ClearPass SSO with Google Workspace

Reading Time: 8 minutes

You can easily configure ClearPass SSO to use Google Workspace for all kinds of Single Sign On based logins. This post will show how to use Google Workspace to authenticate your ClearPass Operators and Guest admins.

I have quite a similar post with Azure AD here:

ClearPass SSO with Azure AD

If you read the post above as well, you should have no problems using Google Workspace for ClearPass SSO. The ClearPass part is the same, only the Google part is different.

Add the SSO App to Google Workspace

So, let’s get started. Login to your Google Workspace account as an admin:

https://admin.google.com

After logging in, you go to “Apps–>Web and mobile apps”, click the “Add app” and select the “Add custom SAML app” options to create a new app:

ClearPass SSO with Google Workspace - Add custom SAML App
ClearPass SSO with Google Workspace – Add custom SAML App

A wizard will start to guide you through the setup. The first page allows you to set a name for the app and add an icon:

ClearPass SSO with Google Workspace - Add App Name
ClearPass SSO with Google Workspace – Add App Name

Enter a descriptive name and add an icon. Afterward, click “CONTINUE”:

ClearPass SSO with Google Workspace - Get SSO URI and Cerrtificate
ClearPass SSO with Google Workspace – Get SSO URI and Certificate

On this page copy the “SSO URL” and download the “Certificate”. Click “CONTINUE” to get to the next page in the wizard:

ClearPass SSO with Google Workspace - Enter ACS URL and Entity ID
ClearPass SSO with Google Workspace – Enter ACS URL and Entity ID

This page is quite important. The page asks for the “ACS URL” and the “Entity ID”. Those are always the same for all ClearPass Installations.

ACS URL
https://<clearpass fqdn>/networkservices/saml2/sp/acs

Entity ID
https://<clearpass fqdn>/networkservices/saml2/sp

For Google Workspace, I was not able to find a way to specify multiple URLs. With Azure this was possible. For one ClearPass system, this is not a problem. But if you are running multiple ClearPass systems or a cluster this is a problem, as all servers will have their own URLs. I solved this by using multiple SAML Apps in Google Workspace. One for every cluster member.

Also, use the “Name ID format” and “Name ID” fields as above in the screenshot.

ClearPass SSO with Google Workspace - Create the App
ClearPass SSO with Google Workspace – Create the App

On this last screen simply click the “FINISH” button. We will configure those details later.

You are sent back to the Apps screen. Select the created app and enable the app for all accounts. I restrict access later using the ClearPass service.

ClearPass SSO with Google Workspace - Enable App for Accounts
ClearPass SSO with Google Workspace – Enable App for Accounts

That’s all we need to do for the moment on the Google Workspace site. Let’s head over to ClearPass.

Configure ClearPass SSO

Now, we need to configure ClearPass to use Google Workspace for authentication. Actually, this is very simple, as the steps above 🙂

First, you add the downloaded certificate to ClearPass’s trust store. Go to “Administration–>Certificates–>Trust List” and click the “Add” button:

ClearPass SSO with Google Workspace - Add Certificate to Trust List
ClearPass SSO with Google Workspace – Add Certificate to Trust List

Select the downloaded certificate from above. Use “SAML” as the “Usage” option and click “Add Certificate”.

Afterward, go to “Configuration–>Single Sign-On (SSO)”:

ClearPass SSO with Google Workspace - Add IdP to ClearPass and Enable SSO for Modules
ClearPass SSO with Google Workspace – Add IdP to ClearPass and Enable SSO for Modules

On this page enter the “Identity Provider (IdP) URL”. This is the “SSO URL” from the Google Workspace app.

In the “Enable SSO for” field check the checkmarks as needed. But remember to leave “PolicyManager” unchecked for the moment. I would check this one only after the tests went fine.

In the “Identity Provider (IdP) Signing Certificate” section select the certificate you uploaded previously.

In the following, we will use groups in Google Workspace to assign access rights in ClearPass. To make those groups visible in ClearPass go back to the Google Workspace app and modify the “SAML attributes mapping”:

ClearPass SSO with Google Workspace - Add Groups to SAML
ClearPass SSO with Google Workspace – Add Groups to SAML

I selected my current important roles “clearpass-admin” and “parent”. In the “App attribute” column enter a name, like the one in the screenshot above. This name will be visible in ClearPass and will have the groups included if the user is part of them. Consider this like the “memberof” attribute in Active Directory.

To make this attribute available and usable in ClearPass simply add this one to the “SSO” dictionary. Go to “Administration–>Dictionaries–>Applications” and click on the “SSO” application. In the new windows click the “Export” button and download the dictionary.

ClearPass SSO with Google Workspace - Export SSO Dictionary
ClearPass SSO with Google Workspace – Export SSO Dictionary

Open the downloaded file with a text editor of your choice. I use VisualStudio Code. But any text editor will work.

The dictionary is an XML file and you add the new line to the “ApplDictionary” section:

<ApplDictionaryAttributes attrType="String" attrName="ClearPass-Role"/>

The “attrName” should align with your “App attribute” name from the Google Workspace app. You can add more lines if needed to align with your Google Workspace app.

Now, simply import the modified dictionary again:

ClearPass SSO with Google Workspace - Add SSO Dictionary
ClearPass SSO with Google Workspace – Add SSO Dictionary

After the import, you can check if the new attribute is available. Click on the “SSO” application:

ClearPass SSO with Google Workspace - SSO Dictionary
ClearPass SSO with Google Workspace – SSO Dictionary

If it is not available, wait a minute and check again. For me, it took a little bit. Might be due to browser caching issues or ClearPass needing some time to load the dictionary correctly.

