중요:
2024년 5월 1일부터 Apple에서는 GoogleSignIn-iOS와 같이 흔히 사용되는 SDK를 사용하는 iOS 애플리케이션의 개인 정보 보호 매니페스트 및 서명을
요구합니다. 2024년 5월 1일 전에 GoogleSignIn-iOS v7.1.0 이상으로 업그레이드하세요.
업그레이드 가이드를 따르세요.
앱 백엔드에서 Google API에 액세스
컬렉션을 사용해 정리하기
내 환경설정을 기준으로 콘텐츠를 저장하고 분류하세요.
서버가
사용자 대신 또는 사용자가 오프라인일 때 Google API 호출
시작하기 전에
기본 Google 로그인 통합을 완료해야 합니다.
앱의 서버 측 API 액세스 사용 설정
iOS 앱에서 Google API 액세스
페이지가 있는 경우 앱이 클라이언트 측에서만 사용자를 인증합니다. 이 경우
사용자가 앱을 활발하게 사용하는 동안에만 앱에서 Google API에 액세스할 수 있어야 합니다.
있습니다.
이 페이지에 설명된 절차를 통해 서버에서 Google API를 만들 수 있습니다.
오프라인 상태에서 사용자 대신 전화를 걸 수 있습니다. 예를 들어 사진 앱은
백엔드에서 처리하여 사용자의 Google 포토 앨범에 있는 사진 보정
다른 앨범에 업로드할 수 있습니다. 이렇게 하려면 서버가
액세스 토큰과 갱신 토큰이 필요합니다.
서버에 대한 액세스 토큰과 갱신 토큰을 받는 방법은 다음과 같습니다.
서버에서 교환할 일회성 승인 코드를 요청합니다.
확인할 수 있습니다 로그인에 성공하면 다음과 같은 일회용 코드가 표시됩니다.
GIDSignInResult
의 serverAuthCode
속성
아직 가져오지 않은 경우 서버 클라이언트 ID를 가져옵니다.
앱의 Info.plist
파일에서 OAuth 클라이언트 ID 아래에 명시하세요.
<key>GIDServerClientID</key>
<string>YOUR_SERVER_CLIENT_ID</string>
로그인 콜백에서 일회성 승인 코드를 가져옵니다.
Swift
GIDSignIn.sharedInstance.signIn(withPresenting: self) { signInResult, error in
guard error == nil else { return }
guard let signInResult = signInResult else { return }
let authCode = signInResult.serverAuthCode
}
Objective-C
[GIDSignIn.sharedInstance
signInWithPresentingViewController:self
completion:^(GIDSignInResult * _Nullable signInResult,
NSError * _Nullable error) {
if (error) { return; }
if (signInResult == nil) { return; }
NSString *authCode = signInResult.serverAuthCode;
}];
HTTPS POST를 사용하여 serverAuthCode
문자열을 서버에 안전하게 전달합니다.
앱의 백엔드 서버에서 액세스 및 새로고침을 위해 인증 코드를 교환합니다.
토큰입니다. 액세스 토큰을 사용하여 사용자 대신 Google API를 호출합니다.
필요한 경우, 갱신 토큰을 저장하여 사용자가 액세스할 수 없을 때 새 액세스 토큰을
액세스 토큰이 만료된 경우
예를 들면 다음과 같습니다.
Java
// (Receive authCode via HTTPS POST)
if (request.getHeader("X-Requested-With") == null) {
// Without the `X-Requested-With` header, this request could be forged. Aborts.
}
// Set path to the Web application client_secret_*.json file you downloaded from the
// Google API Console: https://console.cloud.google.com/apis/credentials
// You can also find your Web application client ID and client secret from the
// console and specify them directly when you create the GoogleAuthorizationCodeTokenRequest
// object.
String CLIENT_SECRET_FILE = "/path/to/client_secret.json";
// Exchange auth code for access token
GoogleClientSecrets clientSecrets =
GoogleClientSecrets.load(
JacksonFactory.getDefaultInstance(), new FileReader(CLIENT_SECRET_FILE));
GoogleTokenResponse tokenResponse =
new GoogleAuthorizationCodeTokenRequest(
new NetHttpTransport(),
JacksonFactory.getDefaultInstance(),
"https://oauth2.googleapis.com/token",
clientSecrets.getDetails().getClientId(),
clientSecrets.getDetails().getClientSecret(),
authCode,
REDIRECT_URI) // Specify the same redirect URI that you use with your web
// app. If you don't have a web version of your app, you can
// specify an empty string.
