See the supported connectors for Application Integration.
Manage authentication profiles
The tasks in your Application Integration may require connection to an external application, service, or data source. An authentication profile lets you configure and store the authentication details for the connection in Application Integration. You can configure the task to use the stored authentication profile. Creating an authentication profile is a one-time activity, and you can reuse the same profile in multiple integrations.
Required roles
To get the permissions that you need to manage authentication profiles, ask your administrator to grant you the following IAM roles on an integration:
-
Application Integration Admin (
roles/integrations.integrationAdmin
) -
Create authentication profiles:
Application Integration Editor (
roles/integrations.integrationEditor
) -
Edit authentication profiles:
Application Integration Editor (
roles/integrations.integrationEditor
) -
Delete authentication profiles:
Application Integration Admin (
roles/integrations.integrationAdmin
)
For more information about granting roles, see Manage access to projects, folders, and organizations.
You might also be able to get the required permissions through custom roles or other predefined roles.
Create OAuth 2.0 client ID
A client ID is used to identify a single application to Google's OAuth servers. If your application runs on multiple platforms, then each will need its own client ID. To use OAuth 2.0 in your application, you need an OAuth 2.0 client ID, which your application uses when requesting an OAuth 2.0 access token.
To create an OAuth 2.0 client ID, do the following steps:
- In the Google Cloud console, go to APIs & Services > Credentials.
- Click + Create Credentials and select OAuth client ID from the list of available options.
The Create OAuth client ID page appears.
- Appication type: Select Web Application from the drop-down list.
- Name: Enter a name for your OAuth 2.0 client to identify the client in the Cloud console.
- Under Authorized redirect URIs, click +Add URI and enter the following:
https://console.cloud.google.com/integrations/callback/locations/AUTH_PROFILE_REGION
- Click Create.
An OAuth 2.0 client ID is created successfully.
Create a new authentication profile
To create a new authentication profile, select one of the following options:
Console
- In the Google Cloud console, go to the Application Integration page.
- In the navigation menu, click Auth Profiles.
- Click Create and enter the following details:
- In the Profile name field, enter the name of the authentication profile to be displayed in the integration editor.
- From the Region list, select a region for the authentication profile.
- In the Description field, enter a description for the authentication profile.
- Click Continue.
- From the Authentication type list, select the authentication type and enter the required details. Based on your selection, the dialog displays additional fields required for the authentication credentials. You can select any of the following authentication types:
- Optionally, you can add SSL/TLS client certificates that are used by the server to validate a client's identity. You can enter the following field:
- SSL certificate
- Private key
- Private key passphrase
- Click Create.
The Authentication Profiles page appears.
Terraform
Use the google_integrations_client
resource.
You can use terraform to create the following authentication profiles:
- Auth token
- SSL/TLS client certification only
- JSON Web Token (JWT)
- OAuth 2.0 authorization code
- OAuth 2.0 client credentials
- OIDC ID token
- Service account
Auth token
The following example creates a Auth token authentication type in the us-central1
region:
SSL/TLS client certification
The following example creates a SSL/TLS client certification authentication type in the us-central1
region:
JSON Web Token (JWT)
The following example creates a JSON Web Token (JWT) authentication type in the us-central1
region:
OAuth 2.0 authorization code
The following example creates a SSL/TLS client certification authentication type in the us-central1
region:
OAuth 2.0 client credentials
The following example creates a OAuth 2.0 client credentials authentication type in the us-central1
region:
Google OIDC ID token
The following example creates a Google OIDC ID token authentication type in the us-central1
region:
resource "random_id" "default" { byte_length = 8 } resource "google_service_account" "service_account" { account_id = "sa-${random_id.default.hex}" display_name = "Service Account" } resource "google_integrations_auth_config" "auth_config_oidc_token" { location = "us-central1" display_name = "tf-oidc-token" description = "Test auth config created via terraform" decrypted_credential { credential_type = "OIDC_TOKEN" oidc_token { service_account_email = google_service_account.service_account.email audience = "https://us-central1-project.cloudfunctions.net/functionA 1234987819200.apps.googleusercontent.com" } } depends_on = [google_service_account.service_account, google_integrations_client.client] }
Service account
The following example creates a service account authentication type in the us-central1
region:
resource "random_id" "default" { byte_length = 8 } resource "google_service_account" "service_account" { account_id = "sa-${random_id.default.hex}" display_name = "Service Account" } resource "google_integrations_auth_config" "auth_config_service_account" { location = "us-central1" display_name = "tf-service-account" description = "Test auth config created via terraform" decrypted_credential { credential_type = "SERVICE_ACCOUNT" service_account_credentials { service_account = google_service_account.service_account.email scope = "https://www.googleapis.com/auth/cloud-platform https://www.googleapis.com/auth/adexchange.buyer https://www.googleapis.com/auth/admob.readonly" } } depends_on = [google_service_account.service_account, google_integrations_client.client] }
After you save, the new authentication profile is available as an option in the Authorization profile to use drop-down of any task requiring authentication.
