How to create a 3rd party app for SAML + Auto Proviosning for Google Workspace Admin - google-workspace

How can I create a 3rd party SAML app that also supports Auto User Provisioning ( like Salesforce app in Saml Catalog)?
What are the steps to create a SAML app to show in the list of Web and Mobile Apps?
I am looking for steps other than Admin->Create custom Saml app

Related

Firebase authentication problem with Apple sign in

I'm using firebase authentication in a flutter app.
I've set up apple authentication and I'm building for both web and for ios.
In the apple developer console, I have an app id (com.crossology.ios) and an associated services id (com.crossology.auth)
In the firebase console, if I set authentication > apple > services id to "com.crossology.ios", authentication works in my flutter app.
If I set it to "com.crossology.auth", authentication works on my flutter web interface.
I don't see a way to configure apple authentication to work for both web and app at the same time.

Developing a PWA where the Session ID issued by the User (Trusted). In the same PWA, we have a 3rd party PWA. How can the session persist across?

The PWA App access is based on the user credentials passed from the User's Mobile App (where our PWA App is being exposed within the i Frame) and the two parties are contractually bound trusted entities. We now have a 3rd party PWA App that is called upon based on a specific service filter selection by the User. However, the Trust exists between our PWA and the 3rd party PWA, but not between the User's Mobile App.
How can the session be maintained across this flow?

Set up auto provisioning for custom SAML Web app in Google workspace

I am trying to set up a custom SAML Web app with auto provisioning in my google admin. I am able to create an custom SAML Web app but the auto provisioning feature is not available. As per this community link there are a bunch of other apps which provide auto provisioning. I couldn’t find a way to setup a custom one.
I am creating a custom SAML Web app by following steps:
Logging into google admin
App -> Web and Mobile Apps -> Add App -> Add custom SAML App
Below is how it looks after i create few apps already present in the apps list and when i create a custom SAML App. The custom app clearly does not have the User auto provisioning or there is a setting for the same which i am missing.
How do i set up auto provisioning for custom SAML Web app?
Please help!
Currently there is no support for auto-provisioning on custom SAML apps. In their release blog post Google explains how this works:
Following this launch, admins will be able to set up automated user provisioning and deprovisioning for Salesforce.com and other apps (with support for more applications coming soon).
These are apps that they are specifically adding support to. Since then they have been steadily adding more apps to their catalog, but it's still a predefined list. All SPs have different APIs to provision users so it is probably not so easy to create an interface that will be able to connect with any of them, so Google seems to be sticking to implementing them one by one.
The link that you shared contains another link to Apps that support automated provisioning, which has the full list of supported apps. Any app outside of this list won't have auto-provisioning available.

How to implement SSO between App Center Client and MobileFirst common apps?

We want to deploy App Center Client (maybe to customize one based on App Center API) as other apps developed based on MobileFirst platform. The current environment has LDAP (TDS) and ISAM (TAM), how to implement the SSO between them?
I know we can easily to do SSO between common mobile apps based on MobileFirst Platform, but if we want add the appcenter client to SSO, how to do it?
Device SSO between MFP-based applications is indeed possible.
A requirement for Device SSO to work isa connection to the MFP Server
The Application Center installer app is a MFP-based application as well, however this application does not contact the MFP Server. It contacts the Application Center Management Server.
So in theory, you could enable device SSO by following the user documentation (linked above), however it will be "one-sided" in the sense that it will work in the Application Center installer app only if the login was first done by the "regular" MFP-baed app.

How the official Twitter mobile application connects a user?

I would like to know how the official Twitter Mobile Application (android/IOS) is able to connect a user without approving the application ?
Do they use their own REST API with OAuth but wich one ?
https://dev.twitter.com/docs/auth/obtaining-access-tokens
Do they use a special master key ?
Isn't it a security threat ?
They appear to use OAuth interface just like any other app. If you go to the twitter settings page, where you can revoke OAuth tokens, I see the mobile twitter applications there (iPhone, iPad, IOS integration) and they can be revoked.