OAuth 기반 앱 플립 연결 (앱 플립)을 사용하면 사용자가 인증 시스템의 계정을 Google 계정에 쉽고 빠르게 연결할 수 있습니다.
사용자가 계정 연결 프로세스를 시작할 때 사용자의 휴대전화에 앱이 설치되어 있으면 앱으로 원활하게 전환되어 사용자 승인을 받습니다.
이 접근 방식은 사용자가 인증하기 위해 사용자 이름과 비밀번호를 다시 입력하지 않아도 되므로 더 빠르고 쉽게 연결할 수 있습니다. 대신 앱 플립은 앱에서 사용자 계정의 사용자 인증 정보를 활용합니다. 사용자가 Google 계정을 앱과 연결하면 개발자가 만든 모든 통합을 활용할 수 있습니다.
iOS 및 Android 앱 모두에 앱 플립을 설정할 수 있습니다.
그림 1. 앱 플립을 사용하여 사용자 휴대전화에서 계정 연결
요구사항
앱 플립을 구현하려면 다음 요구사항을 충족해야 합니다.
Android 또는 iOS 앱이 있어야 합니다.
OAuth 2.0 승인 코드 흐름을 지원하는 OAuth 2.0 서버를 소유, 관리, 유지해야 합니다.
디자인 가이드라인
이 섹션에서는 App Flipping 계정 연결 동의 화면의 디자인 요구사항 및 권장사항을 설명합니다. Google에서 앱을 호출하면 앱이 사용자에게 동의 화면을 표시합니다.
요구사항
사용자의 계정이 Google Home 또는 Google 어시스턴트와 같은 특정 Google 제품에 연결되는 것이 아닌 Google에 연결된다고 안내해야 합니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["필요한 정보가 없음","missingTheInformationINeed","thumb-down"],["너무 복잡함/단계 수가 너무 많음","tooComplicatedTooManySteps","thumb-down"],["오래됨","outOfDate","thumb-down"],["번역 문제","translationIssue","thumb-down"],["샘플/코드 문제","samplesCodeIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-07-25(UTC)"],[[["\u003cp\u003eOAuth-based App Flip Linking simplifies account linking by allowing users to connect their existing app accounts to their Google accounts, streamlining the process and eliminating the need for re-entering credentials.\u003c/p\u003e\n"],["\u003cp\u003eApp Flip requires an Android or iOS app and a managed OAuth 2.0 server that supports the authorization code flow, ensuring secure and authorized access.\u003c/p\u003e\n"],["\u003cp\u003eDesign guidelines for the App Flip consent screen emphasize clear communication, data transparency, user control, and branding, promoting a user-friendly experience.\u003c/p\u003e\n"],["\u003cp\u003eImplementing App Flip involves modifying user authorization code to accept deep links from Google, and detailed guides are available for both Android and iOS app integration.\u003c/p\u003e\n"],["\u003cp\u003eApp Flip can be tested using sample apps and tools before production, allowing developers to simulate the flow and verify functionality; production testing involves using a registered Google Account and verifying linked account states.\u003c/p\u003e\n"]]],[],null,["# Google Account Linking with OAuth-based App Flip\n\nOAuth-based App Flip Linking (App Flip) allows your users to easily and quickly\nlink their accounts in your authentication system to their Google accounts.\nIf your app is installed on your user's phone when they initiate the account\nlinking process, they are seamlessly flipped to your app to obtain user\nauthorization.\n\nThis approach provides a faster and easier linking process since the user does\nnot have to re-enter their username and password to authenticate; instead,\nApp Flip leverages the credentials from the user's account on your app. Once a\nuser has linked their Google account with your app, they can take advantage of\nany integrations that you have developed.\n\nYou can set up App Flip for both iOS and Android apps.\n**Figure 1.** Account linking on a user's phone with App Flip.\n\nRequirements\n------------\n\nTo implement App Flip, you must fulfill the following requirements:\n\n- You must have an Android or iOS app.\n- You must own, manage and maintain an OAuth 2.0 server which supports the OAuth 2.0 authorization code flow.\n\n| **Note:** Confirm that your OAuth2 implementation or provider supports the authorization code flow along with App Flip redirect URLs and client_ids as described in our guides.\n\nDesign guidelines\n-----------------\n\nThis section describes the design requirements and recommendations for the App\nFlip account linking consent screen. After Google calls your app, your app\ndisplays the consent screen to the user.\n\n### Requirements\n\n1. You must communicate that the user's account is being linked to Google, **not** to a specific Google product, such as Google Home or Google Assistant.\n\n### Recommendations\n\nWe recommend that you do the following:\n\n1. **Display Google's Privacy Policy.