You may be using Google Workspace for email and collaboration, but prefer Microsoft Entra ID as your identity and security foundation. This post outlines how to:
Use Entra ID as the IdP for Google Workspace via SAML SSO + SCIM provisioning.
Apply Conditional Access with Authentication Context for step‑up rules.
Incorporate Microsoft Defender for Cloud Apps (MDCA) to enforce real‑time, in‑session step‑up authentication for risky actions across any SAML/OIDC app.
CA + AC handles access control at login; MDCA adds dynamic, in–session enforcement. For example, if a user changes IP mid-session or initiates a sensitive download, MDCA can trigger step-up immediately.
Identity: Entra ID as IdP; users/groups provisioned to Google via SCIM.
Access: Conditional Access baseline policies, plus Authentication Context labels like High‑Impact‑Download.
Session: MDCA operates as a reverse‑proxy via Conditional Access App Control, mediating traffic to enforce real‑time controls.
Google: Configured to use Entra ID for SSO, optionally paired with Google’s own Context‑Aware Access.
Entra ID Premium P1+
Microsoft Defender for Cloud Apps