Google Workspace SAML Log Events

Cloud & SaaSAuthentication & AccessGoogle WorkspaceCloud Control PlaneSIEM / Log Aggregator

Location

Google Admin Console > Reporting > Audit and investigation > SAML log events

Description

Federation-related audit events for SAML sign-in activity, identity-provider interactions, and SSO-related account access within Google Workspace.

Forensic Value

SAML logs help determine whether federated authentication was abused, whether an attacker used an external identity provider to reach Google Workspace, and which federation path was involved during suspicious sign-ins.

Tools Required

Google Admin ConsoleReports APISIEM

Collection Commands

Google Admin Console

Reporting > Audit and investigation > SAML log events > Filter by user, IdP, event name, and status > Export matching events

Reports API

GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/saml?startTime=2026-03-01T00:00:00.000Z

Collection Constraints

  • SAML coverage depends on federated sign-in being in use and the relevant audit stream being available for the tenant.
  • Correlating Google Workspace SAML events with the external IdP logs is required for full attribution.

MITRE ATT&CK Techniques

T1078.004T1556