Create a Google API Console Project

To authorize Coveo to access your Google content, you must perform a G Suite domain-wide delegation of authority. Before doing so, you must first create a Google API Console project and then create a service account within the project. The project is required to enable the API keys and the service account is required to enable the domain-wide delegation of authority.

Create a Google API Console Project

  1. Go to the Google Developers Console, and log in using a Google Account with administrator credentials.

  2. Click Filter, and then select the organization in which you want to create the API project for the Coveo Cloud source.

  3. In the Manage resources panel, click Create Project.

  4. On the New Project page, enter the Project Name.

    The Project ID is automatically created based on the project name. You can always modify it by clicking Edit.

  5. Click Create.

  6. Click the Google APIs logo at the top of the page, and then click Library in the left menu.

  7. On the API Library page, use the search box to search and select Google Drive API.

  8. On the API page, click Enable.

  9. Return to the API Library page and repeat steps 7 to 9 to enable Admin SDK.

    If you selected an existing Google Developer Console project, you can skip the rest of this procedure and authorize the Coveo Cloud source to access your Google Apps for Work.

Create a Service Account

  1. In the left sidebar, select Credentials.

  2. Click Create Credentials, and then from the drop-down menu, select Service account.

  3. On the Create service account page, enter the Service account name and the Service account description.

    The Service account ID is automatically created from the Service account name.

  4. Click Create.

  5. On the Service account permissions page, click the Role drop-down menu, and then select Service Accounts, and then Service Account Admin.

  6. Click Continue.

  7. Enter the users or groups for the selected role, and then click Done.

  8. Create the Key ID.

  9. On the Service accounts for project page, click the project row.

  10. On the Service account details page, click Add Key, followed by Create new key.

  11. Select P12, and then click Create.

    A private key is automatically downloaded as a Personal Information Exchange (.p12) file in your browser’s download folder.

  12. In the Private key saved to your computer dialog box, take note of the Private key password, and then click Close.

  13. Enable G Suite domain-wide delegation:

    • Under Service account status, click Show Domain-Wide Delegation.

    • Click Enable G Suite Domain-Wide Delegation.

    • In Product name for the consent screen, enter the product name (e.g., Coveo Cloud) that will appear when the application requests read access to the users’ data.

    • Click Save.

  14. Take note of the client ID and email address:

    • In the IAM & Admin menu, select Service Accounts.

    • In the service account row that you just created, in the Options column of the account row, click View Client ID.

    • On the Client ID Service account client page, take note of the Client ID and the email address located under the Service Account name. You’ll need this information later to configure your source.

What’s Next?

To grant the source access to your Google account, you must modify the security parameters.

Recommended Articles