Introduction
This guide explains how to configure an OpenID Connect (OIDC) federation between Google Workspace / Cloud Identity (Identity Provider) and Wikit IAM (OIDC Broker). Once the configuration is complete, users in your organization will be able to log in to Wikit using their usual Google Workspace username and password.
Prerequisites
- Be a Google Workspace Administrator (or be assisted by the admin).
- Have access to the organization's Google Cloud Console.
- Know:
- Your Google Workspace domain (e.g.,
client.com) - The organization slug provided by Wikit (e.g.,
client) - The Wikit IAM authentication URL:
https://auth.wikit.ai
- Your Google Workspace domain (e.g.,
Google Workspace Side Configuration
Step 1: Create (or select) a Google Cloud Project
- Log in to the Google Cloud Console with an administrator account.
- Select an existing project, or click on New Project.
- Recommended name:
Wikit-SSO-<your_organization>(e.g.,Wikit-SSO-client1).
Step 2: Configure the OAuth Consent Screen
- In the menu, go to: APIs & Services → OAuth consent screen.
- User Type:
- Choose Internal (recommended) to limit access to users within your Google Workspace domain.
- Fill in the required fields:
- App Name:
Wikit - User Support Email
- Developer Contact Information
- App Name:
- Leave the scopes as default (Wikit only uses
openid,email,profile). - Click Save and Continue.
Step 3: Create an OAuth App (OIDC) and Retrieve Credentials
Go to: APIs & Services → Credentials.
Click on Create Credentials → OAuth client ID.
Select:
- Application type: Web application
Fill in:
Name:
Wikit SSOAuthorized redirect URIs: Add exactly the URL provided by Wikit:
[https://auth.wikit.ai/realms/wikit-prod/broker/](https://auth.wikit.ai/realms/wikit-prod/broker/){organization-slug}/endpointExample for client1:
[https://auth.wikit.ai/realms/wikit-prod/broker/client1/endpoint](https://auth.wikit.ai/realms/wikit-prod/broker/client1/endpoint)Important: The URI must be identical character by character. Otherwise, Google will return a
redirect_uri_mismatcherror.
Click Create.
Copy the displayed values:
- Client ID
- Client Secret
Step 4: (Recommended) Restrict Access to Users in Your Domain
To ensure that only accounts from your domain (e.g., @client1.com) can log in:
- Open the Google Admin Console.
- Go to: Security → Access and data control → API controls → Manage Third-Party App Access
- Find the
Wikit SSOapp you just created. - Set the access to Trusted for the relevant Organizational Units or groups.
Information to Send to Wikit
Please send the following items to your Wikit contact:
- Client ID:
... - Client Secret:
... - Google Workspace Domain (e.g.,
client.com) - (Optional) 1–2 test accounts (e.g.,
firstname.lastname@client.com)
Wikit will finalize the configuration (OIDC Identity Provider alias {organization-slug}) and enable the login button.
Connection Test
Once the configuration is complete on the Wikit side:
- Go to the usual Wikit URL.
- Click on Log in with Google Workspace.
- Authenticate with your Workspace account (
firstname.lastname@client1.com). - You are redirected to Wikit and logged in.
Troubleshooting
- Error
redirect_uri_mismatch→ Check that the redirect URI declared in Google is exactly: