Google Apps SAML Integration with Screencast-O-Matic

Google Apps SAML Integration with Screencast-O-Matic

Google Apps SAML Integration with Screencast-O-Matic

Google Apps serving as the Identity Provider (IDP) can provide your users with single sign-on (SSO) access via Security Assertion Markup Language 2.0 Standard (SAML) to the Screencast-O-Matic Screen Recorder and Video Editor under your team plan.  When Team users first authenticate via SAML and you have configured SAML to create users, we setup their dedicated hosting account as part of the Team Plan.

This article describes how to configure SAML SSO with Google Apps serving as the IDP. 

Prerequisites 

  • Your organization must be using Google Apps
  • You will need administrative permissions for Google Apps
  • You must be using a Screencast-O-Matic Team Plan 
  • You will need administrative permissions for your Team Plan

 

Configuring SAML SSO with Screencast-O-Matic

1. Login into Google Apps as an Admin.

2. In your Google Apps Administration Console, select the "Apps" option.
gsuiteadmin.png

3. In the Apps window select SAML App.



4. Choose the "+" option to add a new application.





5. Select "Setup my Own Custom App".
gsuitesamlappsenablesso.png

6. Download the IDP Metadata file and save the file to your computer.  Click next.
gsuitesamlappdownloadidpxml.png

7. Fill out an application name.  Click Next.


8. Keep the following tab/window open as we will return to configure later.



9. Login to Screencast-O-Matic as Team Admin and click your user icon, then Settings.

10. On left sidebar, click Authentication.




11. Under "SAML Authentication" move the slider to On which requires your users to login via SAML.


Once enabled, you will find the additional settings needed to set up communication between Screencast-O-Matic and the ADFS identity provider.

12. In the text box, specify a unique access URL.  This URL will be used by your Team the first time they authenticate into Screencast-O-Matic.  When visiting this URL, the user will be re-directed to your organization network login for sign-in or if they are already logged into your network they will be automatically signed into Screencast-O-Matic.
note: "myuniqueurl" shown below will be a name you create for your access page.
 

13. If you intend to have your users enjoy the advanced features provided in hosting (branded player, content sharing, channel carousel, stock media, etc.) then you need to check "Create users on Screencast-O-Matic".   The first time a user from your organization logs in via SAML, their hosting account will be set up so they can manage and share content.
Setting up users



14. Next, download the metadata XML from the settings area.



15. Select "Choose File" and upload the Google Apps IDP Metadata file you previously saved.
 

16. Copy the ACS URL and Entity ID for use in Google Apps.                                                                        

17.Return to the Google Apps tab or window and paste the ACS URL and Entity ID into their respective fields. 
Make sure to leave the defaults for Name ID set to "Basic Information" and "Primary Email"
gsuitesamlacsurlentityid2.png


18. Add Attributes to map First and Last Name for users.
note: you only need to do this step if you clicked "Create users .. " above.  Otherwise, skip to the next step.

urn:oid:2.5.4.42 -> First Name (Basic Information)
urn:oid:2.5.4.4 -> Last Name (Basic Information)




19. Click Finish.                                                                                       
gsuitesamlattributemapping.png

20. You should see the following screen with your installed app.


20. Return to the Screencast-O-Matic Authentication Settings and click Save.

21. Click the “Test Login” link to make sure the login works. 



You are all set!  Now when your users land on the team access page they will be prompted to login via Google SSO.