Before you begin, make sure you have an Admin account (Viewer or Contributor) with Abstract
- As an Admin, create a new SAML app called Abstract in admin.google.com.
- Configure your ACS URL and Entity as follows (shown in screenshot below):
|Abstract’s Assertion Consumer Service (ACS) URL||https://auth.goabstract.com/saml/response|
3. Add an Attribute Mapping called exactly “email” (shown in screenshot below):
About SAML responses:
- We currently only support HTTP:POST binding.
- We are expecting an “email” Assertion Attribute, as shown below.
<saml2:Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified"> <saml2:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">email@example.com</saml2:AttributeValue></saml2:Attribute>
About XML Metadata:
By default, Google SAML provides a URL to your XML metadata that is only accessible for authenticated admins. You’ll need to have your XML metadata available via a public URL in order to configure SSO on Abstract. You can use https://pastebin.com to create a public URL. Simply, create a + new paste with your XML metadata and click on the raw button.
- Open the Abstract web app.
- Go to the Permissions page in the left side bar.
- In the Configure SSO section, enter your Metadata URL and Entity ID.
- Enter any manual exceptions you might have. Emails listed in the manual exceptions section will bypass SSO and be able to log in with email and password.
- Note: You’ll need to use primary email addresses in the manual exceptions list. SSO activation will fail if the email you list is a user’s secondary email. If that happens, you’ll see an error message with the primary email for the failing account. Add that primary email to the manual exceptions list after you’ve verified you know the user.
- Click Test with my Account. If an error occurs when trying to authenticate into Abstract, please consult Google’s Help Center first. If additional assistance is need you can contact our support team.
- Toggle Activate SSO on.
- Click Save Changes.