Google OIDC Configuration
Last updated
Last updated
Log in to the Google Cloud Console at https://console.cloud.google.com/.
At the top of the page, click Select a Project or New Project.
In the left menu (or under Quick access on the page), click on APIs & Services, then OAuth consent screen.
In the User Type section, select Internal.
Fill in Application name and Support email fields, and click Save and Continue.
Add email, profile, and openid.
Click the Create credentials button, and select OAuth client ID.
Fill in the details below and click Create.
Application Type: Web application
Name: [Name of you application]
Authorized redirect URIs: https://pbi.parallels.com/rbi/oidc/signin/callback
and https://pbi.parallels.com/owner/test-idp.
This is the Parallels Browser Isolation redirect URL.
In the dialog that appears, copy the Client ID and Client Secret or download the JSON file.
Once the above steps are completed, copy the values which should mimic the table below, and paste them into the Parallels Browser Isolation IDP configuration section as shown below:
Domain
Ex: acme.com or parallels.com or <yourorgdomain.com>
The domain name should always match the value used in the email or UPN after the "@" symbol. [Ex; login using TestUser@pbi.parallels.com or TestUser@acme.com]
Discovery URL
Copy this value from Google's IDP Settings. It should follow the format specified in the Value Column
Client ID
******************
Copy this value from Google's IDP Settings
Client Secret
******************
Copy this value from Google's IDP Settings
Username Claim Name
For more info visit; https://developers.google.com/identity/openid-connect/openid-connect
Groups Claim Name
groups
For more info visit; https://developers.google.com/identity/openid-connect/openid-connect
Click Save and proceed with adding users using the Admin Management section that was configured in the OIDC.