Skip to content

Commit db6eb10

Browse files
final updates
1 parent 05878b1 commit db6eb10

File tree

4 files changed

+42
-32
lines changed

4 files changed

+42
-32
lines changed
174 KB
Loading
276 KB
Loading

src/content/docs/cloudflare-one/identity/idp-integration/google.mdx

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -11,42 +11,50 @@ You do not need to be a Google Cloud Platform user to integrate Google Suite as
1111

1212
## Set up Google as an identity provider
1313

14-
1. Visit the Google Cloud Platform console. Create a new project, name the project, and select **Create**.
14+
1. Log in to the Google Cloud Platform [console](https://console.cloud.google.com/). Create a new project, name the project, and select **Create**.
1515

16-
2. On the project home page, go to **APIs & Services** on the sidebar and select **Dashboard**.
16+
2. On the project home page, go to **APIs & Services** and on the sidebar select **Credentials**.
1717

18-
3. On the sidebar, go to **Credentials** and select **Configure Consent Screen** at the top of the page.
18+
3. Select **Configure Consent Screen** at the top of the page.
1919

20-
4. Choose `External` as the User Type. Since this application is not being created in a Google Workspace account, any user with a Gmail address can login.
20+
![Location to configure a Consent Screen in the Google Cloud Platform console.](~/assets/images/cloudflare-one/identity/google/configure-consent-screen.png)
2121

22-
5. Name the application, add a support email, and input contact fields. Google Cloud Platform requires an email in your account.
23-
:::note
24-
In the **Scopes** section, we recommend adding the `userinfo.email` scope. This is not required for the integration, but shows authenticating users what information is being gathered. You do not need to add test users.
25-
:::
22+
4. To configure the consent screen:
2623

27-
6. Return to the **APIs & Services** page, select **Create Credentials** > **OAuth client ID**, and name the application.
24+
1. Select **Get started**.
25+
2. Input an **App name** and a **User support email**.
26+
3. Choose `External` as the Audience Type. Since this application is not being created in a Google Workspace account, any user with a Gmail address can log in.
27+
4. Input **Contact Information**. Google Cloud Platform requires an email in your account.
28+
5. Agree to Google's user data policy and select **Continue**.
29+
6. Select **Create**.
30+
31+
5. The OAuth overview page will load. On the OAuth overview screen, select **Create OAuth client**.
32+
33+
![Location to create an OAuth client in the Google Cloud Platform console.](~/assets/images/cloudflare-one/identity/google/create-oauth-client.png)
34+
35+
6. Choose _Web application_ as the **Application type** and give your OAuth Client ID a name.
2836

2937
7. Under **Authorized JavaScript origins**, in the **URIs** field, enter your team domain:
3038

3139
```txt
3240
https://<your-team-name>.cloudflareaccess.com
3341
```
3442

35-
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
43+
You can find your team name in [Zero Trust](https://one.dash.cloudflare.com/) under **Settings** > **Custom Pages**.
3644

3745
8. Under **Authorized redirect URIs**, in the **URIs** field, enter the following URL:
3846

3947
```txt
4048
https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback
4149
```
4250

43-
9. Google will present the OAuth Client ID and Secret values. The secret field functions like a password and should not be shared. Copy both values.
51+
9. After creating the OAuth client, select the OAuth client that you just created. Google will present the **OAuth Client ID** value and **Client secret** value. The client secret field functions like a password and should not be shared. Copy both values.
4452

4553
10. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
4654

4755
11. Under **Login methods**, select **Add new**. Choose **Google** on the next page.
4856

49-
12. Input the Client ID and Client Secret fields generated previously.
57+
12. Input the Client ID (**App ID** in the Cloudflare dashboard) and Client Secret fields generated previously.
5058

5159
13. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
5260

src/content/docs/cloudflare-one/identity/idp-integration/gsuite.mdx

Lines changed: 22 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -20,34 +20,34 @@ You do not need to be a Google Cloud Platform user to integrate Google Workspace
2020

2121
### 1. Configure Google Workspace
2222

23-
1. Log in to the Google Cloud Platform [console](https://console.cloud.google.com/). This is separate from your Google Workspace console.
23+
1. Log in to the Google Cloud Platform [console](https://console.cloud.google.com/). This is separate from your Google Workspace console.
2424

25-
2. A Google Cloud project is required to enable Google Workspace APIs. If you do not already have a Google Cloud project, go to **IAM & Admin** > **Create Project**. Name the project and select **Create**.
25+
2. A Google Cloud project is required to enable Google Workspace APIs. If you do not already have a Google Cloud project, go to **IAM & Admin** > **Create Project**. Name the project and select **Create**.
2626

