Integrate Google Workspace as an Identity Provider
To integrate Google Workspace with Juniper Mist, create an LDAP client in the Google Admin Console and then add it as an Identity Provider in your Juniper Mist organization.
About Google Workspace Integrations
Google Workspace leverages secure Lightweight Directory Access Protocol over SSL (LDAPS) connector for the following use cases:
- For certificate-based (EAP-TLS or EAP-TTLS) authorization:
- Retrieves user group membership information to support authentication policies based on this user identity
- Gets the status—active or suspended—of an user account
-
EAP-TTLS with PAP
- Checks the username and password for authentication with Google’s Identity Provider
Preparations in the Google Admin Console
Before you can integrate Google Workspace with Juniper Mist, you need to go to your Google Admin Console and create an LDAP client for Juniper Mist Access Assurance connector. Use the following tips to configure your LDAP client with the appropriate settings.
As a Google admin, refer to Google resources if you need step-by-step help. For example, consider using this Google help topic: https://support.google.com/a/answer/9048434. (This link is provided as a suggestion only. Search and browse through your Google documentation as needed.)
Tips for Your Google Admin LDAP Client
-
When adding your LDAP client, give it a descriptive name that you can later incorporate into the IdP name in your Juniper Mist organization.
-
In the access permissions for your LDAP client:
-
Verify user credentials—Entire domain
-
Read user information—Entire domain
-
Read group information—On
-
-
Download the LDAPS client certificate, and save it so that you can use it later in this procedure.
-
In the Client Details:
-
Authentication—Generate access credentials, and copy the username and password so that you can use these values later in this procedure.
-
Service Status—Set to On for everyone.
-
Add Your LDAP Client as an Identity Provider in Juniper Mist
Before You Begin
You must have an Juniper Mist admin account with the Super User role.
You'll need the following information from the Google Admin Console:
-
The certificate files that you downloaded for your LDAP client
You'll have one file ending with KEY extension and one file with a CRT extension.
-
The username and password that you copied when you generated your LDAP client credentials
To add your LDAP Client as an Identity Provider in Juniper Mist:
About EAP-TTLS and Azure AD using ROPC
Extensible Authentication Protocol–Tunneled TLS (EAP-TTLS) leverages LDAPS OAuth flow with Azure AD to perform user authentication. This implies the use of legacy authentication, which involves the use of a username and password without MFA. There are several factors to consider when employing this method:
- Configure client devices with the correct Wi-Fi profile, either from GPO or MDM. Providing only username and password at the login prompt does not work for some operating systems.
- Users must use Google Email ID (username@domain) username format for entering the username.
- Configure clients to trust server certificate. See Use Digital Certificates.