You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/idp-integration/google.mdx
+20-12Lines changed: 20 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,42 +11,50 @@ You do not need to be a Google Cloud Platform user to integrate Google Suite as
11
11
12
12
## Set up Google as an identity provider
13
13
14
-
1.Visit the Google Cloud Platform console. Create a new project, name the project, and select **Create**.
14
+
1.Log in to the Google Cloud Platform [console](https://console.cloud.google.com/). Create a new project, name the project, and select **Create**.
15
15
16
-
2. On the project home page, go to **APIs & Services** on the sidebar and select **Dashboard**.
16
+
2. On the project home page, go to **APIs & Services**and on the sidebar select **Credentials**.
17
17
18
-
3.On the sidebar, go to **Credentials** and select**Configure Consent Screen** at the top of the page.
18
+
3.Select**Configure Consent Screen** at the top of the page.
19
19
20
-
4. Choose `External` as the User Type. Since this application is not being created in a Google Workspace account, any user with a Gmail address can login.
20
+

21
21
22
-
5. Name the application, add a support email, and input contact fields. Google Cloud Platform requires an email in your account.
23
-
:::note
24
-
In the **Scopes** section, we recommend adding the `userinfo.email` scope. This is not required for the integration, but shows authenticating users what information is being gathered. You do not need to add test users.
25
-
:::
22
+
4. To configure the consent screen:
26
23
27
-
6. Return to the **APIs & Services** page, select **Create Credentials** > **OAuth client ID**, and name the application.
24
+
1. Select **Get started**.
25
+
2. Input an **App name** and a **User support email**.
26
+
3. Choose `External` as the Audience Type. Since this application is not being created in a Google Workspace account, any user with a Gmail address can log in.
27
+
4. Input **Contact Information**. Google Cloud Platform requires an email in your account.
28
+
5. Agree to Google's user data policy and select **Continue**.
29
+
6. Select **Create**.
30
+
31
+
5. The OAuth overview page will load. On the OAuth overview screen, select **Create OAuth client**.
32
+
33
+

34
+
35
+
6. Choose _Web application_ as the **Application type** and give your OAuth Client ID a name.
28
36
29
37
7. Under **Authorized JavaScript origins**, in the **URIs** field, enter your team domain:
30
38
31
39
```txt
32
40
https://<your-team-name>.cloudflareaccess.com
33
41
```
34
42
35
-
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
43
+
You can find your team name in [Zero Trust](https://one.dash.cloudflare.com/) under **Settings** > **Custom Pages**.
36
44
37
45
8. Under **Authorized redirect URIs**, in the **URIs** field, enter the following URL:
9. Google will present the OAuth Client IDand Secret values. The secret field functions like a password and should not be shared. Copy both values.
51
+
9.After creating the OAuth client, select the OAuth client that you just created. Google will present the **OAuth Client ID** value and **Client secret** value. The client secret field functions like a password and should not be shared. Copy both values.
44
52
45
53
10. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Settings** > **Authentication**.
46
54
47
55
11. Under **Login methods**, select **Add new**. Choose **Google** on the next page.
48
56
49
-
12. Input the Client ID and Client Secret fields generated previously.
57
+
12. Input the Client ID (**App ID** in the Cloudflare dashboard) and Client Secret fields generated previously.
50
58
51
59
13. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/identity/idp-integration/gsuite.mdx
+22-20Lines changed: 22 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,34 +20,34 @@ You do not need to be a Google Cloud Platform user to integrate Google Workspace
20
20
21
21
### 1. Configure Google Workspace
22
22
23
-
1. Log in to the Google Cloud Platform [console](https://console.cloud.google.com/). This is separate from your Google Workspace console.
23
+
1.Log in to the Google Cloud Platform [console](https://console.cloud.google.com/). This is separate from your Google Workspace console.
24
24
25
-
2. A Google Cloud project is required to enable Google Workspace APIs. If you do not already have a Google Cloud project, go to **IAM & Admin** > **Create Project**. Name the project and select **Create**.
25
+
2.A Google Cloud project is required to enable Google Workspace APIs. If you do not already have a Google Cloud project, go to **IAM & Admin** > **Create Project**. Name the project and select **Create**.
26
26
27
-
3. Go to **APIs & Services** and select **Enable APIs and Services**. The API Library will load.
27
+
3.Go to **APIs & Services** and select **Enable APIs and Services**. The API Library will load.
28
28
29
-
4. In the API Library, search for `admin` and select **Admin SDK API**.
29
+
4.In the API Library, search for `admin` and select **Admin SDK API**.
30
30
31
-
5.**Enable** the Admin SDK API.
31
+
5.**Enable** the Admin SDK API.
32
32
33
-
6. Return to the **APIs & Services** page and go to **Credentials**.
33
+
6.Return to the **APIs & Services** page and go to **Credentials**.
34
34
35
-
7. You will see a warning that you need to configure a consent screen. Select **Configure Consent Screen**.
35
+
7.You will see a warning that you need to configure a consent screen. Select **Configure Consent Screen**.
36
36
37
-

