Skip to content

Commit 9742437

Browse files
[CF1] Gsuite IdP guide update
1 parent 2fe7819 commit 9742437

File tree

5 files changed

+18
-15
lines changed

5 files changed

+18
-15
lines changed
Binary file not shown.
244 KB
Loading
Binary file not shown.
Binary file not shown.

src/content/docs/cloudflare-one/identity/idp-integration/gsuite.mdx

Lines changed: 18 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -24,30 +24,32 @@ You do not need to be a Google Cloud Platform user to integrate Google Workspace
2424

2525
2. A Google Cloud project is required to enable Google Workspace APIs. If you do not already have a Google Cloud project, go to **IAM & Admin** > **Create Project**. Name the project and select **Create**.
2626

27-
3. Go to **APIs & Services** and select **+ Enable APIs and Services**. The API Library will load.
27+
3. Go to **APIs & Services** and select **Enable APIs and Services**. The API Library will load.
2828

29-
4. In the API Library, search for `admin` and select _Admin SDK API_.
29+
4. In the API Library, search for `admin` and select **Admin SDK API**.
3030

3131
5. **Enable** the Admin SDK API.
3232

3333
6. Return to the **APIs & Services** page and go to **Credentials**.
3434

35-
![Location of credential settings at the top of the Google Cloud Platform dashboard.](~/assets/images/cloudflare-one/identity/google/click-configure-consent.png)
36-
3735
7. You will see a warning that you need to configure a consent screen. Select **Configure Consent Screen**.
3836

37+
![Location to configure a Consent Screen in the Google Cloud Platform console.](~/assets/images/cloudflare-one/identity/google/configure-consent-screen.png)
38+
3939
8. To configure the consent screen:
4040

41-
1. Choose **Internal** as the User Type. This limits authorization requests to users in your Google Workspace and blocks users who have regular Gmail addresses.
42-
2. Name the application, add a support email, and input contact fields. Google Cloud Platform requires an email in your account.
43-
3. The **Scopes** page can be left blank.
44-
4. The summary page will load and you can save and exit.
41+
1. Select **Get Started**.
42+
2. Input an **App name** and a **User support email**.
43+
3. Choose **Internal** as the Audience Type. This limits authorization requests to users in your Google Workspace and blocks users who have regular Gmail addresses.
44+
4. Input **Contact Information**. Google Cloud Platform requires an email in your account.
45+
5. Agree to Google's user data policy and select **Continue**.
46+
6. Select **Create**.
4547

46-
9. Return to the **Credentials** page and select **+ Create Credentials** > **OAuth client ID**.
48+
9. The OAuth overview page will load. Select **Create OAuth Client**.
4749

48-
![Location of OAuth client ID settings on Google Cloud Platform credentials page.](~/assets/images/cloudflare-one/identity/google/create-oauth.png)
50+
(Need picture from LC)
4951

50-
10. Choose _Web application_ as the Application type.
52+
10. Choose _Web application_ as the **Application type** and give your OAuth Client ID a name.
5153

5254
11. Under **Authorized JavaScript origins**, in the **URIs** field, enter your team domain:
5355

@@ -63,20 +65,21 @@ You do not need to be a Google Cloud Platform user to integrate Google Workspace
6365
https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback
6466
```
6567

66-
13. Google will present the OAuth Client ID and Secret values. The secret field functions like a password and should not be shared. Copy both values.
68+
13. After creating the OAuth client ID, select the OAuth client ID that you just created. Google will present the **OAuth Client ID** and **Client secret** values. The client secret field functions like a password and should not be shared. Copy both the **OAuth Client ID** and **Client secret** values.
6769

6870
14. On your [Google Admin console](https://admin.google.com), go to **Security** > **Access and data control** > **API controls**.
69-
![Location of Trust internal apps setting in the Google Admin dashboard](~/assets/images/cloudflare-one/identity/gsuite/trust-internal-apps.png)
7071

71-
15. Enable the **Trust internal, domain-owned apps** option. This setting is disabled by default and must be enabled for Cloudflare Access to work correctly.
72+
15. In **API Controls**, select **Settings**.
73+
74+
16. Select **Internal apps** and check the box next to the **Trust internal apps** to enable this option. This setting is disabled by default and must be enabled for Cloudflare Access to work correctly.
7275

7376
### 2. Add Google Workspace to Zero Trust
7477

7578
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
7679

7780
2. Under **Login methods**, select **Add new** and choose **Google Workspace**.
7881

79-
3. Input the Client ID and Client Secret fields generated previously. Additionally, input the domain of your Google Workspace account.
82+
3. Input the Client ID (**App ID** in the Cloudflare dashboard) and Client Secret fields generated previously. Additionally, input the domain of your Google Workspace account.
8083

8184
4. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
8285

0 commit comments

Comments
 (0)