Single Sign-On: Google configuration

Integration with the Google Identity SSO provider

Currently, only authentication of existing users is supported via SAML 2.0. New team members cannot be automatically created by logging in through a SAML 2.0 provider. An admin will still need to create/invite the team member through the Medallia Agent Connect platform.

Demonstration of google SAML configuration

Step 1. Configure your Identity Provider

Below are the settings you will need to configure the Agent Connect SAML cloud app within your Google Identity Provider, if you are unsure of your subdomain please reach out to your Client Services Manager.

You must be signed in as a super administrator for this task.

With Security Assertion Markup Language (SAML), your users can sign in to enterprise cloud applications with their Google Cloud credentials.

Set up: https://support.google.com/a/answer/9073633?hl=en&ref_topic=6304952

Step 2. Provide Your Configuration to Medallia

The identity provider should generate a couple of pieces of data that will need to be supplied to the Support or Professional Services team.

You will be asked to provide:

  • Identity Provider Single Sign-On/Login URL

  • X.509 Certificate

Step 3. Test the Configuration

Once the configuration has been setup within Agent Connect, you will be able to test the Single Sign-on by visiting https://{your_subdomain}.stellaconnect.net/employees/sign_in?sso=true and clicking Sign in with provider.

Step 4. Go Live

When you are completed with testing, just contact us and we will enable your SAML configuration to be the default and ONLY login option for all team members. At this point, all team members that visit the login page for Agent Connect will be immediately redirected to the Identity Provider for login.