Account Login Email ID: Enter the Account Login Email ID to connect to the mailboxes. It has two options:
Service Account Email - Enter the Google Service Account Email. The steps to create a service account are given below.
P 12 File Path - Provide the P 12 Key File path for the service account. The steps to create and save a P 12 Key for a service account are given below.
JSON Key - It is another encrypted key useful in accessing G Suite account during restore process. The steps to create and utilize a JSON key are given below.
Step 1: Type the URL https://console.cloud.google.com/
Step 2: Go to your domain and select an existing project, or create a new project. (In the Google cloud platform, go to APIs and services, and click Enable APIs and Services. In the API Library, Please search and enable required API, Gmail API, Admin SDK API, Google Drive API, Contacts API, Google People API, Google Calendar API, Google Chat API.)
Step 3: Go to APIs & Services, then choose Credentials.
Step 4: In the new window, click Create Credentials.
Step 5: In the drop-down, choose Service account.
Step 6: Enter the name of the new Service account. The Service Account ID will be filled automatically as per your given name. Click Create.
Step 7: To Provide a Role to the Service account, you can choose Project and select the role, for example, Owner.
Step 8: Click Continue. A new Service Account has been created. Now double click on the service account.
Step 1: Type https://admin.google.com/ac/home in the web browser. After opening the Admin Console, click Security It will open several categories where you should open Access and data control and select APIs controls there.
Step 2: In the App Access Control page, click Manage domain-wide delegation option under Domain-wide delegation.
Step 3: Click Add New.
Step 4: Input the Unique ID of the Service account, and in the OAuth scopes, you need to input the URL of scopes are given below.
https://mail.google.com
https://www.googleapis.com/auth/contacts.readonly
https://www.googleapis.com/auth/calendar.events.readonly
https://www.googleapis.com/auth/calendar.events
https://www.googleapis.com/auth/admin.directory.user.readonly
https://www.googleapis.com/auth/admin.directory.user
https://www.googleapis.com/auth/calendar
https://www.googleapis.com/auth/contacts
https://www.googleapis.com/auth/admin.directory.userschema.readonly
https://www.googleapis.com/auth/admin.directory.rolemanagement.readonly
https://www.googleapis.com/auth/calendar.readonly
https://www.googleapis.com/auth/calendar.settings.readonly
https://www.googleapis.com/auth/gmail.readonly
https://www.googleapis.com/auth/admin.directory.group.readonly
https://www.googleapis.com/auth/drive.readonly
https://www.googleapis.com/auth/drive.metadata.readonly
https://www.googleapis.com/auth/drive
https://www.googleapis.com/auth/drive.file
https://www.googleapis.com/auth/userinfo.profile
https://www.googleapis.com/auth/gmail.labels
https://www.googleapis.com/auth/gmail.settings.basic
https://www.googleapis.com/auth/tasks
https://www.googleapis.com/auth/ediscovery.readonly
Step 5: You can add above multiple Google APIs in the list. Click Authorize.
Step 1: Go to the same Service Accounts again and edit or double click.
Step 2: Go to the Keys section and click ADD KEY.
Step 3: Choose to Create new key.
Step 4: Choose P12 and click Create.
Step 5: A message will appear to show that the Private key is saved to your computer.
Step 6: On your computer, you can find the newly downloaded key. And add the same P12 File path in the tool.
Step 1: Go to the service account and double-click on it or choose edit. Under key tab, choose ADD KEY, then select Create new key.
Step 2: Choose JSON key as the recommended key format. Then, click Create.
Step 3: Select the folder to save JSON key and click Save for saving the key.
Step 4: In the tool’s login page, browse the JSON file through its location. Then, you go ahead in the restore procedure.
Super Admin Email Address - Enter the Google Workspace Super Admin Email Address to connect with the application.
Service Account Email Address - Enter Google Service Account Email Address. The steps to create a Service Account are given below.
Private Key Path(.P12) - Enter the P12 key's file path with Service Account. The steps to create and save a P12 key for a Service Account are given below.
Create the Service Account in Google Workspace
Step 1- Click on the given link to open Google Cloud Platform Console in web browser - https://www.console.cloud.google.com
Step 2- Login as the Super Administrator and under the Quick Access section on the home screen click on IAM and admin.
Step 3- Now under the IAM and admin page, click on Manage resources.
Then, click on CREATE PROJECT option.
Step 4- Type a unique project name and leave other details to default. Then, click CREATE button. You will be notified when the project is created.
Step 5- Again, click on Navigation menu, then choose Cloud Overview and select Dashboard.
Step 6- Click on the dropdown beside Google cloud logo above title bar to check if the created project is selected or not.
If the newly created project is not selected select it from the dropdown menu.
Step 7- Now, go to the Navigation menu and click on VIEW ALL PRODUCTS.
Then, under the Management section, click on APIs and services.
Step 8- On the APIs and services, go to OAuth consent screen and choose External option as the User Type and click CREATE.
Step 9- Under the Edit app registration page, provide required application details. Start by providing the App name and an email address as the User support email.
Note: Under the App logo section, you can upload logo file if you have one or can ignore this step and can leave App domain section as default.
Step 10- Click on ADD DOMAIN under Authorized domains. Enter the name of your domain and under Developer Contact Information, input the email address so Google can inform you about all the changes in your project. Then, click SAVE AND CONTINUE.
TIP: Note down the App name for future references.
Step 11- Now, you must add all scopes as per Kernel Google Chat to Microsoft Team Chat Migration Tool. So, click on ADD OR REMOVE SCOPES.
Step 12- Under Manually add scopes, you must input all the following scopes manually.
https://www.googleapis.com/auth/chat.spaces,
https://www.googleapis.com/auth/chat.messages,
https://www.googleapis.com/auth/chat.memberships,
https://www.googleapis.com/auth/chat.messages.reactions,
https://www.googleapis.com/auth/admin.directory.user,
https://www.googleapis.com/auth/drive,
https://www.googleapis.com/auth/drive.file,
https://www.googleapis.com/auth/documents
Step 13- Then, click ADD TO TABLE >> UPDATE.
Step 14- After adding all the scopes, click SAVE.
Step 15- Now again, go to Navigation menu>VIEW All PRODUCTS>APIs & Services.
Step 16- Beside APIs & Services, click on + ENABLE APIS AND SERVICES option.
Step 17- In the API Library, search and enable all the required APIs.
Note: After enabling one API you might need to go back manually to + Enable APIs & Services page to add enable another API.
Step 18- Now, enable these APIs one by one - Admin SDK API, Google Drive API, and Google Chat API.
After enabling Google Chat API, on the same page, go to CONFIGURATION tab.
Step 19- Under Application info, enter App name (Which user created in OAuth consent screen), Avatar URL - https://localhost and input proper Description.
Step 20- In Connection settings, Choose App URL, and enter App URL - https://localhost.
Step 21- In Visibility, enter email addresses to add individuals and groups in your domain. Separate multiples with commas. It may take up to 24 hours for group access changes to take effect.
Step 22- In Logs, Check Log errors to Logging checkbox, and click SAVE.
Step 23- After enabling APIs and Configuring Google Chat API, go to Credentials.
Step 24- In the new window, click on + Create Credentials and select Service account.
Step 25- Input a new name of the Service Account. The Service Account ID section will be filled automatically as per your given name. Click Create.
Step 26- You can provide access on the 2-step or also ignore the step and click on CONTINUE. On the 3rd step, again click on CONTINUE, and then, click on Done.
Step 27- The new service account email address is created in the Service Account list. Click on it.
Step 28- Copy the Service Account Email address and the Unique ID and keep them in a safe location.
Assign Domain Wide Delegation to Service Account
Domain Wide Delegation provides the necessary scopes to the newly created Service Account.
Step 1- Type https://admin.google.com/ac/home in the web browser and login using Super Administrator credentials. After opening the Admin Console, click Security>>Access and data control>>API controls.
Step 2- In the App Access control page, click MANAGE DOMAIN-WIDE DELEGATION option under Domain-wide delegation.
Step 3- Click on the Add New option.
https://www.googleapis.com/auth/chat.spaces,
https://www.googleapis.com/auth/chat.messages,
https://www.googleapis.com/auth/chat.memberships,
https://www.googleapis.com/auth/chat.messages.reactions,
https://www.googleapis.com/auth/admin.directory.user,
https://www.googleapis.com/auth/drive,
https://www.googleapis.com/auth/drive.file,
https://www.googleapis.com/auth/documents
Private Key Path(.P12)
Step 1- Now, go back to Google Cloud Platform Console. Then, click on the APIs and services under the Quick access section on the home screen.
Step 2- Select the Credentials >> Service Accounts again. Click on the email.
Step 3- Go to the Keys section > ADD KEY and choose to Create new key.
Step 4- Choose P12 and click Create.
Step 5- A message will appear to show that Private key is saved to your computer. Click Close.
Step 6- On your computer, you can find the newly downloaded key and add the same P12 File path in Kernel Tool.