If you get an ID Token from Google, the user's email will always be verified, and this value will be true
.
In the rare case where the user had yet to verify their account's email address and attempts to use OpenID Connect, they will see an error message informing them that they need to verify their account, with steps on how to complete that. This is the current behavior for Google's OpenID Connect implementation at least.
If you are relying on verified email addresses, then out of correctness you probably should reject logins that don't have email_verified=true
, but the good news is that your system shouldn't ever see that case from Google.
Not exactly sure how you're using the email, but typically authentication systems use the sub
and iss
ID Token claims to uniquely identify the user & IdP, rather than relying on the email address which is subject to change.