Skip to main content

Google SSO Configuration

Updated over a week ago

This article outlines the steps required to configure Google SSO (SAML) for Panorays on the customer side.

Panorays supports SAML-based Single Sign-On (SSO) using Google as the identity provider. Configuration is performed in the Google Admin Console, and metadata is shared with Panorays to complete the setup.

➕ Google Configuration Steps

1️⃣ Create a New SAML App in Google

  1. Open the Google Admin Console.

  2. Go to Apps.

  3. Search for and select Web and mobile apps.

  4. Click Add AppAdd custom SAML app.

2️⃣ Define the SAML App

  1. Enter a name for the SAML configuration.

  2. Continue to the next step.

3️⃣ Download and Share Metadata

  1. Download the SAML Metadata file from Google.

  2. Send the metadata file to support@panorays.com so it can be uploaded into the Panorays system.

4️⃣ Configure Service Provider Details

Enter the following values in Google:

  • ACS URL: https://auth.panoraysapp.com/sso/saml/assert

  • Entity ID: https://auth.panoraysapp.com

  • Signed Response: Enable Signed response

  • Name ID format: EMAIL

  • Name ID: Basic Information>Primary email

Click Continue once completed.

5️⃣ Assign User Access

At the final step:

  • Assign users or groups that should have access to Panorays via Google SSO.

💡 Tips / Important Notes

  • Make sure only the relevant groups are assigned to avoid unauthorized access.

  • Changes to group assignments may take a few minutes to propagate.

  • If authentication issues occur, verify that the metadata shared with Panorays matches the Google configuration.

📌 Summary

Configuring Google SSO allows users to securely access Panorays using their Google credentials. The setup requires creating a custom SAML app in Google, sharing metadata with Panorays, and assigning access to the appropriate user groups.

Did this answer your question?