Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.brightdata.com/llms.txt

Use this file to discover all available pages before exploring further.

This guide explains how to set up Google Workspace SSO for Bright Data using OIDC, with the OAuth client ID created in the Google Cloud Console and users provisioned manually in the Bright Data Control Panel.
Google Workspace SSO for Bright Data is configured in the Google Cloud Console (console.cloud.google.com), not the Google Workspace Admin console. This is a separate feature from the public Continue with Google sign-in button.
Requirements
  • A Google Cloud project linked to your Google Workspace organization, with permission to configure the OAuth consent screen and create OAuth client IDs (typically a project owner or editor)
  • A Bright Data account with admin permission
  • All Bright Data users who will sign in via SSO must already exist in the Bright Data Control Panel under Account Settings → Users. Bright Data Google Workspace SSO uses manual provisioning. There is no SCIM or JIT provisioning.
  1. Sign in to the Google Cloud Console with an account that has access to your Google Workspace organization’s project.
  2. In the left navigation, go to APIs & Services → OAuth consent screen.
  3. Set User type to Internal so only members of your Workspace can sign in.
  4. Fill in the required fields (app name, user support email, developer contact information).
  5. Save.

Create the OAuth client ID

  1. In the Google Cloud Console, go to APIs & Services → Credentials.
  2. Click Create Credentials → OAuth client ID.
  3. Set Application type to Web application.
  4. Name the client. We recommend Bright Data Control Panel.
  5. Leave Authorized redirect URIs empty for now. You will paste in the Bright Data redirect URI in the next section.
  6. Click Create. Google displays a dialog with your Client ID and Client Secret. Copy both values.

Configure Bright Data

  1. In a new tab, open the Bright Data Control Panel and go to Account Settings → Passwords & authentication.
  2. Under Configure Single Sign-On, click Google Workspace.
  3. In the dialog, paste:
    • Client ID from step 11
    • Client Secret from step 11
    • Workspace Domain. The primary domain of your Google Workspace (for example, yourcompany.com).
  4. Copy the read-only Sign-in redirect URI displayed in the dialog. It has the form https://brightdata.com/users/auth/google_workspace/<customer_id>/done.

Paste the redirect URI back into Google

  1. Return to the Google Cloud Console OAuth client ID you created in step 7.
  2. Under Authorized redirect URIs, click Add URI and paste the Sign-in redirect URI from step 15.
  3. Click Save.

Activate and test

  1. Return to the Bright Data Control Panel Google Workspace dialog.
  2. Click Activate.
  3. Test by signing out of Bright Data and signing back in via Google Workspace SSO. Use an account whose email is present in both your Google Workspace and the Bright Data Control Panel (Account Settings → Users).

Add users for SSO sign-in

Bright Data Google Workspace SSO uses manual provisioning. There is no SCIM or JIT user creation. Before a user can sign in:
  1. In the Bright Data Control Panel, go to Account Settings → Users.
  2. Add the user’s email address. The email must match the user’s primary Google Workspace email.
  3. Set the user’s role.
When that user signs in via Google Workspace SSO for the first time, Bright Data creates the user record using the pre-added email.

Notes

  • The OAuth consent screen must be set to Internal user type. An External consent screen would allow any Google account to attempt sign-in.
  • The Workspace Domain field enforces the OIDC hd (hosted domain) claim. Only users whose Google account belongs to the configured Workspace Domain will succeed.
  • Google Workspace SSO is a separate feature from the public Continue with Google sign-in button. They use different client IDs, redirect URIs, and provisioning flows. See Google OAuth 2.0.
  • If you rotate the Client Secret in Google Cloud Console, update it in the Bright Data dialog as well. Otherwise sign-in fails with an invalid_client error.
  • The Sign-in redirect URI must match exactly between the Bright Data dialog and the Authorized redirect URIs list in Google Cloud Console. Mismatches return a redirect_uri_mismatch error.

SSO technical reference

For the full enterprise SSO technical reference, including OIDC parameters and a comparison of provisioning methods across all supported identity providers, see the SSO technical reference on the Okta SSO page.

Google Workspace-specific parameters

ParameterValue
ProtocolOpenID Connect (OIDC)
Application typeWeb application, created in Google Cloud Console → APIs & Services → Credentials
Required scopesopenid profile email
User identifieremail claim
Hosted domain enforcementThe hd claim is validated on every callback. Only emails from the configured Workspace Domain succeed.
OAuth consent screenMust be Internal user type
ProvisioningManual. Pre-add the user in Bright Data Control Panel (Account Settings → Users) before first sign-in.