Step 1: Retrieve credentials for third-party apps
Getting credentials
Google Oauth 2.0
Authenticate using Oauth 2.0
- Authorize URL (Required): Authorize url. E.g. https://accounts.google.com/o/oauth2/v2/auth?access_type=offline&prompt=consent
- Client ID (Required): Client ID
- Client secret (Required): Client secret
- Project ID (Required): The ID of the project that hosts the storage bucket
- Scopes (Required): Granted permission. E.g. https://www.googleapis.com/auth/devstorage.read_write
- Token URL (Required): Token url. E.g. https://oauth2.googleapis.com/token
Google Cloud Storage Private Key
The Google Cloud Storage component requires a username / private key pair for authentication. To create a GCP service account, follow directions on https://cloud.google.com/docs/authentication/getting-started.
Be sure to assign the user you just created with the correct permissions. To access Google Cloud Storage resources, you will need to assign either a resource specific permission, or the Cloud Storage Admin role. After creating a service account, you will have an option to create a key for the account. If you are not greeted with this option, click on the service account you just created, and navigate to the 'keys' section. Here you can click 'Add Key' This will generate a .json file with type, project_id, and a dozen other fields. Use these fields along with your GCP Project Id to create a new connection.
- Client Email (Required): The email address of the client you would like to connect.
- Private Key (Required): The private key of the client you would like to connect.
- Project ID (Required): The ID of the project that hosts the storage bucket
Updated 3 months ago