Skip to content
  • There are no suggestions because the search field is empty.

Google SSO for Humly Control Panel

This guide describes how to set up Google Single Sign-On (SSO) for Humly Control Panel. Once configured, users with a Google account can log in to HCP using their Google credentials.

Table of Contents

 

Prerequisites

  • Access to Google Cloud Console (console.cloud.google.com)
  • Access to Google Admin Console (admin.google.com)
  • Admin access to Humly Control Panel

Part 1: Google Cloud Console

Step 1 – Enable the Cloud Identity API

  1. Go to Google Cloud Console and open your project.
  2. Navigate to APIs & Services → API Library.
  3. Search for "Cloud Identity API" (not "Cloud Identity-Aware Proxy API").
  4. Click on Cloud Identity and then click Enable.

This API is required for group membership checks during login.

Step 2 – Create an OAuth 2.0 Client ID

  1. Navigate to Google Auth Platform → Clients.
  2. If prompted, configure the OAuth consent screen first:
    • Click "Configure consent screen".
    • Set User Type to Internal.
    • Fill in the required fields (App name, support email) and save.
  1. Once the consent screen is configured, return to Clients and click "Create OAuth client".
  2. Select Application type: Web application.
  3. Give it a descriptive name.
  4. Under Authorized JavaScript origins, add your HCP domain (without a trailing slash):
    https://your-hcp-domain.com
  5. Leave Authorized redirect URIs empty.
  6. Click Create and copy the generated Client ID — you will need it in Part 3.

Part 2: Google Admin Console

Step 3 – Add the Cloud Identity Scope to Domain-wide Delegation

  1. Go to Google Admin Console (admin.google.com).
  2. Navigate to Security → Access and data control → API controls.
  3. Click "Manage Domain Wide Delegation".
  4. Find the existing service account used by HCP and click Edit.
  5. Add the following scope:
    https://www.googleapis.com/auth/cloud-identity.groups.readonly
  6. Save the changes.

Part 3: Humly Control Panel

Step 4 – Configure Google SSO in HCP

  1. Log in to Humly Control Panel as an admin.
  2. Navigate to the SSO settings section.
  3. Check "Enable Google SSO".
  4. Paste the Client ID from Step 2 into the Client ID field.
  5. Optionally enter your organization's domain in the Hosted Domain field (e.g. example.com). This restricts login so that only users with a Google account on that domain can authenticate.
  6. Save the settings.

Users who are already added locally in HCP can now log in using their Google account via the SSO button on the login page.


Optional: Group-based Access Control

If you want to control which HCP roles users receive based on their Google Group membership, follow these additional steps.

Step 5 – Create Google Groups

  1. In Google Admin Console, go to Directory → Groups.
  2. Click Create group for each HCP role you want to use with SSO (e.g. Global Admins, Local Admins, Users, etc.).
  3. Under Group settings, set:
    • Access type: Restricted
    • Who can join: Only invited users
  4. Click Create Group.
  5. Click "Add members" and add the relevant users to the group.

Step 6 – Map Google Groups to HCP Roles

  1. In Humly Control Panel, go to the SSO settings section.
  2. Under Google Workspace groups, enter the group email address for each HCP role you want to map. For example:
    • Global Admins: my-group-admins@example.com
    • Users: my-group-users@example.com
  3. Save the settings.

Users who belong to a mapped Google Group will automatically receive the corresponding HCP role when logging in via SSO.

Step 7 (Optional) – Mark the App as Trusted to Skip the Consent Screen

By default, users see a consent screen the first time they log in with Google SSO. To remove this screen entirely, mark the app as Trusted in Google Admin Console:

  1. In Google Admin Console, go to Security → Access and data control → API controls.
  2. Click "Manage App Access".
  3. Go to Configured apps → View list → Configure new app.
  4. Search for your app by name or OAuth Client ID and select it.
  5. Set scope to All users in your organization and click Continue.
  6. Set Access to Google Data to Trusted and click Continue.
  7. Review the summary and click Finish.

 

Note: It may take up to a few hours for this setting to take effect. Clear browser cookies and try again if the consent screen still appears.


Troubleshooting

  • Consent screen still appearing after marking app as Trusted: Allow up to a few hours for the setting to propagate. Clear browser cookies and try again.
  • User cannot log in via SSO: Verify that the user is either added locally in HCP or is a member of a mapped Google Group.
  • User cannot log in via SSO: Verify that you are using the email of the group and not the group name in Humly Control Panel.

Best Practices

  • Use a dedicated Google Cloud project for HCP SSO to keep credentials and API access isolated from other services in your organization.
  • Set OAuth consent screen to Internal to ensure only users within your Google Workspace organization can authenticate. Never use External for an internal tool like HCP.
  • Use Restricted access and invite-only for Google Groups to prevent users from adding themselves to groups and gaining unintended HCP roles.
  • Create one Google Group per HCP role with a clear naming convention, for example humly-sso-global-admins@example.com, to make group management easy and auditable.
  • Regularly review group memberships to ensure only the right users have access to each HCP role, especially when employees leave or change responsibilities.
  • Mark the app as Trusted in Google Admin Console to provide a seamless login experience without consent prompts for your users.
  • Test with dedicated test users before rolling out SSO to all users, to verify that group mappings, roles, and login flows work as expected.
  • Document your group-to-role mappings internally so that future admins can easily understand which Google Groups correspond to which HCP roles.