Overview
This tutorial explains how to configure Incydr to use single sign-on (SSO) with Google.
This article assumes you are already familiar with SSO and the SAML standard. For more information about how Incydr implements SSO, see our Introduction to single sign-on.
Single sign-on (SSO) for Incydr
• These SSO instructions apply only if you access Incydr directly via a console.*.code42.com URL (typically for SSO configured before September 2025).
• If you access Incydr from the Mimecast Administration Console after signing in at login.mimecast.com, these instructions do not apply to you (typically for SSO configured after September 2025).
• Directory services information, however, applies to all Incydr environments.
Considerations
Before you begin
Verify network connectivity
Configure your private network, Internet, and VPN settings to allow client devices to communicate with your identity provider on ports 80 and 443. Test client connectivity to the identity provider before you proceed.
Determine whether you need to configure multiple Incydr tenants
Step 1: Determine the URLs for your Incydr environment
Step 2: Add the SAML app in Google
Perform the following steps to set up a custom SAML app in Google to connect to Incydr. For general information about setting up a custom SAML app, see Google's documentation.
- Sign in to the Google Admin console.
- Select Apps > Web and mobile apps.
- Select Add app > Add custom SAML app.
- Enter an App name and click Continue.
- Click Download Metadata, save the file for use in Step 3 below, and click Continue.
- On the Service provider details page, complete the fields with values you obtained in Step 1. For example::
-
ACS URL:
https://example.com/api/SsoAuthLoginResponse -
Entity ID:
https://example.com/tenantid -
Start URL:
https://example.com/login
-
ACS URL:
- Leave Signed response unchecked and click Continue.
- On the Attributes page, click Add mapping and add the following mappings:
- Primary email > uid
- First name > givenName
- Last name > sn
- Click Finish.
Details of the SAML are displayed. - Click User access and turn on the service for a test group.
Test with a group first before turning on the service for all users. For more information, see Google's documentation.
Step 3: Add Google as an authentication provider
- Sign in to the Incydr console.
- Navigate to Administration > Integrations > Identity Management.
- Click Add Authentication Provider.
- In Display name, enter an identity provider name to display to users that sign in with SSO.
If your environment provides more than one SSO identity provider, users see a list of providers to choose from. They must select the provider configured for their Incydr organization. - In Provider's metadata, select Upload file, click Select a file, and select the metadata file you downloaded in Step 2.
- Click Create provider.
Authentication provider settings appear.
Note the following message on the dialog:
This provider will not be applied to an organization until you update the organization security settings.
Do not apply this authentication provider to organizations yet. You will apply this provider to a test organization and to production organizations in later steps.
- If you do not use the default settings (they must match the mappings in Step 2 above), you can use Attribute mapping to customize additional mappings between Incydr user attributes and authentication provider SSO assertion attributes.
- Local Users displays the current user. If there are any other users you want to exempt from using this authentication provider to log in, enter them here.
Step 4: Test SSO authentication
Step 5: Apply this provider to production organizations
Step 6: Add new users who sign in with SSO
- Assign the custom SAML app to users or groups in the Google dashboard. See Google's documentation for more information.
- Ensure users are set up in V. You can add users manually with the Incydr console to an organization that uses SSO, or deploy agents to users in an organization that uses SSO. The users in Incydr must have first name, last name, and user name (email address) values that match the users' values in Google.
What to expect
Reduced authentication prompts
Lost access to an identity provider
Troubleshooting
Expired SSL certificate
If the SSL certificate for your identity provider expires, follow these steps to delete and re-add the provider:
- In the Incydr console, select Administration > Integrations > Identity Management.
- From the Actions menu, select Delete this authentication provider.
- Follow the steps above to re-add the provider with a new XML metadata file that applies to the new certificate.
Error: app_not_configured_for_user
Backup agent only
If a user attempts to sign in to Incydr and receives the Error: app_not_configured_for_user message, it may be due to one of the following problems.
-
The user is already authenticated in Google with a non-corporate account
To resolve this issue, the user should sign in to Google using their corporate account, or log out completely from all Google accounts before signing in to their corporate account. -
Incorrect application configuration
To resolve this issue, verify that the service provider settings for the custom SAML app are configured correctly in the Google admin console.
For more failure types and solutions, see the Google documentation.
External resources
- Wikipedia:
- Google: Set up your own custom SAML application
Comments
Please sign in to leave a comment.