Parallels Browser Isolation Administrator's Guide
ProductsSupportPartnersDocumentation
  • About Parallels Browser Isolation
  • What's new
  • Parallels Browser Isolation licensing
  • Getting started
    • Activating a license key
    • Configuring an IdP
    • Configuring Parallels Browser Isolation
    • Adding users
    • Adding applications
    • Adding policies
  • Parallels Browser Isolation interface
    • Dashboard
    • Applications
    • Policies
    • Insights
    • User Management
  • Appendix
    • IdP configuration
      • Google OIDC Configuration
      • OKTA OIDC Configuration
      • Auth0 OIDC Configuration
      • Microsoft Entra OIDC Configuration
    • Known Issues
  • Providing feedback
Powered by GitBook

Social media

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube

Other Resources

  • Feedback

© 2025 Parallels International GmbH. All rights reserved.

On this page

Was this helpful?

Export as PDF
  1. Appendix
  2. IdP configuration

Google OIDC Configuration

PreviousIdP configurationNextOKTA OIDC Configuration

Last updated 10 months ago

Was this helpful?

  1. Log in to the Google Cloud Console at .

  2. At the top of the page, click Select a Project or New Project.

  1. In the left menu (or under Quick access on the page), click on APIs & Services, then OAuth consent screen.

  2. In the User Type section, select Internal.

  1. Fill in Application name and Support email fields, and click Save and Continue.

  1. Add email, profile, and openid.

  1. Click the Create credentials button, and select OAuth client ID.

  1. Fill in the details below and click Create. Application Type: Web application Name: [Name of you application] Authorized redirect URIs: https://pbi.parallels.com/rbi/oidc/signin/callback and https://pbi.parallels.com/owner/test-idp. This is the Parallels Browser Isolation redirect URL.

  1. In the dialog that appears, copy the Client ID and Client Secret or download the JSON file.

  2. Once the above steps are completed, copy the values which should mimic the table below, and paste them into the Parallels Browser Isolation IDP configuration section as shown below:

Settings
Value
Details

Domain

Ex: acme.com or parallels.com or <yourorgdomain.com>

The domain name should always match the value used in the email or UPN after the "@" symbol. [Ex; login using TestUser@pbi.parallels.com or TestUser@acme.com]

Discovery URL

Copy this value from Google's IDP Settings. It should follow the format specified in the Value Column

Client ID

******************

Copy this value from Google's IDP Settings

Client Secret

******************

Copy this value from Google's IDP Settings

Username Claim Name

email

Groups Claim Name

groups

  1. Click Save and proceed with adding users using the Admin Management section that was configured in the OIDC.

For more info visit;

For more info visit;

https://accounts.google.com/.well-known/openid-configuration
https://developers.google.com/identity/openid-connect/openid-connect
https://developers.google.com/identity/openid-connect/openid-connect
https://console.cloud.google.com/