Setting Up Modern OAuth Connections for Google Services

16 January 2026
KingswaySoft Team

Setting Up Modern OAuth Connections for Google Services

Whether you are managing files in Google Drive or retrieving reporting data from Google Analytics, or working with any such Google Services, the foundation of your integration begins with secure authentication. While Google's OAuth 2.0 implementation is robust, it requires specific configuration steps to ensure your SSIS packages can run unattended in a production environment. When speaking about this foundation, KingswaySoft offers various Google Service based components as a part of our SSIS Productivity Pack. And we generally offer two main authentication modes: Service Account and Authentication Code. While Service Accounts are designed for server-to-server communication, the Authentication Code flow is often the more accessible and practical choice for SSIS developers. It offers several distinct advantages:

  • User Context: It executes operations as a specific user, ensuring the data you retrieve matches exactly what that user sees in the browser.
  • Versatility: Unlike Service Accounts, which are strictly for Workspace domains, this flow works seamlessly with both corporate accounts and personal @gmail.com addresses.
  • Ease of Setup: It allows you to authenticate without needing Admin intervention or complex Domain-Wide Delegation.

This guide serves as a general blueprint for the Authentication Code flow. By setting this up correctly once, you can reuse the same project and credentials across virtually any KingswaySoft Google services component.

Step 1: Create a New Project

The first step begins in the Google Cloud Console. You will need to create a dedicated project for your integration's credentials and API usage.

Log in to the Google Cloud Console, and open the project picker (or press CTRL + O). Click the New Project button to begin.

Google Cloud project selector icon

Google Cloud project selector with the New Project button highlighted.

Give your project a meaningful name (e.g., KingswaySoft-SSIS-Integration) and select the appropriate parent organization or folder.

Google Cloud New Project screen: Project name, ID, and organization settings.

Note on Organization: If you do not have a parent organization assigned, or if you select "No Organization", it will impact your choices in the next step.

Step 2: Initialize the Google Auth Platform

Once your project is created, you must configure the "OAuth consent screen". This is the interface that users will see when authorizing the application to access data.

Google Cloud OAuth consent screen settings for APIs & Services.

Navigate to APIs & Services > OAuth consent screen and select Get Started.

Google Auth Platform not configured. Get started button.

Fill in the required fields, specifically the App name and User support email.

OAuth App configuration screen showing App Name and Support Email fields.

Audience Choice: Internal vs. External

This is a key technical decision point that determines who can authorize the connection:

  • Internal: The preferred choice for Google Workspace users. This restricts access to users within your specific domain. Note that this option is only available if your Google Cloud project is associated with a Workspace Organization resource.
  • External: Select this if you are using a personal @gmail.com account, or if the "Internal" option is unavailable because your project was created with "No Organization" assigned.

Project configuration screen showing Internal vs External audience selection.

Next, enter your contact info. Google will use this email address to notify you about any changes to your project.

Project configuration screen showing Contact Information field

Finally, you will be asked to agree to the "Google API Services: User Data Policy" in order to continue.

Project configuration screen showing Finish checkbox.

Step 3: Enable the Target APIs

Before you can establish a connection, you must explicitly tell Google which services this project is allowed to access.

Go to the API Library, search for the specific API you intend to use, and click Enable. Note that our example is for Google Drive API, and you may enable it for other APIs based on your requirements.

Google Drive API interface with enable and try this API buttons.

Step 4: Generate the OAuth Credentials

With the platform configured and APIs enabled, you can now generate the keys required for the handshake between the connection manager and the Google services.

Navigate to the Credentials tab, click Create Credentials, and select OAuth client ID.

Google Cloud Credentials showing options to create an API key, OAuth client ID, or Service account.

Application Type & Redirect URI

Select Web application as the application type. This is a critical step for ensuring the Connection Manager can receive the authentication code properly.

Creating a Google OAuth client ID for web application authentication.

Under Authorized redirect URIs, you must enter a valid, static HTTPS URL that does not redirect. We typically use our landing page URL (e.g., https://www.kingswaysoft.com), though any URL that fits the listed requirements will work.

Google Cloud Platform Authorized redirect URIs with URL https://kingswaysoft.com

Note: This specific URI acts as the default listener for our components. If this does not match exactly in your configuration, the authentication flow will fail to pass the authorization code back to the component.

