# Google Workspace

## Steps to Configure Hideez Server as an Identity Provider (IdP)

### **1. Set Up Hideez Server as an IdP**

#### **1. Access SAML Configuration:**

* In the Hideez Server dashboard, navigate to **Parameters → Settings → SAML**.

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FHDDCuCr00Modl6J8xxaf%2Fimage.png?alt=media&#x26;token=cf35a172-eb4f-4fdd-979d-856872b287a8" alt="" width="563"><figcaption></figcaption></figure>

#### **2. Download or Create .pfx Certificate**

* The .pfx certificate contains both the public certificate and private key. You can:
  * **Download an existing certificate:** Select the certificate, enter the password, and download.

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FEhJwKm2qdeTpGhvPPPrf%2Fimage.png?alt=media&#x26;token=7c8cfd51-551e-496f-803c-d63725fd18d9" alt="" width="563"><figcaption></figcaption></figure>

* **Create a new self-signed certificate:** Click **Create and Download**, enter the password, and download.

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FxniXyG7PJpY7cArJDD22%2FScreenshot_43.png?alt=media&#x26;token=6aff68e5-c71d-44c8-ab6e-ef12d94c1d78" alt="" width="563"><figcaption></figcaption></figure>

{% hint style="info" %}
A certificate with the `.pfx`extension is a file that contains both the public certificate and its private key, as well as the complete certificate chain up to the root Certificate Authority (CA). The file is usually password-protected and used for authentication, encryption, and establishing secure connections                                                            &#x20;
{% endhint %}

#### 3. **Download or View IdP Components**

1. **Identity Provider Public Certificate (.cer):** Contains only the public key and is used for server authentication and data encryption.
2. **Identity Provider Metadata:** Provides essential IdP details required for interaction with SPs.

<figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FLzoRKM3B9affk6slaZIK%2FScreenshot_44.png?alt=media&#x26;token=0349687c-c11a-4bc6-af9e-b5624f130c7b" alt="" width="563"><figcaption></figcaption></figure>

{% hint style="info" %}
**Identity Provider public certificate** is a certificate with the `.cer` (or `.crt`) extension is a file that contains only the public key and certificate information but **does not include the private key**. Its primary purpose is to authenticate the server or user and to encrypt data.

`.cer` files are used to secure connections, such as HTTPS for websites, client and server authentication in networks, and in various corporate applications.

**Identity Provider (IdP**) metadata is a file or set of data that provides essential information about your IdP to enable proper interaction with Service Providers (SP) in a SAML (Security Assertion Markup Language) context.

Some **Service Providers** provide users with metadata files. In this case, all required fields will be filled in automatically after importing the metadata file.

Otherwise, you can configure settings **manually**. In this case, the settings depend on the specific **Service Provider.**&#x20;
{% endhint %}

### **2. Add Service Provider (SP)**

#### **1. Configure Settings on the Service Provider Side (SP)**

* Here’s an example for **Google Workspace**:
  * Go to [**admin.google.com**](https://admin.google.com/).
  * Navigate to **Menu → Security → Authentication → SSO with third-party IdP**.
  * Under **Third-party SSO profiles**, click **Add SAML profile**.
  * Enter a profile name (e.g., "Hideez Server (IdP)").
  * Paste values from Hideez Server:

    * Issuer / IdP Entity ID  (`e.g., https:// <your hideez server name>`) (1)
    * Login URL  (`e.g., https:// <your hideez server name>/saml/login`) (2)
    * Logout URL (`e.g., https:// <your hideez server name>/saml/logout`) (3)
    * Upload the Identity Provider public certificate (.cer) file (4).

    <div><figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FwNMZe5RVT2WTnGbK4BH5%2FScreenshot_1.png?alt=media&#x26;token=7e351c06-2ea4-4bbe-b06e-625e7497a43b" alt=""><figcaption></figcaption></figure> <figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FMznAcmrmKJwVIthSnXA6%2FScreenshot_48.png?alt=media&#x26;token=1bd70578-402b-4d30-b818-d81de05fd1c4" alt=""><figcaption></figcaption></figure> <figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FodX87Am6GqDiARJ55Hn5%2FScreenshot_51.png?alt=media&#x26;token=a723f0ca-28e5-4966-b828-80ed7359877f" alt=""><figcaption></figcaption></figure></div>

#### **2. Add Service Provider in Hideez Server (IdP)**

* In Hideez Server, click **Add Service Provider** and enter the SP values:

  * Name (e.g., ⁣`Google Workspace-SAML`)&#x20;
  * Issuer / SP Entity ID (e.g., `https://accounts.google.com/samlrp/unique-id`) **(1)**
  * ACS URL (e.g., ⁣`https://accounts.google.com/samlrp/unique-id/acs)` **(2)**
  * Click **Add**

  <div><figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2Frs3s9zB9vPm7RlBpyaHV%2Fimage.png?alt=media&#x26;token=a72fa7ef-12d0-4d06-9927-29645ca692d0" alt=""><figcaption></figcaption></figure> <figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FNsLVR10AwJgaj0BXIY20%2FScreenshot_044%20-%20Copy.png?alt=media&#x26;token=8962e0db-b94f-4e85-824a-1f7e753ec3f5" alt=""><figcaption></figcaption></figure> <figure><img src="https://1669663611-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FRdTysrljwe610dPFG7tE%2Fuploads%2FPsiYqVp3XOht2TopOg2A%2FScreenshot_1%20(1).png?alt=media&#x26;token=6918f1d5-d3a9-41af-8b9e-32db843e33ed" alt=""><figcaption></figcaption></figure></div>
