Only complete this section if not authenticating via Service Account. See Authentication Methods for more details.
- Be signed into http://console.cloud.google.com/.
- From the hamburger menu on the left, select APIs & Services -> OAuth consent screen
- Select Internal for User Type
- Click Create
- Fill in your App name and User support email
- Scroll down to the Authorized Domains section
- Under Authorized domains, add the primary domain of your GWS organization.
- Add another email address for Developer contact information
- Click SAVE AND CONTINUE
- Do nothing on the Scopes screen, just click SAVE AND CONTINUE
- Review summary, then click BACK TO DASHBOARD
- Click Credentials from the menu on the left
- Click CREATE CREDENTIALS
- Select Oauth client ID
- Select Web application for Application type
- Give name as appropriate
- Under Authorized redirect URIs, click "ADD URI." Add
http://localhost
andhttp://localhost:8080/
- Click CREATE
- Click DOWNLOAD JSON from the resulting OAuth client created page
- Click OK
- Move the downloaded file (begins with
client_secret*.json
) to the root directory folder of this repo, rename tocredentials.json
- Go back the menu on the left and click Enabled API Services
- In the center screen click Enable APIS AND Services
- Search for and enable the Admin SDK API
- Search for and enable the Groups Settings API
- During the first run of this tool your default web browser will open up a page to consent to the API scopes needed to run this tool. Sign in with an account with the necessary privileges and click allow.
If you've limited application access to Google's APIs in your organization, the Common Controls: App Access to Google APIs baseline covers this topic, follow the directions below to allowlist the OAuth app.
- Login to https://console.cloud.google.com
- Navigate to the appropriate project
- Select API's & Services from the top left hamburger icon
- Select Credentials
- Copy your client ID under OAuth 2.0 Client IDs
- Now login to admin.google.com and navigate to Security -> Access and Data Control -> API Controls -> Manage Third-Party App Access
- Select Add App -> Oauth App Name or Client ID
- Search by your OAuth client ID
- Select the App
- Select your root organization as the domain
- Select Trusted
- Continue to Usage: Parameters
- Return to Documentation Home