After creating the application, you need to configure the SAML settings, which will allow Langdock to authenticate users via SAML.First, you need to copy configuration values from the Google Workspace Admin console to Langdock.In Langdock, navigate to the Security settings and activate the “SAML Active” toggle. After this, you need to fill out the following fields:
“Issuer”: can be any unique id of your custom SAML app, e.g., langdock.com
“Sign on URL”: The “SSO URL” value from Google Workspace Admin console (e.g., https://accounts.google.com/o/saml2/idp?idpid=XXXXXXXXX)
“Certificate”: The “Certificate” value from Google Workspace Admin console. This will be in the format of:
Now, you can click “Continue” in the Google Workspace Admin console to proceed with the SAML configuration.In the “Service provider details” section, you need to fill in the following values:
“ACS URL”: The “Assertion Consumer Service (ACS) URL” value from Langdock
“Entity ID”: The same value as the “Issuer” field in the previous step (e.g., langdock.com)
“Signed response”: Make sure this is checked
You can leave the other fields empty or with their default values. (“Name ID format”: UNSPECIFIED and “Name ID”: Basic Information > Primary email). Click “Continue” to proceed.In the “Attribute mapping” section, you can leave the default values or map additional attributes if needed. Click “Finish” to complete the SAML configuration.Make sure to assign the application to the users or groups in your Google Workspace account who should have access to Langdock.
To test the SAML setup, open seperate browser or an incognito window and navigate to https://app.langdock.com.Enter an email address of a user in your Google Workspace account and click “Continue”.You will be redirected to the Google login page, where you can enter your credentials.After successful authentication, you will be redirected back to Langdock and logged in.