Skip to content

Integrate Google Suite

Google Workspace SAML/SSO Integration

This guide explains how to set up SAML-based Single Sign-On (SSO) between Google Workspace (formerly G Suite) and Tallyfy to enable seamless authentication and automated user provisioning.

Requirements

  • Google Workspace administrator account with super-administrator privileges
  • Tallyfy Professional or Enterprise plan
  • SAML configuration values from Tallyfy Support

Google Workspace Configuration

Step 1: Create a Custom SAML Application

  1. Sign in to the Google Workspace Admin console
  2. Navigate to Apps > Web and mobile apps
  3. Click Add App > Add custom SAML app
Google Admin Apps Panel

Step 2: Configure Basic App Settings

  1. Enter “Tallyfy” as the application name
  2. Optionally upload the Tallyfy logo
  3. Click Continue to proceed to the next step

Step 3: Obtain Google Identity Provider Details

  1. On the Google Identity Provider details page, collect the following information:
    • SSO URL (Single Sign-On URL)
    • Entity ID (Issuer)
    • Certificate (download the certificate file)
Google Identity Provider Details

Step 4: Configure Service Provider Details

  1. Enter the Tallyfy SAML configuration values (provided by Tallyfy Support):
    • ACS URL (Assertion Consumer Service URL)
    • Entity ID (Service Provider Entity ID)
    • Leave the Start URL field empty
Service Provider Configuration

Step 5: Configure Attribute Mapping

Map the following user attributes:

Google Directory AttributeApp Attribute
Primary Emailemail
First NamefirstName
Last NamelastName

Click Finish to complete the application setup.

Step 6: Enable User Access

  1. In the application settings, go to User Access
  2. Set the Service status to ON for everyone (or select specific organizational units)
Enable User Access

Tallyfy Configuration

Step 1: Submit SAML Information to Tallyfy

Provide Tallyfy Support with the Google Identity Provider details:

  • SSO URL
  • Entity ID
  • Certificate file

Step 2: Configure SAML Settings in Tallyfy

  1. Once Tallyfy Support has processed your information, navigate to your organization settings
  2. Locate the SAML configuration section
  3. Enter the configuration details as provided by Tallyfy Support
Tallyfy SAML Configuration

Step 3: Enable SAML Authentication

Toggle the SAML activation switch to enable SSO for your organization

Enable SAML

User Provisioning and Access

Once the integration is complete:

  1. Share the Tallyfy login URL with your users (available in the SAML configuration modal)
Tallyfy Login URL
  1. Users with access to the Google SAML app can now:
    • Existing users: Sign in without requiring separate Tallyfy credentials
    • New users: Be automatically provisioned in Tallyfy upon first login

Troubleshooting

If users encounter authentication issues:

  • Verify the user has been granted access to the SAML app in Google Workspace
  • Ensure attribute mappings are correctly configured
  • Check that the user is accessing Tallyfy through the proper SSO URL
  • Contact Tallyfy Support for assistance with persistent issues

Authentication > Integrate Okta

A detailed walkthrough for implementing SAML-based Single Sign-On between Okta and Tallyfy through creating an Okta SAML application configuring authentication settings and enabling user provisioning for seamless access.

Authentication > Integrate OneLogin

SAML-based Single Sign-On integration between OneLogin and Tallyfy enables automated user provisioning through a three-phase setup process involving application creation configuration exchange and SSO testing.

Integrations > Authentication and SSO

Single Sign-On integration with Tallyfy enables seamless authentication through major identity providers while offering enhanced security automated user provisioning and centralized access management across organizations.

Authentication > Integrate Azure AD

The detailed guide outlines the complete process of setting up and configuring SAML-based Single Sign-On between Azure Active Directory and Tallyfy for seamless user authentication and automated provisioning.