** Include a link to\n [Google's Privacy Policy](http://policies.google.com)\n on the consent screen.\n\n2. **Data to be shared.** Use clear and concise language to tell the user what\n data of theirs Google requires and why.\n\n3. **Clear call-to-action.** State a clear call-to-action on your consent\n screen, such as \"Agree and link.\" This is because users need to\n understand what data they're required to share with Google to link their\n accounts.\n\n4. **Ability to cancel.** Provide a way for users to go back or cancel, if\n they choose not to link.\n\n5. **Ability to unlink.** Offer a mechanism for users to unlink, such as a\n URL to their account settings on your platform. Alternatively, you can\n include a link to [Google Account](https://myaccount.google.com) where users\n can manage their linked account.\n\n6. **Ability to change user account.** Suggest a method for users to switch\n their account(s). This is especially beneficial if users tend to have\n multiple accounts.\n\n - If a user must close the consent screen to switch accounts, send a recoverable error to Google so the user can sign in to the desired account with *OAuth linking* and the *implicit* flow.\n7. **Include your logo.** Display your company logo on the consent screen.\n Use your style guidelines to place your logo. If you wish\n to also display Google's logo, see\n [Logos and trademarks](https://www.google.com/permissions/logos-trademarks/).\n\n**Figure 2.** Account linking consent screen design guidelines.\n\nImplement App Flip in your native apps\n--------------------------------------\n\nTo implement App Flip, you need to modify the user authorization code in your\napp to accept a deep link from Google.\n\nTo support App Flip on your Android app, follow the instructions on the\n[Android implementation guide](/identity/account-linking/app-flip-android).\n\nTo support App Flip on your iOS app, follow the instructions on the [iOS\nimplementation guide](/identity/account-linking/app-flip-ios).\n\nTest App Flip\n-------------\n\nApp Flip may be simulated using sample and test apps before verified production\napps and a working OAuth 2.0 server are available.\n\nDuring App Flip a Google app will first open your app which then requests an\nauthorization code response from your OAuth 2.0 server, in the final step the\nresponse is returned to the Google app.\n\n### Prerequisites\n\nTo simulate a Google app and trigger the intent which launches your app,\ndownload and install the App Flip Test Tool for\n[Android](https://github.com/googlesamples/identity-appflip-tester-android)\nand\n[iOS](https://github.com/googlesamples/identity-appflip-tester-ios).\n\nDownload and install the App Flip Sample for\n[Android](https://github.com/googlesamples/identity-appflip-android)\nand\n[iOS](https://github.com/googlesamples/identity-appflip-ios)\nTo simulate your app and select an OAuth 2.0 response type.\n\n### Test sequence\n\n1. Open the App Flip Test Tool.\n2. Press `Try Flip!` to launch your App Flip Sample app.\n3. Select a response from the radio buttons in the Sample app.\n4. Press `Send` to return a simulated OAuth 2.0 response back to the Test Tool.\n5. Check the Test Tool log messages for an auth_code or error details.\n\n### Production testing\n\nApp Flip may be tested in production after completing\n[registration](/identity/account-linking/registration) and your OAuth 2.0\nserver implementation.\n\nA single Google Account and a\n[task specific email address](https://support.google.com/a/users/answer/9308648)\nare recommended for automated testing.\n\nAccounts linking state can be viewed using\n[Linked accounts](https://myaccount.google.com/accountlinking) when signed in\nas the Google Account holder.\nAccounts may be unlinked between repeated tests from here as well.\n\nOptionally, you may choose to implement [RISC](/identity/account-linking/unlinking#cross-account_protection_risc)\nto programmatically unlink and notify Google of the change."]]