FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login
    1. Home
    2. Popular
    Log in to post
    • All Time
    • Day
    • Week
    • Month
    • All Topics
    • New Topics
    • Watched Topics
    • Unreplied Topics
    • All categories
    • danD

      Solved Claims to check when using google as an idp for google workspace

      Q&A
      • google idp workspace • • dan
      2
      0
      Votes
      2
      Posts
      20
      Views

      danD

      You should start by checking the relevant google documentation.

      As of writing, this is what their doc says:

      Using the email, email_verified and hd fields, you can determine if Google hosts and is authoritative for an email address. In the cases where Google is authoritative, the user is known to be the legitimate account owner, and you may skip password or other challenge methods.

      Cases where Google is authoritative:

      email has a @gmail.com suffix, this is a Gmail account. email_verified is true and hd is set, this is a Google Workspace account.

      Users may register for Google Accounts without using Gmail or Google Workspace. When email does not contain a @gmail.com suffix and hd is absent, Google is not authoritative and password or other challenge methods are recommended to verify the user. email_verified can also be true as Google initially verified the user when the Google account was created, however ownership of the third party email account may have since changed.

      So in this case, you want to check that hd is set as well as that email_verified is true.

      With FusionAuth, you can check this using a reconcile lambda and looking at the id_token:

      https://fusionauth.io/docs/extend/code/lambdas/google-reconcile https://fusionauth.io/docs/extend/code/lambdas/openid-connect-response-reconcile
    • V

      Currently using MojoAuth — thinking about switching to FusionAuth, looking for advice

      General Discussion
      • • • vijaysingh1784
      2
      0
      Votes
      2
      Posts
      27
      Views

      mark.robustelliM

      @vijaysingh1784 Looks like you have done a bit of research your self and made a pretty good analysis. I am not very familiar with MojoAuth, but just to confirm a few things:

      FusionAuth is very customizable. You should check out things like Lambdas, Webhooks and other various options.

      FusionAuth can be self-hosted or can be hosted for you.

      FusionAuth handles SAML, SCIM and other various integrations.

      FusionAuth is very scalable and gives you great control with api acess and other mechanisms.

      Depending on your needs, FusionAuth can be as easy to self host as spinning up a docker image to a full blown complex K8s deployment. It should fit your needs there.

      While there is no direct migration guide for the product you are talking about, there are several other migration guides for you to look over that should give you an idea on how to do it.

    • B

      Unsolved What is the verification key in a SAMLv2 IdP used for?

      Q&A
      • • • biwi
      4
      0
      Votes
      4
      Posts
      256
      Views

      mark.robustelliM

      @biwi It sounds like the keys may have gotten switched or something odd. Is it possible to wipe everything out at try again from scratch? Also, check out this blog post as it may be useful for you as well.

    • danD

      Docs MCP server

      Release
      • • • dan
      1
      0
      Votes
      1
      Posts
      15
      Views

      No one has replied