Gather Planasonix URLs
From Settings → Security → SSO, copy:- ACS URL (Assertion Consumer Service URL)
- Entity ID (SP entity identifier)
Create the custom SAML application
Open SAML app configuration
In Google Admin console, go to Apps → Web and mobile apps → Add app → Add custom SAML app.
Name and optional branding
Enter an app name (for example,
Planasonix) and optional icon, then continue.Enter service provider details
Choose I have SP metadata if Planasonix provides a metadata XML file; otherwise select Set up connection manually and enter:
- ACS URL: paste the Planasonix ACS URL exactly.
- Entity ID: paste the Planasonix Entity ID exactly.
- Start URL (optional): your organization’s Planasonix login URL if Google prompts for it.
Map attributes
Add attribute mappings so Planasonix receives email, first name, and last name using the attribute names shown on the Planasonix SSO configuration screen. Add group mappings only if your tenant uses group-based authorization from SAML.
X.509 certificate management
Google signs SAML assertions with an IdP certificate. Planasonix needs the current certificate (via metadata upload or manual paste) to validate signatures.- Initial setup
- Renewal before expiry
Download IDP metadata from the Google SAML app page or copy the X.509 certificate block into Planasonix along with SSO URL and Entity ID from Google.
Certificate renewal does not change your ACS URL or Entity ID. You typically update only the signing certificate or full IdP metadata in Planasonix.
Manual ACS and entity URLs
When you configure manually (no SP metadata file), double-check for typos, http vs https, and trailing slashes. Google and Planasonix both treat URLs as exact strings.Related topics
SSO overview
SAML setup summary and enforcing SSO for the org.
Teams and permissions
Group and role mapping after Google SSO.