9.2 Configuring the Connector for Google Apps

The connector for Google Apps creates a SAML 2.0 connection between Access Manager Appliance and Google Apps. The connector helps you create a federated connection between Access Manager Appliance and Google Apps. When your users log in to the User Portal page, they need to authenticate only once. For more information, see Section 1.2, Understanding Federated Single Sign-On with SAML 2.0.

To configure the connector for Google Apps:

  1. Log in to Administration Console as an administrator.

  2. In the Dashboard, under Administrative Tasks, click Applications.

  3. (Conditional) Select the appropriate Identity Server cluster to use application.

  4. Click the plus sign + to import the SAML 2.0 connector for Google Apps.

    1. Click Add Application from Catalog, then search for the SAML 2.0 connector for Google Apps.

      For more information, see Section 2.0, Using the Application Connector Catalog.

      or

    2. Click Import Application from File, then browse to and select the file.

  5. Specify the following details:

    Options

    Description

    Name

    Specify a name for the connector for Google Apps.

    Description

    Specify a description of the connector.

    You can configure multiple connectors for Google Apps. Ensure that you use a unique name and a description to help determine differences between the connectors.

    Change Image

    (Optional) Change the default image that the User Portal page displays to the users. Each connector contains a default image. You can change that image to any image you want.

    The maximum image size is 200 x 200 pixels and the ideal image size is 100 x 100 pixels. You can use an image from the Image Gallery or upload your own image.

    Application Connector Setup: This section displays the metadata information Access Manager Appliance requires from Google Apps to create the federated connection.

    Customer domain

    Specify the Google domain you provided when you set up your Google domain.

    Destination URL

    (Optional) Specify the URL where users go after the initial login.

    Metadata

    Displays the metadata for the connector. You can view or download the metadata.

    If you have not saved the connector, the system creates the SAML 2.0 metadata using the values provided and other values from the connector.

    IMPORTANT:This field does not appear until you save the connector.

    Unique ID

    or

    Entity ID

    Displays the value of the Unique ID or Entity ID if specified.

    For more information, see Section 4.4, Unique ID.

    IMPORTANT:This field appears only after you save the connector and you had specified the unique ID or entity ID to resolve the Entity ID conflict while saving the connector first time.

    Signing Certificate

    Uploads a signing certificate file to secure communication between Access Manager Appliance and Google Apps. It displays the content of the signing certificate if you have saved the connector.

    You can upload up to two service provider signing certificates.

    For more information, see Minimizing Service Interruption of SAML 2.0 Service Providers in the NetIQ Access Manager Appliance 4.4 Administration Guide.

    When you add two certificates, the identity provider picks up the appropriate certificate from the metadata. Both of the certificates are active simultaneously. When two certificates are used, ensure that the certificate information (X.509 data) is sent along with the signed document.

    You can view details, download, and delete the uploaded certificates.

    The system automatically adds new certificates to the trust store for Administration Console. However, the new certificates are not automatically added to the trust store for the Identity Server cluster.

    IMPORTANT:You must manually add signing certificates to the Identity Server cluster trust store and to the OCSP trust store. Else, the health of the Identity Server cluster turns yellow and users do not see appmarks configured for this application when they log in to the User Portal page. For more information, see Managing Certificates and Keystores in the NetIQ Access Manager Appliance 4.4 Administration Guide.

    Attributes: Allows you to see and manage the attributes that are part of the SAML 2.0 assertion.

    Replace Attribute Set

    If you want to import existing attributes from attribute sets already configured on the local Access Manager system, click this option. Select the required attribute sets from the list.

    IMPORTANT:Selecting an existing Attribute Set replaces any attributes available in the application.

    Google username

    Select the appropriate attribute from Google Apps for the ID of the users. Typically, the user’s email address is the user ID for Google Apps.

    Access and Roles: Allows you to control who has access to the application.

    Roles

    Select the role assignments to determine the user accessibility of this application.

    The Role assignments made in the Appmark editor determine the user visibility of the appmarks associated with this application, not the accessibility of the application.

    Contracts

    Select the contracts presented to users when they click the appmark. The users see these contract unless the contract is satisfied during login or through the authentication levels.

    System Setup: Displays the metadata information from Access Manager Appliance to use in Google Apps to create the federated connection.

    Metadata

    You can view or download the metadata information from Access Manager Appliance to create the federated connection.

    Signing Certificate

    You can view or download the signing certificate from Access Manager Appliance to create the federated connection.

    Federation Instructions

    Contains the federation instructions on what you must change or modify in Google Apps to create the federated connection. Follow the federated instructions.

    The information in the Federation Instructions is specific to your environment.

    NOTE:The Advanced Setup does not appear in any of these sections until you save the connector.

  6. Click Save.