The Google Workspace integration lets users link their personal Google account to Aperium so agents can read and act on their email, files, documents, spreadsheets, and calendar. Setup happens in two places: configure an OAuth client in Google Cloud, then paste the credentials into the Aperium admin onboarding flow or the Admin Console’s MCP Servers tab.Documentation Index
Fetch the complete documentation index at: https://docs.aperium.apps.hillspire.com/llms.txt
Use this file to discover all available pages before exploring further.
What you’ll need
- A Google Cloud project. You can use an existing project or create a new one.
- An admin account that can manage OAuth credentials and APIs in that project.
- Your Aperium deployment URL (for example
https://app.your-company.com).
Setup
Create or select a Google Cloud project
Open the Google Cloud Console and either pick an existing project or create a new one. Every step below applies to this project.
Enable the required Google APIs
From the left panel, open APIs & Services, go to Enabled APIs and services, and click + ENABLE APIS AND SERVICES. Search for and enable each of these:
- Gmail API
- Google Drive API
- Google Docs API
- Google Sheets API
- Google Calendar API
Configure the OAuth consent screen
Under APIs & Services, select the OAuth consent screen tab.
- If your Google Cloud account belongs to a Google Workspace organization and you only need to authorize users in that org, choose Internal for User Type.
- Otherwise, choose External.
- App name (for example
Aperium). - User support email.
- Developer contact email.
Add the OAuth scopes
On the Scopes step of the consent screen, click ADD OR REMOVE SCOPES and add every scope below. These are the scopes Aperium requests at consent time.Identity
openidhttps://www.googleapis.com/auth/userinfo.emailhttps://www.googleapis.com/auth/userinfo.profile
https://www.googleapis.com/auth/gmail.readonlyhttps://www.googleapis.com/auth/gmail.sendhttps://www.googleapis.com/auth/gmail.modify
https://www.googleapis.com/auth/drive.readonlyhttps://www.googleapis.com/auth/drive
https://www.googleapis.com/auth/documents.readonlyhttps://www.googleapis.com/auth/documents
https://www.googleapis.com/auth/spreadsheets.readonlyhttps://www.googleapis.com/auth/spreadsheets
https://www.googleapis.com/auth/calendar.readonly
Add test users (External user type only)
If you chose External in the consent screen step and the app is not yet verified, add a test user entry for every email address that should be allowed to complete the OAuth flow. Without this, only the developer account can connect.Click SAVE AND CONTINUE, review the summary, and click BACK TO DASHBOARD.
Create the OAuth client credentials
Open the Credentials tab and click + CREATE CREDENTIALS then OAuth client ID.
For local development, also add For local development, also add

- Application type: Web application.
- Name: Anything that makes the client easy to find later (for example
Aperium).
http://localhost:3000.Authorized redirect URIs. Add the Aperium OAuth callback path:http://localhost:8080/api/v1/google/auth/callback.Click CREATE. Google shows the Client ID and Client secret. Copy both, or use Download JSON to save the credentials file.Paste the credentials into Aperium
Open Aperium and go to either the admin onboarding flow (first sign-in) or the Admin Console’s MCP Servers tab (any time after). Open the Connect Aperium to Google Workspace form and fill in:
- OAuth Client ID. The client ID from Google Cloud.
- OAuth Client Secret. The client secret from Google Cloud.
- Redirect URI. The same redirect URI you registered in Google Cloud (for example
https://<your-aperium-domain>/api/v1/google/auth/callback).

What users see
After admin setup is complete, users land on the Connect your tools page (during onboarding) or the Integrations page (any time after). They click Link Account on the Google Workspace tile, are redirected to Google’s consent screen, review the scopes Aperium is asking for, and click Allow to finish linking.Going to production
For a production rollout where users outside a Workspace organization need to sign in, submit the OAuth app for Google verification. Restricted scopes such asgmail.modify and drive typically require Google verification before the consent screen will allow non-test users to proceed.