Skip to main content
Matrix42 Self-Service Help Center

Identity Provider Integration III: Google

Create your Custom App

For the SAML2 usage with Google Accounts you’ll need to create your own custom SAML application. 

SAML2 authentication with Google Accounts is supported from Silverback Version 21.0 Update 1. 

  • Open your Google Admin Console 
  • Login with your super administrator account
  • Click Apps in the middle frame
  • Select Web and mobile apps
  • Click Add App
  • Select Add custom SAML App

App details

  • Enter an App Name, e.g. Matrix42 Silverback 
  • Upload an App icon (optional)
  • Press Continue

Google Identity Provider Details

  • Click Download Meta 
  • Press Continue

Service provider details 

Name ID

  • Select as Name ID format EMAIL
  • Select as Name ID Basic Information > Primary email
  • Press continue

Attribute Mapping

  • Press Finish
  • Wait until the application creation is finished 

Grant Access to your Custom App

In this section you need to grant access to users, which will be applicable to use this application. Every User which should be able to Login to Silverback require to have a granted access. Please note that changes may take up to 24 hours to propagate to all users.

Grant Access

  • Click on User Access to OFF for everyone
  • Enable either ON for everyone or customize the Access to this application to Groups or Organisational units
  • Press Save 

Import Metadata to Silverback

Import Metadata 

  • Open your Silverback Management Console
  • Login as Administrator 
  • Navigate to Admin
  • Navigate to Authentication Provider
  • Click Import from File
  • Select Choose File
  • Select your previously downloaded Metadata file (GoogleIDPMetadata.xml)
  • Click Open
  • Click OK
  • Click OK to save these changes
  • Click OK to confirm

Configure Authentication Provider 

  • Enable Show on Login Page
  • Disable classic sign-in (optional)
  • Enable Dynamic User Creation
    • Silverback will create for each login a local user account for verification reasons
    • Use your Identity Provider as access control mechanism
  • Change the Title of your SAML2 Button, e.g Gsuite
  • Change the Icon 
  • Change the Color
  • Click Save

Review the Settings Overview for further explanation and appearance.

Try a Login as a Device User

  • Open your Browser in Incognito Mode
  • Open Self Service Portal 
  • Check the SAML2 button appearance
  • Click the SAML2 button
  • You will be redirected to your Google Identity Provider
  • Login with your credentials
  • When everything went right, you should be logged it into Self Service Portal
  • Take a device and perform an enrollment
  • In case you have an active LDAP Connection in Silverback, please refer to Co-Existence with LDAP Connection
  • Otherwise, please proceed with Identities 

Co-Existence with LDAP Connection

In case you connected Silverback with a LDAP Server, you might receive after pressing the Start (1) button inside the Self-Service Portal, an error that contains a warning that this user already has a pending enrollment request or that you are not authorised to access this system (2). The logic is that if a LDAP connection is available, Silverback checks first your LDAP server if the user is present to query additional LDAP Attributes for the user and to not create dynamically a new local user. To ensure the matching between your Identity Provider and the user in your LDAP Server and to let your users create a new pending enrollment, the value selected for Name ID must match with the comparer added in your LDAP User Filter (e.g. userPrincipalName={0}). The captured username from the Identity Provider login (your Name ID) is indicated after Welcome (3) and must match in the Co-Existence with the userPrincipalName of the user in your LDAP server. In case a Group Membership is set in the LDAP User Filter (MemberOf=), the user must be present in the select Group Membership, too. Please keep also in mind, that the LDAP user must have a valid Device Email Field information present. With the LDAP attribute Username, you can ultimately define in this scenario which user name the device will receive in Silverback.



  • Navigate back to your Silverback Management Console
  • Navigate to Users
  • You should see now a new Username with your Identity Provider E-Mail and Username information

System User with SAML2

  • Navigate to Admin
  • Navigate to User Management
  • Click New System User
  • Enter a username 
  • Enter as Email the E-mail used for your Idenity Provider (e.g.
  • Create any password you like
    • Ensure to meet minimum requirements

Type any random password that matches the minimum password requirements as the authentication will be done through the Identity Provider.

  • Select Role
  • Select Language
  • Click Save

Try a Login as System User

  • Open your Browser in Incognito Mode
  • Open Silverback Management Console
  • Click the SAML2 Button
  • You will be redirected to your Identity Provider
  • Login with your Credentials
  • When everything went right, you should be logged it into Silverback Management Console

Additional Notes 

In case you enroll devices with the Device Enrollment Program, ensure to use as Authentication Username +OTP if your users has been created dynamically as a local device user (Identities) in Silverback. Due to the authentication with the Identity Provider, these users will be created without any password, so Silverback is not able to perform an authentication for the user at this stage of the device enrollment. 

  • Was this article helpful?