Skip to main content

Fix Google Shared Drive Permission Errors — Resolve Access Issues with RcloneView

· 4 min read
Tayson
Senior Engineer

A 403 Forbidden error on a Shared Drive you should have access to is both confusing and urgent.

Google Shared Drives (formerly Team Drives) introduce a layered permission model that goes beyond simple file sharing. When sync tools fail to access Shared Drive content, the error messages from Google's API are often vague — "insufficient permissions" could mean a dozen different things. RcloneView streamlines Shared Drive configuration with explicit drive ID selection, proper OAuth scope handling, and clear error reporting that pinpoints the actual permission failure.

RcloneView app preview

Manage & Sync All Clouds in One Place

RcloneView is a cross-platform GUI for rclone. Compare folders, transfer or sync files, and automate multi-cloud workflows with a clean, visual interface.

  • One-click jobs: Copy · Sync · Compare
  • Schedulers & history for reliable automation
  • Works with Google Drive, OneDrive, Dropbox, S3, WebDAV, SFTP and more
WindowsmacOSLinux
Get Started Free →

Free core features. Plus automations available.

How Shared Drive Permissions Differ

Unlike personal Google Drive, where the account owner has full access to everything, Shared Drives use role-based permissions managed at the organizational level. Members can be assigned Manager, Content Manager, Contributor, Commenter, or Viewer roles, and each role has specific capabilities. A Contributor, for example, can add files but cannot delete or move them — an operation that rclone's sync command may attempt by default.

The critical detail is that Shared Drive access must be explicitly granted at the drive level. Being in the same Google Workspace organization does not automatically grant access. Additionally, domain-wide sharing policies set by the Workspace admin can override individual drive permissions, silently blocking external users or service accounts.

RcloneView's remote configuration wizard prompts you to select a specific Shared Drive by ID, ensuring the connection targets the correct drive rather than defaulting to the user's personal "My Drive."

Selecting a Google Shared Drive in RcloneView remote setup

Configuring OAuth Scopes Correctly

A common source of permission errors is insufficient OAuth scopes. When you first authorize RcloneView with Google, the OAuth consent screen requests specific permissions. If the initial authorization used a read-only scope, all write operations on Shared Drives will fail with a 403 error.

RcloneView requests the drive scope by default, which provides full read-write access. If you previously authorized with a narrower scope, you need to re-authorize by running the config flow again. The token file stores the granted scopes, and RcloneView can detect when the current token lacks the permissions needed for your configured operations.

For Google Workspace environments using service accounts, the service account must be granted domain-wide delegation with the appropriate scopes in the admin console. Without this step, the service account can authenticate but cannot access any Shared Drive content.

Configuring Google Drive transfer settings in RcloneView

Resolving Common Error Scenarios

"File not found" on files that exist: This typically means the rclone remote is pointed at My Drive instead of the Shared Drive. In RcloneView, verify that the team_drive parameter in your remote configuration is set to the correct Shared Drive ID.

"Insufficient permissions" on upload: Check your role on the Shared Drive. Contributors and above can upload, but if an admin has restricted uploads to Managers only, you will get this error. RcloneView's verbose logging (-vv) shows the exact API response, including which permission is missing.

"Rate limit exceeded" during bulk operations: Shared Drives share API quota across all members. A large sync job from one user can exhaust the quota, causing 403 rate-limit errors for everyone. RcloneView's --tpslimit flag throttles API calls to stay within shared quotas.

Reviewing file permissions and sync status in RcloneView

Service Account and Workspace Admin Settings

For automated workflows, service accounts are the recommended authentication method. The service account must be added as a member of each Shared Drive it needs to access, with at least Content Manager privileges for sync operations that involve deleting files.

Workspace admins should also verify that the "Sharing outside the organization" policy permits the service account's access pattern. If the admin has disabled external sharing, a service account from a different GCP project will be blocked regardless of its Shared Drive membership.

Setting up automated Shared Drive sync with service account in RcloneView

Getting Started

  1. Download RcloneView from rcloneview.com.
  2. Configure a Google Drive remote and select your Shared Drive by ID during setup.
  3. Verify OAuth scopes by re-authorizing if your current token lacks write permissions.
  4. Check your Shared Drive role — Content Manager or higher is required for full sync operations.

With the right configuration, Shared Drive permission errors disappear and team sync workflows run smoothly.


Related Guides:

Supported Cloud Providers

Local Files
WebDAV
FTP
SFTP
HTTP
SMB / CIFS
Google Drive
Google Photos
Google Cloud Storage
OneDrive
Dropbox
Box
MS Azure Blob
MS File Storage
S3 Compatible
Amazon S3
pCloud
Wasabi
Mega
Backblaze B2
Cloudflare R2
Alibaba OSS
Ceph
Swift (OpenStack)
IBM Cloud Object Storage
Oracle Cloud Object Storage
IDrive e2
MinIO
Storj
DigitalOcean Spaces