<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Single sign-on with Google in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Single-sign-on-with-Google/m-p/1973742#M23134</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/174719"&gt;@DesenvolvimentoCresol&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to confirm, you are trying to set up Google Cloud Platform as IDP for your Qlik SaaS tenant?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the steps which I followed:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
 &lt;LI&gt;Login to Google Cloud Platform (GCP) and hit &lt;I&gt;Select a project&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;Give it a name like &lt;STRONG&gt;QlikSaaSIDP&lt;/STRONG&gt; and create it.&lt;/LI&gt;
 &lt;LI&gt;Jump to the &lt;I&gt;OAuth consent screen&lt;/I&gt; as part of the panel menu &lt;I&gt;APIs &amp;amp; Services.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;Select &lt;I&gt;External&lt;/I&gt;.&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Remark:&lt;/STRONG&gt; Customer running their business in Google Workspace will probably select &lt;I&gt;Internal&lt;/I&gt; here...&lt;/LI&gt;
 &lt;LI&gt;Enter a app name such as &lt;STRONG&gt;QlikSaaS&lt;/STRONG&gt;. Select a support email adress (based on your registered user(s)), limit the access to this app by specifying &lt;STRONG&gt;qlikcloud.com&lt;/STRONG&gt; as authorized domain and add email addresses of your choice as D&lt;I&gt;eveloper contact information&lt;/I&gt;,&lt;/LI&gt;
 &lt;LI&gt;Hit &lt;I&gt;Save and continue&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;Now you can specify the scope permissions. By default the scopes &lt;STRONG&gt;profile, email &lt;/STRONG&gt;and &lt;STRONG&gt;openid&lt;/STRONG&gt; are required to successfully register a user in Qlik SaaS.&amp;nbsp;&lt;/LI&gt;
 &lt;LI&gt;Hit a&lt;I&gt;dd or remove scopes&lt;/I&gt; to open the scope selection screen.&lt;/LI&gt;
 &lt;LI&gt;Select the first three "non sensitive" scopes&lt;STRONG&gt; email, profile &lt;/STRONG&gt;and &lt;STRONG&gt;openid&lt;/STRONG&gt;.&lt;/LI&gt;
 &lt;LI&gt;Hit &lt;I&gt;Update&lt;/I&gt; at the bottom of the screen.&lt;/LI&gt;
 &lt;LI&gt;Afterwards these three scopes should appear in the section of non-sensitive scopes.&amp;nbsp;&lt;BR /&gt;Hit &lt;I&gt;Save and continue&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;The optional info part on the next screen can be neglected.&amp;nbsp;&lt;BR /&gt;it &lt;I&gt;Save and continue.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;Check the summary and complete the app creation process by hitting &lt;I&gt;back to dashboard&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;Next, switch to the menu &lt;I&gt;Credentials&amp;nbsp;&lt;/I&gt;and hit &lt;I&gt;Create Credentials&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;Choose &lt;I&gt;OAuth client ID.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;Select &lt;I&gt;Web application&lt;/I&gt; in the dropdown menu.&lt;/LI&gt;
 &lt;LI&gt;Enter a name for the application such as &lt;STRONG&gt;Qlik2GCP&amp;nbsp;&lt;/STRONG&gt;and e&lt;SPAN style="color:rgb(23,43,77);"&gt;nter your&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SaaS tenant URL&lt;/STRONG&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; extended by the postfix &lt;/SPAN&gt;&lt;I&gt;login/callback&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;&amp;nbsp;in the section&amp;nbsp;&lt;I&gt;Authorized redirect URIs&lt;/I&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Save by hiting &lt;I&gt;Create.&lt;/I&gt;&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;A&lt;STRONG&gt; Client ID&lt;/STRONG&gt; and &lt;STRONG&gt;Client Secret&lt;/STRONG&gt; will be generated. Copy it to an editor for later use.&lt;/LI&gt;
 &lt;LI&gt;Hit &lt;I&gt;Ok.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;That's it on the GCP side. Now flip to your Qlik SaaS tenant.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Let's continue with the Qlik SaaS part&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
 &lt;LI&gt;To enable the IDP in QSE SaaS login with a tenant admin and jump to the cloud admin console.&lt;/LI&gt;
