Setting Up Google Workspace Integration
This guide walks you through connecting your Google Workspace environment to Triggr.
Overview
The Google Workspace integration enables Triggr to automate tasks within Google Workspace, including:
- User management, licensing, and organizational units (Admin SDK)
- File and folder operations (Google Drive)
- Email sending and management (Gmail)
- Group configuration and membership management (Groups Settings)
Prerequisites
Before you begin, ensure you have:
- Super Admin credentials for Google Workspace
- Access to Google Cloud Console (console.cloud.google.com)
- Access to Google Workspace Admin Console (admin.google.com)
Important: The authorizing user must possess Super Admin credentials in Google Workspace. Access is limited to resources the authorizing user can access - domain-wide delegation is not currently supported. This restriction prevents mailbox delegation and shared Drive access for other accounts.
Step 1: Create a GCP Project
First, create a Google Cloud Platform project for the integration.
- Navigate to Google Cloud Console
- Go to IAM & Admin > Manage Resources
- Click CREATE PROJECT
- Enter a descriptive project name (e.g., "Triggr Integration")
- Choose your organization and location settings
- Click Create
Step 2: Enable Required APIs
Enable the APIs that Triggr needs to interact with Google Workspace.
- Select your project from the dropdown at the top
- Go to APIs & Services > Library
- Search for and enable each of the following APIs:
- Admin SDK API - for user management
- Google Drive API - for file and folder operations
- Gmail API - for email management
- Groups Settings API - for group configuration
Step 3: Configure OAuth Consent Screen
Set up the OAuth consent screen for your application.
- Go to APIs & Services > OAuth consent screen
- Select Internal as the user type
- Click Create
- Complete the required fields:
- App name: Enter a name (e.g., "Triggr")
- User support email: Enter your support email
- Navigate to Data Access > Scopes
- Search for "Admin SDK" and select all related scopes
- Click UPDATE
- Save your changes
Step 4: Create OAuth Credentials
Create the OAuth credentials that Triggr will use to authenticate.
- Go to APIs & Services > Credentials
- Click CREATE CREDENTIALS > OAuth client ID
- Select Web application as the application type
- Enter a descriptive name (e.g., "Triggr OAuth Client")
- Under Authorized redirect URIs, add:
https://app.triggr-app.com/oauth/callback - Click Create
- Copy the Client ID and Client Secret immediately
Important: Store your Client Secret securely - you may need to regenerate it if lost.
Step 5: Configure Triggr Base Settings
Configure the base integration settings in Triggr.
- In Triggr, navigate to Integrations
- Find and select Google Workspace
- Click + Configure next to the Base Configuration card
- Set all fields to dashes (
-):- Client ID:
- - Client Secret:
- - Admin Email:
-
- Client ID:
- Click Save Configuration
Note: The base configuration uses placeholder values because credentials are configured per-client for this integration.
Step 6: Configure Per-Client Credentials
Set up credentials for each client that needs Google Workspace access.
- In the Google Workspace integration page, locate the Per-Client Configuration section
- Select the client from the dropdown
- Enter the credentials from your GCP project:
- Client ID: The Client ID from Step 4
- Client Secret: The Client Secret from Step 4
- Admin Email: The Super Admin account email address
- Click Save
Step 7: Complete OAuth Authorization
Authorize Triggr to access Google Workspace.
- After saving the per-client configuration, click Authorize
- Sign in with the Super Admin account when prompted
- Review and accept the requested permissions
- You'll be redirected back to Triggr once authorization is complete
Step 8: Trust Triggr in Google Workspace Admin Console
Configure Google Workspace to trust the Triggr application.
Trust Settings
- Go to Google Workspace Admin Console
- Navigate to Security > Access and data control > API controls
- Click Accessed Apps > View List
- Locate "Triggr" in the app list
- Change the Status to Trusted
- Enable Allowlist for exemption from API access blocks
Session Control Configuration
- Go to Security > Google Cloud session control
- Expand the Google Cloud session control section
- Select Require authentication
- Enable Exempt trusted apps
- Choose your preferred re-authentication method
- Click Save
Important Notes
- Super Admin Required: Only Super Admin accounts can authorize this integration
- No Domain-Wide Delegation: Access is limited to resources the authorizing Super Admin can access
- Per-Client Setup: Each client requires their own GCP project and OAuth credentials
- Legacy Integrations: Integrations established before May 2025 can enable additional APIs by repeating the enablement steps and re-authorizing in Triggr
Troubleshooting
Authorization Failures
If authorization fails:
- Verify the authorizing user has Super Admin access
- Confirm all required APIs are enabled in GCP
- Validate the redirect URI matches exactly:
https://app.triggr-app.com/oauth/callback
Permission Errors
If you receive permission errors after authorization:
- Ensure the app is marked as Trusted in Google Workspace Admin Console
- Verify session control exemptions are configured
- Confirm all OAuth scopes were selected during consent screen setup
Changing the Admin Account
If you need to change the authorizing admin:
- Remove the per-client configuration in Triggr
- Re-add the configuration with the new admin email
- Complete the authorization flow with the new Super Admin account
APIs Not Working
If certain functionality isn't available:
- Go to APIs & Services > Library in GCP
- Verify all required APIs are enabled
- Re-authorize in Triggr to pick up the new API permissions
Need help? Contact your account manager - we're happy to help configure this integration with you.
