An open API service indexing awesome lists of open source software.

https://github.com/iamfrench/gsuite-as-identity-provider-idp-for-office-365-or-azure-active-directory

Finally manage to sync GSuite account with azure active directory!!!
https://github.com/iamfrench/gsuite-as-identity-provider-idp-for-office-365-or-azure-active-directory

azure azure-active-directory federated-identity gsuite gsuite-saml-apps identity-provider identity-provider-idp office-365 saml tutorial

Last synced: 13 days ago
JSON representation

Finally manage to sync GSuite account with azure active directory!!!

Awesome Lists containing this project

README

        

# GSuite-as-identity-Provider-IdP-for-Office-365-or-Azure-Active-Directory
_Sync G Suite accounts with Azure active directory!_

## Google Admin requirements
### Set up SAML app (choose Microsoft Office 365)

> [GSuite Admin SAML Apps Link](https://admin.google.com/AdminHome?fral=1#AppsList:serviceType=SAML_APPS)

![GSuite SAML Apps](https://i.imgur.com/qSIrLyN.png)

Note:

ACS URL: `https://login.microsoftonline.com/login.srf`

Entity ID: `urn:federation:MicrosoftOnline`

![GSuite Office 365 Settings](https://i.imgur.com/0yEnR5m.png)

### Configure Provisioning

_Ensure that you are using an administrator Azure Active Directory account that is not already linked to your existing Google account._

> [GSuite Office 365 Provisioning settings Link](https://admin.google.com/AdminHome?fral=1#AppDetails:service=935556381546&flyout=provisioningSetupV2)

![GSuite Office 365 settings](https://i.imgur.com/giY8PmH.png)

## Azure Active Directory requirements (this is a pain in the a**)
Validate your domain on Azure:
https://portal.azure.com/?l=en.en-us#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Domains

And DON'T set this domain as Primary:

![](https://i.imgur.com/GhEaTXo.png)

Download the `GoogleIDPMetadata-{your-domain}.xml` file:

![GoogleIDPMetadata-{your-domain}.xml sample file](https://i.imgur.com/rNvQshH.png)

Then install all required tools (powershell tools)

![Required PowerShell tools](https://i.imgur.com/sSkF2vZ.png)
https://www.microsoft.com/en-us/download/details.aspx?id=41950

And start a powershell console:
`Install-Module MSOnline`
Enter your MS credentials.

```
Import-Module MSOnline
$Msolcred = Get-credential
Connect-MsolService -Credential $MsolCred
```

Now edit my sample `dfs-pf-samlp.xml` file with your Google Ids:

- `GOOGLESAMLID` and
- copy paste your certificate (from `GoogleIDPMetadata-{your-domain}.xml` file)

Then import the config into powershell:
```
$wsfed = Import-Clixml dfs-pf-samlp.xml
```

And Set the domain as federated:
```
Set-MsolDomainAuthentication -DomainName "{your-domain}" -FederationBrandName $wsfed.FederationBrandName -Authentication Federated -PassiveLogOnUri $wsfed.PassiveLogOnUri -ActiveLogOnUri $wsfed.ActiveLogonUri -SigningCertificate $wsfed.SigningCertificate -IssuerUri $wsfed.IssuerUri -LogOffUri $wsfed.LogOffUri -PreferredAuthenticationProtocol "SAMLP"
```

And use this command to export your domain settings:
```
Get-MsolDomainFederationSettings -DomainName "{your-domain}" | Export-Clixml dfs-pf-samlp.xml
```

The command to view the config is:
```
Get-MsolDomainFederationSettings -DomainName "{your-domain}" | Format-List *
```

Next you have to assign a license to all your users and to set azure self service password reset to off:

https://portal.azure.com/?l=en.en-us#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/PasswordReset

Test the link with incognito mode or invite mode:
1. From Office 365: https://www.office.com/
2. From App launcher (Google App)

![Google App launcher](https://i.imgur.com/UfVOBQ9.png)

## Troubleshooting

1. Delete the user from the Azure side.
1. Wait a few hours for G Suite Auto Provisioning to work.