This section explains how to configure Google as an SSO provider in Localtonet and make it available for your HTTP tunnels.
The setup consists of two main parts:
Creating OAuth credentials in Google Cloud
Adding the Google provider to Localtonet
Before adding Google as an SSO provider in Localtonet, you must create OAuth credentials in Google Cloud.
Go to Google Cloud Console
Create a new project or select an existing one.
Navigate to: APIs & Services → Credentials
Click Create Credentials → OAuth client ID
If prompted, configure the OAuth consent screen:
User Type: External (recommended for most use cases)
Fill in required application details
Add scopes:
openid
email
profile
Create an OAuth Client ID:
Application type: Web application
Authorized redirect URI:
Save the configuration and copy:
Client ID
Client Secret
You will use these values in the next step.
Open the SSO Providers setting in HTTP Tunnel page
Click Add Provider
Fill in the provider details:
Provider Name
Any descriptive name (e.g. Google, Company Google Login)
Provider Type
Select Google
Client ID
Paste the Client ID from Google Cloud
Client Secret
Paste the Client Secret from Google Cloud
The following endpoints are pre-filled automatically for Google and should not be changed unless you have a specific reason:
Authorization Endpoint
https://accounts.google.com/o/oauth2/v2/auth
Token Endpoint
https://oauth2.googleapis.com/token
UserInfo Endpoint
https://openidconnect.googleapis.com/v1/userinfo
Callback Path
/auth/callback/google
(Optional) Configure Allowed Email Domains
Enter one domain per line (e.g. company.com)
Only users with matching email domains will be allowed to authenticate
Toggle Active to enable the provider.
Click Save.

Your Google SSO provider is now available for use.
Adding a provider at account level does not automatically protect tunnels.
You must enable it per tunnel.
Open the HTTP Tunnel Settings for the tunnel you want to protect.
Navigate to SSO Providers → Manage.
Enable SSO for this tunnel.
Toggle Google to enable it for this tunnel.
Configure optional tunnel-level restrictions:
SSO Path(s) – paths that require authentication
Logout Path – logout endpoint for the tunnel
Allowed Domains / Emails / Usernames – additional access restrictions
Click Save Changes.

When a user accesses the tunnel URL:
The request is intercepted by the Localtonet authentication layer.
The user is redirected to Google for authentication.
After successful login, the user is redirected back to the tunnel.
Access is granted only if all provider and tunnel rules are satisfied.
Your local application remains unchanged and does not handle authentication.
Use domain restrictions for internal or company-only tools
Prefer Google SSO over Basic Auth for production environments
You can enable multiple SSO providers for the same tunnel
OAuth credentials can be rotated without affecting tunnel configuration