Watch Webinar: Figma - Design to Code in 80% Less Time

Announcing Visual Copilot - Figma to production in half the time logo
Talk to Us
Contact Sales
Talk to Us










Visual CMS

Drag-and-drop visual editor and headless CMS for any tech stack

Theme Studio for Shopify

Build and optimize your Shopify-hosted storefront, no coding required



Get StartedLogin

enterprise plans

Builder supports the industry standards, Security Assertion Markup Language (SAML) and OpenId Connect (OIDC). This means that single sign-on (SSO) integrates with any identify providers that support either. 

This document covers how to integrate Google Workspace with SAML.

While we enable SSO for your Organization, you can start setting up the SAML App in Google Admin. For more detailed instructions, follow the Google guide, Set up your own custom SAML application: Using SAML-based SSO.

1. Navigate to your Google Admin account and visit your Apps page.

2. Click on SAML Apps.

3. Click the plus, +, icon or link to create a new app, then select the option at the bottom for Setup my own custom app.

4. Save your SSO URL, Entity Id, and download your certificate, then click Next.

5. In the form that opens, enter the name of the App (such as, builder-io), a description (such as, Drag-and-drop Visual CMS”).

6. Add the Builder logo. Click the image below to open the logo in a new tab if needed.

Builder Logo

7. On the next screen, enter the Builder SAML information:

  • ACS URL:
  • Entity ID:

8. Save service.

9. After you create the SAML app, make sure you turn it on for all users or the group of users you would like to enable access for.

With SSO enabled on your Builder account and an app, you can add your SSO details:

  1. Go back to your Builder Organization Settings.
  2. Enter the SAML information from your Google account above (SSO URL, Entity Id, and the certificate you downloaded).
  3. When choosing an SSO Name be aware that this is a unique name across all organizations in Builder, and it will be used to access your unique SSO login page; for example, Choose something that is easy to bookmark or remember for you and your colleagues.

By default, usernames are not mapped between Builder and identity providers. However, administrators can establish this connection by mapping a specific name field from the identity provider to the name attribute in Builder's profile settings. This configuration ensures that the username is properly set upon user login with SSO.

To map usernames between Builder and Google Workspace, you'll need to go to Google Workspace to update your profile mappings.

OpenID Connect (OIDC) builds on OAuth 2.0 so applications can authenticate users and retrieve their basic information in a standardized way. OAuth 2.0 supports different authorization strategies, including:

  • Implicit flow: for browser-based apps. It is less favored as it can expose tokens to the browser.
  • Authorization Code Flow: is preferred for its security, suitable for apps that can manage a Client Secret without exposing it, as it conducts token exchanges away from the user's browser. The Client Secret acts as a password between the app and the authorization server to safely exchange an authorization code for an access token.

When setting up OIDC for SSO in, you have the option to include a client secret in your Builder SSO configuration, which indicates that you want to use the code flow. If you don't include a client secret, Builder defaults to using the implicit flow.

To add your IdP's Client Secret to your Builder SSO configuration:

  1. In Google Workspace: Get your Client Secret from Google Workspace. Refer to their docs for creating access credentials.
  2. In Builder: Go to Builder's Organization Settings.
  3. Click the Edit button for Single Sign-On. Note that you must have SSO enabled for your Organization before this option is available in your Organization Settings.
  4. For the SSO Method, make sure you've selected OpenID Connect.
  5. Paste the Client Secret in the Client Secret field.
  6. Click the Save button.
Screenshot of the SSO dialogue in Builder with a circle around the IdP Client Secret field. It is the fifth field in the dialogue and displays when the selected SSO Method is OpenID Connect.

Due to recent browser updates, if you previously used the Firebase URL, you must update your authentication domain for SSO to ensure compatibility and security.

To accommodate these changes while maintaining existing SSO configurations:

  1. Update the ACS URL: Replace the previous redirect URL of with the new domain This applies to both SAML and OIDC configurations and must be updated in the Identity Provider (IdP) settings.
  2. Update the login URL: Append the query parameter authDomain=new to the login URL. For example, a bookmarked login URL would be formatted as Including this parameter ensures compatibility with the new custom domain. Omitting it may lead to incompatibility issues, affecting SSO functionality with recent versions of browsers such as Firefox and Safari.

For IdP-initiated logins, the login URL provided by the IdP must also include the authDomain=new parameter for seamless integration.

Was this article helpful?


Visual CMS

Theme Studio for Shopify

Sign up


Featured Integrations





Get In Touch

Chat With Us




© 2020, Inc.


Privacy Policy

Terms of Service


Get the latest from

By submitting, you agree to our Privacy Policy