 &lt;LI&gt;Open&amp;nbsp;&lt;I&gt;identity provider&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;&amp;nbsp;in the configuration section&amp;nbsp;and create a new one.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;Select Type &lt;I&gt;Interactive&lt;/I&gt; and provider &lt;I&gt;Generic&lt;/I&gt;. Optionally, enter a description.&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Among application credentials you refer to the &lt;/SPAN&gt;&lt;I&gt;discovery endpoint&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; of your GCP authorization server as &lt;/SPAN&gt;&lt;I&gt;OpenID Connect metadata URI.&amp;nbsp;&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(32,33,36);"&gt;The Discovery document for Google's OpenID Connect service can be retrieved from&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://accounts.google.com/.well-known/openid-configuration" target="_blank"&gt;https://accounts.google.com/.well-known/openid-configuration&lt;/A&gt;.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Next insert the required &lt;/SPAN&gt;&lt;I&gt;Client ID&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; and &lt;/SPAN&gt;&lt;I&gt;Client Secret&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; from the previously created GCP application &lt;/SPAN&gt;&lt;I&gt;Qlik2GCP.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;The &lt;/SPAN&gt;&lt;I&gt;realm&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; setting is optional but can be meaningful to set when you run a Qlik multicloud environment and you want to homogenize license usage across all Qlik Sense Site such as QSE SaaS and QSE on Windows. So you can enter here the user directory attribute you have set in the SAML configuration for a GCP IDP on QSE on Windows - such as&amp;nbsp;Google.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;Moving forward to the claim settings the &lt;I&gt;sub&lt;/I&gt; attribute is critical. By default the claim &lt;I&gt;sub&lt;/I&gt; delivers a cyrptical string (e.g. 116730270589448078398) when the mapping parameter is retained as "sub". This is the &lt;I&gt;Google ID&amp;nbsp;&lt;/I&gt;of a user object&lt;I&gt;.&amp;nbsp;&lt;/I&gt;However, the&amp;nbsp;email address or display name&amp;nbsp;of a user object may be required instead for better tracability and license synchronicity (in particular in a multicloud setup). This can be achieved by changing the attribute to &lt;I&gt;email &lt;/I&gt;or &lt;I&gt;name.&lt;/I&gt;&amp;nbsp;&lt;/LI&gt;
 &lt;LI&gt;The remaining claims can be left untouched.&lt;/LI&gt;
 &lt;LI&gt;Finally, enter the required scopes &lt;STRONG&gt;openid, email &lt;/STRONG&gt;and&lt;STRONG&gt; profile&lt;/STRONG&gt; as whitespace seperated values in the &lt;I&gt;Scope&lt;/I&gt; section.&lt;/LI&gt;
 &lt;LI&gt;Hit &lt;I&gt;Create&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Now the settings can be saved and the identity provider can be validated.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;Login with a &lt;I&gt;google account&lt;/I&gt; which should be promoted to a tenant admin in your Qlik SaaS instance.&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;If all claim settings are correct a profile validation windows pops up where you can check the transmitted content of the &lt;/SPAN&gt;&lt;I&gt;name, email&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; and &lt;/SPAN&gt;&lt;I&gt;sub&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; claim.&amp;nbsp;Confirming these profile data...&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;...promotes your logged in user to a tenant admin (if not set already)...&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;... add you can activate the IDP.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Success!&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Final test can be executed by logging in with a test user - in this scenario &lt;I&gt;qlikdummy@gmail.com&lt;/I&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Checking the licensed user in the cloud admin console confirms the correct claim submission.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;FYI: &lt;/SPAN&gt;&lt;A href="https://help.qlik.com/en-US/cloud-services/Subsystems/Hub/Content/Sense_Hub/Admin/mc-creating-idp.htm" target="_blank"&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;https://help.qlik.com/en-US/cloud-services/Subsystems/Hub/Content/Sense_Hub/Admin/mc-creating-idp.htm&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;I hope this helps!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 26 Aug 2022 16:49:37 GMT</pubDate>
