Google Workspace does not have a dedicated connector type. Use the generic
oidc connector type with Google’s OIDC discovery endpoint.Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
Google Workspace supports standard OpenID Connect, so you can connect it to the Orchestrator usingtype: oidc with Google’s well-known discovery URL. This approach works for organizations that use Google Workspace as their primary identity provider or for hybrid environments that combine Google and other identity platforms.
Use Cases
- Google SSO federation — Extend Google Workspace authentication to enterprise applications that don’t support Google login natively
- Google-to-enterprise app bridging — Translate Google OIDC tokens into header-based or cookie-based authentication for legacy apps
- Hybrid Google/Microsoft environments — Orchestrate authentication across both Google Workspace and Azure AD from a single point
Configuration
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
OAuth credentials for Google Workspace must be created in the Google Cloud Console under APIs & Services > Credentials. Create an “OAuth 2.0 Client ID” of type “Web application” and add the
oauthRedirectURL to the Authorized redirect URIs.Configuration Reference
| Key | Type | Required | Description |
|---|---|---|---|
name | string | Yes | Unique connector identifier referenced in app policies |
type | string | Yes | Must be oidc (Google uses the generic OIDC connector) |
oidcWellKnownURL | string | Yes | Google’s OIDC discovery endpoint: https://accounts.google.com/.well-known/openid-configuration |
oauthClientID | string | Yes | OAuth 2.0 client ID from the Google Cloud Console |
oauthClientSecret | string | Yes | OAuth 2.0 client secret (use secret reference syntax) |
oauthRedirectURL | string | Yes | Callback URL registered in the Google Cloud Console credentials |
scopes | string | No | Space-separated OAuth scopes (default: openid profile email) |
oauthExtraParams | map | No | Additional query parameters for the authorization request |
tls | string | No | Named TLS profile for provider communication |
Troubleshooting
- Verify the OAuth consent screen is configured in the Google Cloud Console — the consent screen must be published or in test mode with authorized test users
- Ensure the
oauthRedirectURLmatches exactly what is registered in the Google Cloud Console under Authorized redirect URIs - Check that the client secret reference resolves correctly via your secret provider