As an admin, you can set up user provisioning and single sign-on (SSO) between a Microsoft Entra ID tenant and your Google Workspace or Cloud Identity account. Then, your users can sign in to an Microsoft Entra ID authentication page instead of the Google sign-in screen on their ChromeOS devices.
Security Assertion Markup Language (SAML) single sign-on (SSO) support for ChromeOS devices allows users to sign in to a device with the same authentication mechanisms that you use within the rest of your organization. Their passwords can remain within your organization's Identity Provider (IdP). Signing in is very similar to signing in to a Google Workspace account from a browser via SAML SSO. However, because a user is signing in to a device, there are several additional considerations.
Before you begin
- Your domain is configured in Microsoft Entra ID and Google (Workspace or Cloud Identity).
- User account names are the same for Microsoft Entra ID and Google. The Microsoft Entra ID directory holds your domain as a registered subdomain.
- These steps do not require a local federation, such as Active Directory Federation Services (ADFS). However, they do rely on the equivalent cloud based service bundled with the Microsoft Entra ID Free tier.
How to
Related topics
- Configure SAML single sign-on for ChromeOS devices
- Micrsoft Entra ID user provisioning and single sign-on
- Tutorial: Micrsoft Entra SSO integration with Google Cloud / G Suite Connector by Microsoft
Google and related marks and logos are trademarks of Google LLC. All other company and product names are trademarks of the companies with which they are associated.