprise cloud applications with their Google Cloud credentials.

Set up SSO via SAML for Reflektive

Step 1: Set up Google as a SAML identity provider (IdP)
  1. Sign in to your Google Admin console.

    Sign in using your administrator account (does not end in @gmail.com).

  2. From the Admin console Home page, go to Apps and then SAML Apps.

    To see Apps on the Home page, you might have to click More controls at the bottom. 

  3. Click Add Add at the bottom right.
  4. Locate and click Reflektive in the application list.
  5. On the Google IDP Information page:
    1. Download the Metadata XML.
    2. Copy and save the SSO URL.
  6. Click Next.

    The Basic information window shows the Application name and Description seen by users.

  7. Click Next.
    The Service Provider Details page shows the ACS URL and the Entity ID.
  8. Click Next & Finish.  ​
Step 2: Set up Reflektive as a SAML 2.0 service provider (SP)

Send an email to your support contact at Reflektive® to let them know you'd like to enable SAML on your account.  Include the Metadata XML and the SSO URL  you downloaded in step 1.

Reflektive will let you know when they enable SAML on their side.​

Step 3: Enable the Reflektive app
  1. Sign in to your Google Admin console.

    Sign in using your administrator account (does not end in @gmail.com).

  2. From the Admin console Home page, go to Apps and then SAML Apps.

    To see Apps on the Home page, you might have to click More controls at the bottom. 

  3. Select Reflektive.
  4. At the top right of the gray box, click Edit Service Compose.

  5. Ensure that your Reflektive user account email IDs match those in your Google domain.
Step 4: Verify that SSO is working
  1. Go to your Reflektive instance.  
    You should be redirected to the Google sign-in page.
  2. Enter your username and password.  
    After your credentials are authenticated, you are redirected to Reflektive.

 

Was this helpful?
How can we improve it?