Once created, you will receive your Client ID and Client Secret. Be sure to store these values securely.

OAuth client created screen displaying Client ID and Client Secret.

Step 5: Configure the Connection Manager

Now that the Google side is ready, return to Visual Studio and open the specific Connection Manager for the service you are using. In our example, we will be working with the Google BigQuery connection manager, but it can be replaced with any other Google Services, such as Google Drive, Google Analytics, Google Ads, etc. 

  1. Set the Authentication Mode to Authorization Code (if applicable).

  2. Click the Generate Token File button.

Google BigQuery Connection Manager interface showing authentication settings.

  1. Select My Own App as the App Type.

  2. Paste in your Client ID, Client Secret, and Redirect URI.

OAuth Configuration dialog showing 'My Own App' setup with fields for credentials and API scopes.

  1. Click Sign In & Authorize.

This will launch a browser window. Once you authorize the app, the browser will redirect to your configured redirect URI with a code. When the Use Default Browser to Sign In option is not checked/used, the Connection Manager will automatically detect this code and complete the token generation.

Browser address bar showing the redirect URL with the generated authorization code parameter.

Step 6: Token Management & Deployment

To ensure your SSIS package can run on a schedule without requiring manual re-authentication, you must manage the token file.

In the Connection Manager, specify a local Token File Path to save the .token file and set a Password.

  • The Token File: This file stores the refresh token, allowing the component to automatically renew access.

Google BigQuery Connection Manager configured with Authorization Code and a local token file path.

Note: Token refreshes are automatically handled by the component. And due to that, when deploying to a server, ensure that the user account running the job has full Read/Write permissions to this token file so that when a refresh occurs, the ETL process can properly save the updated token file.

Conclusion: The Universal Advantage

By following this blueprint, you now have a production-ready authentication setup.

One of the greatest advantages of this approach is reusability. If you initially set this up for Google Drive but later need to connect to any other Google service, you do not need to create a new project. Simply enable the required API in the console, create a new Connection Manager in Visual Studio, and reuse your existing Client ID and Client Secret. This modular approach keeps your integration environment clean, organized, and easy to manage.

Archive

January 2026 1 December 2025 2 November 2025 2 October 2025 2 September 2025 2 August 2025 2 July 2025 2 June 2025 1 May 2025 2 April 2025 3 March 2025 1 February 2025 1 January 2025 2 December 2024 1 November 2024 3 October 2024 1 September 2024 1 August 2024 2 July 2024 1 June 2024 1 May 2024 1 April 2024 2 March 2024 2 February 2024 2 January 2024 2 December 2023 1 November 2023 1 October 2023 2 August 2023 1 July 2023 2 June 2023 1 May 2023 2 April 2023 1 March 2023 1 February 2023 1 January 2023 2 December 2022 1 November 2022 2 October 2022 2 September 2022 2 August 2022 2 July 2022 3 June 2022 2 May 2022 2 April 2022 3 March 2022 2 February 2022 1 January 2022 2 December 2021 1 October 2021 1 September 2021 2 August 2021 2 July 2021 2 June 2021 1 May 2021 1 April 2021 2 March 2021 2 February 2021 2 January 2021 2 December 2020 2 November 2020 4 October 2020 1 September 2020 3 August 2020 2 July 2020 1 June 2020 2 May 2020 1 April 2020 1 March 2020 1 February 2020 1 January 2020 1 December 2019 1 November 2019 1 October 2019 1 May 2019 1 February 2019 1 December 2018 2 November 2018 1 October 2018 4 September 2018 1 August 2018 1 July 2018 1 June 2018 3 April 2018 3 March 2018 3 February 2018 3 January 2018 2 December 2017 1 April 2017 1 March 2017 7 December 2016 1 November 2016 2 October 2016 1 September 2016 4 August 2016 1 June 2016 1 May 2016 3 April 2016 1 August 2015 1 April 2015 10 August 2014 1 July 2014 1 June 2014 2 May 2014 2 February 2014 1 January 2014 2 October 2013 1 September 2013 2 August 2013 2 June 2013 5 May 2013 2 March 2013 1 February 2013 1 January 2013 1 December 2012 2 November 2012 2 September 2012 2 July 2012 1 May 2012 3 April 2012 2 March 2012 2 January 2012 1

Tags