Skip to main content

Google Workspace SSO Setup

Complete step-by-step guide to configure SAML-based Single Sign-On between Google Workspace and NetSuite.


Overview

GOOGLE WORKSPACE SSO ARCHITECTURE
═══════════════════════════════════════════════════════════════════════════════

┌─────────────────────┐ ┌─────────────────────┐ ┌─────────────────────┐
│ │ │ │ │ │
│ USER │ │ GOOGLE │ │ NETSUITE │
│ │ │ WORKSPACE │ │ │
│ 1. Access NetSuite │ ──────▶ │ │ │ │
│ │ │ 2. Authenticate │ │ │
│ 3. Enter Google │ ──────▶ │ with 2FA │ │ │
│ credentials │ │ │ │ │
│ │ ◀────── │ 4. SAML Assertion │ ──────▶ │ 5. Validate & │
│ │ │ │ │ Grant Access │
│ │ │ │ │ │
└─────────────────────┘ └─────────────────────┘ └─────────────────────┘

Prerequisites

Before You Begin

RequirementDetails
Google WorkspaceBusiness Starter, Standard, Plus, Enterprise, or Education
Google Admin RoleSuper Admin
NetSuite RoleAdministrator
NetSuite Account IDFound in Setup > Company > Company Information
Matching EmailsUser emails must match between Google and NetSuite

Part 1: NetSuite Configuration

Step 1: Enable SAML SSO Feature

  1. Log in to NetSuite as Administrator
  2. Navigate to Setup > Company > Enable Features
  3. Click SuiteCloud subtab
  4. Check SAML Single Sign-on
  5. Click Save

Step 2: Get NetSuite SAML Information

  1. Navigate to Setup > Integration > SAML Single Sign-on
  2. Note down the following values:
NETSUITE SAML ENDPOINTS
═══════════════════════════════════════════════════════════════════════════════

Entity ID (Audience):
https://system.netsuite.com/saml2/sp/{YOUR_ACCOUNT_ID}/acs

ACS URL (Reply URL):
https://system.netsuite.com/saml2/sp/{YOUR_ACCOUNT_ID}/acs

Example (if Account ID is 1234567):
Entity ID: https://system.netsuite.com/saml2/sp/1234567/acs
ACS URL: https://system.netsuite.com/saml2/sp/1234567/acs

Part 2: Google Workspace Configuration

Step 3: Access Google Admin Console

  1. Go to admin.google.com
  2. Sign in with your Super Admin account
  3. Navigate to Apps > Web and mobile apps

Step 4: Add SAML Application

  1. Click Add app dropdown
  2. Select Add custom SAML app

Step 5: App Details

  1. Enter App name: NetSuite
  2. (Optional) Upload app icon
  3. Click Continue

Step 6: Download Google IdP Information

On the Google Identity Provider details page, you'll see:

GOOGLE IDP INFORMATION
═══════════════════════════════════════════════════════════════════════════════

SSO URL:
https://accounts.google.com/o/saml2/idp?idpid={YOUR_IDP_ID}

Entity ID:
https://accounts.google.com/o/saml2?idpid={YOUR_IDP_ID}

Certificate:
[Download Certificate button]

Important Actions:

  1. Download the certificate (click Download Certificate)
  2. Copy the SSO URL
  3. Copy the Entity ID
  4. Click Continue

Step 7: Configure Service Provider Details

Enter NetSuite's SAML information:

FieldValue
ACS URLhttps://system.netsuite.com/saml2/sp/{ACCOUNT_ID}/acs
Entity IDhttps://system.netsuite.com/saml2/sp/{ACCOUNT_ID}/acs
Start URL(leave blank or https://system.netsuite.com)
Signed ResponseChecked
Name ID FormatEMAIL
Name IDBasic Information > Primary email

Click Continue

Step 8: Configure Attribute Mapping

Map Google user attributes to SAML claims:

Google Directory AttributeApp Attribute
Primary emailemail
First namefirstName
Last namelastName
ATTRIBUTE MAPPING CONFIGURATION
═══════════════════════════════════════════════════════════════════════════════

Required Mapping:
┌─────────────────────────────────────────────────────────────────────────────┐
│ Google Directory → SAML Attribute │
│ ────────────────────────────────────────────────────── │
│ Primary email → email │
└─────────────────────────────────────────────────────────────────────────────┘

