This example describes how to integrate Google Workspace as a SAML identity provider (IdP) for an Oxide silo. It assumes that you have a Google Workspace domain with admin access, as well as access to the Oxide Console with fleet admin permissions.
Create SAML App in Google Admin Console
Log in to the Google Admin Console using a web browser.
Navigate to Apps > Web and mobile Apps > Add app > Add custom SAML app and proceed through the wizard to create a new SAML app.
In the "Google Identity Provider details" section, download the IDP metadata file, and save the Entity ID for later use.
In the "Service provider details" section, set the ACS and Entity ID fields to the following values:
ACS URL:
https://$SILO_NAME.sys.$RACK_FQDN/login/$SILO_NAME/saml/googleEntity ID:
https://$SILO_NAME.sys.$RACK_FQDN/login/$SILO_NAME/saml/googleStart URL (optional): Same as ACS URL
Name ID Format: Unspecified
Name ID (value): Basic Information > Primary Email
In the Attributes Mapping section, create whichever attributes that you’d like to map to Oxide. At minimum, you’ll want to map a
groupattribute in order to pass on the user’s group membership.
Assign Users and Groups
Now that the SAML app is created, assign users or groups to the app in the Google Admin Console.
Configure Oxide Silo and Identity Provider
Create Silo in Oxide
In the Oxide Console:
Navigate to System > Silos and create a new silo.
Silo Name: Must match the name you used in the Google SAML configuration.
Admin Group Name: Must match the group name in Google (e.g.,
admins).
Upload a TLS certificate valid for the silo domain.
Create Identity Provider in Oxide
In the silo’s Identity Provider tab, click New Provider and populate each field. See below for an example using the silo name corp and the domain oxide.acme.com:
| Field | Value |
|---|---|
Provider Name |
|
Description |
|
Entity ID | This value corresponds to the |
Service provider client ID |
|
Metadata source | Import the IDP metadata file |
ACS URL | |
SLO URL | |
Technical contact email |
|
Group attribute name |
|
Signing Keypair | Provide in Base64-encoded DER format. |
Log in to Oxide
After configuring the identity provider, log in to your Oxide Silo using the Google SSO button.
group attribute.