Skip to main content

Knowledge Base

Log in to Bynder with Google

Would you like your users to log in to your Bynder portal using Google SSO? Bynder supports two solutions for users to authenticate.

Use Bynder's Google SSO if you simply want users to authenticate using their Google account. Implement Google SSO (SAML) if you want to enable profile and/or group mapping and have the possibility to update user attributes upon authentication.

Explore both solutions below which will let your users simply log in to the portal using their Google account.

Differences Between Bynder's Google SSO and Google SSO (SAML)

Bynder's Google SSO

With Bynder's Google SSO users can log in to Bynder using their Google account. By setting up a default permission profile you can ensure that users who log in for the first time using Bynder's Google SSO will be assigned to the default permission profile. Once they have an account in the portal you can assign them to a different permission profile, which will be respected upon future logins.

Bynder's Google SSO doesn't require an extensive setup, which makes it quicker to implement than Google SSO (SAML)

Google SSO (SAML)

Google Single Sign-On (SAML) uses a Security Assertion Markup Language (SAML) for user authentication. With Google SSO (SAML) you can enable group and/or profile mapping and you can update users (user attributes, user profile and groups) every time they authenticate.

As Google SSO (SAML) offers more features and requires more setup, the implementation generally takes longer than implementing Bynder's Google SSO.

Comparison Table

Check the table below to see the differences between Bynder's Google SSO and Google SSO (SAML).

Bynder's Google SSO

Google SSO (SAML)

Log in to Bynder portal with one click

Profile mapping

Group mapping

Update users

Quick Implementation

Which Authentication Method Would you Like to Use?

With Bynder's Google SSO users can log in to Bynder using their Google account. By setting up a default permission profile you can ensure that users who log in for the first time using Bynder's Google SSO will be assigned to the right permission profile. Once they have an account in the portal you can assign them to a different permission profile, which will be respected upon future logins.

The whitelisting feature ensures that only allowed domains can log in using Bynder's Google SSO.

How to enable Bynder's Google SSO?

Contact your Customer Success Manager if you would like to have Bynder's Google SSO set up for your portal and provide us with the following information.

  • Decide which domains should be whitelisted. These domains will be allowed to log in with Bynder's Google SSO.

  • The default permission profile that users should be assigned to upon their first login. Once they have an account in the portal you can assign them to a different permission profile, which will be respected upon future logins.

How to Set Up a Custom SAML Application?
  1. Follow the steps in Set up your own custom SAML application and check the additional information below.

  • App Icon

    Right click the icon below and save it to use it as the app icon:

    bynder_icon.png
  • Service Provider Details

    You can retrieve the necessary service provider metadata by visiting the following URL. Make sure to replace YourPortalURL with the URL of your Bynder portal.

    https://YourPortalURL.com/sso/saml/metadata/
    • ACS URL: https://YourPortalURL.bynder.com/sso/SAML/authenticate/

    • Entity ID: https://YourPortalURL.bynder.com

    • Start URL: Leave empty

    • Signed response: Yes

    • Name ID format: Unspecified (default)

    • Name ID: Basic Information > Primary email (default)

  • SAML Attribute Mapping

    The following attributes are required:

    • name (first name of the user)

    • surname (last name of the user)

    The following attributes are optional:

    • Telephone

    • country

    • city

    • Company

    • department

    • JobDescription

  • For profile mapping, group mapping or both:

    • groups

    Note

    Department is a single-valued user profile field in Google Directory and can be mapped to the attribute groups.

Tip

Follow these instructions if you want multiple values to be mapped to multi-valued attribute groups.

  1. Turn on your SAML app.

  2. Download and share the metadata file with us, which is the preferred method. Alternatively, you can share the following with us:

    • SSO URL

    • Certificate

How to Map Multiple Values to Multi-Valued Attribute "groups"?

Department is a user profile field that can be mapped to the attribute groups.

Note

Any other other user profile field can be mapped to the attribute groups as well.

By default, Google Workspace doesn't offer a way to map multiple values to a SAML attribute. If multiple values need to be mapped to the attribute groups you need to create a custom schema. This enables you to add a custom user profile field which can contain multiple values which can be mapped to the attribute groups.

Check the custom schema example below.

{
  "fields": [
    {
      "displayName": "Groups",
      "fieldName": "groups",
      "fieldType": "STRING",
      "multiValued": true,
      "readAccessType": "ADMINS_AND_SELF"
    }
  ],
  "displayName": "Bynder groups",
  "schemaName": "BynderSSO"
}
How to Set Up a Custom Schema?
  1. Follow the steps in Creating custom attributes using the user schema and check the additional information below.

  2. Update the SAML attribute mapping for the custom SAML app.

Learn more