Google Workspace
Last updated
Was this helpful?
Last updated
Was this helpful?
In the Hideez Server dashboard, navigate to Parameters → Settings → SAML.
The .pfx certificate contains both the public certificate and private key. You can:
Download an existing certificate: Select the certificate, enter the password, and download.
Create a new self-signed certificate: Click Create and Download, enter the password, and download.
A certificate with the .pfx
extension is a file that contains both the public certificate and its private key, as well as the complete certificate chain up to the root Certificate Authority (CA). The file is usually password-protected and used for authentication, encryption, and establishing secure connections
Identity Provider Public Certificate (.cer): Contains only the public key and is used for server authentication and data encryption.
Identity Provider Metadata: Provides essential IdP details required for interaction with SPs.
Identity Provider public certificate is a certificate with the .cer
(or .crt
) extension is a file that contains only the public key and certificate information but does not include the private key. Its primary purpose is to authenticate the server or user and to encrypt data.
.cer
files are used to secure connections, such as HTTPS for websites, client and server authentication in networks, and in various corporate applications.
Identity Provider (IdP) metadata is a file or set of data that provides essential information about your IdP to enable proper interaction with Service Providers (SP) in a SAML (Security Assertion Markup Language) context.
Some Service Providers provide users with metadata files. In this case, all required fields will be filled in automatically after importing the metadata file.
Otherwise, you can configure settings manually. In this case, the settings depend on the specific Service Provider.
Here’s an example for Google Workspace:
Go to admin.google.com.
Navigate to Menu → Security → Authentication → SSO with third-party IdP.
Under Third-party SSO profiles, click Add SAML profile.
Enter a profile name (e.g., "Hideez Server (IdP)").
Paste values from Hideez Server:
Issuer / IdP Entity ID (e.g., https:// <your hideez server name>
) (1)
Login URL (e.g., https:// <your hideez server name>/saml/login
) (2)
Logout URL (e.g., https:// <your hideez server name>/saml/logout
) (3)
Upload the Identity Provider public certificate (.cer) file (4).
In Hideez Server, click Add Service Provider and enter the SP values:
Name (e.g., Google Workspace-SAML
)
Issuer / SP Entity ID (e.g., https://accounts.google.com/samlrp/unique-id
) (1)
ACS URL (e.g., https://accounts.google.com/samlrp/unique-id/acs)
(2)
Click Add