You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
First, create a new project in the Google Developers Console to obtain a client ID and a client secret that you can later add to Azure Active Directory (Azure AD).
142
142
1. Go to the Google APIs at https://console.developers.google.com, and sign in with your Google account. We recommend that you use a shared team Google account.
143
-
2. Accept the terms of service if you're prompted to do so.
144
-
3. Create a new project: In the upper-left corner of the page, select the project list, and then on the **Select a project** page, select **New Project**.
145
-
4. On the **New Project** page, give the project a name (for example, **Azure AD B2B**), and then select **Create**:
143
+
144
+
1. Accept the terms of service if you're prompted to do so.
145
+
146
+
1. Create a new project: At the top of the page, select the project menu to open the **Select a project** page. Choose **New Project**.
147
+
148
+
1. On the **New Project** page, give the project a name (for example, `MyB2BApp`), and then select **Create**:
146
149
147
150

148
151
149
-
4. On the **APIs & Services** page, select **View**under your new project.
152
+
1. Open the new project by selecting the link in the **Notifications**message box or by using the project menu at the top of the page.
150
153
151
-
5. Select **Go to APIs overview** on the APIs card. Select**OAuth consent screen**.
154
+
1. In the left menu, select **APIs & Services**, and then select**OAuth consent screen**.
152
155
153
-
6. Select**External**, and then select **Create**.
156
+
1. Under**User Type**, select **External**, and then select **Create**.
154
157
155
-
7. On the **OAuth consent screen**, enter an **Application name**:
158
+
1. On the **OAuth consent screen**, under **App information**, enter an **App name**.
156
159
157
-

160
+
1. Under **User support email**, select an email address.
158
161
159
-
8. Scroll to the **Authorized domains** section and enter **microsoftonline.com**:
162
+
1. Under **Authorized domains**, select **Add domain**, and then add the `microsoftonline.com` domain.
160
163
161
-

164
+
1. Under **Developer contact information**, enter an email address.
162
165
163
-
9. Select **Save**.
166
+
1. Select **Save and continue**.
164
167
165
-
10. Select **Credentials**. On the **Create credentials**menu, select **OAuth client ID**:
168
+
1. In the left menu, select **Credentials**.
166
169
167
-

170
+
1. Select **Create credentials**, and then select **OAuth client ID**.
171
+
172
+
1. In the Application type menu, select **Web application**. Give the application a suitable name, like `Azure AD B2B`. Under **Authorized redirect URIs**, add the following URIs:
168
173
169
-
11. Under **Application type**, select **Web application**. Give the application a suitable name, like **Azure AD B2B**. Under **Authorized redirect URIs**, enter the following URIs:
170
174
-`https://login.microsoftonline.com`
171
175
-`https://login.microsoftonline.com/te/<tenant ID>/oauth2/authresp` <br>(where `<tenant ID>` is your tenant ID)
172
176
-`https://login.microsoftonline.com/te/<tenant name>.onmicrosoft.com/oauth2/authresp` <br>(where `<tenant name>` is your tenant name)
173
177
174
178
> [!NOTE]
175
179
> To find your tenant ID, go to the [Azure portal](https://portal.azure.com). Under **Azure Active Directory**, select **Properties** and copy the **Tenant ID**.
176
180
177
-

178
-
179
-
12. Select **Create**. Copy the client ID and client secret. You'll use them when you add the identity provider in the Azure portal.
181
+
1. Select **Create**. Copy your client ID and client secret. You'll use them when you add the identity provider in the Azure portal.
180
182
181
183

182
184
183
-
13. You can leave your project at a publishing status of **Testing** and add test users to the OAuth consent screen. Or you can select the **Publish app** button on the OAuth consent screen to make the app available to any user with a Google Account.
185
+
1. You can leave your project at a publishing status of **Testing** and add test users to the OAuth consent screen. Or you can select the **Publish app** button on the OAuth consent screen to make the app available to any user with a Google Account.
184
186
185
187
## Step 2: Configure Google federation in Azure AD
186
188
@@ -190,7 +192,7 @@ You'll now set the Google client ID and client secret. You can use the Azure por
190
192
1. Go to the [Azure portal](https://portal.azure.com). On the left pane, select **Azure Active Directory**.
191
193
2. Select **External Identities**.
192
194
3. Select **All identity providers**, and then select the **Google** button.
193
-
4. Enter the client ID and client secret you obtained earlier. Select **Save**:
195
+
4. Enter the client ID and client secret you obtained earlier. Select **Save**:
194
196
195
197

0 commit comments