    <dc:creator>Vinay_B</dc:creator>
    <dc:date>2022-08-26T16:49:37Z</dc:date>
    <item>
      <title>Single sign-on with Google</title>
      <link>https://community.qlik.com/t5/Management-Governance/Single-sign-on-with-Google/m-p/1973652#M23132</link>
      <description>&lt;P&gt;Good morning, I'm trying to integrate Google with Qlik Sense Enterprise SaaS to unify logins, but so far I haven't been able to advance anything, has anyone gone through this? Have you done any such integration? what are the necessary settings?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2022 14:44:36 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Single-sign-on-with-Google/m-p/1973652#M23132</guid>
      <dc:creator>DesenvolvimentoCresol</dc:creator>
      <dc:date>2022-08-26T14:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: Single sign-on with Google</title>
      <link>https://community.qlik.com/t5/Management-Governance/Single-sign-on-with-Google/m-p/1973742#M23134</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/174719"&gt;@DesenvolvimentoCresol&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to confirm, you are trying to set up Google Cloud Platform as IDP for your Qlik SaaS tenant?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the steps which I followed:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
 &lt;LI&gt;Login to Google Cloud Platform (GCP) and hit &lt;I&gt;Select a project&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;Give it a name like &lt;STRONG&gt;QlikSaaSIDP&lt;/STRONG&gt; and create it.&lt;/LI&gt;
 &lt;LI&gt;Jump to the &lt;I&gt;OAuth consent screen&lt;/I&gt; as part of the panel menu &lt;I&gt;APIs &amp;amp; Services.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;Select &lt;I&gt;External&lt;/I&gt;.&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Remark:&lt;/STRONG&gt; Customer running their business in Google Workspace will probably select &lt;I&gt;Internal&lt;/I&gt; here...&lt;/LI&gt;
 &lt;LI&gt;Enter a app name such as &lt;STRONG&gt;QlikSaaS&lt;/STRONG&gt;. Select a support email adress (based on your registered user(s)), limit the access to this app by specifying &lt;STRONG&gt;qlikcloud.com&lt;/STRONG&gt; as authorized domain and add email addresses of your choice as D&lt;I&gt;eveloper contact information&lt;/I&gt;,&lt;/LI&gt;
 &lt;LI&gt;Hit &lt;I&gt;Save and continue&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;Now you can specify the scope permissions. By default the scopes &lt;STRONG&gt;profile, email &lt;/STRONG&gt;and &lt;STRONG&gt;openid&lt;/STRONG&gt; are required to successfully register a user in Qlik SaaS.&amp;nbsp;&lt;/LI&gt;
 &lt;LI&gt;Hit a&lt;I&gt;dd or remove scopes&lt;/I&gt; to open the scope selection screen.&lt;/LI&gt;
 &lt;LI&gt;Select the first three "non sensitive" scopes&lt;STRONG&gt; email, profile &lt;/STRONG&gt;and &lt;STRONG&gt;openid&lt;/STRONG&gt;.&lt;/LI&gt;
 &lt;LI&gt;Hit &lt;I&gt;Update&lt;/I&gt; at the bottom of the screen.&lt;/LI&gt;
 &lt;LI&gt;Afterwards these three scopes should appear in the section of non-sensitive scopes.&amp;nbsp;&lt;BR /&gt;Hit &lt;I&gt;Save and continue&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;The optional info part on the next screen can be neglected.&amp;nbsp;&lt;BR /&gt;it &lt;I&gt;Save and continue.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;Check the summary and complete the app creation process by hitting &lt;I&gt;back to dashboard&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;Next, switch to the menu &lt;I&gt;Credentials&amp;nbsp;&lt;/I&gt;and hit &lt;I&gt;Create Credentials&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;Choose &lt;I&gt;OAuth client ID.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;Select &lt;I&gt;Web application&lt;/I&gt; in the dropdown menu.&lt;/LI&gt;
 &lt;LI&gt;Enter a name for the application such as &lt;STRONG&gt;Qlik2GCP&amp;nbsp;&lt;/STRONG&gt;and e&lt;SPAN style="color:rgb(23,43,77);"&gt;nter your&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SaaS tenant URL&lt;/STRONG&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; extended by the postfix &lt;/SPAN&gt;&lt;I&gt;login/callback&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;&amp;nbsp;in the section&amp;nbsp;&lt;I&gt;Authorized redirect URIs&lt;/I&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Save by hiting &lt;I&gt;Create.&lt;/I&gt;&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;A&lt;STRONG&gt; Client ID&lt;/STRONG&gt; and &lt;STRONG&gt;Client Secret&lt;/STRONG&gt; will be generated. Copy it to an editor for later use.&lt;/LI&gt;
 &lt;LI&gt;Hit &lt;I&gt;Ok.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;That's it on the GCP side. Now flip to your Qlik SaaS tenant.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Let's continue with the Qlik SaaS part&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
 &lt;LI&gt;To enable the IDP in QSE SaaS login with a tenant admin and jump to the cloud admin console.&lt;/LI&gt;
 &lt;LI&gt;Open&amp;nbsp;&lt;I&gt;identity provider&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;&amp;nbsp;in the configuration section&amp;nbsp;and create a new one.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;Select Type &lt;I&gt;Interactive&lt;/I&gt; and provider &lt;I&gt;Generic&lt;/I&gt;. Optionally, enter a description.&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Among application credentials you refer to the &lt;/SPAN&gt;&lt;I&gt;discovery endpoint&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; of your GCP authorization server as &lt;/SPAN&gt;&lt;I&gt;OpenID Connect metadata URI.&amp;nbsp;&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(32,33,36);"&gt;The Discovery document for Google's OpenID Connect service can be retrieved from&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://accounts.google.com/.well-known/openid-configuration" target="_blank"&gt;https://accounts.google.com/.well-known/openid-configuration&lt;/A&gt;.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Next insert the required &lt;/SPAN&gt;&lt;I&gt;Client ID&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; and &lt;/SPAN&gt;&lt;I&gt;Client Secret&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; from the previously created GCP application &lt;/SPAN&gt;&lt;I&gt;Qlik2GCP.&lt;/I&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;The &lt;/SPAN&gt;&lt;I&gt;realm&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; setting is optional but can be meaningful to set when you run a Qlik multicloud environment and you want to homogenize license usage across all Qlik Sense Site such as QSE SaaS and QSE on Windows. So you can enter here the user directory attribute you have set in the SAML configuration for a GCP IDP on QSE on Windows - such as&amp;nbsp;Google.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;Moving forward to the claim settings the &lt;I&gt;sub&lt;/I&gt; attribute is critical. By default the claim &lt;I&gt;sub&lt;/I&gt; delivers a cyrptical string (e.g. 116730270589448078398) when the mapping parameter is retained as "sub". This is the &lt;I&gt;Google ID&amp;nbsp;&lt;/I&gt;of a user object&lt;I&gt;.&amp;nbsp;&lt;/I&gt;However, the&amp;nbsp;email address or display name&amp;nbsp;of a user object may be required instead for better tracability and license synchronicity (in particular in a multicloud setup). This can be achieved by changing the attribute to &lt;I&gt;email &lt;/I&gt;or &lt;I&gt;name.&lt;/I&gt;&amp;nbsp;&lt;/LI&gt;
 &lt;LI&gt;The remaining claims can be left untouched.&lt;/LI&gt;
 &lt;LI&gt;Finally, enter the required scopes &lt;STRONG&gt;openid, email &lt;/STRONG&gt;and&lt;STRONG&gt; profile&lt;/STRONG&gt; as whitespace seperated values in the &lt;I&gt;Scope&lt;/I&gt; section.&lt;/LI&gt;
