Google Workspace
Visualize Google Workspace domain user groups, users, and their authorized tokens, map Google Workspace users to employees and managers, and monitor changes through queries and alerts.
- Installation guide
- Google Workspace data model
- Google Workspace types
Installation
For this integration, you will need to add necessary API scopes to your Google Worskpace as well as create a dedicated user and role with scopes and priveleges for JupiterOne within the Admin console.
Add the JupiterOne API scopes
Log in to the Google Workspace Admin Console as a super administrator to perform the following actions:
- Click Account Settings > Profile and retrieve your Customer ID. It will have a format similar to
C1111abcd
. Alternatively, click Security and expand Setup single sign-on (SSO) for SAML applications and copy theidpid
property value from the SSO URL. For example,https://accounts.google.com/o/saml2/idp?idpid=C1111abcd
provides the IDC1111abcd
. Retain this value for the Account ID field in the JupiterOne integration configuration. - Return to the Admin Console home page. Click Security > API controls.
- In the Domain wide delegation pane, select Manage Domain Wide Delegation.
- Click Add new and enter the JupiterOne Service Account client ID
102174985137827290632
(US region) or114158755753045408365
(EU Region) into the Client ID field.
The correct JupiterOne Service Account client ID to use will be shown to you in the integration configuration UI.
Add the following API scopes (comma separated):
https://www.googleapis.com/auth/admin.directory.domain.readonly, https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.group.readonly, https://www.googleapis.com/auth/admin.directory.user.security, https://www.googleapis.com/auth/apps.groups.settings, https://www.googleapis.com/auth/admin.directory.rolemanagement.readonly,https://www.googleapis.com/auth/admin.directory.device.mobile.readonly, https://www.googleapis.com/auth/admin.directory.device.chromeos.readonly, https://www.googleapis.com/auth/cloud-identity.devices.readonly, https://www.googleapis.com/auth/chrome.management.reports.readonly
Click Authorize.
Create a JupiterOne user in Google Workspace
Continuing in the Admin console, create a user the JupiterOne Service Account will impersonate.
Click Users > Add new user.
Enter First name "JupiterOne", Last name "SystemUser", Primary email "jupiterone-admin". Retain the email address for the Admin Email field in the JupiterOne integration configuration.
Click Add new user, and retain the temporary generated password for the next step.
In another browser (or using Chrome's Incognito feature), log in as the new user to set a complex password and accept the Google Workspaces Terms of Service. You may dispose of the password as it will not be used and may be reset by a super administrator in the future as needed.
Create a JupiterOne role in Google Workspace
Continuing in the Admin console, create a new role that will have only the permissions required by JupiterOne, and which will include only the jupiterone-admin system user.
Click Users, then click on the "JupiterOne SystemUser".
Click Admin roles and privileges, then click the icon to edit the user's roles
Click Create custom role > Create a new role.
Enter Name "JupiterOne System", a Description "Role for JupiterOne user to enable read-only access to Google Workspaces Admin APIs." If you have email controls that filter for employee impersonation attacks, you may want to change the name to something such as "j1-system”.
In the Privileges Admin console Privileges section, select these permissions:
- Manage Devices and Settings
- Chrome Management -> Manage Chrome OS Devices
- Chrome Management -> View Extensions List Report
In the Privileges Admin API Privileges section, select these permissions:
- Users -> Read
- Groups -> Read
- Domain Management
- User Security Management
To ingest role and role assignment data you must grant this account Super Admin permissions in addition to the custom role listed above. Permissions will still be restricted by the readonly API scopes if Super Admin permissions are granted, however access to group setting updates and token deletions will be an incidental side effect due to the limitations in the Google domain wide API settings.
These permissions will not be used by the JupiterOne integration, but if granting those permissions is unacceptable, please do not provide Super Admin permissions. The only ingestion items that will not be ingested due to missing Super Admin permissions are roles, role assignments, and token information.
Adding Scopes and Privileges
Changes to the integration may include additional data ingestion requiring authorization of new scopes and additional Admin API Privileges granted to the custom Admin Role.
To authorize additional scopes, log in to the Google Workspace Admin Console as a super administrator to perform the following actions.
Click Security > API controls.
In the Domain wide delegation pane, select Manage Domain Wide Delegation.
Identify the JupiterOne Service Account having the client ID
102174985137827290632
(US region) or114158755753045408365
(EU Region).Click Edit to add scopes.
Click Authorize.
To grant additional Admin API Privileges, return to the Admin console:
Click Admin roles, then click the "JupiterOne System" role.
Click Privileges to add additional privileges to enable JupiterOne to fetch new data.
Click Save.
Configuration in JupiterOne
To add the Google Workspace integration in JupiterOne, navigate to the Integrations tab in JupiterOne and select Google Workspace. Click New Instance to begin configuring your integration. Enter the following:
- Account Name by which you want to identify this Google Workspace account in JupiterOne. Ingested entities will have this value stored in
tag.AccountName
when the AccountName toggle is enabled. - Description that assist your team when identifying the integration instance.
- Select a Polling Interval that you feel is sufficient for your monitoring needs. You may leave this as
DISABLED
and manually execute the integration. - Enter the Customer ID collected during the setup of Google Workspace.
- Enter the Email Address of the user created during setup of Google Workspace.
Click Create once all values are provided to finalize the integration.
Integration Jobs Events
A common log when running the integration job is Permission denied reading tokens for N users. This happens when the credentials provided to JupiterOne are insufficient for reading tokens of users with greater permissions, such as those with the Super Admin role assignment. This is not an error, but is only listed as informational.
As noted, this is due to the "JupiterOne SystemUser" that is configured for integration purposes not having sufficient permissions to list the tokens for users with higher privileges, such as the "Super Admin" Role. These tokens are not necessary for the job to complete and all other data will still be retrieved.
Next steps
Now that your integration instance has been configured, it will begin running on the polling interval you provided, populating data within JupiterOne. Continue on to our Instance management guide to learn more about working with and editing integration instances.
Data Model
Entities
The following entities are created:
Resources | Entity _type | Entity _class |
---|---|---|
Account | google_account | Account |
Chrome Extension | google_chrome_extension | Application |
Chrome OS Device | google_chrome_os_device | Device |
Device | google_device | Device |
Domain | google_domain | Domain |
Group | google_group | Group |
Group Settings | google_group_settings | Configuration |
Mobile Device | google_mobile_device | Device |
Role | google_role | AccessRole |
Site | google_site | Site |
Token | google_token | AccessKey |
User | google_user | User |
Relationships
The following relationships are created:
Source Entity _type | Relationship _class | Target Entity _type |
---|---|---|
google_account | MANAGES | google_chrome_os_device |
google_account | MANAGES | google_device |
google_account | HAS | google_group |
google_account | MANAGES | google_mobile_device |
google_account | HAS | google_role |
google_account | HAS | google_user |
google_group | HAS | google_group |
google_group | HAS | google_group_settings |
google_group | HAS | google_user |
google_site | HAS | google_user |
google_token | ALLOWS | mapped_entity (class Vendor) |
google_user | ASSIGNED | google_role |
google_user | ASSIGNED | google_token |
