Google Workspace Integration Setup
This guide walks you through setting up a Google Workspace identity integration with RAD Security, allowing you to sync users, groups, and organizational data from Google Workspace. The setup process involves:- Creating a service account in Google Cloud Console
- Configuring domain-wide delegation
- Downloading and extracting service account credentials
- Configuring the integration in RAD Security
Prerequisites
Before you begin, ensure you have:- Access to the Google Workspace Admin Console
- Access to the Google Cloud Console
- A Google Workspace account with appropriate admin permissions (see below)
Required Permissions
The Google Workspace account used for domain-wide delegation must have the following permissions:Customer Management Permissions
Customer Management Permissions
- Manage customer > Read customer
- Manage customer > Read customer > Read customer branding settings
- Manage customer > Read customer > Read customer contact info
- Manage customer > Read customer > Read customer onboard settings
- Manage customer > Read customer > Read customer profile settings
- Manage customer > Read customer > Read customer support settings
- Manage customer > Read customer > Read customer timezone settings
Groups Permissions
Groups Permissions
- Groups
- Groups > Create
- Groups > Delete
- Groups > Read
- Groups > Update
Users Permissions
Users Permissions
- Users > Create
- Users > Delete
- Users > Read
- Users > Update
- Users > Update > Add/Remove Aliases
- Users > Update > Force Password Change
- Users > Update > Move Users
- Users > Update > Rename Users
- Users > Update > Reset Password
- Users > Update > Suspend Users
Organization Permissions
Organization Permissions
- Organization Units > Read
Step 1: Create Service Account and Configure Domain-Wide Delegation
1
Access Google Cloud Console
Navigate to the Google Cloud Console and select or create a project.
2
Enable Admin SDK API
The Cloud Console project will need to have access to the Admin SDK API. If you are using an existing project and need to enable access to the Admin SDK API, you can use this page to do so.
- Go to APIs & Services > Library
- Search for “Admin SDK API”
- Click Enable
3
Create Service Account and Set Up Domain-Wide Delegation
Follow this Google guide to set up the service account and configure domain-wide delegation in Google Workspace.
This guide covers both creating the service account in Google Cloud Console and setting up domain-wide delegation in Google Workspace Admin Console.
4
Add OAuth Scopes
When configuring domain-wide delegation, you’ll need to add OAuth scopes. Use the following comma-separated list:
What do these scopes enable?
What do these scopes enable?
cloud-platform- Access to Google Cloud Platform resourcesadmin.directory.group- Manage groups in your domainadmin.directory.user- Manage users in your domainadmin.directory.rolemanagement- View and manage role assignmentsadmin.directory.user.security- Manage user security settingsadmin.reports.audit.readonly- View audit reports
Step 2: Download Service Account Credentials
In the Google Cloud Console, navigate to IAM & Admin > Service Accounts, then select the service account you created in Step 1.1
Open Keys Tab
Click on the Keys tab for your service account
2
Create New Key
- Click Add Key
- Select Create new key
- Choose JSON format
- Click Create
Protect this key file, as it allows access to your Google Workspace account via delegation. Store it securely and never commit it to version control.
Step 3: Extract Service Account Credentials
Make a note of the following fields from the downloaded key file:client_id, private_key, token_uri, and client_email.
Consider the following example key file:
client_idis1234567890private_keyis-----BEGIN PRIVATE KEY-----\\nKEY MATERIAL HERE-----END PRIVATE KEY-----\\ntoken_uriishttps://oauth2.googleapis.com/tokenclient_emailisEXAMPLE@EXAMPLE.iam.gserviceaccount.com
Copy the private key exactly as it appears in the JSON file. This includes the
-----BEGIN PRIVATE KEY----- and -----END PRIVATE KEY----- markers, as well as the \n characters (shown as \\n in the JSON). Do not modify or reformat the key.Step 4: Configure in RAD Security
Navigate to your RAD Security workspace and configure the Google Workspace integration with the following parameters:Required Parameters
| Parameter | Description | Example |
|---|---|---|
| Client Email | The client_email value from Step 3 | EXAMPLE@EXAMPLE.iam.gserviceaccount.com |
| Client ID | The client_id value from Step 3 | 1234567890 |
| Client Secret | The private_key value from Step 3 (copy entire value including BEGIN/END markers) | -----BEGIN PRIVATE KEY-----\\n... |
| Delegate | Email address of the Google Workspace admin user you’re delegating access to | admin@yourcompany.com |
Important: When copying the
client_secret (private key), copy the entire value exactly as it appears in the JSON file, including the -----BEGIN PRIVATE KEY----- and -----END PRIVATE KEY----- markers, as well as the \n characters.The delegate field should be the email address of a Google Workspace user with the admin permissions listed in the Prerequisites section.
Verify Integration
After completing the setup, verify your integration is working:- Navigate to Integrations in your RAD Security workspace
- Locate your Google Workspace integration
- Check the connection status shows as Active
- Verify users and groups are syncing correctly
Your Google Workspace integration is now configured! RAD Security can now sync users, groups, and organizational data from your Google Workspace domain.
Troubleshooting
Authentication Failed
Authentication Failed
- Verify all credentials are copied exactly, including the complete private key
- Ensure the delegate email address is correct and has admin permissions
- Check that the service account has domain-wide delegation enabled
- Confirm the OAuth scopes were entered correctly
Insufficient Permissions
Insufficient Permissions
- Review the permissions on the delegate user account
- Ensure all required OAuth scopes are granted in domain-wide delegation
- Verify the Admin SDK API is enabled in your Google Cloud project
Users/Groups Not Syncing
Users/Groups Not Syncing
- Check that the delegate user has read access to users and groups
- Verify the appropriate OAuth scopes are configured
- Review the integration logs in RAD Security for specific errors
Private Key Format Issues
Private Key Format Issues
- Ensure the private key includes the
-----BEGIN PRIVATE KEY-----and-----END PRIVATE KEY-----markers - Copy the entire value including
\ncharacters - Don’t modify or reformat the key - use it exactly as it appears in the JSON file
Security Best Practices
Rotate Keys Regularly
Periodically create new service account keys and delete old ones to minimize security risks.
Principle of Least Privilege
Only grant the minimum permissions required for your use case. Disable unused permissions.
Monitor Access
Regularly review audit logs to monitor service account activity and detect anomalies.
Secure Key Storage
Never commit keys to version control. Use secure secret management systems.