Integration Service
latest
false
Banner background image
Integration Service User Guide
Last updated Mar 25, 2024

Google Docs authentication

Prerequisites

Depending on the authentication type you select, you need one of the following:

  • Your Google email address and the password associated with your Google account.
  • Your application's Client ID and Client secret

If your account is not enabled by Google:

  • Reach out to your administrator for approvals on creating connections.
  • Enable permission by checking the options available to allow creating a connection.

For more information on Google Docs, refer to Google Docs developer documentation.

Permissions

Connecting allows UiPath products to interact with Google Docs data on your behalf. This may include read, write, modify and delete data, depending on your Google Docs permissions. You can always remove any access in your Google Account.

The following scopes are requested by the Connector: openid, https ://www.googleapis.com/auth/userinfo.email, https ://www.googleapis.com/auth/userinfo.profile, https ://www.googleapis.com/auth/drive.

This represents the full list of required scopes. If you bring your own OAuth 2.0 app and select fewer scopes, some activities may not be used.

Add the Google Docs connection

  1. Select Integration Service from Automation Cloud.
  2. From the Connectors list, select Google Docs. You can also use the search bar to find the connector.

  3. Select the Add connection button.
  4. You are now redirected to the connection page. You can choose between two authentication types: OAuth 2.0 Authorization code or Bring your own OAuth 2.0 app.
    • If you select OAuth 2.0 Authorization code, click Connect, then authenticate using your Google email address and password.
    • If you select Bring your own OAuth 2.0 app, you must provide a Client ID and Client secret.
  5. Your connection has been added.

Refresh tokens for OAuth applications

Google has refresh token limitations for individual OAuth 2.0 client IDs. If the limit is reached, creating a new refresh token automatically invalidates the oldest refresh token without warning. This limit does not apply to service accounts (see Using OAuth 2.0 for Server-to-Server Applications). For more information, see Google's official documentation.

A list of reasons which can cause token expiry:
  • You have revoked your app's access.
  • The refresh token has not been used for six months.
  • You need to change passwords and the refresh token contains Gmail scopes.
  • Your account has exceeded a maximum number of granted (live) refresh tokens.
    • If you request a new token after the limit is exceeded, your old connection, based on a previously granted token, will expire. Only the new connection or the latest edited/reauthenticated connection (with the latest token) will work.
  • An admin has set any of the services requested in your application's scopes to Restricted (the error is admin_policy_enforced).
  • For Google Cloud Platform APIs: the session length set by the admin could have been exceeded.
Note: The limit is currently set to 100 refresh tokens per Google account per OAuth 2.0 client ID. This number can be subject to change. For the latest information, always check the Google documentation.

There is a larger limit on the total number of refresh tokens a user account or service account can have across all clients. Regular users won't exceed this limit, but a developer account used to test an implementation might.

To make sure this limit is not exceeded, UiPath offers users the ability to create their own OAuth applications and connect using the Bring your own app authentication type. Make sure to follow the best practices from Google when creating your OAuth application. For details on how to create an OAuth application, see Google's official documentation.

Warning: Token invalidation results in failed connections and automations are unable to run without fixing connections.

Was this page helpful?

Get The Help You Need
Learning RPA - Automation Courses
UiPath Community Forum
Uipath Logo White
Trust and Security
© 2005-2024 UiPath. All rights reserved.