- 26 Mar 2025
- 4 Minutes to read
- Print
- DarkLight
Google Cloud Identity
- Updated on 26 Mar 2025
- 4 Minutes to read
- Print
- DarkLight
Cloud Identity is an Identity as a Service (IDaaS) solution that centrally manages users and groups. You can configure Cloud Identity to federate identities between Google and other identity providers, such as Active Directory and Microsoft Entra ID (formerly Azure AD). For more information refer to Google Cloud Identity official documentation.
Integration Method: API
Tables: Device Inventory Info (5001)
This integration supports the following events.
Event | Description |
---|---|
Device Inventory | Retrieves a list of devices managed within an organization using Google Cloud Identity, including details on device status, ownership, and security posture. |
Company Device Inventory | Retrieves an inventory of company-managed devices in Google Cloud Identity, including details on compliance, security status, and configurations. |
This integration supports the following versions.
Google Cloud Identity API Version | v1 |
Note:
Google Cloud Identity doesn’t follow a traditional versioning system. As of this document preparation, latest release was on September 25, 2024.
Prerequisites
The user should have a Google Cloud Platform (GCP) project created in their deployment.
The user should have a Google Cloud Service Account created from the Google Developers Console.
The user should have granted Domain-Wide Delegation and added the necessary scopes for the service account.
The user should have access to the DataBee console.
Configuration Overview
Generate a service account with the required scopes and its private key.
Add the Google Cloud Identity data feed in the DataBee console with the following parameters.
DataBee Parameter
Google Cloud Identity Parameter
Client Email
Service account email id
Admin Email
Domain admin email id
Private Key
Private Key
Google Cloud Identity Configuration
Setting Up the New Project
Login to your Google Cloud Platform console.
On your console, click on your organization name in the Navigation bar.
On “Select a resource” window click on NEW PROJECT.
On the “New Project” window, enter your ‘Project name’ and click on Create.
Setting Up the service account
Perform the following steps to set up Google Workspace credentials on your Google console:
Navigate to console.cloud.google.com, and log into the Google account where you want to set up your Google Workspace credentials.
Navigate to IAM & Admin > Service Accounts.
In the Service Accounts, select CREATE SERVICE ACCOUNT > Service Accounts.
In “Create service account” page, perform the following steps:
Name your service account and select CREATE AND CONTINUE.
Grant your service account access to a project.
Select Continue.
Grant users access to your service account.
Select DONE.
Getting Client ID and Private Key
In Credentials, navigate to your new service account name, and select your new service account name.
In the “Service account details” page for your new service account, perform the following steps:
Navigate to the Unique ID, and copy the contents of the Unique ID.
This is also your Client ID.
Navigate to the KEYS tab.
Select ADD KEY > Create new key.
Select the JSON key type and click CREATE.
Save the key type as JSON file to your selected directory. Below is the sample private key.
Note:
Your new public/private key pair is generated and downloaded to your machine, and it serves as the only copy of this key. Please/Kindly store it in a secure place.
Setting Up Domain Wide Delegation
Navigate to admin.google.com.
Log in to your administrator Google account.
On the Google Admin Home Page, navigate to Security > Access and data control > API controls.
In “API Controls” page, navigate to Domain wide delegation, and select MANAGE DOMAIN WIDE DELEGATION.
In “Domain-wide Delegation” page, select Add new to add a new client ID.
In the “Add a new client ID” window, perform the following steps:
In the ‘Client ID’ field, paste the Unique ID that you copied from the Service account details page.
In the ‘OAuth scopes (comma-delimited)’ field, add the following read-only scope to fetch users, deleted users, roles, and mobile devices data:
https://www.googleapis.com/auth/cloud-identity.devices.readonly
Select AUTHORIZE.
DataBee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.
Search for the Google Cloud Identity option using the search bar in the “Add new data feed” page.
Click on the API Ingest option for the collection method.
Enter feed contact information and click Next.
In the configuration details dialog, enter the following:
Authorization Method: Google OAuth2
API Base URL: replace the <instance> placeholder with value based on the location of your GCP account as listed below.
global: securitycenter
me-central-2: securitycenter.me-central2.rep
Token URL: enter https://oauth2.googleapis.com/token.
Private Key: paste the private key inside the Service Account JSON file downloaded earlier.
Client Email: enter the email address during the service account creation process
Example:
Correct Format: MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAA
Incorrect Format: -----BEGIN PRIVATE KEY----\nMIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAA\n-----END PRIVATE KEY-----\n
Admin Email: enter the email address of the user for which the application is requesting delegated access. If there is no domain-wide authority delegated to the service account, enter the same email as entered in the Client Email field.
Click Submit.
Troubleshooting Tips
If you’re facing invalid_client or unauthorized_client issues, this might be due to incorrect service account credentials. Ensure the private key is pasted correctly. Since you cannot view the key after the first time, re-create the service account key, paste it into a text editor to verify there are no spaces or unexpected characters, and reconfigure the Google Cloud Identity integration.
If you are facing a response code 403, this might be due to missing permissions. Ensure that the service account has the required Cloud Identity roles and permissions as per the steps mentioned above.