Search Results :


Drupal SAML Single Sign On using Google Apps as Identity Provider

The Drupal SAML integration using the miniOrange SAML SP module establishes seamless SSO between Google Apps and the Drupal site. The users will be able to log in to the Drupal site using their Google Apps credentials. This document will walk you through the steps to configure Single Sign-On - SSO between Drupal as a Service Provider (SP) and Google Apps as an Identity Provider (IdP). The module is compatible with Drupal 7, Drupal 8, Drupal 9, and Drupal 10.

Installation Steps

  • Download the module:
    Composer require 'drupal/miniorange_saml'
  • Navigate to Extend menu on your Drupal admin console and search for miniOrange SAML Service Provider using the search box.
  • Enable the module by checking the checkbox and click on install button.
  • Configure the module at
  • Install the module:
    drush en drupal/miniorange_saml
  • Clear the cache:
     drush cr
  • Configure the module at
  • Navigate to Extend menu on your Drupal admin console and click on Install new module button.
  • Install the Drupal SAML SP 2.0 Single Sign On (SSO) - SAML Service Provider module either by downloading the zip or from the URL of the package (tar/zip).
  • Click on Enable newly added modules.
  • Enable this module by checking the checkbox and click on install button.
  • Configure the module at

Drupal SAML SP Metadata:

  • After installing the module on your Drupal site, in the Administration menu, navigate to Configuration → People → miniOrange SAML Login Configuration. (/admin/config/people/miniorange_saml/idp_setup)
  • Drupal SAML Single Sign-On - Select miniOrange SAML Login Configuration
  • Copy the SP Entity ID/Issuer and the SP ACS URL from the Service Provider Metadata tab. Keep it handy. (This is required to configure Google Apps as IdP.)
  • Drupal SAML Single Sign-On - Copy SP information which is required to configure Google as IdP

Configure SAML Single Sign-On Application in Google Apps:

  • Login into your G-Suite Administration account.
  • Navigate to the Apps from the left panel and click on Web and mobile apps.
  • Google SAML Single Sign-On - Select Web and mobile app under Apps
  • Click on the Add app, and select the Add custom SAML app from the dropdown.
  • Google SAML Single Sign-On - Select Add Custom SAML app
  • Enter the App name and Description (optional). Click on the CONTINUE.
  • Google SAML Single Sign-On - Enter App name
  • Click on the DOWNLOAD METADATA button. Keep the downloaded file handy. (This is needed to configure Drupal as SAML SP.)
  • Google SAML Single Sign-On - Download IdP Metadata, it's required to configure Drupal as SP
  • Paste the copied SP Entity ID/Issuer and SP ACS URL (from Drupal site) into the Entity ID and ACS URL text field, respectively. Click on CONTINUE.
  • Google-SAMl-Single-Sign-On-Provide-the-required-information-and-click-save
  • In the Attribute mapping panel, select a user field from the dropdown under the Google Directory attribute (First name) and the corresponding attribute key to be sent in the response (field_fname). You can add more attributes using ADD.
  • Google-SAML-Single-Sign-On-Map-Attribute

Add Users to Google (G Suit) Application:

  • In the Google Admin console, navigate to Menu → Apps → Web and mobile apps.
  • Select the application that you have created on Google Apps. (In this case, Drupal_SAML).
  • Click on the User access
  • Google SAML Single Sign-On - User access
  • Enable the checkbox ON for everyone and click on the SAVE button.
  • Google SAML Single Sign-On - Enable the checkbox On for everyone

Configure Drupal as SAML Service Provider:

  • Navigate to the Service Provider Setup tab of the Drupal site and click on Upload IDP Metadata.
  • Choose the metadata file that you downloaded from Google Apps and click on the Upload File button.
  • Drupal-SAML-Paste-the-Federation-Metadata-URL-into-the-Upload-Metadata-URL

    Note: To update Identity Provider Name, follow these steps:

    • Under Action, select the Edit.
    • Enter Google Apps in the Identity Provider Name text field.
    • Scroll down and click on the Save Configuration button.

  • Click on the Test link to test the connection between Drupal and Google Apps.
  • Drupal-SAML-Click-on-Test-link-to-verify-the-connection-between-drupal-and-azure
  • On a Test Configuration popup sign in using Google App credentials (if an active session is not present). After successful authentication, a list of attributes that are received from Google App will be displayed. Click on the Done.
  • drupal saml Single Sign On as SP - click on Done button

Congratulations! you have successfully configure Google App as SAML Identity Provider (IdP) and Drupal as SAML Service Provider.

How does SAML SSO login work?

  • Open a new browser/private window and navigate to the Drupal site login page.
  • Click the Login using Identity Provider (Google App) link.
  • You will be redirected to the Google App login page. Enter the Google credentials. After successful authentication, the user will be redirected back to the Drupal site.

Additional Features:

Explore the advanced features offered by the module with full-featured trial. You can initiate the trial request using Request 7-day trial button of the module or reach out to us at for one-on-one assistance from Drupal expert.

 Case Studies
miniOrange has successfully catered to the use cases of 400+ trusted customers with its highly flexible/customizable Drupal solutions. Feel free to check out some of our unique case studies using this link.
 Other Solutions
Feel free to explore other Drupal solutions that we offer here. The popular solutions used by our trusted customers include 2FA, User Provisioning, Website Security. 
  24*7 Active Support
The Drupal developers at miniOrange offer quick and active support for your queries. We can assist you from choosing the best solution for your use case to deploying and maintaining the solution.
Hello there!

Need Help? We are right here!

Contact miniOrange Support

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to