Add Genesys Cloud as an application that organization members can access with the credentials to their Google Workspace account.
There is a general problem when a Service Provider (SP) receives a SAML response from an Identity Provider (IdP) and their system clocks are not in sync. This problem can result in users getting locked out of their single sign-on when logging in. The problem might be caused by the length of the clock skew between the SP and the IdP. Clock skews between Genesys Cloud and your identity provider cannot be greater than 10 seconds.
Field | Description |
---|---|
SSO URL | Copy and save this URL to use as the Target URI in the Genesys Cloud configuration. |
Entity ID | Copy and save this URL to use as the Issuer URI in the Genesys Cloud configuration. |
Certificate | Download the certificate. |
Field | Description |
---|---|
Application Name | Type your Genesys Cloud application name. |
Field | Description |
---|---|
ACS URL | Type the URL of your Genesys Cloud organization for the AWS region: |
Entity ID | Type a unique string that you want to use to identify the Entity ID, for example: mypurecloud.com/google |
Name ID Format | From the list, select TRANSIENT. |
If the following extra SAML attributes are present in the assertion, Genesys Cloud acts on the attributes. The attributes are case-sensitive.
Attribute name | Attribute value |
---|---|
OrganizationName |
|
Email address of the Genesys Cloud user to be authenticated.
| |
ServiceName | (Optional) A valid URL for the browser to be redirected to after successful authentication, or one of the following keywords:
|
Field | Description |
---|---|
Certificate | To upload X.509 certificates for SAML signature validation, do one of the following.
Or you can:
Uploaded certificates appear with their expiration date. To remove a certificate, click X. Note: To renew or update an expiring certificate, follow these instructions to upload X.509 certificates, repeating steps 1--3. You can upload up to five certificates to Genesys Cloud per SSO configuration, and Genesys Cloud chooses the correct certificate during single sign-on and logout. |
Issuer URI | Type the Entity ID from Step 2 Google IDP Information in the Google Workspace Genesys Cloud custom application, for example: |
Target URI | Type the SSO URL from Step 2 Google IDP Information in the Google Workspace Genesys Cloud custom application, for example: |
Relying Party Identifier | Type the Entity ID from Step 4 Service Provider Details in the Google Workspace Genesys Cloud custom application, for example: mypurecloud.com/google Note: The values and functionality of the Entity ID in the Google IDP Information is different from the Entity ID in the Service Provider Details for your Genesys Cloud application. |
Get user feedback about articles.