For Google Chat apps built on HTTP endpoints, this section explains how to verify that the requests to your endpoint come from Chat.
To dispatch interaction events to your Chat app's
endpoint, Google makes requests to your service. To verify that the request is
coming from Google, Chat includes a
bearer token
in the Authorization
header of every HTTPS request to your endpoint. For
example:
POST
Host: yourappurl.com
Authorization: Bearer AbCdEf123456
Content-Type: application/json
User-Agent: Google-Dynamite
The string AbCdEf123456
in the preceding example is the bearer authorization
token. This is a cryptographic token produced by Google. The type of the bearer
token and the value of the
audience
field depend on the type of authentication audience you selected when
configuring the Chat app.
If you've implemented your Chat app using Cloud Functions or Cloud Run, Cloud IAM handles token verification automatically. You just need to add the Google Chat service account as an authorized invoker. If your app implements its own HTTP server, you can verify your bearer token using an open source Google API client library:
- Java: https://github.com/google/google-api-java-client
- Python: https://github.com/google/google-api-python-client
- Node.js: https://github.com/google/google-api-nodejs-client
- .NET: https://github.com/google/google-api-dotnet-client
If the token doesn't verify for the Chat app, your
service should respond to the request with an HTTPS response code
401 (Unauthorized)
.
Authenticate requests using Cloud Functions or Cloud Run
If your function logic is implemented using Cloud Functions or Cloud Run, you must select HTTP endpoint URL in the Authentication Audience field of the Chat app connection setting and make sure that the HTTP endpoint URL in the configuration corresponds to the URL of the Cloud Function or Cloud Run endpoint.
Then, you need to authorize the Google Chat service account
[email protected]
as an invoker.
The following steps shows how to use Cloud Functions (1st gen):
Console
After deploying your function to Google Cloud:
In the Google Cloud console, go to the Cloud Functions page:
In the Cloud Functions list, click the checkbox next to the receiving function. (Don't click the function itself.)
Click Permissions at the top of the screen. The Permissions panel opens.
Click Add principal.
In the New principals field, enter
[email protected]
.Select the role Cloud Functions > Cloud Functions Invoker from the Select a role drop-down menu.
Click Save.
gcloud
Use the gcloud functions add-iam-policy-binding
command:
gcloud functions add-iam-policy-binding RECEIVING_FUNCTION \
--member='serviceAccount:[email protected]' \
--role='roles/cloudfunctions.invoker'
Replace RECEIVING_FUNCTION
with the name of your
Chat app's function.
The following steps shows how to use Cloud Functions (2nd gen) or Cloud Run services:
Console
After deploying your function or service to Google Cloud:
In the Google Cloud console, go to the Cloud Run page:
In the Cloud Run services list, click the checkbox next to the receiving function. (Don't click the function itself.)
Click Permissions at the top of the screen. The Permissions panel opens.
Click Add principal.
In the New principals field, enter
[email protected]
.Select the role Cloud Run > Cloud Run Invoker from the Select a role drop-down menu.
Click Save.
gcloud
Use the gcloud functions add-invoker-policy-binding
command:
gcloud functions add-invoker-policy-binding RECEIVING_FUNCTION \
--member='serviceAccount:[email protected]'
Replace RECEIVING_FUNCTION
with the name of your
Chat app's function.
Authenticate HTTP requests with an ID Token
If the Authentication Audience field of the Chat app
connection setting is set to
HTTP endpoint URL,
the bearer authorization token in the request is a Google-signed OpenID Connect
(OIDC) ID token.
The email
field is set to [email protected]
.
The Authentication Audience field is set to the URL you configured
Google Chat to send requests to your Chat app.
For example, if the configured endpoint of your
Chat app is https://example.com/app/
, then the
Authentication Audience field in the ID token ishttps://example.com/app/
.
The following samples show how to verify that the bearer token was issued by Google Chat and targeted at your app using the Google OAuth client library.
Java
Python
Node.js
Authenticate requests with a Project Number JWT
If the Authentication Audience field of the Chat app
connection setting is set to Project
Number
, the bearer authorization token in the request is a self-signed
JSON Web Token (JWT),
issued and signed by [email protected]
.
The audience
field is set to the Google Cloud project number that you used
to build your Chat app. For example, if your
Chat app's Cloud project number is
1234567890
, then the audience
field in the JWT is 1234567890
.
The following samples show how to verify that the bearer token was issued by Google Chat and targeted at your project using the Google OAuth client library.
Java
Python
Node.js
Related topics
- For an overview of authentication and authorization in Google Workspace, see Learn about authentication and authorization.
- For an overview of authentication and authorization in Chat, see Authentication overview.
- Set up authentication and authorization with user credentials or a service account.