Only complete this section if not authenticating via Service Account. See Authentication Methods for more details.
- Sign in to your account at http://console.cloud.google.com/.
- Click the "hamburger" menu on the left (three horizontal bars on top of each other), and select APIs & Services -> OAuth consent screen
- Select Internal for User Type
- Click Create
- Fill in your App name and User support email
- Scroll down to the Authorized Domains section
- Under Authorized domains, add the primary domain of your GWS organization.
- Add another email address for Developer contact information
- Click SAVE AND CONTINUE
- Do nothing on the Scopes screen, just click SAVE AND CONTINUE
- Review summary, then click BACK TO DASHBOARD
- Click Credentials from the menu on the left
- Click CREATE CREDENTIALS
- Select Oauth client ID
- Select Web application for Application type
- Give name as appropriate
- Under Authorized redirect URIs, click "ADD URI." Add
http://localhost
andhttp://localhost:8080/
. NOTE the ending slash (/
) in the second URL is necessary. If the slash is missing, you will eventually get an error when running ScubaGoggles (It will be an "access blocked" error on the Google authentication webpage. You'll also seeError 400: redirect_uri_mismatch
). - Click CREATE
- Click DOWNLOAD JSON from the resulting OAuth client created page
- Click OK
- Move the downloaded file (begins with
client_secret*.json
) to the location and name you specified when you ran the ScubaGoggles setup utility. If you have not yet run the setup utility, you will specify this file as the credentials file when prompted by the setup utility. You'll make it easier on yourself if you rename the file to something simple, likecredentials.json
. - Go back the menu on the left and click Enabled API Services
- In the center screen click Enabled APIs & Services
- Search for and enable the Admin SDK API
- Search for and enable the Groups Settings API
- During the first run of this tool your default web browser will open up a page to consent to the API scopes needed to run this tool. Sign in with an account with the necessary privileges and click allow.
If you've limited application access to Google's APIs in your organization, the Common Controls: App Access to Google APIs baseline covers this topic, follow the directions below to allowlist the OAuth app.
- Login to https://console.cloud.google.com
- Navigate to the appropriate project
- Select API's & Services from the top left hamburger icon
- Select Credentials
- Copy your client ID under OAuth 2.0 Client IDs
- Now login to admin.google.com and navigate to Security -> Access and Data Control -> API Controls -> Manage Third-Party App Access
- Select Add App -> Oauth App Name or Client ID
- Search by your OAuth client ID
- Select the App
- Select your root organization as the domain
- Select Trusted
- Continue to Usage: Parameters
- Return to Documentation Home