@wasif
Based on the provided information, here's how you can configure the Mumara to use an internal app in your Google Workspace account without requiring Google's approval for the Gmail scopes:
Create an internal app in your Google Cloud Console associated with your Google Workspace account. Set the user type to "Internal" on the OAuth consent screen configuration. This limits access to only users within your organization.
In the OAuth consent screen, add the necessary Gmail scopes for sending emails, such as
https://www.googleapis.com/auth/gmail.send. Since the app is internal, these sensitive scopes do not require verification by Google.
Generate OAuth 2.0 credentials (Client ID and Client Secret) for the internal app.
Configure domain-wide delegation for the internal app's service account in the Google Admin console. This allows the app to access user data on behalf of users in your organization without individual user consent.
In the Google Admin console, go to Security > API Controls > Domain wide delegation. Add the Client ID of the internal app and authorize the required Gmail scopes (gmail.send).
Provide the OAuth 2.0 credentials (Client ID and Client Secret) and the service account email to Mumara. They will need to implement OAuth 2.0 authentication in their application using these credentials to obtain access tokens for API requests.
Mumara can then use the access token to make authorized API calls to send emails on behalf of your organization's users via the Gmail API.
By creating an internal app and configuring domain-wide delegation, you can allow the Mumara to access necessary Gmail scopes without going through Google's approval process for external apps. The app is limited to only your organization, and the admin controls access via the domain-wide delegation settings.
=====
Can this be implemented?