Hello there!

Need Help? We are right here!

Support Icon
miniOrange Email Support
success

Thanks for your Enquiry. Our team will soon reach out to you.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com

Search Results:

×

How to restrict access to Google Apps & Services using miniOrange CASB


Restricting access to Google apps and services helps protect sensitive business information, maintain data privacy, and prevent unauthorized users from accessing your digital workspace. In this guide, we’ll show you the step-by-step process to implement a miniOrange CASB to restrict access to your favorite Google apps and services.

Step 1: Sign up with miniOrange CASB

  • Click here to log into your miniOrange account.

    (Don’t have an account? No worries, click here to create a new account)

  • Login into miniOrange google apps CASB

Step 2: Selecting Google Apps & Services

  • After logging in, you should be taken to the miniOrange dashboard page. Locate the "Google" tab and select the "Add App" option to select the apps & services you want to restrict.
  • Google CASB Access Restriction authentication method dashboard

  • Select the Add Authentication Source option from the drop-down menu.
  • Google CASB Access Restriction Add authentication

  • Mention an Authentication name for the authentication source, and click on Generate Metadata.
  • Google CASB Authentication Generate Metadata

  • After clicking on Generate Metadata, you will get the metadata details, as shown in the image below. Use this data to configure the SAML application in your Identity Provider (IDP) like Keycloak, Okta, Entra ID (Azure AD), miniorange and more.
  • Google CASB Access Restriction Generate Metadata SAML Flow

  • If you would like to view the metadata details again, then you can click on the View Metadata button.
  • Now, Enter the remaining details like the IDP Entity ID, SAML Login URL, SAML Logout URL, and X509 Certificate which you will find in your Identity Provider metadata. Once done, Choose the Binding Type for SSO Request as required. You will find this information in the IDP metadata. However, if you are not sure, please select the HTTP-Redirect Binding as the default configuration.
  • Google CASB Access Restriction SP metadata IDP Details

  • Click the Save & Next button once you have filled out all the details.
  • You have now successfully configured SAML Authentication with miniOrange CASB.

Step 3: Configuring SAML SSO in Google Admin Console

  • Now, You are redirected to Basic Settings section.
  • Fill in the following details to configure the Google Application:
  • Organization Name: Enter the name of your organization.
    Organization Domain: Enter the domain of your organization on Google. (Ex: example.com)
    Attribute Key: Enter the Group Attribute Key for the SSO app, which you have configured in the IDP under the SAML attributes section.
    Name Attribute Key: Enter the attribute name like fname,Lname etc.
    Enter ACS URL: You can get the Google ACS URL from the Google admin panel.
    Enter Entity URL: You can get the Google Entity URL from the Google admin panel.
    CASB Type Select CASB type as Inline or Offline
    Enable MDM If you want to configure MDM on your device, enable it

    Google CASB Basic Settings Details

  • For ACS URL and Entity URL you need to first configure Google Admin Authentication using the below steps.
  • Firstly, Login to your Google Admin Dashboard.
  • Google Admin Dashboard CASB

  • On the left side, below the menu icon (☰), click on Home () ⤏ Security () ⤏ Authentication ⤏ SSO with third-party IDP.
  • Google CASB SSO third party IDP

  • Now, click on ADD SAML PROFILE to create a new SAML profile.
  • Add SAML SSO profile IDP

  • Enter SSO profile name and fill in IDP entity ID and Sign-in page URL from IDP metadata.
  • Google CASB SAML Profile IDP Details

  • Go to CASB basic settings screen and click on View IDP Metadata to find IDP entity ID and Sign-in page URL. You can also Download the X.509 Certificate from here.
  • IDP Metadata Google CASB

  • Copy and paste the IDP entity ID and Sign-in page URL and attach the X.509 Certificate in Upload Certificate and click on Save button.
  • Added IDP Metadata SAML SSO Profile



  • Set up SSO to allow all existing users to access Google Workspace services through third-party identity providers.
  • Click on the Edit Button highlighted in the red box in the image below.
  • Google CASB SSO edit button

  • After clicking on the edit icon, a menu will be displayed, as shown below.
  • Google CASB dashboard open menu

  • Select the checkbox “Set up SSO with third-party identity provider”.
  • Fill in the details on the Sign-in page URL (i.e., the Sign-in page URL is the SAML login URL that you have in the IDP metadata).
  • Now, click on the “REPLACE CERTIFICATE” button, which will open a window to upload the certificate. Upload the X.509 Certificate that you have in the IDP metadata.
  • Once done with these steps, click on the SAVE button to update the configuration.

