Google can be used as a federated authenticator in the Identity Server. Do the following to configure the Identity Server to authenticate users using their Google user accounts.
- To navigate to the federated authenticators configuration section, do the following.
- Register OAuth 2.0 Application in Google. As the first step, go to Google API Console and navigate to the Credentials tab from the sidebar. You can configure OAuth web application in Google by selecting OAuth Client ID. You can find more details from here.
Select a web application and give it a name (e.g., SampleWebApllication). Enter the Authorized redirect URI as
(this is the endpoint in WSO2 Identity Server that accepts the response sent by Google).
- Expand the Google Configuration form and configure the Google authenticator as shown below. Make sure to add your Redirect URI as the Callback URL and Client id and Secret which is generated from above Google application. You can find the client id and secret from edit OAuth client.
Fill in the following fields where relevant.
Field Description Sample value Enable Selecting this option enables Google to be used as an authenticator for users provisioned to the Identity Server. Selected Default Selecting the Default check box signifies that Google is the main/default form of authentication. This removes the selection made for any other Default checkboxes for other authenticators. Selected Client Id This is the username from the Google application you created from google developer console. 1421263438188909 Client Secret This is the password from the Google application you created from google developer console. Click the Show button to view the value you enter. 12ffb4dfb2fed67a00846b42126991f8 Callback Url This is the URL to which the browser should be redirected after the authentication is successful. It should have this format:
https://(host-name):(port)/acs. Here ACS URL (Assertion Consumer URL) is the endpoint in WSO2 Identity Server which accepts the response sent by Google.
https://localhost:9443/commonauth Additional Query Parameters This is necessary if you are connecting to another Identity Server or application. Sometimes extra parameters are required by this IS or application so these can be specified here. scope=openid email profile