Google Workspace
A Python-based, comprehensive Model Context Protocol (MCP) server that enables AI agents to interact with Google Workspace—covering Gmail, Calendar, Docs, Sheets, Slides, Chat, Forms, Tasks, Search, and Drive.
Credentials Setup
To use this server, you must authorize it using Google Cloud Console.
warning
On personal or free Google Workspace plans, credentials expire after 7 days. For production environments, use a Google Workspace Business plan (even the Starter tier is sufficient).
OAuth Credential Setup Guide
- Sign In to a Google Cloud Project
- Visit Google Cloud Console
- If prompted, select your country and agree to the terms and conditions.
- Click the 'Select Project' button in the upper left-hand corner near the logo if there is no project selected.
- Choose an existing project or click 'New Project'.
- You do NOT need an organization - using
No Organizationfor location is fine as is an existing one. - You do NOT need to start a free trial of Google Cloud - the authentication APIs are free.
- You do NOT need an organization - using
- Configure Consent Screen
- Click the 'OAuth consent screen' under 'API & Services' in the left sidebar.
- If a Get started link is shown, click that. If not, you've already completed this step, and you can continue with creating your credentials (3).
- Input the required project configuration:
- App name: Jotsu (or whatever you like)
- Select a user support email from the dropdown.
- Audience: Internal if you are a Google Workspace user, External if not. If you can select Internal, do so, otherwise External.
- Enter a contact email.
- Agree to the 'User Data Policy'.
- Click Create.
- If you are using a personal account, and you selected 'External' above, then you have to authorize any users who will access this application - including yourself.
- Select Audience in the left-hand sidebar.
- Click Add users under Test users
- Add emails for all users - including your own email.
- You can optionally configure other information, such as branding, for a better user experience, but it's not required and may be done later.
- Create OAuth 2.0 Credentials
- Navigate to APIs & Services → Credentials. If you don't see this option click the menu icon in the upper-left corner.
- Click Create Credentials → OAuth Client ID
- Choose Web application as the application type.
- Enter Jotsu or any name you prefer in the 'Name' field.
- Scroll down to Authorized redirect URIs (skip Authorized JavaScript origins) and click Add URI.
- Input https://my.jotsu.com/oauth/redirect in the 'URIs 1' field.
- Click Create.
- Download JSON and note the Client ID and Client Secret.
- Enable Required APIs
- Navigate to APIs & Services → Library. If you don't see this option click the menu icon in the upper-left corner.
- Enable each Google API you intend to use by clicking the corresponding link. For each link, click 'Next' to confirm the project and click 'Enable'.
Configure the server in Jotsu
- Input your credentials
- Click 'Add' in the available servers section on the Servers page.
- Replace [GOOGLE_WORKSPACE_CLIENT_ID] and [GOOGLE_WORKSPACE_CLIENT_SECRET] with the downloaded information.
- Click 'Add Server' to authentication and 'OK' to start.
- Authorize Your User
- Google may display warnings that this application is in test mode or only available for your account.
- Accept all options from Google until returned to Jotsu.
- Save the Server
- Click Save server and the server details are displayed.
About Google credentials
The way Google credentials are set up and used varies significantly depending on your plan type.
| Plan | Free | Business |
|---|---|---|
| Application type | Test | Internal |
| Refresh Token Expires In | 7 days | No expiration |
| Users | Must be explicitly enabled, limited to 100 | All users in your organization |
License
This server is a fork of google_workspace_mcp by Taylor Wilsdon and other contributors. All credit belongs to them.
MIT License
Copyright (c) 2025 Taylor Wilsdon