  • Set up Single Sign-On (SSO) to allow existing users within an organization to individually access Google Workspace services through third-party identity providers.
  • On the left side, Click on DirectoryOrganisational unitsCreate organisational unit as shown below.
  • Google CASB SAML SSO Organisation units

  • Next, click on Create organisational unit. You will get a pop-up to add a name of organisational unit and description to identify it. Once done, click on CREATE button.
  • Google CASB Create organisational unit

  • Now, on the left side, click on Security () ⤏ Authentication ⤏ SSO with third-party IDP ⤏ MANAGE button.
  • Manage SSO Profile Google CASB

  • Select the Organisational unit that you created.
  • created organisational unit Google Apps

  • Click on Another SSO profile option and choose SAML SSO profile from dropdown which you created above.
  • SAML SSO Profile third party IDP

  • Select the created user from SSO with third-party IDP section and copy the ACS URL and Entity URL as shown below.
  • SSO third-party IDP Google CASB

  • Paste it on ACS URL and Entity URL in Basic Settings section.
  • Add Details ACS URl Entity URL Google

  • Once done with these steps, click on the Save and Next button to update the configuration.
  • You have successfully created the SAML SSO with Third Party IDPs!

Step 4: Configuring Policies

    Let’s see how to configure policies for Google Workspace CASB.

  • You should be taken to the Manage Policy screen. Enter your policy details, like Policy Name and Policy Description and Select Policies as per your Requirement.
  • Google CASB policies enable IP Restriction

  • Follow the below steps to configure restrictions according to your need:

    1. IP Configuration

    • Click on Checkbox for “Enable IP Restriction” as shown in the image below.
    • By enabling this IP Restriction feature, you are restricting access to users based on their IP addresses:
      • 1) Select the Allow or Deny option to either permit or restrict certain IP addresses.

        2) Click on the Add IP Address icon to create a new field where you can add the IP addresses you want to regulate.


      setup Google CASB- Add IP address


    2. Location Configuration

    • Click on Checkbox for “Enable Location Restriction” as shown in the image below.
    • By enabling this feature, you are restricting access to users based on their Location:
      • 1) Select the Allow or Deny option to either permit or restrict certain locations.

        2) Select Locations from dropdown.

      setup Google CASB- Add locations


    1. Time of Access Configuration

    • Click on Checkbox for “Enable Time of Access Configuration” as shown in the image below.
    • By enabling this feature, you will apply time restrictions to users based on the configured settings and specified timings.
      • 1) Select Allow or Deny to permit or restrict user access during the selected time slot.

        2) Select the user's timezone.

        3) Select the start and end times for the time-based restriction.


      setup Google CASB - add whitelisted paths


    2. Session Based Restriction

    • Click on Checkbox for “Enable Session Based Restriction” as shown in the image below.
    • By enabling this feature, you are restrict user sessions based on configured duration:
      • 1)The session management should be based on days or hours.

        2)Enter the duration for restrict user sessions.


      setup Google CASB - Session Based Restriction


    1. Prevent Download

    • Click on Checkbox for “Enable Prevent Download” as shown in the image below.
    • By enabling this feature, you are restricting access to download. Currently this feature is only applicable for Google Docs and Google Drive. Downloading and sharing will be restricted from the apps or groups on which you apply this policy.

    • setup Google CASB- click on Prevent Download

    2. File Based Restriction

    • Click on Checkbox for “Enable File Based Restriction” as shown in the image below.
    • Enable this feature to control file uploads based on the allowed extension list.
      • 1)Select the Allow or Deny option to either permit or restrict certain files. e.g. PDF, Doc, ZIP and etc.


      setup Google CASB- click on File Based Restriction

    3. Enable Disable Copy

    • Click on the "Enable Disable copy" checkbox.
    • By enabling this feature, you are restricting users from copying the contents of the page.

    • setup Google CASB- click on Enable Disable cop

  • Once, done with all the configurations click on Save and Next button.

Step 5: Configuring Groups

  • You should be taken to the Manage Groups screen. Enter the Name and Description for group (It should be the same as the name of the group that you have configured in the IDP). Select the Policy from the drop-down menu.
  • Google CASB Groups submit app restriction group

  • Now, let’s give permissions for applications for the group:
  • a) No App Restriction for Group: There will be no restrictions on the application for the group.

    b) App Restriction for Group: The restrictions will be applied over the apps based on the policy that you have configured for the group.

    c) Disable App for Group: The application becomes inaccessible from anywhere for the entire group.

    d) Custom App Restriction for Group: You can apply an application-specific custom application restriction policy to an application that overpowers the group's restriction policy.

  • After successfully configuring all screens, you will be redirected to the edit screen.

Step 6: Edit Screen

  • Basic Settings section You can change any configurations if required in the Authentication.
  • Suppose you want to configure different authentication sources. In that case, you can simply click on the Authentication Source in the Navigation Bar, where you will be able to add, view & edit authentication sources.
  • Google CASB Basic Settings change any configuration

  • In Groups Settings section You can add and configure groups on this screen and view all configured groups.
  • Click on Add New and you will get a pop-up for adding a new group and you can configure it using the above mentioned steps.
  • Google CASB pop-up new groups restrictions

  • In the Session Management section, you can see the details of logged-in users' sessions.
  • Google CASB Session Management


Not able to configure or test Google Workspace CASB?
For this, you need to Contact us or email us at proxysupport@xecurify.com and we'll help you setting it up in no time.


External References


miniOrange CASB offers a wide variety of security features with flexible scalability, all available at the most affordable price to all types of businesses. Start by signing up now!


Request a Free Demo!

  

 Thank you for your response. We will get back to you soon.

Please enter your enterprise email-id.

miniOrange CASB solutions making it affordable for organizations