0

Note - There are many discussions about syncing Google app accounts to Active directory. This is a different question -

I would like my users (about 10) on google app to login to my local web apps i.e. gitlab / gerrit / jenkins using their google app account through SSO.

In addtion I would like them to login to their local linux machines with the same ids through Active directory.

So once they login to their machine they should be able to access all the local webapps configured to use google apps and other google apps (gmail / drive) without performing any other login.

Is this possible? how ?

Gautam
  • 99
  • 2

1 Answers1

0

this is a mixture of SLO and SSO - the single login aspects are common and can be configured in a number of ways, they will rely on the LDAP protocol, as such your linux clients will be inside your private network and be configured to send authentication requests to a domain controller - this covers single login, there are many resources that cover deploying, configuring and managing this kind of setup.

the second scenario covers single sign on, authentication happens in your domain and authorisation happens in the other, this is achieved by installing an identity provider or subscribing to an online service SAS offering that provides support for single sign on protocols.

your question mentions active directory federation services, if you have this on domain then you can support these protocols: security Assertion Markup Language (SAML) Windows Identity Federation (WIF) lightweight directory access protocol (LDAP) OpenIDConnect (OIDC). you can integrate kerberos ticketing and achieve true SSO.

you can achieve what you are trying with OIDC, and you should try and stick with using one federation protocol - because logging into a service with SAML with not automatically log you in to a service that depends on OIDC.

Google apps use the OIDC protocol- but it's not clear if your identity provider is ADFS or Google.

Sum1sAdmin
  • 1,914
  • 1
  • 11
  • 20