Hub documentation
How to configure OIDC SSO with Google Workspace
Single Sign-On (SSO) Audit Logs Storage Regions Data Studio for Private datasets Resource Groups (Access Control) Advanced Compute Options Advanced Security Tokens Management Publisher Analytics Gating Group Collections Network Security Rate Limits Blog Articles
PRO Plan Repositories Getting Started with Repositories Repository Settings Storage Limits Storage Backend (Xet) Local Cache Pull Requests & Discussions Notifications Collections Webhooks GitHub Actions Notebooks Next Steps Licenses
Models The Model Hub Model Cards Eval Results Leaderboard Data Gated Models Uploading Models Downloading Models Integrated Libraries Model Widgets Model Inference Models Download Stats Model Release Checklist Local Apps Frequently Asked Questions Advanced Topics
Datasets Datasets Overview Dataset Cards Gated Datasets Uploading Datasets Uploading Datasets (for LLMs) Downloading Datasets Streaming Datasets Integrated Libraries Data Studio Datasets Download Stats
Spaces Spaces Overview Spaces GPU Upgrades Spaces ZeroGPU Spaces Dev Mode Spaces Disk Usage & Storage Spaces Custom Domain Spaces as MCP servers Spaces as Agent Tools Spaces as API Endpoints Gradio Spaces Streamlit Spaces Static HTML Spaces Docker Spaces Embed your Space Run Spaces with Docker Spaces Configuration Reference Sign-In with HF button Featured Spaces Spaces Changelog Advanced Topics
Storage Buckets new Jobs Jobs Overview Quickstart Pricing and Billing Manage Jobs Configuration Popular Images Examples & Tutorials Schedule Jobs Webhook Automation Reference
Agents Agents Overview Hugging Face CLI for AI Agents Hugging Face MCP Server Hugging Face Agent Skills Building agents with the HF SDK Local Agents with llama.cpp Agent Libraries
Other Organizations Billing Security
User Access Tokens Two-Factor Authentication Git over SSH Signing Commits with GPG Single Sign-On (SSO)
Moderation Paper Pages Academia Hub Search Digital Object Identifier (DOI) Hub API Endpoints OAuth / Sign in with HF Basic SSO Managed SSO User Management User Provisioning (SCIM) Configuration Guides
Advanced Access Control (Resource Groups) Programmatic User Access Control Management Malware Scanning Pickle Scanning Secrets Scanning Protect AI JFrog How to configure OIDC with Okta How to configure SAML with Okta How to configure SCIM with Okta How to configure SAML with EntraID (Azure AD) How to configure OIDC with EntraID (Azure AD) How to configure SCIM with EntraID (Azure AD) How to configure SAML with Google Workspace How to configure OIDC with Google Workspace
How to configure OIDC SSO with Google Workspace
In this guide, we will use Google Workspace as the SSO provider with the OpenID Connect (OIDC) protocol as our preferred identity protocol.
We currently support SP-initiated authentication. For user provisioning, see SCIM.
This feature is part of the Team & Enterprise plans.
Step 1: Create OIDC App in Google Workspace
- In your Google Cloud console, search and navigate to
Google Auth Platform>Clients. - Click
Create Client. - For Application Type select
Web Application. - Provide a name for your application.
- Retrieve the
Redirection URIfrom your Hugging Face organization settings, go to theSSOtab and select theOIDCprotocol. - Click
Create. - A pop-up will appear with the
Client IDandClient Secret, copy those and paste them into your Hugging Face organization settings. In theSSOtab (make sureOIDCis selected) paste the corresponding values forClient IdentifierandClient Secret.

Step 2: Configure Hugging Face with Google’s OIDC Details
- At this point the Client ID and Client Secret should be set in your Hugging Face organization settings
SSOtab. - Set the Issuer URL to
https://accounts.google.com.

Step 3: Test and Enable SSO
Before testing, ensure you have granted access to the application for the appropriate users. The admin performing the test must have access.
- Now, in your Hugging Face SSO settings, click on “Update and Test OIDC configuration”.
- You should be redirected to your Google login prompt. Once logged in, you’ll be redirected to your organization’s settings page.
- A green check mark near the OIDC selector will confirm that the test was successful.
- Once the test is successful, you can enable SSO for your organization by clicking the “Enable” button.
- Once enabled, members of your organization must complete the SSO authentication flow described in the How it works section.