Connecting Google IdP

Prev Next

This article provides step-by-step instructions for deploying imper.ai with Google Workspace.

The deployment enables imper.ai to integrate with Google Workspace as an Identity Provider (IdP) and to protect Google Meet sessions using identity-aware verification.

The process includes:

  • Connecting Google Workspace as an IdP in imper.ai

  • Configuring Domain-Wide Delegation in the Google Admin Console

  • Authorizing required Google API permissions

  • Completing Google Workspace onboarding in imper.ai

Follow the steps in the order listed. This article assumes that all prerequisites have been met and that the deployment sequence has been reviewed.


Prerequisites

Before you begin, ensure that:

  • You have Google Workspace Super Admin privileges

  • You have Admin access to the imper.ai Admin Console

  • Google Workspace is selected as your Identity Provider (IdP)

  • You have access to the imper.ai App (Client) ID provided during onboarding


Deployment Procedure

Step 1: Connect Google Identity Provider (IdP)

  1. Log in to the imper.ai Admin Console using administrator credentials or SSO.

  2. Navigate to Settings > Integrations.

  3. Locate Google Workspace and click Connect. The Google Integration pop-up opens.

    Integration options for imper.ai, featuring Google and Entra connection buttons.

    Note: If the user logging in to the Imper.ai console is not an administrator, you must provide the “Admin Email (Required for Non-Admins)” field and enter the email address of your Google Workspace Administrator.


Step 2: Copy Scopes from imper.ai

  1. In the Google Integration pop-up window, click Copy Scopes.

  2. Keep the scopes copied. You will paste them into the Google Admin Console in a later step.

These scopes define the Google APIs imper.ai is authorized to access.


Step 3: Open the Google Admin Console

You can access the Google Admin Console in one of the following ways:

  • Click the Domain-Wide Delegation link directly from the imper.ai integration pop-up

OR

  • Manually sign in to the Google Admin Console using a Super Admin account


Step 4: Navigate to Domain-Wide Delegation Settings

In the Google Admin Console:

  1. Go to Security.

  2. Select Access and data control.

  3. Click API controls.

  4. Navigate to Domain-wide delegation.

  5. Click Manage Domain-Wide Delegation.

    Admin panel displaying API controls and domain wide delegation settings for Google services.


Step 5: Add a New Client ID

  1. In the Domain-wide delegation page, click Add new.

  2. The Add a new client ID dialog opens.
    API clients section for registering web applications and managing user data access.

    Form to add a new client ID with options for OAuth scopes and overwrite settings.


Step 6: Authorize imper.ai (Domain-Wide Delegation)

  1. In the Client ID field, enter the imper.ai App (Client) ID provided during onboarding.

  2. In the OAuth scopes field, paste the scopes you copied earlier from imper.ai.

  3. Click Authorize (or Save, depending on your console version).

This completes the Domain-Wide Delegation configuration.

Input form for adding a new client ID with OAuth scopes and options.

This is a one-time setup performed by a Google Workspace Super Admin.
It authorizes imper.ai to securely access approved Google APIs on behalf of users in your organization.


Permissions Granted

When connecting Google Workspace as an IdP, imper.ai requests access to specific Google APIs.

These Google Workspace permissions allow imper.ai to retrieve identity and organizational context required for verification and meeting protection.

Permissions Requested From All Monitored Users

googleapis.com/auth/userinfo.email

  • Description: View the user’s email address

  • Used for: Identifying the user and linking their Google account

googleapis.com/auth/userinfo.profile

  • Description: Access basic profile information (name, profile image)

  • Used for: User identification and improved verification experience

googleapis.com/auth/meetings.space.readonly

  • Description: Read-only access to Google Meet spaces

  • Used for: Monitoring active meetings and enabling protection

googleapis.com/auth/meetings.space.created

  • Description: Access to Meet spaces created by the user

  • Used for: Tracking newly created meetings

googleapis.com/auth/calendar.readonly

  • Description: Read-only access to calendar settings and events

  • Used for: Syncing meeting metadata

googleapis.com/auth/calendar.events

  • Description: Access to view, create, and modify calendar events

  • Used for: Creating or updating meetings so they can be monitored


Permissions Requested From Google Workspace Admin Only

googleapis.com/auth/admin.directory.user.readonly

  • Description: Read-only access to users in the organization

  • Used for: Reading directory users to enable monitoring

googleapis.com/auth/admin.reports.audit.readonly

  • Description: Read-only access to Google Workspace audit logs

  • Used for: Monitoring user activity, security events, and compliance

Additional temporary permissions may appear during deployment.

These can be manually removed after the integration is complete.


Integration Status

Once authorization is complete:

  • Google Workspace appears as Connected on the Integrations page in imper.ai

  • The integration becomes immediately available for Google Meet protection

No additional configuration is required at this stage.


What This Enables

After connecting Google Workspace and completing Domain-Wide Delegation, imper.ai can:

  • Distinguish internal vs. external participants

  • Associate meeting participants with organizational context

  • Improve detection of impersonation and social engineering attempts

This connection is a prerequisite for enabling Google Meet protection.


Next Steps: Complete Google Workspace Onboarding

After completing Domain-Wide Delegation:

  1. Return to Admin Console > Integrations in imper.ai.

  2. Complete the remaining onboarding steps, including: