Fostr’s Google Drive integration links your files and folders directly into workflows where teams collaborate, execute projects, and store critical artifacts. This guide explains how Drive data is accessed within Fostr, the credential and permission requirements for connection, and how file visibility is controlled inside shared workspaces.
Credentials and Authentication Requirements
To enable the Google Drive integration, administrators must configure an OAuth 2.0 client within the Google Cloud Console. This client provides the credentials required for API access, including:
The Google Drive integration typically requires scopes such as:
drive.readonly
for standard file and folder metadatadrive.metadata.readonly
for locating files by name, folder, or propertiesdrive.file
when enabling users to create or manage Drive-linked content from within FostrImportant: Although some OAuth scopes (e.g., drive.readonly) allow broad read-level access, Fostr only interacts with files and folders that a user or administrator has explicitly shared or linked for integration. The integration does not enumerate or ingest the entirety of a user’s Google Drive content.
Credentials are generally provisioned at the tenant level for organizational deployments, allowing access across multiple Shared Drives and user-owned files within the same Google Workspace domain. In some cases, user-level delegation can be added to bring in personal My Drive content for specialized workflows.
Credential Storage and Environment Separation
Once generated, credentials and tokens are securely stored in encrypted form within the Integration record in Fostr. Visibility is limited to platform-level administrators and designated integration managers.
Tokens and secrets are stored per environment, meaning staging, production, and sandbox instances each require separate credential input. Fostr automatically handles token refresh using Google OAuth standards. If tokens expire, are revoked, or rotated by Google Workspace administrators, the integration will return standardized error messages signaling remediation.
Permissions and Role Scope
The level of access granted to Fostr is determined entirely by the scopes and account permissions approved during setup. Typical configurations include:
Organizational consent is generally required for Shared Drive access or domain-wide connectivity. Service accounts or delegated administrative accounts are recommended for large-scale usage, ensuring long-term stability independent of individual user accounts.
Visibility and Data Behavior Inside Fostr