Gmail Connector

Gmail Connector

Additional Documentation

This Connector is based on the Gmail ADO.NET Provider by CData. For additional help, including Connection String parameters, please see: https://cdn.cdata.com/help/DLG/ado/

Establishing a Connection

OAuth Authentication

Use the OAuth authentication standard to connect to Gmail. You can authenticate with a user account.

Authenticate with a User Account

This approach is suitable if other users will be accessing their own data through the provider as, instead of providing the Password, you can use the OAuth authentication standard. See Using OAuth Authentication for an authentication guide.

Connection String Options

The connection string properties are the various options that can be used to establish a connection. This section provides a complete list of the options you can configure in the connection string for this provider. Click the links for further details.

For more information on connecting, see Establishing a Connection.
Auth SchemeThe type of authentication to use when connecting to Gmail.
Auto CacheAutomatically caches the results of SELECT queries into a cache database specified by either CacheLocation or both of CacheConnection and CacheProvider .
Cache ConnectionThe connection string for the cache database. This property is always used in conjunction with CacheProvider . Setting both properties will override the value set for CacheLocation for caching data.
Cache LocationSpecifies the path to the cache when caching to a file.
Cache MetadataThis property determines whether or not to cache the table metadata to a file store.
Cache ProviderThe name of the provider to be used to cache data.
Cache ToleranceThe tolerance for stale data in the cache specified in seconds when using AutoCache .
Callback URLThe OAuth callback URL to return to when authenticating. This value must match the callback URL you specify in your app settings.
Connection Life TimeThe maximum lifetime of a connection in seconds. Once the time has elapsed, the connection object is disposed.
Firewall PasswordA password used to authenticate to a proxy-based firewall.
Firewall PortThe TCP port for a proxy-based firewall.
Firewall ServerThe name or IP address of a proxy-based firewall.
Firewall TypeThe protocol used by a proxy-based firewall.
Firewall UserThe user name to use to authenticate with a proxy-based firewall.
Include MessageWhether to include message body content and attachment data or not.
Initiate OAuthSet this property to initiate the process to obtain or refresh the OAuth access token when you connect.
Is HTMLDetermines whether the MesssageBody is HTML or plain-text.
Keep AliveThe IMAP connection should be kept alive when this value is true.
List MailboxesWhether to list all mailboxes or just the subscribed IMAP mailboxes.
LocationA path to the directory that contains the schema files defining tables, views, and stored procedures.
LogfileA filepath which designates the name and location of the log file.
Log ModulesCore modules to be included in the log file.
Max ItemsMaximum number of items to return.
Max Log File CountA string specifying the maximum file count of log files. When the limit is hit, a new log is created in the same folder with the date and time appended to the end and the oldest log file will be deleted.
Max Log File SizeA string specifying the maximum size in bytes for a log file (for example, 10 MB). When the limit is hit, a new log is created in the same folder with the date and time appended to the end.
Max RowsLimits the number of rows returned rows when no aggregation or group by is used in the query. This helps avoid performance issues at design time.
OAuth Access TokenThe access token for connecting using OAuth.
OAuth Client IdThe client ID assigned when you register your application with an OAuth authorization server.
OAuth Client SecretThe client secret assigned when you register your application with an OAuth authorization server.
OAuth Expires InThe lifetime in seconds of the OAuth AccessToken.
OAuth JWT CertThe JWT Certificate store.
OAuth JWT Cert PasswordThe password for the OAuth JWT certificate.
OAuth JWT Cert SubjectThe subject of the OAuth JWT certificate.
OAuth JWT Cert TypeThe type of key store containing the JWT Certificate.
OAuth JWT IssuerThe issuer of the Java Web Token.
OAuth JWT SubjectThe user subject for which the application is requesting delegated access.
OAuth Refresh TokenThe OAuth refresh token for the corresponding OAuth access token.
OAuth Settings LocationThe location of the settings file where OAuth values are saved when InitiateOAuth is set to GETANDREFRESH or REFRESH. Alternatively, this can be held in memory by specifying a value starting with memory://.
OAuth Token TimestampThe Unix epoch timestamp in milliseconds when the current Access Token was created.
OAuth VerifierThe verifier code returned from the OAuth authorization URL.
OfflineUse offline mode to get the data from the cache instead of the live source.
OtherThese hidden properties are used only in specific use cases.
PasswordThe password of the Gmail account used to authenticate.
Peek ModeWhen true PEEK is added to all FETCH commands sent to IMAP. Used to avoid setting the /Seen flag.
Pool Idle TimeoutThe allowed idle time for a connection before it is closed.
Pool Max SizeThe maximum connections in the pool.
Pool Min SizeThe minimum number of connections in the pool.
Pool Wait TimeThe max seconds to wait for an available connection.
Proxy Auth SchemeThe authentication type to use to authenticate to the ProxyServer proxy.
Proxy Auto DetectThis indicates whether to use the system proxy settings or not. This takes precedence over other proxy settings, so you'll need to set ProxyAutoDetect to FALSE in order use custom proxy settings.
Proxy ExceptionsA semicolon separated list of destination hostnames or IPs that are exempt from connecting through the ProxyServer .
Proxy PasswordA password to be used to authenticate to the ProxyServer proxy.
Proxy PortThe TCP port the ProxyServer proxy is running on.
Proxy ServerThe hostname or IP address of a proxy to route HTTP traffic through.
Proxy SSL TypeThe SSL type to use when connecting to the ProxyServer proxy.
Proxy UserA user name to be used to authenticate to the ProxyServer proxy.
Pseudo ColumnsThis property indicates whether or not to include pseudo columns as columns to the table.
Query Full DetailsDetermines whether to include full details of messages.
ReadonlyYou can use this property to enforce read-only access to Gmail from the provider.
RTKThe runtime key used for licensing.
SchemaUsed to specify what Gmail Api to use. The default one is the IMAP.
SSL Server CertThe certificate to be accepted from the server when connecting using TLS/SSL.
Support Enhanced SQLThis property enhances SQL functionality beyond what can be supported through the API directly, by enabling in-memory client-side processing.
TablesThis property restricts the tables reported to a subset of the available tables. For example, Tables=TableA,TableB,TableC.
TimeoutThe value in seconds until the timeout error is thrown, canceling the operation.
UID ModeIf true, permanent message Ids are used instead of the default temporary Ids.
    • Related Articles

    • Gainsight Connector

      Gainsight's Customer Success Software empowers companies to increase revenue, decrease customer churn, and drive advocacy.  Gainsight is a cloud-based application and available for your migrations and integrations through the Creatio Connect Cloud ...
    • Stripe Connector

      Additional Documentation This Connector is based on the Stripe ADO.NET Provider by CData. For additional help, including Connection String parameters, please see: https://cdn.cdata.com/help/BOG/ado/
    • Snowflake Connector

      Additional Documentation This Connector is based on the Snowflake ADO.NET Provider by CData. For additional help, including Connection String parameters, please see: https://cdn.cdata.com/help/OWG/ado/
    • Redshift Connector

      Additional Documentation This Connector is based on the Redshift ADO.NET Provider by CData. For additional help, including Connection String parameters, please see: https://cdn.cdata.com/help/FRG/ado/
    • Zendesk Connector

      Additional Documentation This Connector is based on the Twitter ADO.NET Provider by CData. For additional help, including Connection String parameters, please see: https://cdn.cdata.com/help/FZG/ado/