Google Domain
google_domain
inherits from Domain
Property | Type | Description | Specifications |
---|---|---|---|
primary * | boolean | ||
verified * | boolean |
Google Account
google_account
inherits from Account
Property | Type | Description | Specifications |
---|---|---|---|
domains * | array of string s | ||
primaryDomain | string | ||
accountId | string | ||
vendor * | string | default: Google |
Google Role
google_role
inherits from AccessRole
Property | Type | Description | Specifications |
---|---|---|---|
kind | string | null | The type of the resource. Always admin#directory#role. | |
vendor * | string | default: Google |
Google User
google_user
inherits from User
Property | Type | Description | Specifications |
---|---|---|---|
suspended * | boolean | ||
archived * | boolean | ||
agreedToTerms | boolean | null | ||
changePasswordAtNextLogin | boolean | null | ||
creationTime | number | ||
deletionTime | number | ||
lastLoginOn | number | ||
lastLoginTime | number | ||
customerId | string | null | ||
hashFunction | string | null | Examples: MD5, SHA-1, crypt | |
includeInGlobalAddressList * | boolean | ||
ipWhitelisted * | boolean | ||
admin * | boolean | ||
isAdmin * | boolean | ||
isDelegatedAdmin * | boolean | ||
isEnforcedIn2Sv * | boolean | ||
isEnrolledIn2Sv * | boolean | ||
isMailboxSetup * | boolean | ||
kind | string | null | The type of the resource. Always admin#directory#user for users. | |
orgUnitPath | string | null | ||
primaryEmail | string | null | ||
recoveryEmail | string | null | ||
recoveryPhone | string | null | ||
suspensionReason | string | null | ||
thumbnailPhotoUrl | string | null | ||
aliases | array | null |
Google Site
google_site
inherits from Site
Property | Type | Description | Specifications |
---|---|---|---|
name * | string | ||
type | string | null | ||
area | string | null | ||
buildingId | string | null | ||
floorName | string | null | ||
floorSection | string | null | More specific location within the floor. For example if a floor is divided into sections "A", "B" and "C" this field would identify one of those values. |
Google Group
google_group
inherits from Group
Property | Type | Description | Specifications |
---|---|---|---|
adminCreated | boolean | null | ||
directMembersCount | string | null | ||
email | string | null | ||
kind | string | null | The type of the resource. Always admin#directory#group for groups. | |
aliases | array | null | ||
nonEditableAliases | array | null | The list of the group's non-editable alias email addresses that are outside of the account's primary domain or subdomains. |
Google Group Settings
google_group_settings
inherits from Configuration
Property | Type | Description | Specifications |
---|---|---|---|
email | string | ||
whoCanJoin | string | null | Any of: ANYONE_CAN_JOIN ALL_IN_DOMAIN_CAN_JOIN INVITED_CAN_JOIN CAN_REQUEST_TO_JOIN | |
whoCanViewMembership | string | null | Any of: ALL_IN_DOMAIN_CAN_VIEW ALL_MEMBERS_CAN_VIEW ALL_MANAGERS_CAN_VIEW | |
whoCanViewGroup | string | null | Any of: ANYONE_CAN_VIEW ALL_IN_DOMAIN_CAN_VIEW ALL_MEMBERS_CAN_VIEW ALL_MANAGERS_CAN_VIEW | |
allowExternalMembers | boolean | null | ||
whoCanPostMessage | string | null | Any of: NONE_CAN_POST ALL_MANAGERS_CAN_POST ALL_MEMBERS_CAN_POST ALL_OWNERS_CAN_POST ALL_IN_DOMAIN_CAN_POST ANYONE_CAN_POST | |
allowWebPosting | boolean | null | ||
primaryLanguage | string | null | ||
isArchived | boolean | null | ||
archiveOnly | boolean | null | ||
messageModerationLevel | string | null | Any of: MODERATE_ALL_MESSAGES MODERATE_NON_MEMBERS MODERATE_NEW_MEMBERS MODERATE_NONE | |
spamModerationLevel | string | null | Any of: ALLOW MODERATE SILENTLY_MODERATE REJECT | |
