https://github.com/iamfrench/gsuite-as-identity-provider-idp-for-office-365-or-azure-active-directory
Finally manage to sync GSuite account with azure active directory!!!
https://github.com/iamfrench/gsuite-as-identity-provider-idp-for-office-365-or-azure-active-directory
azure azure-active-directory federated-identity gsuite gsuite-saml-apps identity-provider identity-provider-idp office-365 saml tutorial
Last synced: 13 days ago
JSON representation
Finally manage to sync GSuite account with azure active directory!!!
- Host: GitHub
- URL: https://github.com/iamfrench/gsuite-as-identity-provider-idp-for-office-365-or-azure-active-directory
- Owner: IAmFrench
- Archived: true
- Created: 2018-01-31T14:26:52.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2021-08-06T16:08:46.000Z (over 3 years ago)
- Last Synced: 2025-03-03T07:43:33.436Z (about 2 months ago)
- Topics: azure, azure-active-directory, federated-identity, gsuite, gsuite-saml-apps, identity-provider, identity-provider-idp, office-365, saml, tutorial
- Size: 5.86 KB
- Stars: 36
- Watchers: 6
- Forks: 12
- Open Issues: 6
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# GSuite-as-identity-Provider-IdP-for-Office-365-or-Azure-Active-Directory
_Sync G Suite accounts with Azure active directory!_## Google Admin requirements
### Set up SAML app (choose Microsoft Office 365)> [GSuite Admin SAML Apps Link](https://admin.google.com/AdminHome?fral=1#AppsList:serviceType=SAML_APPS)

Note:
ACS URL: `https://login.microsoftonline.com/login.srf`
Entity ID: `urn:federation:MicrosoftOnline`

### Configure Provisioning
_Ensure that you are using an administrator Azure Active Directory account that is not already linked to your existing Google account._
> [GSuite Office 365 Provisioning settings Link](https://admin.google.com/AdminHome?fral=1#AppDetails:service=935556381546&flyout=provisioningSetupV2)

## Azure Active Directory requirements (this is a pain in the a**)
Validate your domain on Azure:
https://portal.azure.com/?l=en.en-us#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/DomainsAnd DON'T set this domain as Primary:

Download the `GoogleIDPMetadata-{your-domain}.xml` file:

Then install all required tools (powershell tools)

https://www.microsoft.com/en-us/download/details.aspx?id=41950And start a powershell console:
`Install-Module MSOnline`
Enter your MS credentials.```
Import-Module MSOnline
$Msolcred = Get-credential
Connect-MsolService -Credential $MsolCred
```Now edit my sample `dfs-pf-samlp.xml` file with your Google Ids:
- `GOOGLESAMLID` and
- copy paste your certificate (from `GoogleIDPMetadata-{your-domain}.xml` file)Then import the config into powershell:
```
$wsfed = Import-Clixml dfs-pf-samlp.xml
```And Set the domain as federated:
```
Set-MsolDomainAuthentication -DomainName "{your-domain}" -FederationBrandName $wsfed.FederationBrandName -Authentication Federated -PassiveLogOnUri $wsfed.PassiveLogOnUri -ActiveLogOnUri $wsfed.ActiveLogonUri -SigningCertificate $wsfed.SigningCertificate -IssuerUri $wsfed.IssuerUri -LogOffUri $wsfed.LogOffUri -PreferredAuthenticationProtocol "SAMLP"
```And use this command to export your domain settings:
```
Get-MsolDomainFederationSettings -DomainName "{your-domain}" | Export-Clixml dfs-pf-samlp.xml
```The command to view the config is:
```
Get-MsolDomainFederationSettings -DomainName "{your-domain}" | Format-List *
```Next you have to assign a license to all your users and to set azure self service password reset to off:
https://portal.azure.com/?l=en.en-us#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/PasswordReset
Test the link with incognito mode or invite mode:
1. From Office 365: https://www.office.com/
2. From App launcher (Google App)
## Troubleshooting
1. Delete the user from the Azure side.
1. Wait a few hours for G Suite Auto Provisioning to work.