Optional Mappings:
┌─────────────────────────────────────────────────────────────────────────────┐
│ First name → firstName │
│ Last name → lastName │
│ Department → department │
└─────────────────────────────────────────────────────────────────────────────┘

Click Finish


Part 3: Complete NetSuite Configuration

Step 9: Configure IdP in NetSuite

  1. Return to NetSuite: Setup > Integration > SAML Single Sign-on
  2. Enter the following:
FieldValue
Identity Provider NameGoogle Workspace
Identity Provider IssuerEntity ID from Step 6
Identity Provider Sign-in URLSSO URL from Step 6
Identity Provider Sign-out URL(leave blank)

Step 10: Upload IdP Certificate

  1. Still on SAML configuration page
  2. Scroll to Identity Provider Certificate section
  3. Click Upload Certificate
  4. Select the certificate file downloaded in Step 6
  5. Click Upload

Step 11: Configure SAML Settings

SettingRecommended Value
SAML Single Sign-onEnabled
Require SAML SSO for all loginsStart with "No", enable after testing
Name ID FormatEmail Address
Signature AlgorithmRSA-SHA256

Step 12: Save Configuration

  1. Review all settings
  2. Click Save

Part 4: Enable and Assign Users

Step 13: Turn On the App in Google

  1. Return to Google Admin Console
  2. Go to Apps > Web and mobile apps
  3. Click on NetSuite
  4. Click User access
  5. Choose one of the following:
USER ACCESS OPTIONS
═══════════════════════════════════════════════════════════════════════════════

Option 1: ON for everyone
┌─────────────────────────────────────────────────────────────────────────────┐
│ All users in your organization can access NetSuite via SSO │
│ Use when: All employees need NetSuite access │
└─────────────────────────────────────────────────────────────────────────────┘

Option 2: ON for specific organizational units
┌─────────────────────────────────────────────────────────────────────────────┐
│ Only users in selected OUs can access │
│ Use when: Only certain departments need access │
│ │
│ Steps: │
│ 1. Click on the Organizational Unit on the left │
│ 2. Set Service Status to ON │
│ 3. Repeat for each OU that needs access │
└─────────────────────────────────────────────────────────────────────────────┘

Option 3: ON for specific groups
┌─────────────────────────────────────────────────────────────────────────────┐
│ Only users in selected groups can access │
│ Use when: Access based on role rather than department │
│ │
│ Steps: │
│ 1. Click "Groups" │
│ 2. Select the group │
│ 3. Set Service Status to ON │
└─────────────────────────────────────────────────────────────────────────────┘
  1. Click Save

Step 14: Verify Users Exist in NetSuite

Ensure each assigned user has a matching NetSuite user:

  1. In NetSuite, go to Lists > Employees > Employees (or Contacts)
  2. Verify user exists with matching email address (must match Google email exactly)
  3. Verify user has Login Access enabled
  4. Verify user has appropriate Role(s) assigned

Part 5: Testing

Step 15: Test SSO Login

Method 1: IdP-Initiated (from Google)

  1. Go to myapps.google.com or Google Workspace app launcher
  2. Find and click NetSuite
  3. Should redirect and log into NetSuite

Method 2: SP-Initiated (from NetSuite)

  1. Open an incognito/private browser window
  2. Go to NetSuite login page
  3. If SSO is configured, you may be redirected to Google
  4. Or click Log in with SAML Single Sign-on
  5. Authenticate with Google credentials
  6. Should redirect back to NetSuite logged in

Step 16: Verify Login

After successful login, verify:

CheckHow to Verify
User identityCheck logged-in user name
RolesVerify correct roles appear
PermissionsTest access to expected features
Audit trailCheck Setup > Users/Roles > Login Audit Trail

Part 6: Production Rollout

Step 17: Enable Mandatory SSO (Optional)

Once testing is complete and all users are verified:

  1. Go to Setup > Integration > SAML Single Sign-on
  2. Set Require SAML SSO for all logins to Yes
  3. Click Save

Warning: Only enable after thorough testing. Keep a backup admin account or document the break-glass procedure.

Step 18: Communicate to Users

Notify users of the change:

SSO ROLLOUT COMMUNICATION TEMPLATE
═══════════════════════════════════════════════════════════════════════════════

Subject: NetSuite Login Change - Google Sign-In Enabled

Starting [DATE], NetSuite login will use your Google Workspace credentials.

