![]() ![]() For the Authorized redirect URIs, enter.For the Authorized JavaScript origins, enter.Under Application type, select Web application.Select Credentials in the left menu, and then select Create credentials > Oauth client ID.In the Developer contact information section, enter comma separated emails for Google to notify you about any changes to your project.In the Authorized domains section, enter.In the App domain section, enter a link to your Application home page, a link to your Application privacy policy, and a link to your Application terms of service.In the left menu, select APIs and services and then OAuth consent screen.Select your project by name, then select Open. Make sure you are using the new project by selecting the project drop-down in the top-left of the screen.In the upper-left corner of the page, select the project list, and then select New Project.Sign in to the Google Developers Console with your Google account credentials.If you don't already have a Google account you can sign up at. For more information, see Setting up OAuth 2.0. To enable sign-in for users with a Google account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in Google Developers Console. ![]() Complete the steps in Get started with custom policies in Active Directory B2C. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |