How to allow a third-party application access in Google Workspace.
Error 400: admin_policy_enforced
You may run into Error 400: admin_policy_enforced
when signing in with the CubeBackup Service Account Generator using Google accounts. This can be related to restrictions on Google Cloud Platform access or third-party access in your Google Workspace. You can choose to manually create the CubeBackup service account in Google Cloud Platform, or follow the instructions below to add the CubeBackup Service Account Generator to your trusted app list.
Manage CubeBackup Service Account Generator on your allowlist
Sign in to the Google Admin Console using an administrator account.
From the main menu in the top-left corner, select Security > Access and data control > API controls.
Click MANAGE THIRD-PARTY APP ACCESS in the App access control section.
On the App Access Control page, click Add app > OAuth App Name Or Client ID.
On the Configure an OAuth app page, search for the OAuth app name
CubeBackup Service Account Generator
. You can also copy and paste the following client ID for the CubeBackup Service Account Generator and search for that directly.245460226182-qmvicortr8j8ol2qri0kkb6pik8odipb.apps.googleusercontent.com
Then click Select on the result.
Follow the prompt to tick the checkbox for the OAuth Client ID of the CubeBackup Service Account Generator, then click SELECT.
Configure the user access Scope, then click CONTINUE.
Select Trusted and click CONTINUE.
Finally, review all the information and click FINISH.
Now you return to the CubeBackup Service Account Generator to create a service account. After successfully completing this step, you may, if you wish, remove the CubeBackup Service Account Generator from the allow list for the Google Workspace.