# Google Cloud Identity

### **Overview**

MangoApps supports integration with Google Cloud Identity as an SSO provider using LDAP. This integration allows user and group synchronization between Google Cloud Identity and MangoApps, eliminating the need for complex on-premise Active Directory setups.&#x20;

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2Fgyaj6nXuPSFDVjNqtvsy%2Fgoogle-cloud-logo.png?alt=media&#x26;token=c896b7f8-8927-4302-abd5-67e0688aff8d" alt="" width="545"><figcaption></figcaption></figure>

This configuration saves IT overhead and enhances user management efficiency for enterprises already leveraging Google’s cloud infrastructure.

***

### **Required Roles**

To set up and manage this integration, the following roles are required:

* **Google Cloud Identity Admin:** Responsible for configuring the LDAP client within the Google Admin Console.
* **MangoApps Network Admin:** Required to access the MangoApps Admin Portal to complete the LDAP connection setup and sync configuration.

Ensure that both roles have the necessary access permissions in their respective platforms before proceeding.

***

### Google Admin Console Configuration **Side Setup**

Log in to Google Admin Console from here: [admin.google.com](https://admin.google.com). Log in using a Google Cloud Identity Admin account.

Navigate to `Apps > LDAP > Add Client`.

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2FvsQ8CemzUCHzOugIDqhT%2Ferghsaea.png?alt=media&#x26;token=8ef9ead2-2984-4587-9c12-26bbd2e03d42" alt="" width="563"><figcaption></figcaption></figure>

Provide a **Client Name** and **Description**.

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2FydpZSQOtJqWe2569PPUd%2Fsrthfsghdf.png?alt=media&#x26;token=cded2566-0b86-4dd3-b1aa-5b847fb56b9c" alt=""><figcaption></figcaption></figure>

**Set Access Permissions**

* **Verify User's Credentials:** Select **Entire Domain**.
* **Read User's Information:** Select **Entire Domain**.
* **Attributes Access:** Choose **System attributes**, **Public Custom**, and **Private Custom**.

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2F4nGZAlwdGpgMfZDwb2pL%2Ffsdfsdf.png?alt=media&#x26;token=4ae79382-7b5c-4819-86a1-6a9ad1bcfedf" alt="" width="563"><figcaption></figcaption></figure>

* **Enable Group Access:** Toggle on the **Read Group Information** setting.

Finally, click the **Add LDAP Client** button.

**Download Certificate**

* Download the automatically generated certificate.
* Click **Continue to Client Details**.

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2FT3mgrFwJ2d1ans46ODpu%2Frhfgfbfd.png?alt=media&#x26;token=176c5ab9-0e22-45a3-90b0-8d2d009c4c50" alt="" width="563"><figcaption></figcaption></figure>

**Generate Credentials**

Go to `Apps > LDAP > Settings > Authentication` and generate new credentials for authentication.

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2Fv1Ll6VeKNH8dlW6tNix4%2Frgfdsfgdxcvx.png?alt=media&#x26;token=4460893e-05fd-4df6-ba21-d65484b8d529" alt="" width="563"><figcaption></figcaption></figure>

**Enable Service**

Go to the **Status Service**, select **ON for everyone**, and click **Save**.

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2Fbtkt5pPial0OkOHzhKjT%2Fgrser.png?alt=media&#x26;token=3e5980ec-9890-4600-aa0f-016db387cdc5" alt="" width="548"><figcaption></figcaption></figure>

***

### **MangoApps Side Setup**

Log in to the MangoApps Admin Portal and navigate to `Admin Portal > SSO > Connection > Active Directory/LDAP`. Toggle on **Active Directory LDAP Integration**.

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2Fi9LjchnqWpZnHRDlghDg%2F27-05-2025-02-40-15.png?alt=media&#x26;token=94606d7d-4e38-429b-85bb-f018aa6b5a3c" alt="" width="563"><figcaption></figcaption></figure>

Configure server settings as follows:

* **Server Type:** Select **Google LDAP** from the dropdown.
* **Host & Port:** Enter the values provided by your LDAP configuration.
* **Group DN & Base DN:** Enter the names required.
* **Certificate:** Upload the certificate downloaded from the Google Admin Console.
* **Login Details:** Enter the username and password generated earlier.

Click **Test Connection** to verify.

***

**Configure User Mapping**

Set up user attribute mappings to sync profile data.

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2F5D05KnNw66Hp5oQ28tyr%2F27-05-2025-02-48-17.png?alt=media&#x26;token=a55a86b7-61f0-4407-aafb-c3ad0b465920" alt="" width="563"><figcaption></figcaption></figure>

Choose between **Scheduled Sync** or **Just-In-Time (JIT) Sync** and use **User Object Filters** to define which users should be synced.

***

**Configure Group Mapping**

Enable **Group Sync** by checking the box anad use **Group Object Filters** to specify which groups to sync.

<figure><img src="https://1627138357-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LjKbJ2ssjhlUZRcGOXW%2Fuploads%2FLAAPbAeZkoURcl7r7eml%2F27-05-2025-02-55-19.png?alt=media&#x26;token=56e865b0-d145-4ddd-958c-b0426a39c5e6" alt="" width="563"><figcaption></figcaption></figure>

Map group attributes and apply **Group Membership Rules** to automate user assignment.

Click **Save Settings**.

Use the **Preview & Synchronize** option to view a list of users and groups that meet your filters.

***

### **Testing Considerations**

Before a full rollout:

* Use **Preview & Synchronize** to verify user and group data being pulled from Google Cloud Identity.
* Test **login behavior** with a subset of users to confirm credentials and group-based access policies.
* Confirm that changes in user profiles or group memberships in Google are reflected in MangoApps through sync.

***

### **Security Considerations**

* **Data Security:** All communication between MangoApps and Google LDAP is secured via SSL using the downloaded certificate.
* **Access Control:** Use filters to limit synchronization to only necessary users and groups.
* **Credential Handling:** Use system-generated credentials from the Google Admin Console to ensure secure authentication.

***

### **End User Experience**

For end users, this integration provides:

* **Single Sign-On (SSO):** Users log in to MangoApps using their Google Cloud Identity credentials.
* **Seamless Access:** Automatically gain access to appropriate teams and projects based on group memberships.
* **Up-to-Date Profiles:** Profile information like job title, department, and contact details remain consistent across platforms.

No additional configuration is needed on the user's end.

***

### **Rollout Recommendations**

To ensure a smooth transition:

* Begin with a small user group to validate the integration.
* Provide internal guides to explain the new login process.
* Have IT support available during rollout to address any access issues.
* Roll out to departments or regions in phases if your organization is large.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://guides.mangoapps.com/integrations-guide/single-sign-on/sso-integrations-by-provider/sso-integrations-for-google-workspace/google-cloud-identity.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