Optional. If you have not created an authentication profile prior to configuring an integration task, you can access the profile creation dialog by selecting + Add new authentication profile from the Authorization profile to use drop-down in the task configuration pane. Follow the preceding steps to create a new authentication profile.
Edit authentication profiles
To edit an authentication profile, follow these steps:
- In the Google Cloud console, go to the Application Integration page.
- In the navigation menu, click Auth Profiles.
- Select a Region for the authentication profile using the drop-down menu in the Authentication Profiles page.
- Click
The Authentication Profiles dialog appears.
(Actions menu) and click Edit.
- Edit the details and click Save.
The Authentication Profiles page appears.
Delete authentication profiles
To delete an authentication profile, follow these steps:
- In the Google Cloud console, go to the Application Integration page.
- In the navigation menu, click Auth Profiles.
- Select a Region for the authentication profile using the drop-down menu in the Authentication Profiles page.
- Click Delete.
The Authentication Profiles page appears.
Authentication types
The authentication type required to complete an integration task depends upon the authentication configured in the authorization server. The authorization server can be a standalone server or an API that issues credentials to the calling client. Application Integration supports the following authentication types:
- Auth token
- Google OIDC ID Token
- JSON Web Token (JWT)
- OAuth 2.0 authorization code
- OAuth 2.0 client credentials
- OAuth 2.0 resource owner password credentials
- SSL/TLS client certification only
- Service account
The following sections describe the configuration properties of the authentication types.
Auth token
The Auth token authentication type uses a token (credentials) for authentication. The credentials are sent to the server in the HTTPAuthorization
request header in the
Authorization: TYPE CREDENTIALS
format. To configure this
authentication type, set the following properties:
- Type: Authentication type such as
Basic
,Bearer
, orMAC
. - Token: Credentials for the authentication type.
If the authentication server requires an SSL/TLS certificate, upload the certificate and the private key.
To find out which tasks support this authentication type, see Compatibility of authentication types with tasks.Google OIDC ID Token
The Google OIDC ID Token authentication type uses JSON Web Tokens (JWT) for authentication. The Google OpenID Connect (OIDC) provider, accounts.google.com, signs and issues these JWTs for authentication using a service account. To configure this authentication type, set the following properties:- Service account: Service account (principal) in your Google Cloud project with permission to access your API.
- Audience: The audience for the OIDC token (this identifies the recipients that the JWT is intended for). For example, Trigger URL is the audience for the Cloud Function task.
JSON Web Token (JWT)
The JWT authentication type uses JSON Web Token (JWT) for authentication. For more information about JWT, see RFC7519. To configure this authentication type, set the following properties:- JWT header: Algorithm used to generate the signature.
Note: You can only specify the HS256 algorithm.
- JWT payload: A set of claims. You can use registered, public, or custom claims.
- Secret: Shared key between the client and the authentication server.
If the authentication server requires an SSL certificate, upload the certificate and the private key using the file picker. Enter the private key passphrase .
To find out which tasks support this authentication type, see Compatibility of authentication types with tasks.OAuth 2.0 authorization code
The OAuth 2.0 authorization code authentication type uses an OAuth 2.0
authorization token for authentication. To configure this
authentication type, set the following properties:
- Authentication endpoint: Endpoint to the application's authentication endpoint. You will be redirected to this URL to review the access permissions for the application. The token will only be generated after access is granted.
- Token endpoint: Endpoint that grants or refreshes the access token.
- Client ID: A unique string provided by the authentication server to the registered client. The Client ID is not a secret, and it is exposed to the resource owner. Use this field along with a client secret.
- Secret: Shared secret key between the client (integration) and the authentication server.
- Scope(s): Scope of the access token. Scopes let you specify access permissions for users. You can specify multiple scopes separated by a single space (" "). For more information, see OAuth 2.0 Scopes for Google APIs.
If the authentication server requires an SSL certificate, upload the certificate and the private key using the file picker. Enter the private key passphrase in the available field, if required.
To find out which tasks support this authentication type, see Compatibility of authentication types with tasks.OAuth 2.0 client credentials
The OAuth 2.0 client credentials authentication type uses an OAuth 2.0
authorization token for authentication. This authentication first requests an access token using the
client credentials and then uses the token to access the protected resources. To configure this
authentication type, set the following properties:
- Token endpoint: Endpoint that grants or refreshes the access token.
- Client ID: A unique string provided by the authentication server to the registered client. The Client ID is not a secret, and it is exposed to the resource owner. Use this field along with a client secret.
