Overview
Currently, when a document in SharePoint is shared via OneDrive, or a Collaboration invite to the Share Folder, is sent to a client's Gmail account, the recipient will receive a SharePoint code that is commonly delivered in their Junk/Trash email folder. There can also be a delay before the code arrives.
To overcome this, Google Federation can be enabled in Azure.
External users are then able to access the shared content with your practice using their existing Gmail account ID and password. This provides clients quicker access to any shared documents or to the share folders. If a client is already logged into Google, they will not to need to enter a password.
Steps 1 to 5 in this article are based on the following help article https://www.anupams.net/enable-google-federation-external-sharepoint/.
- Step 1 - Prerequisites
- Step 2 - Configure Google Project and App Registration
- Step 3 - Locate Directory Information In Azure
- Step 4 - Generate OAuth Credentials
- Step 5 - Add Google Federation as an Identity Provider
- Step 6 - Test the User Experience
- Step 7 - Review the Guest Account Creation in Azure
Step 1 - Prerequisites
- Create or select a Google account that can be used to enable Google Federation.
- Open the SharePoint Admin Center from https://admin.microsoft.com/, then navigate to SharePoint Admin Centre and login as the Goggle account above.
- Ensure the External Sharing levels are set to 'New and existing guests'.
Refer to Step 2 - Ensure External Sharing is Turned On in Link your Practice's OneDrive Admin Account. - Ensure the SharePoint and OneDrive integration with Azure AD B2B is enabled.
Refer to the following Microsoft help article https://docs.microsoft.com/en-us/sharepoint/sharepoint-azureb2b-integration
Step 2 - Configure Google Project and App Registration
- Open Google Cloud Platform from https://console.developers.google.com/and login using the Google account from Step 1.
- Click Select a project.
- Click New Project.
- Enter the Project name (for example, "Google Federation for FYI").
- Click Create.
- Click OAuth consent screen in the menu on the left-hand side.
- Checkmark External to enable this.
- Click Create.
The App Creation screen displays. - Enter the App name (for example, "Google Federation for FYI").
- Enter an email address for the User support email.
- You can optionally add a logo by clicking Browse for App logo.
Important Note: If an image is uploaded after the app has been published, Google will need to verify it. - In the Authorised domain section, click Add Domain and enter "microsoftonline.com" (without the quotation marks).
- In the Developer contact information section, add an email address.
- Click SAVE AND CONTINUE.
- In the Edit app registration, click ADD OR REMOVE SCOPES.
- Ensure the following Scopes are added:
.../auth/userinfo.email - See your primary Google Account email address
.../auth/userinfo.profile - See your personal info, including any personal info you've made publicly available
openid - Associate you with your personal info on Google - Click UPDATE.
- Click SAVE AND CONTINUE
- If required, click Add Users to test the setup (this is optional at this stage).
Step 3 - Locate Directory Information In Azure
- Open Azure Active Directory from https://portal.azure.com/ and login as an Azure Administrator.
- Click Properties in the menu on the left-hand side.
- Copy the Tenant ID.
Step 4 - Generate OAuth Credentials
- Re-display the Google Cloud Platform from https://console.developers.google.com/ as in Step 2 above.
- Click Credentials in the menu on the left-hand side.
- Click CREATE CREDENTIALS.
- Select OAuth Client ID.
- For the Application Type, select Web Application.
- Enter a Name for the application (for example, "Google Federation for FYI").
- Under Authorised Redirect URIs, click ADD URL
- Add the following:
- https://login.microsoftonline.com
- https://login.microsoftonline.com/te/<directory id>/oauth2/authresp
Replace <directory id> with the Tenant ID from Azure Active Directory
- Click SAVE.
Note: This process may take a few minutes or a few hours for Google to complete the process. - The Client ID and Client Secret display. Copy and save both of these to a safe location to be used in the next Step.
Step 5 - Add Google Federation as an Identity Provider
- Open Azure Active Directory from https://portal.azure.com/ and login as in Step 3 above.
- Click Identity Providers.
- Click Google in the menu at the top.
- Enter the Client ID and Client Secret that was saved in Step 4 above.
- Click Save.
Step 6 - Test the User Experience
- In FYI, share a document via OneDrive with a test client that is set up to use a Google account (refer to Sharing Documents via OneDrive).
or
Invite a test client that is set up to use a Google account to use FYI Collaborate (refer to Sharing the Share Folder with the Client). - After opening the link in the email received by the test client, enter the Gmail account in the Microsoft login screen. Microsoft will redirect this to the accounts.google.com authentication screen.
- Enter the Gmail account for the test client that the document or invite was sent to.
- Enter the password for this account
- Complete the 2-Step Verification code (if applicable).
- Review and accept the permissions as the client. This is for the guest account creation and administration in Azure Active Directory.
- Check that the document or folder that was shared is available to the test client.
Step 7 - Review the Guest Account Creation in Azure
- Open Azure Active Directory from https://portal.azure.com/ and login as in Step 3 above.
- Click Users.
- Search for the guest user account for the test client that the document or folder was shared to.
- Ensure that Identity Issuer shows as "google.com".