Topics on this page
Google setup guide
Download the metadata XML for Trend Cloud One
- Log into Trend Cloud One with Full Access to the Identity and Account permissions.
- Click Administration near the bottom of the page.
- Click the Identity Providers tab on the left.
- Click Download Metadata XML for Trend Cloud One, or right-click the link and select an option to save the file.
This XML file will be read in order to configure SAML in Google.
Configuring SAML in Google
Refer to Google's Documentation for more details.
Currently, Google is still in beta for sending a user's group membership in the SAML response. As a workaround, the instructions provided in this document implement the use of custom attributes to map to and include notations of where to use group membership should your account have access to that feature. To use custom attributes, navigate to Directory > Users, click More options, select Manager user attributes, and then click Add custom attribute. This will be used to determine what users have access to what roles in Trend Cloud One. Set the category, for example CloudOneRole
. Set the name to role
, visible to organization and single value. Now update your users profile to have a value in that custom field, for example full-access
. The mapping will be created in the subsequent steps.
Adding your custom SAML app
- Log in to Google Admin console with super administrator privileges.
- On the left side, navigate to Apps > Web and mobile apps. Click Add app, select Add custom SAML app, provide a name for your application, and then click Continue.
- Click Download Metadata, and then Continue.
- Fill in the next sections as follows, clicking Continue as you complete each section:
Service Provider Details:
Field | Value | Notes |
---|---|---|
ACS URL | From the Trend Cloud One metadata XML file, enter the value for AssertionConsumerService > Location |
For example: https://saml.cloudone.trendmicro.com/idpresponse |
Entity ID | From the Trend Cloud One metadata XML file, enter the value for entityID |
For example: https://saml.cloudone.trendmicro.com |
Start URL | Empty or "/workload" | Set this if you would like users to be automatically taken to Workload Security upon sign-in. |
Leave other fields as their default values.
Attribute Mapping:
Google Directory attributes | App attributes |
---|---|
Basic Information > First name | name |
CloudOneRole > role | role |
If Group membership is available, then do not include the custom attribute (CloudOneRole) mapping. Instead under Google groups search for and select the groups you wish to map to your application. Under App attributes enter role
.
See the attributes claims guide for more information.
Configuring user access
- Inside your SAML application, click User access, then select ON for everyone and click Save.
- Expand Groups on the left, search for or click the group you wish to provide access to your applications. Select ON for everyone and click Save.
Configure SAML in Trend Cloud One
- From the Trend Cloud One Identity Providers page, click New.
- From Identity Provider, in the Alias field, type any name which should include the identity provider, such as Google.
- In Metadata XML File, click Browse, then navigate to the metadata file that you downloaded from the identity provider (not Trend Cloud One).
- For the Mapping section (see explanation in About SAML single sign-on) provide a role and attribute as detailed in the next steps.
- Set Role attribute to:
role
. - Set Group to the name of the custom attribute, for example:
full-access
or a group you mapped to, then map it to a Trend Cloud One role. - For the remaining optional attributes, provide the following values: set Name attribute to
name
and leave Locale attribute and Timezone attribute empty. - Click Save.
In the Mapping section, click + to add more than one Group. You can configure multiple groups to have different access privileges.
Set console theme
Specifying a theme query parameter is optional, and it allows users to specify a particular theme in the RelayState they get from the Identity Provider SAML response. The valid theme values are light
and dark
. If dark
is selected, then the Trend Cloud One console opens in the dark mode. If no theme parameter is specified, the browser defaults to light mode, or whatever is saved within a user's local browser setting.
To specify the theme, the relayState in the SAML response should include theme
as a query parameter with a value of either dark
or light
.
For RelayState:
/theme=dark
for dark theme./theme=light
for light theme.
Test SAML SSO
- Back in your application in Google, make sure you sign out, clear cache and sign back in. Otherwise you may get
Error: not_a_saml_app
because your existing session does not know about its association with your new application. - Once you are back to your application, click Test SAML login and you will be automatically logged in to Trend Cloud One.
If you are having difficulties, see troubleshooting SAML guide.