Share via


Set up the Google Workspace service for Google Drive connector ingestion

The Google Drive Microsoft 365 Copilot connector allows your organization to index files that anyone can access in Google Drive and make them available to Microsoft 365 Copilot and Microsoft Search. This article provides information about the configuration steps that Google Workspace admins need to complete to deploy the Google Drive connector.

For information about how to deploy the connector, see Google Drive connector deployment.

Prerequisites

To complete the setup steps, you must be a Google Workspace super admin, be granted access by a Google Workspace super admin, or be a user with administrative privileges.

To verify user permissions:

  1. In the Google Admin console, go to Menu > Directory > Users.
  2. Open your account page.
  3. On the User details tab, in the Admin roles and privileges section, view the roles assigned to you and the privileges inherited from those roles.

Setup checklist

The following checklist lists the steps involved in configuring the environment and setting up the connector prerequisites.

Task Role
Create a Google Cloud project Google Workspace admin
Enable Admin SDK and Drive APIs Google Workspace admin
Create a Google Cloud service account Google Workspace admin
Add OAuth 2.0 scopes to the service account Google Workspace admin
Get the OAuth 2.0 client ID Google Workspace admin

Create a Google Cloud project

The Google Drive Copilot connector requires a service account key generated by a Google Cloud Platform console project. When you deploy the connector in the Microsoft 365 admin center, you need to provide the service account key.

You can use an existing project you own, or create a new project. To create a project:

  1. Go to the Manage resources page in the Google Cloud Platform console.

  2. Select Create Project.

  3. Enter a project name, organization, and location.

    Screenshot that shows how to create a new project in Google Workspace.

  4. Note the Project ID for later use.

    Screenshot that shows how to get the project ID in Google Workspace.

  5. Select Create.

Enable required APIs

Enable the following APIs in your Google Cloud project:

Screenshot that shows how to check the API enablement.

Create a Google Cloud service account

To create a Google Cloud service account:

  1. Go to the Service Accounts page.

    Screenshot that shows how to create a new service account step1.

  2. Select your project.

  3. Select Create Service Account.

    Screenshot that shows how to create a new service account step2.

  4. Enter a name, ID, and optional description.

  5. Select Create and Continue.

    Screenshot that shows how to create a new service account step3.

  6. Skip Permissions and Principals with access, then select Done.

  7. On the Service Accounts page, select the three-dot menu under Actions and select Manage Keys.

    Screenshot that shows how to get the keys step1.

  8. Select Add Key > Create New Key.

  9. Choose JSON as the key type and select Create.

    Screenshot that shows how to get the keys step2.

  10. A private JSON key is downloaded to your computer.

    Screenshot that shows how to download service account keys.

Add OAuth scopes to your service account

To add OAuth scopes to your service account:

  1. Go to the Google Admin console.

  2. Go to Security > Access and data control > API controls.

    Screenshot that shows how to add api scope step1.

  3. Select Manage Domain Wide Delegation.

    Screenshot that shows how to add api scope step2.

  4. Select Add new and enter the following OAuth scopes:

    • https://www.googleapis.com/auth/admin.directory.user.readonly
    • https://www.googleapis.com/auth/admin.directory.group.readonly
    • https://www.googleapis.com/auth/drive.readonly
    • https://www.googleapis.com/auth/admin.reports.audit.readonly

    Screenshot that shows how to add api scope.

Get the OAuth 2.0 client ID

To get the client ID:

  1. Sign in to the Google Cloud Platform.
  2. Select your service account.
  3. Copy the OAuth 2.0 Client ID.

Authentication in Microsoft 365

Provide the following information to the admin to authenticate the connector during the admin center setup process:

  • Google Workspace domain
  • Admin email
  • JSON private key

Next step