Google Workspace Integration
Connect IronWifi to Google Workspace (formerly G Suite) to authenticate WiFi users with their Google accounts, automatically sync users and organizational units, and enable seamless social login on your captive portal.
Features
- User Synchronization - Import users from Google Workspace
- Group Synchronization - Sync organizational units and groups
- Google Authentication - Users authenticate with Google credentials
- Auto-provisioning - Automatically create users on first login
Prerequisites
- Google Workspace administrator account
- IronWifi account with Connector access
- Google Cloud project (for advanced integrations)
Basic Setup
Enable Google Authentication
For captive portal social login:
- Navigate to Captive Portals > your portal
- Go to Authentication Providers
- Enable Google
- Configure OAuth settings (or use IronWifi's default)
User Synchronization
Sync users from Google Workspace:
- Navigate to Connectors > Add Connector
- Select Google Workspace
- Click Authorize
- Sign in with Google Workspace admin account
- Grant requested permissions
- Configure sync settings
Advanced Setup with Custom OAuth
For full control, create your own Google Cloud OAuth app:
Step 1: Create Google Cloud Project
- Go to Google Cloud Console
- Create a new project
- Enable these APIs:
- Google+ API
- Admin SDK API
- People API
Step 2: Configure OAuth Consent Screen
- Navigate to APIs & Services > OAuth consent screen
- Select Internal (for Workspace users only) or External
- Enter app information:
- App name: IronWifi
- User support email
- Developer contact
- Add scopes:
emailprofileopenid
Step 3: Create OAuth Credentials
- Go to APIs & Services > Credentials
- Click Create Credentials > OAuth client ID
- Select Web application
- Add authorized redirect URIs from IronWifi
- Copy Client ID and Client Secret
Step 4: Configure IronWifi
- Navigate to connector settings
- Enter your Client ID and Client Secret
- Save configuration
- Test authentication
Synchronization Options
What Gets Synced
| IronWifi | |
|---|---|
| Username | |
| Name | Full Name |
| Organizational Unit | Organizational Unit |
| Groups | Groups |
| Status | Status |
Sync Settings
| Setting | Description |
|---|---|
| Auto-sync | Enable scheduled synchronization |
| Sync interval | How often to sync (hourly, daily) |
| Include suspended | Sync suspended Google users |
| OU filter | Only sync specific organizational units |
Manual Sync
Trigger immediate synchronization:
- Navigate to the connector
- Click Sync Now
- Monitor progress
- Review results
Authentication Methods
RADIUS with Google Credentials
Enable users to authenticate to WPA-Enterprise using Google credentials:
- Configure Google Connector
- Enable RADIUS Authentication
- Set Authentication Source for users to google
warning
This requires the Google Secure LDAP or Cloud Identity features. Some Google Workspace editions may not support this.
Captive Portal with Google Login
Enable Google social login on splash pages:
- Enable Google authentication provider
- Add Google domains to Walled Garden:
accounts.google.com
*.googleapis.com
*.gstatic.com
Restricting Access
By Domain
Only allow users from specific domains:
- In connector settings
- Set Allowed Domains
- Enter your domain(s)
By Organizational Unit
Only sync users from specific OUs:
- Configure OU filter
- Select OUs to include
- Save and sync
By Group
Only allow members of specific groups:
- Enable group-based filtering
- Select allowed groups
- Non-members will be denied
Troubleshooting
Authorization Failed
- Verify admin credentials
- Check required API scopes
- Confirm Workspace admin status
Users Not Syncing
- Check OU filter settings
- Verify user status in Google
- Review sync logs for errors
Authentication Failed
- Verify user exists in IronWifi
- Check authentication source setting
- Confirm Google account is active
Best Practices
- Use dedicated admin account for connector authorization
- Enable auto-sync to keep users current
- Filter by OU to only sync relevant users
- Monitor sync logs for failures
- Test with single user before bulk operations