Google OAuth clients that request certain sensitive OAuth scopes are subject to verification by Google.
If you don't verify your script project's OAuth client, users outside your domain see an unverified app screen when they try to authorize your script. An unverified authorization flow allows these users to authorize unverified apps and use them, but only after confirming they understand the risks. The total number of unverified app users is also capped.
For more information, see the following articles:
This change applies to Google OAuth web clients, including those used by all Apps Script projects. By verifying your app with Google, you can remove the unverified app screen from your authorization flow and give your users confidence that your app is non-malicious.
Add-ons, web apps, and other deployments (such as apps that use the Apps Script API) may need verification.
If the app uses sensitive OAuth scopes, the unverified app screen may appear as part of the authorization flow. Its presence (and the resulting unverified app authorization flow) depends on what account the app is published from and what account is attempting to use the app. For example, apps published in a specific Google Workspace organization do not result in the unverified app authorization flow for accounts in that domain, even if the app has not been verified.
The following table illustrates what situations result in the unverified app authorization flow:
|Client is verified||Publisher is a Google Workspace account of customer A||Script is in a shared drive of customer A||Publisher is a Gmail account|
|User is a Google Workspace account of customer A||Normal auth flow||Normal auth flow||Normal auth flow||Unverified auth flow|
|User is a Google Workspace account not of customer A||Normal auth flow||Unverified auth flow||Unverified auth flow||Unverified auth flow|
|User is a Gmail account1||Normal auth flow||Unverified auth flow||Unverified auth flow||Unverified auth flow|
1Any Gmail account, including the account used to publish the app.
The number of users who can authorize an app via the unverified app flow is capped to limit possible abuse. See OAuth application user limits for details.
You can request a verification of the OAuth client used by your app and its associated Cloud Platform (GCP) project. Once your app is verified, your users will no longer see the unverified app screen. In addition, your app will no longer be subject to the user cap.
In order to submit your OAuth client for verification, you must satisfy the following requirements:
In addition, you must have the following required assets:
- Application name. The name of the app; this is displayed on the consent screen. It should match the name used for the app in other locations, such as the Google Workspace Marketplace listing for published apps.
- Application logo. A app logo JPEG, PNG, or BMP image to use in the consent screen. Its file size must be 1MB or less.
- Support email. This is an email displayed on the consent screen for users to contact if they need app support. It can be your email address or a Google Group that you own or manage.
- Scopes. The list of all the scopes your app uses. You can view your scopes in the Apps Script editor.
- Application homepage URL. The location of a homepage describing your app. This location must hosted on an authorized domain.
In addition to the above required assets, you can optionally provide an Application terms of service URL that points to a page describing your app's terms of service. If provided, this location must be in an authorized domain.
- In the Apps Script project, at the left, click Overview . Under Project OAuth Scopes, copy all the scopes your script project uses.
This autodetected list doesn't always include scopes used by Apps Script [built-in services](/apps-script/guides/services/). You must enter these scopes manually by clicking the **manually paste** link and then entering the scopes in the resulting checkbox. When you are done selecting or entering scopes, click **Add**.
When you've entered all the required information, click Save.
Click Submit for verification to start a verification request.
Most verification requests receive a response within 24 to 72 hours. You can check the Verification status at the top of the OAuth consent screen form. When verification of your OAuth client is confirmed, your app is verified.