Skip to content

🛡️ Using Google Workspace as a SAML Identity Provider Only

This document explains how to configure Google Workspace so that it acts only as a SAML Identity Provider (IdP) for Salesforce logins — without giving users Gmail, Drive, or other Google Apps access.

The goal is to make login easy for members while keeping Google Workspace invisible to them.


🎯 Goal

  • Authenticate members into Salesforce via SAML Single Sign-On.
  • Prevent members from accessing Gmail, Drive, Calendar, etc.
  • Avoid sending unnecessary account emails to members.
  • Keep Google Workspace "silent" — used only for authentication.

✅ Steps to Configure

1. Create Bare-Bones Google Accounts

  • In Google Admin Console:
  • Go to Directory → Users → Add new user.
  • When adding a user, uncheck "Send login info to this email address" to avoid sending a welcome email.

Alternatively, when bulk importing users via CSV: - Do not specify notification email fields. - Upload users without triggering email alerts.

⚡ Members will not be notified or required to interact with Google directly.


2. Restrict Access to Google Apps

Set up an Organizational Unit (OU) to manage app access:

  • Create a new OU called IdP Only Users.
  • Move all SAML-only users into this OU.
  • In Apps > Google Workspace > Settings for Org Units:
  • Disable:
    • Gmail
    • Google Drive
    • Google Calendar
    • Google Meet
    • Google Chat
    • Any other unneeded Google Apps
  • Leave enabled:
  • Google Identity Services (required for SAML authentication)

✅ This ensures users cannot use Google services — only authentication via SAML.


3. Manage Salesforce User Records

  • Maintain standard Salesforce users (create, deactivate as needed).
  • Ensure each Salesforce User's Federation ID matches their Google Workspace Primary Email.
  • Continue managing user permissions (Profiles, Roles, Permission Sets) within Salesforce.

🔥 How Login Works for Members

Step What Happens
Member visits Salesforce login page
Member clicks "Login with SSO"
Google Workspace authenticates identity (behind the scenes)
Member is redirected into Salesforce

🧠 The member never directly logs into Google Workspace, sees a Gmail inbox, or manages a Google password.


📋 Key Admin Reminders

  • When a member leaves, deactivate their Salesforce user and optionally suspend their Google Workspace account.
  • If Spokane Mountaineer membership grows beyond the Nonprofit Google tier limits (currently ~2000 users), monitor your Workspace license usage.
  • Keep a consistent naming convention for user emails, e.g., firstname.lastname@yourorg.org.
  • Regularly audit your OUs to ensure proper separation of "IdP Only" users.

🚀 Optional Future Enhancements

  • Automate user creation in Google Workspace with scripts or APIs.
  • Use Data Loader in Salesforce for batch updates to Federation IDs.
  • Implement monitoring to ensure consistency between Google and Salesforce user directories.

🧠 Summary

Area Responsibility
Google Workspace Authentication Only (no Apps access)
Salesforce User Management, Authorization, Permissions
Member Experience Simple, no new accounts to manage

By following this setup, your members will enjoy a seamless, simplified login experience, and your admin team will maintain full control over access without additional complexity.