Home > Manage Apps > Manage App Profiles for Google Tenants > Configure Custom Google App Profiles (Recommended)
Export to PDFFor Google tenants, using a default service app may encounter throttling issues caused by Google quota limits. If performance is a concern, consider configuring a custom Google app for your organization. To configure custom Google app profiles, first Create a Custom Google App, then Consent to Custom Google Apps.
*Note: Before you create an app profile, you must ensure that the tenant has been connected to AvePoint Online Services. For more details on connecting tenants, refer to Connect Tenants.
You can refer to the instructions below to create a custom Google app.
Refer to the instructions below to create a new project and enable APIs. Note the following:
Follow the steps below to create a new project:
Go to .
Click the current resource.

Click New project.

Complete the Project name, Organization, and Location fields.
Click Create.
Follow the steps below to enable Google APIs:
Go to the .
Click the current resource to expand the projects list, and then select the project you want to use.
*Note: The user that can enable APIs for a project must be the project owner.

Click Enable APISand services.

The API library page appears.

Search for and enable APIs that are required by your services. Refer to the following links to view required APIs.
Fly
Gmail migration: and
Google Drive migration: and

Click the API that you want to enable, and then click Enable.

To create the service account, first make sure your organization has turned off the policies that disable service account creation. Note the following:
Before creating a service account, make sure the Disable service account creation, Disable service account key creation, and Disable service account key upload policies are turned off. You can refer to the steps below to turn off the policies:
If you are required to have the Organization Policy Administrator role to Manage policy, refer to the instructions below to add the Organization Policy Administrator role:

Go to .
In the resource list, select the organization of the project where you want to create the service account.

Refer to the following instructions based on your scenario:
If you want to add a new principal, click Grant access. In the panel of granting access, enter your account in the New principals field, select the Organization Policy Administrator role from the Role drop-down list, and click Save.

If you want to edit an existing principal, click the Edit principal button next to the principal. In the panel of editing access, click Add another role, select the Organization Policy Administrator role from the Role drop-down list, and click Save.

Go to .
In the resource list, select the project where you create the service account.

From Disable service account creation, Disable service account key creation, and Disable service account key upload policies, click the policy that you want to turn off.

After you click a policy, the policy details page appears, and you can follow the steps below to turn off a policy:
Click Manage policy.
Select Override parent's policy to set a unique policy for this project.

Click Add a rule to add a new rule.

Select Off to disable the enforcement of the new rule, and click Done.

Click Set policy.
Refer to the steps below to create a service account and a client ID:
Go to the .
Navigate to APIs & Services > Credentials.
Click Create credentials and select Service account.

Enter a service account name and a service account ID. Then, click Done.

Click the service account, and then click the Keys tab.
Click Add Key, and then click Create new key.

Select the JSON key type and click Create. The downloaded file contains important information for the configuration in the following steps, and you must store the file securely as it can’t be recovered if lost.

You can refer to the instructions below to configure scopes:
Go to , and then navigate to Security > Access and data control > API controls.
Click MANAGE DOMAIN WIDE DELEGATION.

Click Add new.
Add the client ID and OAuth scopes. After you finish the configuration, click AUTHORIZE.

Note the following:
To get the client ID, you can open the private key file (downloaded when you Create a Service Account), or go to the Credentials page.

The configured scopes should be the same as the scopes added to the app. You can add required permission scopes to a custom Google app by referring to the following sections:
Fly
Gmail migration: and
Google Drive migration: and
*Note: You must add the permission scopes that are exactly required. For example, the https://www.googleapis.com/auth/drive.readonly scope cannot be replaced by the https://www.googleapis.com/auth/drive scope. It is recommended that one custom Google app is configured for one service only.
After you finish configuring scopes for the custom Google app, go to AvePoint Online Services and navigate to Management > App management to create an app profile and consent to the custom Google app. For more details, refer to the Consent to Custom Google Apps section.
Refer to the following instructions to configure app profiles for custom apps and consent to custom apps.
Navigate to Management > App management, and then click Create.
Select services – Select a tenant and select services for which you want to create app profiles. Click Next.
Choose setup method – Select the Custom mode option. Note that the Custom mode option only appears when the selected services support custom apps.
Consent to apps – Refer to the instructions in the following sections to consent to a custom Google app.
App profile name – Enter a name for the profile.
Admin account – Enter the name of the Admin account that has the required privileges/roles. Refer to the table below for the required privileges/roles that vary with different features. For additional details, refer to the Manage Admin Roles and Privileges section below.
| Service | Function/Module | Admin account permissions |
|---|---|---|
| Cloud Backup for Google Workspace | User services protection (including Gmail, Drive, Calendar, Contacts, and Chat) | Admin API privileges: Users > Read |
| Cloud Backup for Google Workspace | Shared drives protection | Admin console privileges: Drive and Docs > Settings |
| Cloud Backup for Google Workspace | Google Vault protection | Admin console privileges:Google Vault > View All MattersGoogle Vault > Manage ExportsGoogle Vault > Manage Holds |
| Cloud Backup for Google Workspace | Google Classroom protection | Super Admin |
| Cloud Backup for Google Workspace | Google Directory protection | Admin console privileges: Security Center > This user has full administrative rights for Security Center > Audit and Investigation > ViewAdmin API privileges:Groups > Create, Read, and UpdateUsers > Create, Read, and Update Custom Attributes |
| Fly | Gmail migration | Admin API privileges:Users > ReadGroups > ReadAdmin console privileges:Calendar > All Settings > Buildings and Resources > Room InsightsReportsMake changes to events permission to the calendar, or assign the Super Admin role to the Admin account. See more details in the Fly user guide. |
| Fly | Google Drive migration | Admin console privileges:Users > ReadDrive and Docs > SettingsReportsContent manager of shared drives See more details in the Fly user guide. |
| Insights | All features for Google Workspace | Super Admin |
| Confidence Platform for Google | Administration | Super Admin |
| Confidence Platform for Google | Governance | Super Admin |
| Confidence Platform for Google | Risk Intelligence | ● Super Admin, or the following privileges:● Admin API privileges:Users > ReadDomain Management● Admin console privileges:Drive and Docs > SettingsReportsData Classification > Manage Labels |
| Confidence Platform for Google | Policy Enforcement | ● Super Admin, or the following privileges:● Admin API privileges:Users > ReadDomain Management● Admin console privileges:Drive and Docs > SettingsReportsData Classification > Manage Labels |
| Confidence Platform for Google | Information management | ● Admin API privilegesUsers > ReadGroup > ReadDomain ManagementReports● Admin console privileges:Drive and Docs > SettingsData Classification > Manage Labels |
| Opus | All features for Google Workspace | Super Admin, or the following privileges assigned to a custom role: Admin API privileges: Users > ReadDomain ManagementAdmin console privileges:Drive and Docs > SettingsReportsData Classification > Manage Labels |
Refer to the instructions below to manage roles and privileges for an Admin account:
*Note: The user must have the Super Admin role to manage roles and privileges.
Go to the Google .
Click Manage in the Users section.
Click the user you want to assign the roles. The user details page appears.
In the Admin roles and privileges section, click the Expand button.
If you want to assign a pre-built role such as Super Admin or User Management Admin to the account, toggle the switch to Assigned in the Assigned state column.

Click SAVE.
If you want to create a custom role with required privileges, click CREATE CUSTOM ROLE.
Click Create new role.

The Create role page appears. Enter a role name and click CONTINUE.

In the Select Privileges section, select required privileges by referring to the Admin account table above.
Click CONTINUE.
Click CREATE ROLE. The custom role is successfully created.
You can assign the custom role to the Admin account.