27-
3. Go to **APIs & Services** and select **Enable APIs and Services**. The API Library will load.
27+
3. Go to **APIs & Services** and select **Enable APIs and Services**. The API Library will load.
2828

29-
4. In the API Library, search for `admin` and select **Admin SDK API**.
29+
4. In the API Library, search for `admin` and select **Admin SDK API**.
3030

31-
5. **Enable** the Admin SDK API.
31+
5. **Enable** the Admin SDK API.
3232

33-
6. Return to the **APIs & Services** page and go to **Credentials**.
33+
6. Return to the **APIs & Services** page and go to **Credentials**.
3434

35-
7. You will see a warning that you need to configure a consent screen. Select **Configure Consent Screen**.
35+
7. You will see a warning that you need to configure a consent screen. Select **Configure Consent Screen**.
3636

37-
![Location to configure a Consent Screen in the Google Cloud Platform console.](~/assets/images/cloudflare-one/identity/google/configure-consent-screen.png)
37+
![Location to configure a Consent Screen in the Google Cloud Platform console.](~/assets/images/cloudflare-one/identity/google/configure-consent-screen.png)
3838

39-
8. To configure the consent screen:
39+
8. To configure the consent screen:
4040

41-
1. Select **Get Started**.
42-
2. Input an **App name** and a **User support email**.
43-
3. Choose **Internal** as the Audience Type. This limits authorization requests to users in your Google Workspace and blocks users who have regular Gmail addresses.
44-
4. Input **Contact Information**. Google Cloud Platform requires an email in your account.
45-
5. Agree to Google's user data policy and select **Continue**.
46-
6. Select **Create**.
41+
1. Select **Get Started**.
42+
2. Input an **App name** and a **User support email**.
43+
3. Choose **Internal** as the Audience Type. This Audience Type limits authorization requests to users in your Google Workspace and blocks users who have regular Gmail addresses.
44+
4. Input **Contact Information**. Google Cloud Platform requires an email in your account.
45+
5. Agree to Google's user data policy and select **Continue**.
46+
6. Select **Create**.
4747

48-
9. The OAuth overview page will load. Select **Create OAuth Client**.
48+
9. The OAuth overview page will load. Select **Create OAuth Client**.
4949

50-
(Need picture from LC)
50+
![Location to create an OAuth client in the Google Cloud Platform console.](~/assets/images/cloudflare-one/identity/google/create-oauth-client.png)
5151

5252
10. Choose _Web application_ as the **Application type** and give your OAuth Client ID a name.
5353

@@ -57,21 +57,23 @@ You do not need to be a Google Cloud Platform user to integrate Google Workspace
5757
https://<your-team-name>.cloudflareaccess.com
5858
```
5959

60-
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
60+
You can find your team name in [Zero Trust](https://one.dash.cloudflare.com/) under **Settings** > **Custom Pages**.
6161

6262
12. Under **Authorized redirect URIs**, in the **URIs** field, enter the following URL:
6363

6464
```txt
6565
https://<your-team-name>.cloudflareaccess.com/cdn-cgi/access/callback
6666
```
6767

68-
13. After creating the OAuth client ID, select the OAuth client ID that you just created. Google will present the **OAuth Client ID** and **Client secret** values. The client secret field functions like a password and should not be shared. Copy both the **OAuth Client ID** and **Client secret** values.
68+
13. After creating the OAuth client, select the OAuth client that you just created. Google will present the **OAuth Client ID** and **Client secret** values. The client secret field functions like a password and should not be shared. Copy both the **OAuth Client ID** and **Client secret** values.
6969

7070
14. On your [Google Admin console](https://admin.google.com), go to **Security** > **Access and data control** > **API controls**.
7171

7272
15. In **API Controls**, select **Settings**.
7373

74-
16. Select **Internal apps** and check the box next to the **Trust internal apps** to enable this option. This setting is disabled by default and must be enabled for Cloudflare Access to work correctly.
74+
16. Select **Internal apps** and check the box next to **Trust internal apps** to enable this option. The **Trust internal apps** setting is disabled by default and must be enabled for Cloudflare Access to work correctly.
75+
76+
![Location to trust internal apps in the Google Cloud Platform console.](~/assets/images/cloudflare-one/identity/gsuite/trust-internal-apps.png)
7577

7678
### 2. Add Google Workspace to Zero Trust
7779

0 commit comments

Comments
 (0)