Skip to content

Commit 4bf8178

Browse files
authored
Merge pull request #189641 from msmimart/mm-issue84488
[EXID] Per GitHub issue 84488: google-federation - update steps per changes to Google UI
2 parents a8a1f2b + b00e870 commit 4bf8178

File tree

6 files changed

+22
-20
lines changed

6 files changed

+22
-20
lines changed

articles/active-directory/external-identities/google-federation.md

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: how-to
10-
ms.date: 10/01/2021
10+
ms.date: 02/24/2022
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -140,47 +140,49 @@ Follow [Google’s guidance](https://developers.googleblog.com/2016/08/modernizi
140140

141141
First, create a new project in the Google Developers Console to obtain a client ID and a client secret that you can later add to Azure Active Directory (Azure AD).
142142
1. Go to the Google APIs at https://console.developers.google.com, and sign in with your Google account. We recommend that you use a shared team Google account.
143-
2. Accept the terms of service if you're prompted to do so.
144-
3. Create a new project: In the upper-left corner of the page, select the project list, and then on the **Select a project** page, select **New Project**.
145-
4. On the **New Project** page, give the project a name (for example, **Azure AD B2B**), and then select **Create**:
143+
144+
1. Accept the terms of service if you're prompted to do so.
145+
146+
1. Create a new project: At the top of the page, select the project menu to open the **Select a project** page. Choose **New Project**.
147+
148+
1. On the **New Project** page, give the project a name (for example, `MyB2BApp`), and then select **Create**:
146149

147150
![Screenshot that shows a New Project page.](media/google-federation/google-new-project.png)
148151

149-
4. On the **APIs & Services** page, select **View** under your new project.
152+
1. Open the new project by selecting the link in the **Notifications** message box or by using the project menu at the top of the page.
150153

151-
5. Select **Go to APIs overview** on the APIs card. Select **OAuth consent screen**.
154+
1. In the left menu, select **APIs & Services**, and then select **OAuth consent screen**.
152155

153-
6. Select **External**, and then select **Create**.
156+
1. Under **User Type**, select **External**, and then select **Create**.
154157

155-
7. On the **OAuth consent screen**, enter an **Application name**:
158+
1. On the **OAuth consent screen**, under **App information**, enter an **App name**.
156159

157-
![Screenshot that shows the Google OAuth consent screen.](media/google-federation/google-oauth-consent-screen.png)
160+
1. Under **User support email**, select an email address.
158161

159-
8. Scroll to the **Authorized domains** section and enter **microsoftonline.com**:
162+
1. Under **Authorized domains**, select **Add domain**, and then add the `microsoftonline.com` domain.
160163

161-
![Screenshot that shows the Authorized domains section.](media/google-federation/google-oauth-authorized-domains.PNG)
164+
1. Under **Developer contact information**, enter an email address.
162165

163-
9. Select **Save**.
166+
1. Select **Save and continue**.
164167

165-
10. Select **Credentials**. On the **Create credentials** menu, select **OAuth client ID**:
168+
1. In the left menu, select **Credentials**.
166169

167-
![Screenshot that shows the Google APIs Create credentials menu.](media/google-federation/google-api-credentials.png)
170+
1. Select **Create credentials**, and then select **OAuth client ID**.
171+
172+
1. In the Application type menu, select **Web application**. Give the application a suitable name, like `Azure AD B2B`. Under **Authorized redirect URIs**, add the following URIs:
168173

169-
11. Under **Application type**, select **Web application**. Give the application a suitable name, like **Azure AD B2B**. Under **Authorized redirect URIs**, enter the following URIs:
170174
- `https://login.microsoftonline.com`
171175
- `https://login.microsoftonline.com/te/<tenant ID>/oauth2/authresp` <br>(where `<tenant ID>` is your tenant ID)
172176
- `https://login.microsoftonline.com/te/<tenant name>.onmicrosoft.com/oauth2/authresp` <br>(where `<tenant name>` is your tenant name)
173177

174178
> [!NOTE]
175179
> To find your tenant ID, go to the [Azure portal](https://portal.azure.com). Under **Azure Active Directory**, select **Properties** and copy the **Tenant ID**.
176180
177-
![Screenshot that shows the Authorized redirect URIs section.](media/google-federation/google-create-oauth-client-id.png)
178-
179-
12. Select **Create**. Copy the client ID and client secret. You'll use them when you add the identity provider in the Azure portal.
181+
1. Select **Create**. Copy your client ID and client secret. You'll use them when you add the identity provider in the Azure portal.
180182

181183
![Screenshot that shows the OAuth client ID and client secret.](media/google-federation/google-auth-client-id-secret.png)
182184

183-
13. You can leave your project at a publishing status of **Testing** and add test users to the OAuth consent screen. Or you can select the **Publish app** button on the OAuth consent screen to make the app available to any user with a Google Account.
185+
1. You can leave your project at a publishing status of **Testing** and add test users to the OAuth consent screen. Or you can select the **Publish app** button on the OAuth consent screen to make the app available to any user with a Google Account.
184186

185187
## Step 2: Configure Google federation in Azure AD
186188

@@ -190,7 +192,7 @@ You'll now set the Google client ID and client secret. You can use the Azure por
190192
1. Go to the [Azure portal](https://portal.azure.com). On the left pane, select **Azure Active Directory**.
191193
2. Select **External Identities**.
192194
3. Select **All identity providers**, and then select the **Google** button.
193-
4. Enter the client ID and client secret you obtained earlier. Select **Save**:
195+
4. Enter the client ID and client secret you obtained earlier. Select **Save**:
194196

195197
![Screenshot that shows the Add Google identity provider page.](media/google-federation/google-identity-provider.png)
196198

-5.46 KB
Loading

0 commit comments

Comments
 (0)