37
+

38
38
39
-
8. To configure the consent screen:
39
+
8.To configure the consent screen:
40
40
41
-
1. Select **Get Started**.
42
-
2. Input an **App name** and a **User support email**.
43
-
3. Choose **Internal** as the Audience Type. This limits authorization requests to users in your Google Workspace and blocks users who have regular Gmail addresses.
44
-
4. Input **Contact Information**. Google Cloud Platform requires an email in your account.
45
-
5. Agree to Google's user data policy and select **Continue**.
46
-
6. Select **Create**.
41
+
1. Select **Get Started**.
42
+
2. Input an **App name** and a **User support email**.
43
+
3. Choose **Internal** as the Audience Type. This Audience Type limits authorization requests to users in your Google Workspace and blocks users who have regular Gmail addresses.
44
+
4. Input **Contact Information**. Google Cloud Platform requires an email in your account.
45
+
5. Agree to Google's user data policy and select **Continue**.
46
+
6. Select **Create**.
47
47
48
-
9. The OAuth overview page will load. Select **Create OAuth Client**.
48
+
9.The OAuth overview page will load. Select **Create OAuth Client**.
49
49
50
-
(Need picture from LC)
50
+

51
51
52
52
10. Choose _Web application_ as the **Application type** and give your OAuth Client ID a name.
53
53
@@ -57,21 +57,23 @@ You do not need to be a Google Cloud Platform user to integrate Google Workspace
57
57
https://<your-team-name>.cloudflareaccess.com
58
58
```
59
59
60
-
You can find your team name in Zero Trust under **Settings** > **Custom Pages**.
60
+
You can find your team name in [Zero Trust](https://one.dash.cloudflare.com/) under **Settings** > **Custom Pages**.
61
61
62
62
12. Under **Authorized redirect URIs**, in the **URIs** field, enter the following URL:
13. After creating the OAuth client ID, select the OAuth client ID that you just created. Google will present the **OAuth Client ID** and **Client secret** values. The client secret field functions like a password and should not be shared. Copy both the **OAuth Client ID** and **Client secret** values.
68
+
13. After creating the OAuth client, select the OAuth client that you just created. Google will present the **OAuth Client ID** and **Client secret** values. The client secret field functions like a password and should not be shared. Copy both the **OAuth Client ID** and **Client secret** values.
69
69
70
70
14. On your [Google Admin console](https://admin.google.com), go to **Security** > **Access and data control** > **API controls**.
71
71
72
72
15. In **API Controls**, select **Settings**.
73
73
74
-
16. Select **Internal apps** and check the box next to the **Trust internal apps** to enable this option. This setting is disabled by default and must be enabled for Cloudflare Access to work correctly.
74
+
16. Select **Internal apps** and check the box next to **Trust internal apps** to enable this option. The **Trust internal apps** setting is disabled by default and must be enabled for Cloudflare Access to work correctly.
75
+
76
+

0 commit comments