This article describes how to configure Identity Cloud to use Google as a social provider for authentication and/or registration. Identity Cloud provides a standards-based solution for Google social authentication and registration based on OIDC standards.
ForgeRock assumes no responsibility for errors or omissions in the third-party software or documentation.
Create an OAuth 2.0 client
You'll need to create an OAuth 2.0 client for your Identity Cloud Platform project. Identity Cloud uses the OAuth 2.0 client ID when requesting an OAuth 2.0 access token.
Refer to the Google Cloud Platform documentation for guidance on setting up OAuth 2.0. When creating the OAuth 2.0 client, make sure you select your Identity Cloud project. If this is your first time creating a client ID, you will also need to configure your consent screen as shown in the User Consent section in the Google documentation.
Use the following configuration for Identity Cloud:
Application Type: Select
- Name: Enter a suitable name to identify the OAuth 2.0 client.
Authorized redirect URIs: Add the Identity Cloud server URI. This is the page to go to once access has been granted, for example,
Once you have created the OAuth 2.0 client, you'll see a unique Client ID and Client Secret. You'll need this information when you configure the Google social identity provider in Identity Cloud. You can retrieve these details at any time from the Credentials page.
- In the Identity Cloud admin UI, go to Native Consoles > Access Management > Services > Social Identity Provider Service.
- Choose Secondary Configurations, click Add a Secondary Configuration, and select the
Client configuration for Googleoption.
- Complete the following configuration:
- Name: Enter a name for the social identity provider, for example, Google.
- Client ID: Enter the client identifier for your Google Cloud Platform project.
Redirect URL: Enter your Identity Cloud tenant login URL. This must match the redirect URI you configured in your Google Cloud Platform project, for example,
- Scope Delimiter: Enter the scope delimiter, which is usually an empty space.
- Click Create.
The full configuration for the new Google social identity provider is displayed.
- Enter the client secret for your Google Cloud Platform project in the Client Secret field.
- Check the rest of the default settings are correct. In particular, check the following fields:
- Enabled: Ensure the configuration is enabled.
Issuer: Ensure that
Transform Script: Ensure that
Google Profile Normalizationis entered. This script transforms Google credential data into a normalized form.
- Click Save Changes.
You can create custom end-user journeys for social registration and sign in. These journeys will include all your enabled social identity providers, so you won't need to create different journeys for different providers.
See How do I create end user journeys for social registration and login in Identity Cloud? for information on how to create end-user journeys for SSO with social providers.
- In the Identity Cloud admin UI, go to Journeys.
- Click the journey that you want to test.
- Copy the Preview URL.
Paste the preview URL into a browser using Incognito or Browsing mode.
- Follow the sign in and/or registration steps to test your journey.
For example, if Google is configured as a social identity provider for social login, end users are asked if they want to authenticate with Google, similar to the screenshot below.