Support has now ended for Legacy Collaborate.
To upgrade to New Collaborate, refer to Upgrading to New Collaborate.
Overview
Currently, when a document is shared via Collaborate, or a Collaboration invite to the Share Folder, is sent to a client's Gmail account, the recipient will receive a SharePoint code that is commonly delivered to their Junk/Trash email folder. There can also be a delay before the code arrives.
To overcome this, Google Federation can be enabled in Microsoft Entra.
External users are then able to access the shared content with your practice using their existing Gmail account ID and password. This provides clients with faster access to any shared documents or to the shared folders. If a client is already logged into Google, they won't need to enter a password.
Steps 1 to 5 in this article are based on the following article https://www.anupams.net/enable-google-federation-external-sharepoint/.
Step 1 - Prerequisites
Google Account
You will need to either create or select a Google account that can be used to enable Google Federation. This will be required in Step 2.
Configure SharePoint Admin Center settings
- Open the SharePoint Admin Center with a Microsoft 365 admin account by navigating to https://admin.microsoft.com
- On the menu on the left, click Show All.
- Click SharePoint to open the SharePoint admin center.
- Expand Policies and click Sharing.
- Ensure the External Sharing levels are set to 'New and existing guests'.
- Click Save.
Enable Entra ID B2B
Ensure the SharePoint and OneDrive integration with Entra ID B2B is enabled.
Step 2 - Configure Google Project and App Registration
- Open the Google Cloud Platform from https://console.developers.google.com/and log in using the Google account from Step 1.
- Click Select a project.
- Click New Project.
- Enter the Project name (for example, "Google Federation for FYI").
- Click Create.
- Click the OAuth consent screen in the menu on the left-hand side.
- Checkmark External to enable this.
- Click Create.
The App Creation screen displays. - Enter the App name (for example, "Google Federation for FYI").
- Enter an email address for the User support email.
- You can optionally add a logo by clicking Browse for App logo.
Important Note: If an image is uploaded after the app has been published, Google will need to verify it. - In the Authorised domain section, click Add Domain and enter "microsoftonline.com" (without quotation marks).
- In the Developer contact information section, add an email address.
- Click SAVE AND CONTINUE.
- In the Edit app registration, click ADD OR REMOVE SCOPES.
- Ensure the following Scopes are added:
.../auth/userinfo.email - See your primary Google Account email address
.../auth/userinfo.profile - See your personal info, including any personal info you've made publicly available
openid - Associate you with your personal info on Google
- Click UPDATE.
- Click SAVE AND CONTINUE
- If required, click Add Users to test the setup (this is optional at this stage).
Step 3 - Locate Directory Information In Entra
- Open Azure Active Directory from https://portal.azure.com/ and log in as an Azure Administrator.
- Click Properties in the menu on the left-hand side.
- Copy the Tenant ID.
Step 4 - Generate OAuth Credentials
- Re-display the Google Cloud Platform from https://console.developers.google.com/ as in Step 2 above.
- Click Credentials in the menu on the left-hand side.
- Click CREATE CREDENTIALS.
- Select OAuth Client ID.
- For the Application Type, select Web Application.
- Enter a Name for the application (for example, "Google Federation for FYI").
- Under Authorised Redirect URIs, click ADD URL
- Add the following:
- https://login.microsoftonline.com
- https://login.microsoftonline.com/te/<directory id>/oauth2/authresp
Replace <directory id> with the Tenant ID from Azure Active Directory
- Click SAVE.
Note: This process may take a few minutes or a few hours for Google to complete the process.
- The Client ID and Client Secret display. Copy and save both of these to a safe location to be used in the next Step.
Step 5 - Add Google Federation as an Identity Provider
- Open Azure Active Directory from https://portal.azure.com/ and log in as in Step 3 above.
- Click Identity Providers.
- Click Google in the menu at the top.
- Enter the Client ID and Client Secret that was saved in Step 4 above.
- Click Save.
Step 6 - Test the User Experience
- In FYI, share a document via Collaborate with a test client that is set up to use a Google account (refer to Sharing Documents via Collaborate).
or
Invite a test client that is set up to use a Google account to use FYI Collaborate (refer to Sharing the Share Folder with the Client).
- After opening the link in the email received by the test client, enter the Gmail account in the Microsoft login screen. Microsoft will redirect this to the accounts.google.com authentication screen.
- Enter the Gmail account of the test client the document or invite was sent to.
- Enter the password for this account
- Complete the 2-Step Verification code (if applicable).
- Review and accept the permissions as the client. This is for the guest account creation and administration in Azure Active Directory.
- Check that the document or folder that was shared is available to the test client.
Step 7 - Review the Guest Account Creation in Azure
- Open Azure Active Directory from https://portal.azure.com/ and log in as in Step 3 above.
- Click Users.
- Search for the guest user account for the test client that the document or folder was shared to.
- Ensure that Identity Issuer shows as "google.com".