Create the ClearPass SSO Service

As any authentication in ClearPass, a Single Sign On needs an authentication service as well. I always use role mappings in my authentication services and this one is no exception. To use roles, create a new role in ClearPass or use one of the existing roles. To create a new one go to “Configuration–>Identity–>Roles” and click the “Add” button:

ClearPass SSO with Google Workspace - Add Role in ClearPass
ClearPass SSO with Google Workspace – Add Role in ClearPass

Simply enter a “Name” for the role and click the “Save” button.

The next step is to create a role mapping to use the created role from above. Go to “Configuration–>Identity–>Role Mappings” and modify an existing role mapping or add a new one:

ClearPass SSO with Google Workspace - Add Role Mapping
ClearPass SSO with Google Workspace – Add Role Mapping

First, add a “Policy Name”. I often use the “[Guest]” role as the “Default Role”. The important part is the “Mapping Rules” section. For the setup, described above, you only need one mapping. I assign the created role from the step before, to everyone who is part of the “clearpass-admin” group in Google Workspace. The information about the group membership is in the “Application:SSO:ClearPass-Role”.

The next step is to create an “Enforcement Profile”. This one will actually tell the authentication requestor what to do. Go to “Configuration–>Enforcement–>Profiles” and create a new profile:

ClearPass SSO with Google Workspace - Add Enforcement Profile
ClearPass SSO with Google Workspace – Add Enforcement Profile

Select a descriptive “Name” for the profile and select “Application” for the “Type”. For this type of setup, you only need one “Attribute”. As this profile should allow full management access to ClearPass, select the “Super Administrator” for the “SSO-Role”. If you created different user profiles within ClearPass, add additional “Enforcement Profiles” for each and select those in the “Attribute Value” column.

To use the “Enforcement Profile” create an “Enforcement Policy”. Go to “Configuration–>Enforcement–>Policies” and add a new policy:

ClearPass SSO with Google Workspace - Add Enforcement Policy
ClearPass SSO with Google Workspace – Add Enforcement Policy

Again, select a descriptive “Name” and select “Application” for the “Enforcement Type”. The “Default Application Access Profile” should be the “[Deny Application Access Profile]”. So, if no rule matches, access is denied. If you require a different behavior, you can change this to your needs.

I only have one simple rule. Thanks to the role mapping, we did some steps before, I can use this role, the “P-ClearPass-Admin” role, and match the created “Enforcement Profile” to all users with this role. Add additional roles to your needs and keep track of the order of rules. In my case, the rule with the most privileges should be the first and those with the second most privileges second… I think you got the logic.

In the final step, we bring everything together. Create a “Service” and use all the policies and role mappings we created before. Go to “Configuration–>Services” and create a new service:

ClearPass SSO with Google Workspace - Services
ClearPass SSO with Google Workspace – Services

A new wizard will open and you can configure the service:

ClearPass SSO with Google Workspace - Add SSO Service
ClearPass SSO with Google Workspace – Add SSO Service

As always, select a descriptive “Name” for the service and select “Aruba Application Authorization” for the “Type”. Uncheck the checkmark for “Authorization” under “More Options”. Create the “Services Rules” as in the screenshot above. For the “Application Name” select all parts of ClearPass you have selected in the SSO configuration.

ClearPass SSO with Google Workspace - Add SSO Service Role Mapping
ClearPass SSO with Google Workspace – Add SSO Service Role Mapping

In the “Roles” tab select the “Role Mapping” we created previously.

ClearPass SSO with Google Workspace - Add SSO Service Enforcement
ClearPass SSO with Google Workspace – Add SSO Service Enforcement

In the “Enforcement” tab, select the “Enforcement Profile” we created earlier.

Afterward, your service is ready and you can check by trying to log in.

Access Tracker Results

After you tried to log in check the “Access Tracker”. You will see all details about the login and you can troubleshoot if something goes wrong.

ClearPass SSO with Google Workspace - Access Tracker Summary
ClearPass SSO with Google Workspace – Access Tracker Summary

The “Summary” tab reveals all the important information. We see that the correct “Service” is used. We also see the assigned “Roles” and “Enforcement Profiles”.

ClearPass SSO with Google Workspace - Access Tracker Input
ClearPass SSO with Google Workspace – Access Tracker Input

In the “Input” tab you can see the “ClearPass-Role” attribute. The one we configured in Google Workspace.

ClearPass SSO with Google Workspace - Access Tracker Output
ClearPass SSO with Google Workspace – Access Tracker Output

The “Output” tab shows details about the return values. In this case “Super Administrator”.

All that is as expected and actually it is as easy as described above. Do you use SSO (SAML) to login to ClearPass or other services?

If you find this post useful, leave me a comment and share your feedback with me. You can also buy me Pizza, using the “Buy me a Pizza” button on the right, to support this blog and keep the IT gremlin happy.
If you would like to do me a favor, share this post with your friends and social media contacts. This would really help to make this blog more popular and help others to find the information above more easily using search engines.

Share on:

2 thoughts on “ClearPass SSO with Google Workspace”

    • Hi Jose,

      not sure what you are looknig for, but you cannot use SSO to get access the network, but there are two options:

      1. You can use a web login with SSO to allow users to gain network access, but it would not encrypt the connection (if wireless)
      2. You can use SSO to onboard devices with a certificate and use the certificate for TLS based aushtentication against the network.

      The last one would be my recommendation, as it is the most secure one.

      I’m currently writing a post about exactly this topic. I hope I can get it done within the next weeks. If it is ready, let me know if this is whyt you are looking for.

      BR
      Florian

      Reply

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.