 &lt;LI&gt;Hit &lt;I&gt;Create&lt;/I&gt;.&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Now the settings can be saved and the identity provider can be validated.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;Login with a &lt;I&gt;google account&lt;/I&gt; which should be promoted to a tenant admin in your Qlik SaaS instance.&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;If all claim settings are correct a profile validation windows pops up where you can check the transmitted content of the &lt;/SPAN&gt;&lt;I&gt;name, email&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; and &lt;/SPAN&gt;&lt;I&gt;sub&lt;/I&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt; claim.&amp;nbsp;Confirming these profile data...&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;...promotes your logged in user to a tenant admin (if not set already)...&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;... add you can activate the IDP.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Success!&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Final test can be executed by logging in with a test user - in this scenario &lt;I&gt;qlikdummy@gmail.com&lt;/I&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;Checking the licensed user in the cloud admin console confirms the correct claim submission.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;FYI: &lt;/SPAN&gt;&lt;A href="https://help.qlik.com/en-US/cloud-services/Subsystems/Hub/Content/Sense_Hub/Admin/mc-creating-idp.htm" target="_blank"&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;https://help.qlik.com/en-US/cloud-services/Subsystems/Hub/Content/Sense_Hub/Admin/mc-creating-idp.htm&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color:rgb(23,43,77);"&gt;I hope this helps!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2022 16:49:37 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Single-sign-on-with-Google/m-p/1973742#M23134</guid>
      <dc:creator>Vinay_B</dc:creator>
      <dc:date>2022-08-26T16:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: Single sign-on with Google</title>
      <link>https://community.qlik.com/t5/Management-Governance/Single-sign-on-with-Google/m-p/2028270#M24164</link>
      <description>&lt;P&gt;hello Vinay_B,&lt;/P&gt;
&lt;P&gt;I am infinitely grateful for this guide that you made, it worked like a charm !!!!&lt;/P&gt;
&lt;P&gt;Very simple, precise and effective!&lt;/P&gt;
&lt;P&gt;Thank you thank you thank you !!&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 12:38:28 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Single-sign-on-with-Google/m-p/2028270#M24164</guid>
      <dc:creator>joseche99</dc:creator>
      <dc:date>2023-01-20T12:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: Single sign-on with Google</title>
      <link>https://community.qlik.com/t5/Management-Governance/Single-sign-on-with-Google/m-p/2041916#M24393</link>
      <description>&lt;P&gt;Hi, in case this helps someone, when doing this point:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Enter a name for the application such as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Qlik2GCP&amp;nbsp;&lt;/STRONG&gt;and e&lt;SPAN&gt;nter your&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SaaS tenant URL&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;extended by the postfix&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;login/callback&lt;/I&gt;&lt;SPAN&gt;&amp;nbsp;in the section&amp;nbsp;&lt;I&gt;Authorized redirect URIs&lt;/I&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;In my case it worked with the original tenant url, not with the alias.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Setting-up-Qlik-Cloud-Identity-Provider-fails-with-Error-400/ta-p/1974809" target="_blank"&gt;https://community.qlik.com/t5/Official-Support-Articles/Setting-up-Qlik-Cloud-Identity-Provider-fails-with-Error-400/ta-p/1974809&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The original url can be obtained clicking on the user initials in the top right corner, opening 'About', and copying from the enterprise host tenant.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 11:16:10 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Single-sign-on-with-Google/m-p/2041916#M24393</guid>
      <dc:creator>rubenmarin</dc:creator>
      <dc:date>2023-02-24T11:16:10Z</dc:date>
    </item>
  </channel>
</rss>

