Prerequisites
- A valid enterprise license with the 
GOOGLE_OAUTHfeature enabled. - A Google Cloud Platform account with OAuth 2.0 credentials configured.
 
Benefits
- Faster onboarding: New team members can sign in immediately with their existing Google accounts.
 - Centralized identity: Leverage your organization’s Google Workspace for access control.
 - Reduced password risks: Eliminate the need for separate Convoy passwords.
 - Audit trails: Track sign-ins through Google’s authentication logs.
 
Setup
Step 1: Configure Google Cloud Console
1.1 Create OAuth 2.0 Credentials
- Go to Google Cloud Console
 - Create or select a project
 - Navigate to APIs & Services → Credentials
 - Click Create Credentials → OAuth 2.0 Client IDs
 - Choose Web application
 
1.2 Configure Authorized Origins
Add your production domain:1.3 Configure Redirect URIs
Add your production callback URL:1.4 Copy Your Client ID
Save your Client ID — you’ll need it for Convoy configuration.Step 2: Configure Convoy
Update yourconvoy.json with the Google OAuth settings:
Step 3: Restart Convoy
Restart your Convoy instance to apply the Google OAuth configuration.Step 4: Test the Integration
- Navigate to your Convoy login page
 - Click Sign in with Google
 - Complete the Google OAuth consent flow
 - You should be redirected back to Convoy and signed in
 

Login page with Google SSO
How It Works
When a user signs in with Google:- Convoy redirects to Google’s OAuth consent screen
 - User authenticates with their Google account
 - Google returns an ID token containing user information
 - Convoy validates the token and creates or updates the user record
 - An access token and refresh token are issued for the Convoy session
 
First-Time User Setup
New users signing in with Google OAuth for the first time will be prompted to:- Provide a Business Name for their organization
 - Complete initial setup
 - Access their Convoy dashboard
 

First-time Google SSO setup
API Endpoints
The following endpoints handle Google OAuth flows:POST /ui/auth/google/token- Exchange Google ID token for Convoy sessionPOST /ui/auth/google/setup- Complete first-time user setup
GOOGLE_OAUTH feature.
Security Considerations
Best Practices
- Use HTTPS: Always use HTTPS for OAuth flows
 - Restrict domains: Configure allowed Google Workspace domains to prevent unauthorized sign-ins
 - Scopes: Convoy requests minimal scopes (
openid email profile) - Token validation: ID tokens are validated against Google’s public keys
 - Audit logs: All authentication events are logged
 
License Requirements
Google OAuth requires an active enterprise license with theGOOGLE_OAUTH feature. The authentication flow will be blocked if:
- No valid license is present
 - The license doesn’t include the 
GOOGLE_OAUTHfeature - The 
enabledflag is set tofalsein configuration 
Troubleshooting
Common Issues
”Not a valid origin for the client”
Problem: Google blocks requests from unregistered origins. Solution: Ensure your domain is added to Authorized JavaScript Origins in Google Cloud Console.”Redirect URI mismatch”
Problem: The redirect URI in your configuration doesn’t match Google Console settings. Solution: Verify that theredirect_url in convoy.json exactly matches the URI configured in Google Cloud Console.
”Invalid ID token”
Problem: Token validation failed. Solution:- Check that your Client ID is correct
 - Ensure your server clock is synchronized (token validation is time-sensitive)
 - Verify that the token hasn’t expired
 
Google OAuth button doesn’t appear
Problem: Feature is not enabled or license is missing. Solution:- Verify your license includes the 
GOOGLE_OAUTHfeature - Check that 
google_oauth.enabledis set totruein configuration - Restart Convoy after configuration changes
 
Debug Steps
- Check browser console: Look for JavaScript errors during OAuth flow
 - Check network tab: Verify API calls to 
/ui/auth/google/tokenare successful - Check backend logs: Look for authentication errors or token validation failures
 - Verify configuration: Ensure Google Console and Convoy settings match exactly
 
Multiple Authentication Methods
Convoy supports both email/password and Google OAuth authentication simultaneously. Users can choose their preferred sign-in method:- If a user’s email in Convoy matches their Google account email, they can sign in with either method
 - First-time Google sign-in automatically links the account
 - Both authentication methods remain available unless explicitly disabled
 
Related Features
- Enterprise SSO (SAML) - For SAML-based authentication
 - RBAC - Manage permissions after users sign in
 - Organizations and Projects - Structure your teams
 
Support
For additional help:- Review Google’s Identity Services documentation
 - Check Convoy GitHub issues
 - Contact support at [email protected]