- Secret: Shared secret key between the client (integration) and the authentication server.
- Scope(s): Scope of the access token. Scopes let you specify access permissions for users. You can specify multiple scopes separated by a single space (" "). For more information, see OAuth 2.0 Scopes for Google APIs.
- Request types: Mechanisms to send the request parameters to the
authentication server for fetching the access token. You can specify any of the following
request types:
- Encoder header: Encodes the
CLIENT ID
andCLIENT SECRET
inBase64
format and sends the encoded string in the HTTP authorization header. The remaining request parameters are sent in the HTTP request body. - Query parameters: Sends the request parameters in a query string.
- Request body: Sends the request parameters by using the
application/x-www-form-urlencoded
content type andUTF-8
charset in theentity-body
of the HTTP request. - Unspecified
- Encoder header: Encodes the
- Token parameters: Request parameters required to get the token. Specify
the values in key-value format where
Key
is the parameter name andValue
is the corresponding parameter value.
If the authentication server requires an SSL certificate, upload the certificate and the private key using the file picker. Enter the private key passphrase in the available field, if required.
To find out which tasks support this authentication type, see Compatibility of authentication types with tasks.OAuth 2.0 resource owner password credentials
The OAuth 2.0 resource owner password credentials authentication type uses an OAuth 2.0
authorization token for authentication. This authentication first requests an access token using the
resource owner credentials (Username and Password) and then uses the token to access the protected resources. To configure this
authentication type, set the following properties based on the instance type that you connect to:
- Token endpoint: Endpoint that grants or refreshes the access token.
- Client ID: A unique string provided by the authentication server to the registered client. The Client ID is not a secret, and it is exposed to the resource owner. Use this field along with a client secret.
- Secret: Shared secret key between the client (integration) and the authentication server.
- Scope(s): Scope of the access token. Scopes let you specify access permissions for users. You can specify multiple scopes separated by a single space (" "). For more information, see OAuth 2.0 Scopes for Google APIs.
- Username: Username of the resource owner.
- Password: User password.
- Request types: Mechanisms to send the request parameters to the
authentication server for fetching the access token. You can specify any of the following
request types:
- Encoder header: Encodes the
CLIENT ID
andCLIENT SECRET
inBase64
format and sends the encoded string in the HTTP authorization header. Sends the remaining request parameters in the HTTP request body. - Query parameters: Sends the request parameters in a query string.
- Request body: Sends the request parameters by using the
application/x-www-form-urlencoded
content type andUTF-8
charset in theentity-body
of the HTTP request.
- Encoder header: Encodes the
- Token parameters: Request parameters required to get the token. Specify
the values in key-value format where
Key
is the parameter name andValue
is the corresponding parameter value.
If the authentication server requires an SSL certificate, upload the certificate and the private key using the file picker. Enter the private key passphrase in the available field, if required.
To find out which tasks support this authentication type, see Compatibility of authentication types with tasks.SSL/TLS client certificate only
The SSL/TLS client certificate only authentication type uses only the SSL/TLS certificate for authentication. Upload the required certificate and the private key. To configure this authentication type, upload the following files:- SSL certificate: Certificate encoded in PEM format.
- Private key: Certificate's private key file encoded in PEM format.
If the private key requires a
passphrase
, enter the Private key passphrase.
Service account
The Service account authentication type uses the credentials of a Google Cloud project's service account for authentication. To configure this authentication type, set the following properties:
- Service account: Service account (principal) in your Google Cloud project with permission to access your API.
- Scope(s): Scope of the access permissions granted to users. You can specify multiple scopes separated by a single space (" "). For more information, see OAuth 2.0 Scopes for Google APIs.
To learn about best practices for creating and managing service accounts, read the Best practices for working with service accounts documentation.
If the authentication server requires an SSL certificate, upload the certificate and the private key using the file picker. Enter the private key passphrase in the available field, if required.
To find out which tasks support this authentication type, see Compatibility of authentication types with tasks.Compatibility of authentication types with tasks
The following table lists the authentication types and the corresponding compatible tasks. You can use this information to decide which authentication type to use for a task.
Authentication type | Compatible tasks and triggers |
---|---|
Auth token | |
Google OIDC ID Token | |
JSON Web Token (JWT) | |
OAuth 2.0 authorization code | |
OAuth 2.0 client credentials | |
OAuth 2.0 resource owner password credentials | |
SSL/TLS client certificate only | |
Service account |
Authentication rule
If your integration has both OAuth 2.0 profile and a user-managed service account configured, then by default the OAuth 2.0 profile is used for authentication. If neither OAuth 2.0 profile nor user-managed service account is configured, then the default service account (service-PROJECT_NUMBER@gcp-sa-integrations.iam.gserviceaccount.com
) is used. If the task does not use the default service account then the execution fails.