What's changing:
- You'll log in using your company Google account
- 2-Step Verification (if enabled) will apply
- No separate NetSuite password needed

How to log in:
Option 1: From Google
- Go to your Google app launcher (9-dot icon)
- Click "NetSuite"

Option 2: Direct to NetSuite
- Go to NetSuite URL
- You'll be redirected to Google sign-in
- Enter your Google credentials

Questions? Contact [HELPDESK]

Troubleshooting

Common Errors and Solutions

Error: "User not found"

DIAGNOSIS AND FIX
═══════════════════════════════════════════════════════════════════════════════

Symptom: "SAML user not found in NetSuite"

Cause: Email in SAML assertion doesn't match any NetSuite user

Steps to Fix:
1. Check Google user's email: Admin Console > Users > [User]
2. Check NetSuite user's email: Lists > Employees > [Employee] > Email
3. Ensure they match exactly
4. Verify NetSuite user has Login Access enabled
5. Check that Name ID in Google SAML app is set to "Primary email"

Error: "App not assigned"

DIAGNOSIS AND FIX
═══════════════════════════════════════════════════════════════════════════════

Symptom: "You don't have access to this app"

Cause: User's OU or group doesn't have the app enabled

Steps to Fix:
1. Go to Admin Console > Apps > Web and mobile apps > NetSuite
2. Click "User access"
3. Verify the user's OU or group has the app ON
4. Wait up to 24 hours for changes to propagate (usually faster)

Error: "Invalid signature"

DIAGNOSIS AND FIX
═══════════════════════════════════════════════════════════════════════════════

Symptom: "SAML signature validation failed"

Cause: Certificate mismatch or expired

Steps to Fix:
1. Go to Admin Console > Apps > NetSuite > Download Certificate
2. Re-upload certificate in NetSuite SAML configuration
3. Verify "Signed Response" is checked in Google app settings

Error: "ACS URL mismatch"

DIAGNOSIS AND FIX
═══════════════════════════════════════════════════════════════════════════════

Symptom: "Reply URL does not match configured ACS URL"

Cause: ACS URL in Google doesn't match NetSuite expectation

Steps to Fix:
1. Verify account ID in ACS URL
2. Format: https://system.netsuite.com/saml2/sp/{ACCOUNT_ID}/acs
3. Update in Admin Console > Apps > NetSuite > Service provider details
4. Save and test again

Debug Tools

ToolPurpose
SAML-tracer (browser extension)View SAML request/response
Google Admin Console > Reports > AuditCheck SSO events
NetSuite Login AuditCheck NetSuite login attempts

Advanced Configuration

2-Step Verification (2FA)

Google's 2-Step Verification applies to SSO:

2-STEP VERIFICATION FLOW
═══════════════════════════════════════════════════════════════════════════════

User accesses NetSuite


Redirect to Google


Enter Google password


2-Step Verification prompt
(if enabled for user)

├── Google Authenticator code
├── Security key
├── Google prompt on phone
└── Backup codes


SAML assertion to NetSuite


Access granted

To enforce 2-Step Verification:

  1. Admin Console > Security > 2-Step Verification
  2. Set enforcement policy

Context-Aware Access (Enterprise)

For Google Workspace Enterprise, add additional access controls:

  1. Go to Security > Access and data control > Context-Aware Access
  2. Create access levels based on:
    • IP address
    • Device security status
    • Location
  3. Apply access levels to NetSuite app

Maintenance

Certificate Management

Google certificates are valid for 5 years, but you can rotate them:

  1. Admin Console > Apps > NetSuite
  2. Click SAML Settings
  3. Generate new certificate
  4. Download new certificate
  5. Upload to NetSuite
  6. Test SSO
  7. Remove old certificate from NetSuite

User Lifecycle

EventAction Required
New hireCreate NetSuite user, ensure in correct OU/group
TerminationSuspend/delete Google account (immediate access revocation)
Email changeUpdate both Google and NetSuite
Role changeUpdate NetSuite roles (Google doesn't control roles)

Comparison: Google vs Entra ID SSO

FeatureGoogle WorkspaceMicrosoft Entra ID
Setup complexitySimpleModerate
Certificate validity5 years1 year (default)
Conditional accessEnterprise onlyP1/P2 license
Group-based accessYesYes
SCIM provisioningLimitedFull support
Audit loggingYesYes
MFA2-Step VerificationAzure MFA

Next Steps