Google Extended OAuth Service Account
Create a Service Account and Key
If not already selected, select your current project. If you have not created a project yet, please refer to the Configure 0Auth 2.0 G-Suite Adapter instructions.
Click on the menu button at the top left of the page, select APIs & Services, and then select credentials.
Click CREATE CREDENTIALS and select Service Account.
Give the service account a name and account ID. Descriptions are optional.
Click CREATE AND CONTINUE.
Skip the Grant this service account access to project section.
Skip the Grant users access to this service account section. By default, the user that creates the service account will be the only one with access to this service account.
If not redirected, select the menu button in the top left of the page, select APIs & Services, and then select Credentials.
Under the Service Accounts, click the pencil icon next to the service account that was created above.
Scroll to the Keys section and click ADD Key, then select Create New Key.
Select JSON in the popup window and click CREATE.
Save the JSON file and store in a secure area.
Authorizing Service Account Key
- Log in to Google Admin Console as a User with the Super Admin role.
- Click on Security.
- Click on Access and Data Control > API Controls.
- Click on MANAGE DOMAIN WIDE DELEGATION.
- Click Add New.
- Open the JSON file that was downloaded when you created the Service Account Key. Copy the value of the client_id field (without the enclosing quotes) and paste the Client ID field into the browser.
- Enter the scopes you want to grant access to, separated by commas, in the OAuth scopes field and click Authorize.
- The typical scopes you will need will be: https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.user, https://www.googleapis.com/auth/admin.datatransfer, https://www.googleapis.com/auth/admin.directory.group, https://www.googleapis.com/auth/admin.directory.orgunit, https://www.googleapis.com/auth/admin.directory.userschema. A list of available scopes is available at: https://developers.google.com/identity/protocols/googlescopes
- Additional scopes may be added later by repeating the previous two steps.
Creating a GOOGLE_EXTENDED OAuth2 Credential in Connect
- Navigate to Connect > OAuth2 Credentials.
- Select the project you want the credential associated with or select an asterisk (*) to create a credential that may be used by all projects.
- Click the Add OAuth2 Credential button.
- Give the OAuth2 Credential a NAME (must be unique) and select GOOGLE_EXTENDED for the PROVIDER.
- Open the JSON file you received when you created the Service Account Key and copy and paste the contents into the GOOGLE SERVICE ACCOUNT JSON field.
- Click Save.
Creating a G-Suite Connection using GOOGLE_EXTENDED OAuth2 Credential
- Insert the defineGoogleExtendedOAuthConnection() action.
- Enter the domain.
- Select the desired credential in the CREDENTIALNAME dropdown menu.
- Enter the Google User ID of the account you wish to use in the impersonateUserId field. THIS IS REQUIRED.
- Enter an array of scopes to authorize for the connection. The set of scopes must be a subset of those that were authorized for use by the Service Account Key for the domain (typically you will use the same scopes as previously configured).