Google OpenID Connect#

To set up your Union instance to use Google OpenID Connect as the identity provider, follow the directions below.

Google documentation

In this article, we cover the same steps as in the OpenID Connect Google documentation, but with additional directions specific to Union.

Setting up OAuth 2.0#

First, select an existing project or set up a new project in the Google Cloud Console.

  1. Navigate to the Clients section for Google Auth Platform.

  2. Click CREATE CLIENT. If this is your first client, you might need to provide additional app details. There is no special configuration needed from the Union side.

  3. Under Create OAuth client ID, select Web application as the application type and assign a name.

  4. Under Authorized redirect URIs, add an entry with the following callback URI: https://signin.hosted.unionai.cloud/oauth2/v1/authorize/callback.

  5. Click Create.

Obtain OAuth 2.0 credentials#

Next, retrieve your credentials: Click on your configured client and copy the values for Client ID and Client secret to a text file on your computer.

OAuth 2.0 credentials

Share the client ID and client secret securely with Union#

Finally, you will need to share the client ID and client secret securely with Union:

  1. Copy the public key provided by Union here: public-key.txt

  2. Encrypt the given text file on your computer with a PGP tool of your choice.

  3. Share the encrypted message with the Union team over Slack.