
AWS IAM Identity Center with Google Workspace
Integrate AWS IAM Identity Center with Google Workspace for secure, seamless login. Simplify access management with this step-by-step guide.
Published Apr 14, 2025
As cloud adoption accelerates, managing user identities across platforms securely and efficiently is critical. Many organizations already rely on Google Workspace (formerly G Suite) for productivity and identity management. Integrating it with AWS IAM Identity Center (formerly AWS SSO) allows seamless user authentication across multiple AWS accounts—using the same Google credentials your users are familiar with.
In this guide, I’ll walk you through configuring Google Workspace as a SAML 2.0 identity provider (IdP) for AWS IAM Identity Center. Whether you're managing a single AWS account or a complex AWS organization, this setup helps centralize access control, reduce security risk, and enhance user experience.
- Centralized Identity Management: Manage all users in Google Workspace—no need to create and manage separate IAM users in AWS.
- Enhanced Security: Utilize short-lived credentials via SAML federation, reducing exposure from static credentials.
- Improved User Experience: Users access AWS through a single login using familiar credentials.
- Scalable Across AWS Organizations: Assign permission sets for seamless access to multiple AWS accounts.
This integration is perfect for teams already embedded in the Google ecosystem and looking to enhance their AWS access control strategy.
To complete this integration, you’ll need:
- An AWS account with admin access and IAM Identity Center enabled.
- An AWS Organization (required for IAM Identity Center).
- A Google Workspace domain with super admin access.
- Familiarity with SAML 2.0, Google Admin Console, and AWS IAM concepts.
- Sign in to the AWS Management Console with your management account.
- Go to IAM Identity Center → Click Enable.
- Note your **user portal URL—**this is the login entry point for users.
- In IAM Identity Center, go to Settings → Identity source.
- Click Change identity source → External identity provider.
- Select SAML 2.0 and expand the service provider metadata.
- Copy the
- AWS SSO ACS URL
- AWS SSO Issuer URL
- Download the AWS metadata XML —you’ll upload it to Google next.
- Open the Google Admin Console (
admin.google.com
). - Go to Apps → Web and mobile apps → Add App → Add a custom SAML app.
- Name the app (e.g., “AWS IAM Identity Center”) and click Continue.
- On the IdP metadata page:
- Download the Google IdP metadata file.
- Click Continue.
- On the Service Provider Details page:
- ACS URL: Paste the value from AWS.
- Entity ID: Use the AWS Issuer URL.
- Name ID format: Select
EMAIL
. - Name ID: Choose
Primary email
.
- Skip attribute mapping for now unless you plan to map roles or groups.
- Enable the app for users under User Access → Turn ON for everyone → Save.
- Return to AWS IAM Identity Center.
- Upload the Google metadata file or enter the SSO URL and Entity ID manually.
- Click Next, then type
CONFIRM
to finalize the identity source switch.
Permission sets define what a user can access across AWS accounts.
- Go to Permission sets → Create permission set.
- Choose either:
- AWS managed policies (e.g.,
ReadOnlyAccess
) - Or create custom policies for tailored access
- Name and configure the permission set.
- Repeat for additional roles like
AdminAccess
,BillingAccess
, etc.
- Go to AWS Accounts in IAM Identity Center.
- Select the target AWS account.
- Click Assign users or groups.
- Add users by email (matching their Google Workspace accounts).
- Assign them to appropriate permission sets.
- Save the assignment.
- Open an incognito browser.
- Navigate to your IAM Identity Center User Portal URL.
- Sign in with your Google Workspace credentials.
- Verify that you:
- Are redirected to Google login
- Can view and select roles
- Gain access to the AWS Console
Problem | Solution |
---|---|
❌ Login fails | Double-check ACS URL & Entity ID match on both sides. |
🚫 Access denied | Make sure the user is assigned a permission set and AWS account. |
⚠️ SAML error | Ensure SAML app is enabled and metadata is correctly configured. |
⏳ Propagation delays | Allow some time for Google app access to take effect. |
- Least Privilege: Only assign the access needed—use
ReadOnlyAccess
for auditing, avoid blanketAdministratorAccess
. - Use Groups: Map Google groups to AWS permission sets for scalable access management.
- Enable MFA: Protect Google Workspace accounts with 2FA/MFA.
- Audit Everything: Enable CloudTrail to monitor identity access.
By integrating AWS IAM Identity Center with Google Workspace, you’re not just simplifying access—you’re elevating security, reducing operational overhead, and creating a unified identity platform. It’s a powerful move for growing organizations who prioritize security and usability.
As an AWS Community Builder, I encourage you to test this setup in a dev environment, explore advanced configurations like SCIM or attribute-based access control, and share your insights with others in the cloud community.