Email addresses in and Tuple must match exactly. For example,
dev+tuple@company.com does not match dev@company.com. Verify your team’s email addresses before enabling SSO.Add a custom SAML app
Sign in to your Google Workspace Admin console. Navigate to Apps > Web and mobile apps > Add app > Add custom SAML app.

Create the app
Name the app “Tuple” and optionally upload an icon, which you can download here.

Configure your Tuple account
You are shown the Google Identity Provider details. Copy the values from this screen:
Navigate to the Settings tab of the team management dashboard.Under Sign-in methods, set Required Authentication Provider to SAML SSO. The Update SAML Configuration form appears:
Fill in the values with your metadata:Select the Email Domain that SAML should apply to. Only domains with confirmed team members are available.Click Save as draft. Your draft is saved as a Pending Update alongside your current sign-in method, so no one on your team is affected yet.
Click Test to verify the configuration end-to-end. Tuple signs you in through so you can confirm that authentication succeeds before the change affects anyone else on your team.Once the test succeeds, click Publish to make the configuration live. Active Tuple sessions persist, but new sign-ins are routed through .Use Edit to tweak the draft, or Discard to throw it away without publishing.

Only team owners can enable SAML. To find out who your team owner is, check your profile.


Service provider details
Return to the Google Workspace Admin console and fill in the following fields:
ACS URLEntity ID