.execute();
String accessToken = tokenResponse.getAccessToken();
// Use access token to call API
GoogleCredential credential = new GoogleCredential().setAccessToken(accessToken);
Drive drive =
new Drive.Builder(new NetHttpTransport(), JacksonFactory.getDefaultInstance(), credential)
.setApplicationName("Auth Code Exchange Demo")
.build();
File file = drive.files().get("appfolder").execute();
// Get profile info from ID token
GoogleIdToken idToken = tokenResponse.parseIdToken();
GoogleIdToken.Payload payload = idToken.getPayload();
String userId = payload.getSubject(); // Use this value as a key to identify a user.
String email = payload.getEmail();
boolean emailVerified = Boolean.valueOf(payload.getEmailVerified());
String name = (String) payload.get("name");
String pictureUrl = (String) payload.get("picture");
String locale = (String) payload.get("locale");
String familyName = (String) payload.get("family_name");
String givenName = (String) payload.get("given_name");
Python
from apiclient import discovery
import httplib2
from oauth2client import client
# (Receive auth_code by HTTPS POST)
# If this request does not have `X-Requested-With` header, this could be a CSRF
if not request.headers.get('X-Requested-With'):
abort(403)
# Set path to the Web application client_secret_*.json file you downloaded from the
# Google API Console: https://console.cloud.google.com/apis/credentials
CLIENT_SECRET_FILE = '/path/to/client_secret.json'
# Exchange auth code for access token, refresh token, and ID token
credentials = client.credentials_from_clientsecrets_and_code(
CLIENT_SECRET_FILE,
['https://www.googleapis.com/auth/drive.appdata', 'profile', 'email'],
auth_code)
# Call Google API
http_auth = credentials.authorize(httplib2.Http())
drive_service = discovery.build('drive', 'v3', http=http_auth)
appfolder = drive_service.files().get(fileId='appfolder').execute()
# Get profile info from ID token
userid = credentials.id_token['sub']
email = credentials.id_token['email']
달리 명시되지 않는 한 이 페이지의 콘텐츠에는 Creative Commons Attribution 4.0 라이선스에 따라 라이선스가 부여되며, 코드 샘플에는 Apache 2.0 라이선스에 따라 라이선스가 부여됩니다. 자세한 내용은 Google Developers 사이트 정책을 참조하세요. 자바는 Oracle 및/또는 Oracle 계열사의 등록 상표입니다.
최종 업데이트: 2025-08-31(UTC)
[null,null,["최종 업데이트: 2025-08-31(UTC)"],[[["\u003cp\u003eThis guide enables your servers to make Google API calls on behalf of users, even when they're offline.\u003c/p\u003e\n"],["\u003cp\u003eTo achieve this, your server needs an access token and a refresh token, obtained by exchanging a one-time authorization code.\u003c/p\u003e\n"],["\u003cp\u003eYou need to integrate basic Google Sign-In and configure a server client ID in your app's \u003ccode\u003eInfo.plist\u003c/code\u003e file.\u003c/p\u003e\n"],["\u003cp\u003eThe process involves retrieving the authorization code on the client-side, sending it to your server, and exchanging it for tokens on the server.\u003c/p\u003e\n"],["\u003cp\u003eYour server can then use the access token to make API calls and optionally store the refresh token for future use.\u003c/p\u003e\n"]]],[],null,["# Access Google APIs from your app backend\n\nFollow this procedure if you want your servers to be able to make\nGoogle API calls on behalf of users or while they are offline.\n\nBefore you begin\n----------------\n\nYou must complete the [basic Google Sign-In integration](/identity/sign-in/ios/sign-in).\n\nEnable server-side API access for your app\n------------------------------------------\n\nOn the [Access Google APIs in an iOS app](/identity/sign-in/ios/api-access)\npage, your app authenticates the user on the client side only; in that case,\nyour app is able to access Google APIs only while the user is actively using\nyour app.\n\nWith the procedure described on this page, your servers can make Google API\ncalls on behalf of users while they are offline. For example, a photo app could\nenhance a photo in a user's Google Photos album by processing it on a backend\nserver and uploading the result to another album. To do this, your server\nrequires an access token and a refresh token.\n\nTo obtain an access token and refresh token for your server, you can\nrequest a one-time authorization code that your server exchanges for\nthese two tokens. After a successful sign-in, you will find the one-time code as\nthe `serverAuthCode` property of `GIDSignInResult`.\n\n1. If you haven't already, [get a server client ID](/identity/sign-in/ios/start-integrating#server_client_id)\n and specify it in your app's `Info.plist` file, [below your OAuth client ID](/identity/sign-in/ios/start-integrating#add_client_id).