Google Workspace
Frame supports Single Sign-On (SSO) with Google authentication through both OAuth2 and SAML2 integration options. The OAuth2 option is the easiest to setup and can be done in under a minute. The SAML2 option is also relatively quick and easy, but does require a few more steps.
Google Workspace OAuth2 SSO Integration
Configuring Google Workspace OAuth2
- If you would like to enable Google Workspace OAuth2 integration with Frame, you will first need to following the procedure outlined in Google's guide to Control which third-party & internal apps access Google Workspace data.
- On the Google Admin Console home page, go to Security > API controls.
- Under App access control, click on MANAGE THIRD-PARTY APP ACCESS.
- Click on “Configure new app” drop down menu and select OAuth App Name Or Client ID.
- Search for the Client ID
884836301137-76l5epasioe5sb3qvsp31obn45qk6t5i.apps.googleusercontent.com. - Once you locate the Frame app in the search results, click Select.
- Check the checkbox for the Frame app with the Client ID
884836301137-76l5epasioe5sb3qvsp31obn45qk6t5i.apps.googleusercontent.comand then click SELECT. - For App access, specify that this Frame app is to be TRUSTED and click CONFIGURE.
Configuring Google OAuth2 in Frame
- Before Google OAuth2 can be added, the administrator must enable the Google toggle at a given level by navigating to the Admin Console. From there, navigate to the Customer or Organization page (depending on where you wish to add Google).
- Select Users from the left-hand menu.
- From there, navigate to the Authentication tab and enable the OAuth2 toggle. Click Save.

- Click on the newly created Google tab. From there, click Add.

- The Add Google authorization dialog window will appear:

- From this window, you can specify individual email addresses or entire domains you wish to grant access to and their corresponding roles. For this example, we will give access to the domain mycompany.com. All users tied to this domain will be given “Launchpad User” access on the “Applications 2” Launchpad. Read more about permissions in the Manage User Permissions section of Frame documentation.

- Click Add when you have finished specifying your emails/domains and roles.
Signing in with Google Workspace via OAuth2
You can now instruct your users to select the Sign in with Google option when accessing their Frame login page and enter their Google credentials.

They will be prompted to allow Frame access to their Google Drive the first time they sign in.

That's it! Your users can now use Sign in with Google on your account via our OAuth2 integration option. If you prefer to set up your integration using SAML2, continue reading.
Google Workspace SAML2 Integration
Google Workspace SAML2 integration can only be set up by someone with a Super Admin role on a Google Workspace account. During this configuration process we will transition from the Google Workspace Admin console to the Frame console.
Getting Started
To begin, let's create a URL-friendly SAML2 Application ID (also referred to as Entity ID) that we'll use in a few places throughout our setup, as well as a Custom Label which will be displayed on the login page for users, for example.
Application ID: Frame
Custom Label: Frame-Google_SAML
Also copy the Assertion URL
Click add to save the changes for later
Follow the steps to create a SAML 2 Provider explained in the General SAML2 Integration section, until you see until you see the template with the missing configuration info, and copy the Assertion URL which will be needed later in the setup. From here leave the tab open, and continue with the configuration in the Google Admin console.
Google Admin Console
Then, configure your user/group access and click SAVE. In our use-case, we wanted the service to be ON for everyone:
That's it for the Google Admin portion of the setup – we're half way there! By this point you should have the following items needed to setup Frame Console as the SAML2 Service Provider:
-
- Downloaded Metadata XML file
- SAML2 Integration Name
- Entity ID (later referenced as Application ID)
Configure SAML2 in Frame
12. Enter the missing Information which has been collected during the steps above.
- Application ID: The value here needs to match the value set as the "Entity ID" from Step 5.
- Auth provider metadata: Click the “XML” option and paste the contents of the Metadata XML file from Step 4.
- Custom Label:. Allows Admins to customize Frame's Sign in page chiclets/buttons associated with this SAML2 integration.
- Authentication token expiration: Choose a token expiration duration that supports your end-user workflows and complies with your security policies.
- Enable “Signed assertion”
- Assertion Consumer Service (ACS) URL: The endpoint where the Identity Provider (IdP) delivers SAML authentication responses after a successful login.
- Metadata URL: A publicly accessible URL providing your Service Provider's SAML metadata, used by Identity Providers to configure and establish trust.
Optional - Frame Login URL: user is directed to this URL when the user wants to log back into Frame after being logged out due to inactivity.
- Frame Logout URL: user is directed to this URL when the user logs out of the Launchpad or if they decide to leave Frame after being logged out due to inactivity.
Lastly, confirm that everything is entered correctly and click Add.
Configuring SAML2 Permissions
Accessing Frame with Google Workspace
Your SAML integration will now appear to your users as a sign in button on your specific Frame Sign in Page.













