Skip to main content

Google Directory: Configuring OpenID Connect (OIDC)-based Single Sign-On (SSO) for TAC

⚠️ Note: The platform does not support SAML configurations — OpenID Connect (OIDC) must be used.


Step 1: Create a project in Google Cloud

  1. Go to the Google Cloud Console and log in with an administrator account for your organisation

  2. Click "Select project" at the top → "New project"

  3. Enter a name for the project (e.g. "TAC-SSO") and select the correct organisation

  4. Click "Create"


Step 2: Enable the OpenID Connect API

  1. In the left-hand menu, go to "APIs & Services""Dashboard"

  2. Click "+ Enable APIs & Services"

  3. Search for "Google Identity" and select "Google Identity Platform"

  4. Click "Enable"


Step 3: Create OAuth 2.0 credentials

  1. Go to "APIs & Services""Credentials"

  2. Click "+ Create credentials""OAuth client ID"

  3. Under "Application type", select "Web application"

  4. Fill in the required fields:

  5. Click "Create"


Step 4: Configure Scopes for OpenID Connect

When configuring OpenID Connect for TAC, grant the following required scopes:

  • openid

  • profile

  • email

  • offline_access


Step 5: Enable User Access

  1. Go to the Google Admin Console at admin.google.com

  2. Navigate to "Apps""Web and mobile apps"

  3. Select the TAC application you just configured

  4. Go to "Access control" and make sure the required users or groups have permission to access TAC

  5. Save the changes


Step 6: Grant Consent Without Manual Approval

  1. Go back to the Google Cloud Console

  2. Navigate to "APIs & Services""OAuth consent"

  3. Click "Grant consent for the organisation"

  4. Verify that the required scopes are correctly authorised

  5. Save and close

Did this answer your question?