@@ -7,7 +7,7 @@ services: active-directory
7
7
ms.service : active-directory
8
8
ms.subservice : B2B
9
9
ms.topic : conceptual
10
- ms.date : 11/1/2019
10
+ ms.date : 03/05/2020
11
11
12
12
ms.author : mimart
13
13
author : msmimart
@@ -53,25 +53,24 @@ First, create a new project in the Google Developers Console to obtain a client
53
53
54
54
![ Screenshot showing a New project page for Google] ( media/google-federation/google-new-project.png )
55
55
56
- 3 . Make sure your new project is selected in the project menu. Then open the menu in the upper left and select ** APIs & Services** > ** Credentials ** .
56
+ 3 . Make sure your new project is selected in the project menu. Then under ** APIs & Services** , select ** OAuth consent screen ** .
57
57
58
- ![ Screenshot showing the Google API credentials option] ( media/google-federation/google-api.png )
59
-
60
- 4 . Choose the ** OAuth consent screen** tab and enter an ** Application name** . (Leave the other settings.)
58
+ 4 . Select ** External** , and then select ** Create** .
59
+ 5 . On the ** OAuth consent screen** , enter an ** Application name** . (Leave the other settings.)
61
60
62
61
![ Screenshot showing the Google OAuth consent screen option] ( media/google-federation/google-oauth-consent-screen.png )
63
62
64
- 5 . Scroll to the ** Authorized domains** section and enter microsoftonline.com.
63
+ 6 . Scroll to the ** Authorized domains** section and enter microsoftonline.com.
65
64
66
65
![ Screenshot showing the Authorized domains section] ( media/google-federation/google-oauth-authorized-domains.png )
67
66
68
- 6 . Select ** Save** .
67
+ 7 . Select ** Save** .
69
68
70
- 7 . Choose the ** Credentials** tab . In the ** Create credentials** menu, choose ** OAuth client ID** .
69
+ 8 . Choose ** Credentials** . In the ** Create credentials** menu, choose ** OAuth client ID** .
71
70
72
71
![ Screenshot showing the Google APIs create credentials option] ( media/google-federation/google-api-credentials.png )
73
72
74
- 8 . Under ** Application type** , choose ** Web application** , and then under ** Authorized redirect URIs** , enter the following URIs:
73
+ 9 . Under ** Application type** , choose ** Web application** , and then under ** Authorized redirect URIs** , enter the following URIs:
75
74
- ` https://login.microsoftonline.com `
76
75
- ` https://login.microsoftonline.com/te/<directory id>/oauth2/authresp ` <br >(where ` <directory id> ` is your directory ID)
77
76
@@ -80,7 +79,7 @@ First, create a new project in the Google Developers Console to obtain a client
80
79
81
80
![ Screenshot showing the Authorized redirect URIs section] ( media/google-federation/google-create-oauth-client-id.png )
82
81
83
- 9 . Select ** Create** . Copy the client ID and client secret, which you'll use when you add the identity provider in the Azure AD portal.
82
+ 10 . Select ** Create** . Copy the client ID and client secret, which you'll use when you add the identity provider in the Azure AD portal.
84
83
85
84
![ Screenshot showing the OAuth client ID and client secret] ( media/google-federation/google-auth-client-id-secret.png )
86
85
0 commit comments