Setup happens in two halves. First, you configure each provider you want to enable (Google, Facebook, Apple) inside that provider's developer console — this is where you generate the credentials Ezoic needs. Then you paste those credentials into the Ezoic Identity dashboard and turn each provider on.
You can enable any combination of the three providers. Most publishers start with Google One Tap (the fastest setup and the highest-impact provider) and add Facebook and Apple over time.
Part 1: Set Up Google Sign-In
To start, you need to create a project in the Google Cloud Console to get a "Client ID."
Step 1: Go to Google Cloud Console
- Open console.cloud.google.com and sign in with your Google account.
- In the top corner, click the "Select a project" dropdown, then click "New project."
- Give it a name like "My Website Login" and click "Create."

Step 2: Enable the Necessary API
-
In the left-hand menu, go to APIs & Services > Library.
-
Search for "Google People API" and click Enable.

Step 3: Create Login Credentials
- Go to APIs & Services > Credentials.
- Click + Create Credentials, then select OAuth 2.0 Client ID.
- If prompted, set up the consent screen:
- Click Configure Consent Screen
- Choose External, click Create
- Fill in the App Name (such as "My Website")
- Add your email in the required fields
- Scroll down and click Save and Continue until you're done
- On the "Create OAuth Client ID" page:
- Application type: Web application
- Name: something like "Website Login"
- Authorized JavaScript origins: add your website (e.g.
https://yourwebsite.com)
- Click Create
- Copy your Client ID when it appears — you'll need it in Part 4.

For the most up-to-date official setup walkthrough, see Google's Get your Google API client ID guide.
Part 2: Set Up Facebook Login
To enable Facebook as a Social Login provider, you need to register an app with Meta for Developers and generate a Facebook App ID and App Secret. Meta's app-creation wizard walks through five stages — App details > Use cases > Business > Requirements > Overview — and the steps below map to that flow.
- Go to developers.facebook.com and log in with your Facebook account. If you've never registered as a developer, follow the prompts to do so — it's free.
2. From the App Dashboard, click Create App.

3. App details: Enter an app name and a contact email. Click Next.
4. Use cases: From the use-case picker, select Authenticate and request data from users with Facebook Login (it's listed under "Featured" use cases). Click Next.

5. Business: If prompted, link an existing Meta business portfolio or choose to skip. You can add this later if you don't have one ready. Click Next.
6. Requirements / Overview: Review any requirements and click next. Confirm the information on the Overview page and click "Create App" when reviewed. You'll be taken to the app dashboard when finished.
7. Go to App settings > Basic and copy your App ID and App Secret. Paste these into the Facebook section of the Social Login page in your Ezoic Dashboard (also listed in Part 4).

8. Go to Use cases > Customize (Meta also exposes this section under Products > Facebook Login in some dashboard versions).

9. On the Permissions and features tab, tap the "+ Add" button under Action for the email row. The Status column will update to "Ready for Testing". This permission is required so Ezoic can capture the visitor's email as a privacy-safe identity signal — without it, the Facebook sign-in will succeed but no identity signal will reach the auction.

10. Switch to the Settings tab. Under Valid OAuth Redirect URIs, paste the Ezoic-hosted callback URL shown in your Ezoic dashboard at Identity > Social Login (https://identity.ezoic.com/social-login/facebook/callback). Save your changes.

11. Make sure your app is set to Live mode in the App Dashboard so it can accept real-user logins.
You can view more in depth documentation here: Facebook Login for the Web.
Part 3: Set Up Sign in with Apple
Apple Sign-In requires an active Apple Developer account ($99/year) and is configured by registering a Services ID that's tied to your website domain.
- Sign in to developer.apple.com with your Apple Developer account.
- Go to Certificates, Identifiers & Profiles > Identifiers, click the + button, and select Services IDs. Apple's Register a Services ID walkthrough has the full step-by-step.
- Provide a description and a reverse-domain identifier (for example,
com.yoursite.signin).
- After the Services ID is created, edit it and enable Sign in with Apple.
- In the configuration:
- Primary App ID: select an existing iOS/macOS app ID enabled for Sign in with Apple, or create a new one.
- Domains and Subdomains: add your website domain (e.g.
yoursite.com).
- Return URLs: paste the Ezoic-hosted callback URL shown in your Ezoic dashboard at Identity > Social Login (it looks like
https://identity.ezoic.com/social-login/apple/callback).
- Save and copy the Services ID identifier. You'll need it in Part 4.
For the full canonical guide including the App ID prerequisites, see Apple's Configure Sign in with Apple for the web documentation.
Part 4: Connect Each Provider to Ezoic Identity
Once you have credentials for at least one provider, head to the Ezoic dashboard to enable them.
- In the Ezoic publisher dashboard, navigate to Identity > Social Login.
- You'll see three provider cards: Google, Facebook, and Apple. Each card shows whether it's currently Enabled, Disabled, or needs setup.
- Click into each provider you want to enable and paste in the credentials you generated in Parts 1–3:
- Google: paste your Google Client ID. This same credential powers Google One Tap.
- Facebook: paste your Facebook App ID and App Secret.
- Apple: paste your Services ID.
- For Facebook and Apple, copy the Ezoic-hosted callback URL shown on the card and confirm it's listed in that provider's developer console (the redirect URI / OAuth callback fields you configured in Parts 1–3).
- Toggle each configured provider to Enabled and click Save Social Login Settings.

Once saved, the Social Login widget will appear on your site for visitors when Google One Tap can't run, and Google One Tap will continue to appear for eligible Chrome visitors. Both surfaces feed into the same Ezoic Identity layer, so identity signals collected from any provider improve ad targeting equally.