1. In Google Workspace
- Open the Google Admin console.
- Apps → Web and mobile apps → Add app → Add custom SAML app.
- Name the app “Quippy”. Upload a logo if you like. Continue.
- Google Identity Provider details — click Download metadata (you’ll
paste this XML into Quippy) or copy the three fields individually:
- SSO URL
- Entity ID
- Certificate (download the PEM)
- Service provider details:
- ACS URL — the SAML ACS URL from Quippy.
- Entity ID — the SAML Entity ID from Quippy.
- Name ID format —
EMAIL. - Name ID —
Basic Information > Primary email.
- Attribute mapping — optional, but add any group attributes you plan to
map to roles (see
Group → role mappingin the Quippy SSO page). - Turn the app ON for everyone (or for the relevant OUs).
Google Admin console — Add custom SAML app → Service provider details.
2. In Quippy
In the admin portal’s SSO page, pick SAML 2.0, then paste:| Quippy field | Value from Google |
|---|---|
| IdP Entry Point | SSO URL from Google’s IdP details |
| IdP Entity ID | Entity ID from Google’s IdP details |
| Signing Certificate | The PEM certificate Google let you download |
| Signature Algorithm | SHA-256 |
- SAML 2.0 (the supported path)
- OIDC (not supported here)
Use the mapping above. This is what Google Workspace supports for
third-party apps.
3. Test connection
Click Test connection. Quippy fetches the IdP Entry Point and checks the response looks like SAML metadata (containsEntityDescriptor or
IDPSSODescriptor).
Once green, enable SSO. Keep a backup admin until your
first SSO sign-in succeeds.
Common gotchas
App not turned ON for the user's OU
App not turned ON for the user's OU
Even with SAML configured, users whose Org Unit doesn’t have the app
enabled will fail sign-in. Toggle the app ON for the relevant OUs.
Wrong Name ID format
Wrong Name ID format
Name ID should be
EMAIL → Basic Information > Primary email. If it’s
set to something like “Unique ID”, user provisioning in Quippy can fail
because we match on email.Certificate has CRLF line endings
Certificate has CRLF line endings
Copy the certificate as plain text, PEM-formatted. Editors on Windows
sometimes introduce
\r\n line endings that break cert parsing.