Collegamento dell'Account Google con App Flip basata su OAuth

OAuth-based App Flip Linking (App Flip) allows your users to quickly link their accounts in your authentication system to their Google Accounts. If your app is installed on your user's phone when they initiate the account linking process, they are seamlessly flipped to your app to obtain user authorization.

This approach provides a faster linking process since the user does not have to re-enter their username and password to authenticate; instead, App Flip leverages the credentials from the user's account on your app. Once a user has linked their Google Account with your app, they can take advantage of any integrations that you have developed.

You can set up App Flip for both iOS and Android apps.

This figure shows the steps for a user to link their Google account
            to your authentication system. The first screenshot shows how a user
            can select your app if their Google account is linked to your app.
            The second screenshot shows the confirmation for linking their
            Google account with your app. The third screenshot shows a
            successfully linked user account in the Google app.
Figure 1. Account linking on a user's phone with App Flip.

Requirements

To implement App Flip, you must fulfill the following requirements:

  • You must have an Android or iOS app.
  • You must own, manage and maintain an OAuth 2.0 server which supports the OAuth 2.0 authorization code flow.

OAuth-based App Flip Flow

The following sequence diagram details the interaction between the User, Google App, Your App, and Your Authorization Server for App Flip.

User Google App Your App Google Server Your Auth Server 1. Initiates linking 2. Deep link to Your App 3. Show Consent Screen 4. User Grants Consent 5. Get Auth Code 6. authorization_code 7. Return to Google App 8. Pass code to Google Server 9. Token Exchange (POST) 10. access_token, refresh_token 11. Store user tokens 12. Access user resources
Figure 2. The sequence of events in the App Flip flow. If an authorization code is provided, the token exchange happens server-to-server, the same way it does in the browser-based OAuth linking flow.

Roles and responsibilities

The following table defines the roles and responsibilities of the actors in the App Flip flow.

Actor / Component GAL Role Responsibilities
Google App / Server OAuth Client Initiates the linking process, triggers a deep link to your mobile app, exchanges the authorization code for tokens, and securely stores them to access your service's APIs.
Your App Authorization Agent Authenticates the user (typically using existing app credentials), obtains consent, and retrieves an authorization code from your server.
Your Authorization Server Authorization Server Validates authorization codes and refresh tokens, and issues access tokens to the Google Server.

Design guidelines

This section describes the design requirements and recommendations for the App Flip account linking consent screen. After Google calls your app, your app displays the consent screen to the user.

Requirements

  1. You must communicate that the user’s account is being linked to Google, not to a specific Google product, such as Google Home or Google Assistant.

Recommendations

We recommend that you do the following:

  1. Display Google's Privacy Policy. Include a link to Google’s Privacy Policy on the consent screen.

  2. Data to be shared. Use clear and concise language to tell the user what data of theirs Google requires and why.

  3. Clear call-to-action. State a clear call-to-action on your consent screen, such as “Agree and link.” This is because users need to understand what data they're required to share with Google to link their accounts.

  4. Ability to deny or cancel. Provide a way for users to go back, deny, or cancel, if they choose not to link.

  5. Ability to unlink. Offer a mechanism for users to unlink, such as a URL to their account settings on your platform. Alternatively, you can include a link to Google Account where users can manage their linked account.

  6. Ability to change user account. Suggest a method for users to switch their account(s). This is especially beneficial if users tend to have multiple accounts.

    • If a user must close the consent screen to switch accounts, send a recoverable error to Google so the user can sign in to the desired account with OAuth linking and the implicit flow.
  7. Include your logo. Display your company logo on the consent screen. Use your style guidelines to place your logo. If you wish to also display Google's logo, see Logos and trademarks.

This figure shows an example consent screen with call-outs to the
            individual requirements and recommendations to be followed when
            you design a user consent screen.
Figure 2. Account linking consent screen design guidelines.

Implementare il passaggio di app nelle app native

Per implementare il passaggio di app, devi modificare il codice di autorizzazione utente nella tua app in modo che accetti un link diretto da Google.

Per supportare la funzionalità App Flip nella tua app per Android, segui le istruzioni riportate nella guida all'implementazione per Android.

Per supportare la funzionalità App Flip nella tua app per iOS, segui le istruzioni riportate nella guida all'implementazione per iOS.

Testa il passaggio da un'app all'altra

Il trasferimento dell'app può essere simulato utilizzando app di esempio e di test prima che siano disponibili app di produzione verificate e un server OAuth 2.0 funzionante.

Durante App Flip, un'app Google apre innanzitutto la tua app che richiede poi una risposta del codice di autorizzazione al tuo server OAuth 2.0. Nel passaggio finale la risposta viene restituita all'app Google.

Prerequisiti

Per simulare un'app Google e attivare l'intent che avvia l'app, scarica e installa l'App Flip Test Tool per Android e iOS.

Scarica e installa l'esempio di App Flip per Android e iOS per simulare la tua app e selezionare un tipo di risposta OAuth 2.0.

Sequenza di test

  1. Apri lo strumento di test di rotazione dell'app.
  2. Premi Try Flip! per avviare l'app App Flip Sample.
  3. Seleziona una risposta dai pulsanti di opzione nell'app Sample.
  4. Premi Send per restituire allo strumento di test una risposta OAuth 2.0 simulata.
  5. Controlla i messaggi di log dello strumento di test per verificare la presenza di auth_code o dettagli errore.

Test di produzione

La funzionalità App Flip può essere testata in produzione dopo aver completato la registrazione e l'implementazione del server OAuth 2.0.

Per i test automatici, ti consigliamo di utilizzare un solo Account Google e un indirizzo email specifico per l'attività.

Lo stato del collegamento degli account può essere visualizzato utilizzando Account collegati dopo aver eseguito l'accesso come proprietario dell'Account Google. Anche da qui è possibile scollegare gli account tra test ripetuti.

Se vuoi, puoi scegliere di implementare RISC per scollegare ed eseguire la notifica della modifica a Google in modo programmatico.