Google can be used as a federated authenticator in the Identity Server. Do the following to configure the Identity Server to authenticate users using their Google user accounts.
Insert excerpt Configuring Federated Authentication Configuring Federated Authentication nopanel true - Register an OAuth 2.0 Application in Google.
As the first step, go to Google API Console, navigate credential to the Credentials tab from the sidebar. You can configure OAuth web application in Google by selecting by selecting OAuth Client ID. You can find more details from details here.
Select the web application , give and provide a name for the application (Eg:- e.g., SampleWebApllication).
Enter the Authorized redirect URI as https://localhost:9443/commonauth (This this is the endpoint in WSO2 Identity Server which that accepts the response sent by Google). - Expand the Google Configuration form and configure the Google authenticator as shown below. Make sure to add your Redirect URI as the Callback URL and Client id and Secret which is generated from above Google application. You can find the client id and secret from edit OAuth client.
Google configurations:
WSO2 Identity Server configurations: Fill in the following fields where relevant.
Field Description Sample value Enable Selecting this option enables Google to be used as an authenticator for users provisioned to the Identity Server. Selected Default Selecting the Default check box signifies that Google is the main/default form of authentication. This removes the selection made for any other Default checkboxes for other authenticators. Selected Client Id This is the username from the Google application you created from google developer console. 1421263438188909 Client Secret This is the password from the Google application you created from google developer console. Click the Show button to view the value you enter. 12ffb4dfb2fed67a00846b42126991f8 Callback Url This is the URL to which the browser should be redirected after the authentication is successful. It should have this format: https://(host-name):(port)/acs
. Here ACS URL (Assertion Consumer URL) is the endpoint in WSO2 Identity Server which accepts the response sent by Google.https://localhost:9443/commonauth Additional Query Parameters This is necessary if you are connecting to another Identity Server or application. Sometimes extra parameters are required by this IS or application so these can be specified here. scope=openid email profile
...