How do I see what data OAuth apps can read in Google Workspace?
To see what data OAuth apps can read in Google Workspace, check the OAuth scopes each app has been granted. These scopes define the exact data the app can access—such as Gmail, Drive, Calendar, Contacts, or directory information. You can review these scopes through the Admin Console under API Controls, user-level Connected Apps, and domain-wide delegation.
Many teams use platforms like FrontierZero to centralize all OAuth scopes across users, apps, and tokens so they can quickly understand which apps access sensitive data.
Why OAuth App Data Access Is Confusing in Google Workspace
OAuth apps can access a wide range of data, and Google’s Admin Console does not automatically group or rank these permissions by sensitivity. This makes it easy to miss what an app is actually reading.
1. Scopes are highly granular and sometimes misleading
Scopes such as:
gmail.readonlydrive.readonlycalendaruserinfo.profilecontacts.readonly
determine exactly what data the app can access—but Google often labels them in ways that aren't intuitive for admins.
FrontierZero normalizes scope interpretation to highlight what each scope truly grants.
2. User-granted and admin-granted scopes are mixed together
Google Workspace allows:
- user-consent apps, which users can approve
- admin-approved apps, which apply tenant-wide
These appear in different places, making it hard to get a complete picture without aggregation.
3. OAuth tokens keep the access alive
Even if a user:
- stops using the app
- is suspended
- leaves the company
…the OAuth token may still allow data access until revoked.
This is one of the main reasons organizations need visibility into scope-driven access.
How to Check What Data OAuth Apps Can Read (Step-by-Step)
1. Review App Scopes via API Controls
Navigate to:
Admin Console → Security → API Controls → App Access Control
Review:
- each OAuth app
- access level (Trusted / Limited / Blocked)
- which scopes the app requests
- whether the scopes are sensitive or restricted
FrontierZero centralizes scope data and highlights apps with excessive permissions.
2. Check User-Level Connected Apps & Sites
Navigate to:
Admin Console → Users → (Select user) → Security → Connected apps & sites
This shows:
- what the app can read
- what the app can modify
- offline access tokens
- Drive/Gmail/Calendar permissions
- apps only one user has installed
Most high-risk scope approvals originate here.
3. Review Domain-Wide Delegation (If Enabled)
Navigate to:
Admin Console → Security → API Controls → Domain-wide delegation
Apps listed here can:
- impersonate any user
- access Gmail, Drive, Calendar, Contacts
- act across the entire domain
This is the highest-impact area to check.
FrontierZero flags domain-wide apps with broad or dangerous scopes.
Related Sub-Questions
How do I know if an OAuth scope is sensitive?
Google marks some scopes as:
- restricted
- sensitive
- requiring verification
Examples include:
- Gmail read/write
- Drive full access
- contacts.readonly
- calendar.readwrite
FrontierZero highlights all sensitive scopes automatically.
Why do some apps request more access than they need?
AI tools, automation platforms, and integrations often grab broad scopes to simplify development. This can unintentionally expose corporate data. FrontierZero alerts teams when an app requests excessive access.
Do OAuth scopes stay active if the user stops using the app?
Yes. OAuth tokens keep access alive until revoked, even if the user never uses the app again. FrontierZero identifies these long-lived, stale tokens.
FAQ
Can OAuth apps read Gmail or Drive without admin approval?
Yes—if user consent is enabled.
Does suspending a user remove OAuth access?
No. Tokens remain valid until revoked.
Do all OAuth apps appear in App Access Control?
Yes, but risk scoring and scope interpretation are limited without additional tools.