Create a Google Cloud Console project and service account

To authorize Coveo to access your Google content, a Google Workspace administrator must perform a Google Workspace (formerly G Suite) domain-wide delegation of authority. Before doing so, however, a Google Workspace domain administrator must create the following:

  1. A Google Cloud Console project for your organization

  2. A service account for the project

The project is required to enable the API keys and the service account is required to enable domain-wide delegation of authority.

Note

If you’re not the Google Workspace domain administrator for your company, contact them so they can perform the steps detailed in this article.

Create a Google Cloud Console project

  1. Access the Google Cloud Console Manage resources page using a Google account with administrator credentials.

  2. On the Manage resources page, click Create Project.

    Click create project | Coveo
  3. Configure the project.

    1. Enter a Project name.

      Note

      The Project ID is automatically created based on the project name and appears under the Project name field. Click Edit to modify the project ID.

    2. Select the Organization in which you want to create the API project for the Coveo source.

    3. Click Create.

      New project configuration | Coveo
  4. On the header, use the search box to search for, and then select, Google Drive API.

  5. On the Google Drive API page, make sure that your project is selected on the header, and then click Enable.

    Enable Google Drive API | Coveo
  6. On the header, use the search box to search for, and then select, Admin SDK API.

  7. On the Admin SDK API page, make sure that your project is selected on the header, and then click Enable.

    Enable Admin SDK API | Coveo
  8. Create a service account for the project.

Create a service account

  1. In the Google Cloud Console, on the header, use the search box to search for, and then select, Service Accounts.

    Service Accounts | Coveo
  2. On the Service Accounts page, make sure that your project is selected on the header, and then click Create Service Account.

  3. On the Create service account page, enter a Service account name and a Service account description.

    Note

    The Service account ID is automatically created from the Service account name.

  4. Click Create and Continue.

    Service account details | Coveo
  5. From the Role dropdown menu, select Service Accounts > Service Account Admin.

  6. Click Continue.

    Service account access to project | Coveo
  7. Grant users or groups access to the selected role, and then click Done.

    Grant user access to role | Coveo
  8. On the Service accounts for project page, click the service account email.

  9. In the Keys tab, click Add Key > Create new key.

  10. Select P12, and then click Create.

    Create a private key | Coveo
    Note

    A private key is automatically downloaded as a Personal Information Exchange (.p12) file in your browser’s download folder. You’ll need the key file to configure your source.

  11. In the Private key saved to your computer dialog box, take note of the Private key password for your records, and then click Close.

    Important

    Don’t change the Private key password.

  12. In the Details tab, take note of the following information:

    • Service account email (required to configure your source)

    • Under Advanced settings, the Client ID that appears under Domain-wide Delegation (required for domain-wide delegation)

What’s next?

To grant the source access to your Google account, you must modify the security parameters.