\n\n \u003cbr /\u003e\n\n ```scdoc\n \u003ckey\u003eGIDServerClientID\u003c/key\u003e\n \u003cstring\u003eYOUR_SERVER_CLIENT_ID\u003c/string\u003e\n ```\n\n \u003cbr /\u003e\n\n2. In your sign-in callback, retrieve the one-time authorization code:\n\n ### Swift\n\n GIDSignIn.sharedInstance.signIn(withPresenting: self) { signInResult, error in\n guard error == nil else { return }\n guard let signInResult = signInResult else { return }\n\n let authCode = signInResult.serverAuthCode\n }\n\n ### Objective-C\n\n [GIDSignIn.sharedInstance\n signInWithPresentingViewController:self\n completion:^(GIDSignInResult * _Nullable signInResult,\n NSError * _Nullable error) {\n if (error) { return; }\n if (signInResult == nil) { return; }\n\n NSString *authCode = signInResult.serverAuthCode;\n }];\n\n3. Securely pass the `serverAuthCode` string to your server using HTTPS POST.\n\n4. On your app's backend server, exchange the auth code for access and refresh\n tokens. Use the access token to call Google APIs on behalf of the user and,\n optionally, store the refresh token to acquire a new access token when the\n access token expires.\n\n For example: \n\n ##### Java\n\n ```java\n // (Receive authCode via HTTPS POST)\n\n\n if (request.getHeader(\"X-Requested-With\") == null) {\n // Without the `X-Requested-With` header, this request could be forged. Aborts.\n }\n\n // Set path to the Web application client_secret_*.json file you downloaded from the\n // Google API Console: https://console.cloud.google.com/apis/credentials\n // You can also find your Web application client ID and client secret from the\n // console and specify them directly when you create the GoogleAuthorizationCodeTokenRequest\n // object.\n String CLIENT_SECRET_FILE = \"/path/to/client_secret.json\";\n\n // Exchange auth code for access token\n GoogleClientSecrets clientSecrets =\n GoogleClientSecrets.load(\n JacksonFactory.getDefaultInstance(), new FileReader(CLIENT_SECRET_FILE));\n GoogleTokenResponse tokenResponse =\n new GoogleAuthorizationCodeTokenRequest(\n new NetHttpTransport(),\n JacksonFactory.getDefaultInstance(),\n \"https://oauth2.googleapis.com/token\",\n clientSecrets.getDetails().getClientId(),\n clientSecrets.getDetails().getClientSecret(),\n authCode,\n REDIRECT_URI) // Specify the same redirect URI that you use with your web\n // app. If you don't have a web version of your app, you can\n // specify an empty string.\n .execute();\n\n String accessToken = tokenResponse.getAccessToken();\n\n // Use access token to call API\n GoogleCredential credential = new GoogleCredential().setAccessToken(accessToken);\n Drive drive =\n new Drive.Builder(new NetHttpTransport(), JacksonFactory.getDefaultInstance(), credential)\n .setApplicationName(\"Auth Code Exchange Demo\")\n .build();\n File file = drive.files().get(\"appfolder\").execute();\n\n // Get profile info from ID token\n GoogleIdToken idToken = tokenResponse.parseIdToken();\n GoogleIdToken.Payload payload = idToken.getPayload();\n String userId = payload.getSubject(); // Use this value as a key to identify a user.\n String email = payload.getEmail();\n boolean emailVerified = Boolean.valueOf(payload.getEmailVerified());\n String name = (String) payload.get(\"name\");\n String pictureUrl = (String) payload.get(\"picture\");\n String locale = (String) payload.get(\"locale\");\n String familyName = (String) payload.get(\"family_name\");\n String givenName = (String) payload.get(\"given_name\");\n ```\n\n ##### Python\n\n ```python\n from apiclient import discovery\n import httplib2\n from oauth2client import client\n\n # (Receive auth_code by HTTPS POST)\n\n\n # If this request does not have `X-Requested-With` header, this could be a CSRF\n if not request.headers.get('X-Requested-With'):\n abort(403)\n\n # Set path to the Web application client_secret_*.json file you downloaded from the\n # Google API Console: https://console.cloud.google.com/apis/credentials\n CLIENT_SECRET_FILE = '/path/to/client_secret.json'\n\n # Exchange auth code for access token, refresh token, and ID token\n credentials = client.credentials_from_clientsecrets_and_code(\n CLIENT_SECRET_FILE,\n ['https://www.googleapis.com/auth/drive.appdata', 'profile', 'email'],\n auth_code)\n\n # Call Google API\n http_auth = credentials.authorize(httplib2.Http())\n drive_service = discovery.build('drive', 'v3', http=http_auth)\n appfolder = drive_service.files().get(fileId='appfolder').execute()\n\n # Get profile info from ID token\n userid = credentials.id_token['sub']\n email = credentials.id_token['email']\n ```\n\n \u003cbr /\u003e"]]