Set Up Capella SSO Using Google Workspace
- Capella Operational
- how-to
Configure Single Sign-On (SSO) between Google Workspace and Couchbase Capella to allow your organization’s users to authenticate securely without managing separate credentials. This integration enables streamlined access management while maintaining enterprise-grade security.
Prerequisites
To configure Google Workspace as an IdP, you need:
-
To enable SSO for your Capella organization.
-
To sign in to the Google Cloud Console as a super administrator.
Procedure
Choose the tab for your preferred authentication protocol.
-
SAML
-
OIDC
To configure federated and SSO authentication using SAML with Google as your identity provider (IdP), you must complete three procedures in the following order:
Start by adding an app for Capella in the Google Cloud Console. You need information resulting from this step to create a realm in Capella.
-
In the Google Cloud Console, click
. -
Click
. -
Complete these fields:
-
App Name: Enter the display name for this app.
-
(Optional) Description: Add a description of the application.
-
(Optional) App Icon: Add the Capella logo.
-
Click Continue.
Leave this new page open as you need its information for the next step.
-
-
Create a realm in Capella using information from Google.
-
In the Capella UI, click
. -
Click
. -
Complete the Create Realm page:
-
Copy the following configuration details from Google into Capella:
Google Field Capella Field Certificate
SAML Signing Certificate
SSO URL
Sign-in Endpoint URL
-
Verify that the remaining SAML protocol settings are as follows:
Field Value Signature Algorithm
RSA-SHA256
Digest Algorithm
SHA256
SAML Protocol Binding
HTTP-POST
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you must finish configuring the custom SAML app in Google.
-
Returning to the Google Cloud Console, on the Add custom SAML app setup page, click Continue.
-
Copy and paste the following fields from your Capella realm configuration into the Google custom SAML app setup:
To find this information for your organization’s Capella realm, open the page. Listed on this page is the realm you just created with an auto-generated name. Click its listing to open the realm information page.Capella Field Google Field Callback URL
ACS URL
Entity ID
Entity ID
-
In the Google Cloud Console, click Continue.
-
Add the following attributes:
Google Directory attributes App attributes Primary email
email
First name
given_name
Last name
family_name
-
Add group membership.
Google groups App attribute Relevant Google groups, such as admins.
Groups
-
Click Finish.
A page for the new custom SAML web app automatically loads with its configuration details.
-
Turn on the SAML web app for everyone:
To turn on the service for an organizational unit or user group, see Google Workspace Admin Help. -
Click User access.
-
Click On for everyone.
-
Click Save.
It may take a few minutes for these changes to apply.
-
To configure federated and SSO authentication using OIDC with Google as your identity provider (IdP), you must complete three procedures in the following order:
Start by adding an OAuth client configuration for Capella in the Google Cloud Console. You need information from this step to create a realm in Capella.
-
In the Google Cloud Console, create a new project.
-
With the new project open, click
. -
Click Configure consent screen.
-
Click Get started.
-
Complete the App Information, Audience, Contact Information, and Finish sections of the consent screen configuration:
-
App name: Enter a meaningful app name.
-
User support email: Choose or add a contact email for questions about users' consent.
-
Audience: Choose the Internal audience type.
-
Contact information: Add a contact email for Google to notify you about changes to your project.
-
-
Review the User Data Policy. Click Continue
-
Click Create.
-
Click
. -
Add the following scopes:
-
…/auth/userinfo.email
-
…/auth/userinfo.profile
-
openid
-
-
Click Update.
-
Click Save.
-
Click
and configure the OAuth client:-
Application type: Select Web application.
-
Name: Enter a name for your Capella integration.
-
Authorized JavaScript origins: Leave empty.
-
Authorized redirect URIs: Leave empty for now—you’ll add this later.
-
-
Click Create.
Your Client ID and Client Secret are shown. Keep this information secure as you’ll need it for the next step.
With the OAuth client created in Google, you need to create a realm in Capella using its information.
-
In Capella, click
. -
Click
. -
Copy the following information from your Google Oauth client to Capella:
Google Field Capella Field https://accounts.google.com/.well-known/openid-configuration
(this is fixed)OpenID Connect Discovery URL
Client ID
Client ID
Client secret
Client Secret
-
Configure scopes:
Scopes determine which user information Capella requests from your identity provider. The
openid
,email
, andprofile
scopes are automatically included in the realm by default, so you do not need to add them.When adding additional scopes, separate each entry with a space.
-
Configure a default team and group mapping.
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you need to finish configuring the Google Workspace OAuth client.
-
In the Google Cloud Console, open the OAuth client you created for Capella.
-
Copy the following field from your Capella realm configuration to the Google OAuth client configuration:
To find this information for your organization’s Capella realm, open the page. Listed on this page is the realm you just created with an auto-generated name. Click its listing to open the realm information page.Capella Field Google Field Callback URL
Authorized redirect URIs
-
Click Save.