Authenticate with Google
Who can use this feature
Available on the Organization and Enterprise plans
Only organization admins can configure SSO.
If you are using Google Workspaces to manage your company email, you have two approaches available for authentication.
- Google SSO: Use Google's traditional single sign on (SSO) process. This allows members to log in using their Google managed email address and password.
- Google SAML SSO: If you use SAML and SCIM with Google Workspace, you can set up a custom SAML SSO configuration with Figma.
Google SSO
You can enable Google SSO in your Figma Organization under Admin > Settings > Login and provisioning > Authentication . Members must use the Log in with Google option to log in using their Google-managed company email and password.
- Select Members must sign in with a Google Account to make Google SSO mandatory.
- Select Members may log in with any method, including email and password to make Google SSO optional.
Note: You can disable this requirement at any time, if required. Return to this page and select Members may sign in with any available method, including email and password instead. You will need to update your authentication method to this setting, if you want make changes to your SAML SSO or SCIM settings.
Google SAML SSO
Organizations that have stricter security requirements can configure SAML SSO. Learn more about SAML SSO in Figma →
You can use Google as your identity provider to authenticate and provision users. Figma supports SAML SSO initiated from both Google (identity provider) and Figma (service provider).
Add the Figma app to Google
To connect Figma and Google, you first need to add the Figma app to your Google Admin console. This will generate authentication details, which you'll need to configure SAML SSO in Figma.
- Sign in to the Google Admin console as a super administrator.
- Go to Menu > Apps > Web and mobile apps, then click Add app.
- Search for Figma and select Figma Web (SAML) from the results.
- Copy the SSO URL and Entity ID, and download the certificate from the Google Identity Provider details.
- Leave the Google Admin console open; you’ll need it later to complete the setup.
Set up SAML SSO in Figma
- From the file browser, click Admin.
- Select Settings at the top of the screen.
- In the Login and provisioning section, click SAML SSO.
- Next to Tenant ID, click Copy and save this number—you’ll need it to finish setting up SAML in Google.
- Click Edit configuration.
- Under Identity provider (IdP), select Google Workspace.
- Paste the Entity ID from Google into the IdP Entity ID field.
- Paste the SSO URL from Google into the IdP SSO Target URL field.
- For Signing certificate, click Choose file.
- Find and select the identity provider certificate you downloaded from Google.
- Click Review, then check This information is correct.
- Click Configure SAML SSO to save your settings.
Once you've set up SAML SSO, you can chose whether to require if for all members or allow other login methods. Learn more about authentication options →
Set up Figma in Google
Complete the configuration in Google
Now that SAML SSO is configured in Figma, you need to finish the setup in Google.
-
Return to the Google Admin console.
-
Enter the ACS URL, Entity ID, and Tenant ID from Figma.
-
Map Google directory attributes to Figma attributes (e.g.,
givenName
,familyName
,email
). Click Add Mapping and select the additional fields you need. -
To include group memberships:
- For Group memberships, click Search for a group, enter part of the name, and select it. There is a maximum of 75 groups.
- For App attribute, enter the corresponding groups attribute name for the service provider.
The SAML response only includes groups the user is a member of. Learn more about group membership mapping→
-
Click Finish.
Manage user access in Google Admin
To turn a service on or off for certain users, you can organize their accounts into organizational units (to manage access by department) or access groups (to allow access across or within departments).
- Sign in to the Google Admin console as a super administrator.
- Go to Menu → Apps → Web and mobile apps, then click Figma.
- Select User access.
- To turn Figma on or off for everyone, select On for everyone or Off for everyone, then click Save.
- To turn Figma on or off for a specific organizational unit:
- On the left, select the organizational unit.
- For Service status, select On or Off.
- Choose one:
- If the Service status is set to Inherited, click Override to keep the new setting even if the parent setting changes.
- If the Service status is Overridden, click Inherit to revert to the parent setting, or click Save to keep the new setting.
- To turn Figma on for a specific group of users, select an access group. Learn how to customize service access using groups →
- Make sure your Figma user account email domains match the primary domain of your organization’s managed Google Account.
Log in via Figma (service provider initiated SSO) To start the SAML SSO process from Figma's end, head to the following URL: https://www.figma.com/saml/[TenantID]/start
Make sure to replace [Tenant ID]
with your Organization's actual Tenant Id!
Verify SSO
Figma supports both identity provider-initiated and service provider-initiated SSO.
Verify identity provider-initiated SSO
- Sign in to the Google Admin console as a super administrator.
- Go to Menu → Apps → Web and mobile apps, then click Figma.
- Click Test SAML Login.
- Figma should open in a separate tab. If it doesn’t, troubleshoot the error message and try again. Learn more about troubleshooting SAML errors →
Verify service provider-initiated SSO
- Close all browser windows and open the Figma sign-in page.
- Click Use single sign-on.
- Enter your Google Workspace email address and click Log in. You should be redirected to the Google sign-in page.
- Enter your Google Workspace credentials.
- After your credentials are authenticated, Figma should open.
Set up automatic provisioning with SCIM
Google supports automatic provisioning with SCIM. To set up SCIM you will need to generate an API token in Figma then add this to Google.
Tip: You can also use SCIM in Google to manage seats for members in your organization and assign billing groups or workspaces.
Get API token and Tenant ID in Figma
- From the file browser, click Admin .
- Select Settings at the top of the screen.
- In the Login and provisioning section, click SCIM provisioning.
- Click Generate API Token in the dialog.
- Copy the API token to your clipboard. You'll need this to complete the process in Google.
- Go back to the Login and provisioning section and click SAML SSO.
- Next to Tenant ID, click Copy and save this number. You'll need this to complete the process in Google.
- Click Done.
Configure automatic provisioning in Google
-
Sign in to the Google Admin console as a super administrator.
-
Go to Menu → Apps → Web and mobile apps, then click Figma.
-
Select Configure autoprovisioning.
-
For Access token, paste the API token that you copied from Figma.
-
Click Continue.
-
For Endpoint URL, replace {tenant-id} with the Tenant ID you copied from Figma.
-
For App attributes, verify that all mandatory attributes are mapped to Google directory attributes.
-
To map a seat type attribute to a custom attribute, go to Manage seats via SCIM.
-
To limit autoprovisioning to specific groups of users, in Search groups, enter part of the group name, select the group, and choose a scope.
If a group has users from a secondary domain or from outside of your organization, those users are not provisioned.
-
Decide how long users have access to the app after the app is turned off for them or their Google Workspace account is suspended or deleted.
You can suspend and then hard delete their account in Figma, or just suspend or hard delete them. You can set the time frame individually for each option and choose within 24 hours or after one, 7, or 21 days. You can choose options for each of these settings:
- When an app is turned off for a user
- When a user is suspended from Google
- When a user is deleted from Google
-
Turn on Autoprovisioning.
-
Click Turn on to confirm.
Note: If you encounter delays or errors when setting up SAML SSO with Google, such as a "Not a SAML app" error, we recommend trying again after a few hours. You can also refer to Google's troubleshooting guide for common SSO issues.
Let your users know about the change
The first time a user logs into Figma using SSO, or after they are provisioned via SCIM, they'll receive a verification email from SendGrid. This email contains a unique 6-digit pin, which they'll use just once as an additional security measure during their initial login.
To make sure users don't mistake the email for spam or a phishing attempt, you may wish to let them know about this extra step in advance.