This article outlines the steps required to configure Google SSO (SAML) for Panorays on the customer side.
Panorays supports SAML-based Single Sign-On (SSO) using Google as the identity provider. Configuration is performed in the Google Admin Console, and metadata is shared with Panorays to complete the setup.
➕ Google Configuration Steps
1️⃣ Create a New SAML App in Google
Open the Google Admin Console.
Go to Apps.
Search for and select Web and mobile apps.
Click Add App → Add custom SAML app.
2️⃣ Define the SAML App
Enter a name for the SAML configuration.
Continue to the next step.
3️⃣ Download and Share Metadata
Download the SAML Metadata file from Google.
Send the metadata file to [email protected] so it can be uploaded into the Panorays system.
4️⃣ Configure Service Provider Details
Enter the following values in Google:
ACS URL:
https://auth.panoraysapp.com/sso/saml/assertEntity ID:
https://auth.panoraysapp.comSigned Response: Enable Signed response
Name ID format: EMAIL
Name ID: Basic Information>Primary email
Click Continue once completed.
5️⃣ Assign User Access
At the final step:
Assign users or groups that should have access to Panorays via Google SSO.
💡 Tips / Important Notes
Make sure only the relevant groups are assigned to avoid unauthorized access.
Changes to group assignments may take a few minutes to propagate.
If authentication issues occur, verify that the metadata shared with Panorays matches the Google configuration.
📌 Summary
Configuring Google SSO allows users to securely access Panorays using their Google credentials. The setup requires creating a custom SAML app in Google, sharing metadata with Panorays, and assigning access to the appropriate user groups.





