Skip to main content
SAML via Google Workspace

Configure SAML authentication via Google Workspace for secure single sign-on.

Updated over a week ago

What Is SAML?

SAML is an important security standard that allows Taskade users to log in securely without having to remember and manage multiple passwords. SAML can be set up with Okta, Google Workspace, Azure, and other identity providers. Follow the instructions below to configure SAML via Google Workspace.

πŸ’‘ Note: If your team is already using Taskade, your identity provider will take ownership of those accounts. Please inform your team before enabling SAML.

Configure with Google Workspace

  • Requirements

    • The main account must be set up with a company email address.

    • Personal email accounts are not allowed.

    • Your email must be verified.

    • This feature is only available on our Ultimate and Enterprise plans.

Google Workspace Setup

Go to the Google Workspace admin dashboard. In the sidebar, select "Web and mobile apps" under Apps. Click "Add app", then "Add custom SAML app".


Enter "Taskade" under App name and upload a logo (optional).
Click "Next" to continue.


Save the SSO URL, Entity ID, and Certificate to a file somewhere. You'll need this information for Taskade setup. Click "Continue".


On the next screen, enter the following information:

  1. Name ID Format: Email

  2. Name ID: "Basic Information Primary email"

Click "Continue".


Under "Google Directory attributes", select "Primary email" and "email" for "App attributes".


Click the arrow in the "User access" section to open a drop-down menu.


Choose "ON for everyone" in your Google Workspace Dashboard to enable SSO for all users. Click "Save" to confirm the changes.


That concludes Google Workspace setup. Let's finish the process in Taskade.

Taskade Setup

πŸ’‘ Note: Read the requirements before completing the steps below.

  1. Visit and navigate to the Organization tab

  2. On the security screen, paste the Google Workspace we saved earlier:

    • Domain: Enter your domain, e.g., without "https://" or "www."

    • SSO URL: Paste the "SSO URL" from earlier.

    • IDP ISSUER: Paste the "Entity ID" from earlier.

    • IDP PUBLIC SIGNING CERT: Paste the "Certificate" from earlier.

Congratulations! πŸ₯³ Anyone with an email address in your business's domain can now go to and choose "Sign In with Single Sign-On" to sign in with Okta.

😊 Helpful Links

Did this answer your question?