Overview

OAuth-based App Flip Linking (App Flip) allows your users to easily and quickly link their accounts in your authentication system to their Google accounts. If your app is installed on your user’s phone when they initiate the account linking process, they are seamlessly flipped to your app to obtain user authorization.

This approach provides a faster and easier linking process since the user does not have to re-enter their username and password to authenticate; instead, App Flip leverages the credentials from the user's account on your app. Once a user has linked their Google account with your app, they can take advantage of any integrations that you have developed.

You can set up App Flip for both iOS and Android apps.

This figure shows the steps for a user to link their Google account
            to your authentication system. The first screenshot shows how a user
            can select your app if their Google account is linked to your app.
            The second screenshot shows the confirmation for linking their
            Google account with your app. The third screenshot shows a
            successfully linked user account in the Google app.
Figure 1. Account linking on a user's phone with App Flip.

Requirements

To implement App Flip, you must fulfill the following requirements:

  • You must have an Android or iOS app.
  • You must own, manage and maintain an OAuth 2.0 server which supports the OAuth 2.0 authorization code flow.

For more information on the OAuth linking authorization code flow, see Implement your OAuth server.

Design guidelines

This section describes the design requirements and recommendations for the App Flip account linking consent screen. After Google calls your app, your app displays the consent screen to the user.

Requirements

  1. You must communicate that the user’s account is being linked to Google, not to a specific Google product, such as Google Home or Google Assistant.

Recommendations

We recommend that you do the following:

  1. Display Google's Privacy Policy. Include a link to Google’s Privacy Policy on the consent screen.

  2. Data to be shared. Use clear and concise language to tell the user what data of theirs Google requires and why.

  3. Clear call-to-action. State a clear call-to-action on your consent screen, such as “Agree and link.” This is because users need to understand what data they're required to share with Google to link their accounts.

  4. Ability to cancel. Provide a way for users to go back or cancel, if they choose not to link.

  5. Ability to unlink. Offer a mechanism for users to unlink, such as a URL to their account settings on your platform. Alternatively, you can include a link to Google Account where users can manage their linked account.

  6. Ability to change user account. Suggest a method for users to switch their account(s). This is especially beneficial if users tend to have multiple accounts.

    • If a user must close the consent screen to switch accounts, send a recoverable error to Google so the user can sign in to the desired account with OAuth linking and the implicit flow.
  7. Include your logo. Display your company logo on the consent screen. Use your style guidelines to place your logo. If you wish to also display Google's logo, see Logos and trademarks.

This figure shows an example consent screen with call-outs to the
            individual requirements and recommendations to be followed when
            you design a user consent screen.
Figure 2. Account linking consent screen design guidelines.

Set up for OAuth-based App Flip

The following sections describe the prerequisites for OAuth-based App Flip and how to configure your App Flip project in the Actions console.

Create an Action and set up an OAuth 2.0 server

Before you can configure App Flip, you need to do the following:

Configure App Flip in the Actions console

The following section describes how to configure App Flip in the Actions console.

  1. Click Develop in the top navigation. Then, click Account linking in the left navigation.
  2. Toggle on the switch next to Account linking.
  3. Under Account creation, select No, I only want to allow account creation on my website.
  4. Click Next.
  5. Under Linking type, select OAuth and Authorization code from the drop-down menus.
  6. Click Next.
  7. Fill out all the fields under OAuth Client information. (If App Flip isn’t supported, regular OAuth is used as a fallback.)
  8. Click Next.
  9. Under Use your app for account linking (optional), check Enable for iOS.
  10. Fill out the Universal Link field. For more information about universal links, see Allowing Apps and Websites to Link to your Content .
  11. If you want to optionally configure your client, add scopes and click Add scope under Configure your client (optional). If not, click Next.
  12. Under Testing instructions, type test (or any other string) as a placeholder. (Filling in this field with a test account is only necessary if you are actually submitting your Action to be published.)
  13. Click Save.

You can now continue to the next section to implement App Flip in your iOS or Android app.

Implement App Flip in your native apps

To implement App Flip, you need to modify the user authorization code in your app to accept a deep link from Google.

Test App Flip on your device

Now that you’ve created an Action and configured App Flip on the console and in your app, you can test App Flip on your mobile device. You can use the Google Assistant app to test App Flip.

To test App Flip from the Assistant app, follow these steps:

  1. Go to the Actions console and select your project.
  2. Click Test in the top navigation.
  3. Trigger the account linking flow from the Assistant app:
    1. Open the Google Assistant app.
    2. Click Settings.
    3. On the Assistant tab, click Home Control.
    4. Click Add(+).
    5. Select your Action from the list of providers. It will be prefixed with “[test]” in the list. When you select your [test] Action from the list, it should open your app.
    6. Verify that your app was launched and begin testing your authorization flow.