Google Workspace Setup

Overview

This document covers how to setup Google LDP with Sophos Central.

This Recommended Read assumes  that you have already users created in Google that you wish to grant access to.

Configuration

1. Label Pre-Setup on Google

Upon creation of an application (“credentials”) in Google, you’ll see a page like the screenshot below, make a note of the Client ID (highlighted in blue) as you will need it in step "3.3 Client ID".

2. Domain Verification

  • 2.1 Login to your Sophos Central account, using  your Administrator Account.
  • 2.2 Go to overview > Global Setttings > Verify Domain. *Make sure your domain is verified.

3. Adding an Identify Provider

  • 3.1 Navigate to Global Settings > Federated Identify Providers > Add Identify provider.

3.2 Step A: Setup Open ID Connect

  • Enter a Name
  • Select OpenID Connect from the Type drop down 
  • Select Google Workspace for the Vendor drop down

3.3 Step B: Configured OpenID Connect Settings

3.4 Step C:Configure Domains

Select from the drop down the domain your previously configured

3.5 Confirm Identity provider MFA enforcement

Select a radio button indicating if the LDP will enforce MFA (1st option) or if Sophos will enforce MFA (2nd option)

After selecting one option, you should be able to Save and see your domain listed

3.6 Turn on LDP

  • Click on the NAME link of the LDP you just created
  • In the new Details page, find and click "turn on"
  • Copy the Callback URL

4. Configuring Client ID for Web Application

5. Activating LDP on Sophos Central

  • 5.1 Go back to Sophos Central > Overview > Global Settings > Federated Identity Provider > Click the Name and then click the "Turn On" button ( this will switch to off).
    • The "Status" should change to "On" (You can reference the image in Step 3.6 Turn on LDP, for further clarification) 

At this point the LDP is ready for use with Sophos.

Note: Without users configured in the LDP and in Sophos Dashboard (under the People side bar menu), no one will be allowed to log in. If the user used for this configuration has access to the LDP (account created under the LDP), logging back will now require a Sign in with SSO button

Clicking Sign in with SSO should redirect you to the Google Authentication Screen.

Note if you are logged in, in the same browser, it may automatically log you in. To test this further you can use a private browsing window, so you
can remain logged in.

6. Error Conditions (Unexpected ISS Value)

Google provides you with a Download json link, that you can click and should provide you with the URLs for Authz and JWKS. We have found those URLs don’t work
properly and you should use different versions of the URLs. If you have followed the document above, its unlikely you run into this problem but
regardless, you may see the following, after authenticating with Google (and attempting to redirect back to Sophos).

If encountered, kindly recheck step 3.3 Step B: Configure OpenID connect Settings and ensure you have correctly input the following details:

NOTE: To edit an existing IdP, click its name in the IdP list, and click Edit in the screen that opens. Edit is a hyperlink, located just below Vendor in the top section of the screen.
NOTE: To edit an existing IdP you may need to turn the IdP off, first




Edited screnshots
[edited by: Qoosh at 8:06 PM (GMT -7) on 18 Aug 2022]