replyTo | string | null | Any of: REPLY_TO_CUSTOM REPLY_TO_SENDER REPLY_TO_LIST REPLY_TO_OWNER REPLY_TO_IGNORE REPLY_TO_MANAGERS | |
customReplyTo | string | null | ||
includeCustomFooter | boolean | null | ||
customFooterText | string | null | The maximum number of characters is 1,000. | |
sendMessageDenyNotification | boolean | null | ||
defaultMessageDenyNotificationText | string | null | ||
membersCanPostAsTheGroup | boolean | null | ||
includeInGlobalAddressList | boolean | null | ||
whoCanLeaveGroup | string | null | Any of: ALL_MANAGERS_CAN_LEAVE ALL_MEMBERS_CAN_LEAVE NONE_CAN_LEAVE | |
whoCanContactOwner | string | null | Any of: ALL_IN_DOMAIN_CAN_CONTACT ALL_MANAGERS_CAN_CONTACT ALL_MEMBERS_CAN_CONTACT ANYONE_CAN_CONTACT ALL_OWNERS_CAN_CONTACT | |
favoriteRepliesOnTop | boolean | null | ||
whoCanApproveMembers | string | null | Any of: ALL_MEMBERS_CAN_APPROVE ALL_MANAGERS_CAN_APPROVE ALL_OWNERS_CAN_APPROVE NONE_CAN_APPROVE | |
whoCanBanUsers | string | null | Any of: ALL_MEMBERS OWNERS_AND_MANAGERS OWNERS_ONLY NONE | |
whoCanModerateMembers | string | null | Any of: ALL_MEMBERS OWNERS_AND_MANAGERS OWNERS_ONLY NONE | |
whoCanModerateContent | string | null | Any of: ALL_MEMBERS OWNERS_AND_MANAGERS OWNERS_ONLY NONE | |
whoCanAssistContent | string | null | Any of: ALL_MEMBERS OWNERS_AND_MANAGERS MANAGERS_ONLY OWNERS_ONLY NONE | |
customRolesEnabledForSettingsToBeMerged | boolean | null | ||
enableCollaborativeInbox | boolean | null | ||
whoCanDiscoverGroup | string | null | Any of: ALL_MEMBERS_CAN_DISCOVER ALL_IN_DOMAIN_CAN_DISCOVER ANYONE_CAN_DISCOVER |
Google Token
google_token
inherits from AccessKey
Property | Type | Description | Specifications |
---|---|---|---|
clientId | string | null | ||
scopes | array | null | ||
anonymous | boolean | null | ||
nativeApp | boolean | null | ||
userKey | string | null |
Google Chrome Os Device
google_chrome_os_device
inherits from Device
Property | Type | Description | Specifications |
---|---|---|---|
serialNumber | string | null | ||
supportEndDate | number | null | The final date the device will be supported. This is applicable only for those devices purchased directly from Google. | |
platformVersion | string | null | ||
firmwareVersion | string | null | ||
macAddress | string | null | ||
lastSync | number | ||
lastEnrollementTime | number | This property is deprecated. Use lastEnrollmentTime instead. | deprecated: true |
lastEnrollmentTime | number | ||
bootMode | string | null | Any of: Verified Dev | |
tpmFamily | string | TPM 2.0 style encoding Examples: TPM 1.2: "1.2" -> 312e3200 | |
tpmFirmwareVersion | string | ||
tpmManufacturer | string | ||
tpmSpecLevel | string | ||
tpmModel | string | ||
tpmVendorId | string | ||
googleStatus | string | null | Any of: ACTIVE DELINQUENT PRE_PROVISIONED DEPROVISIONED DISABLED INACTIVE RETURN_ARRIVED RETURN_REQUESTED SHIPPED UNKNOWN | |
annotatedUser | string | null | ||
recentUsersType | array of string s | ||
recentUsersEmail | array of string s |
Google Mobile Device
google_mobile_device
inherits from Device
Property | Type | Description | Specifications |
---|---|---|---|
serialNumber | string | null | ||
adbStatus | boolean | null | Adb (USB debugging) enabled or disabled on device | |
brand | string | null | ||
deviceCompromisedStatus | string | null | ||
email | string | ||
encryptionStatus | string | null | ||
firstSyncOn | number | ||
hardware | string | null | ||
hardwareId | string | null | The IMEI/MEID unique identifier for Android hardware | |
imei | string | null | ||
lastSyncOn | number | ||
manufacturer | string | null | ||
ownerName | string | ||
os | string | null | Examples: IOS 4.3, Android 2.3.5 | |
type | string | null | ||
wifiMacAddress | string | null | ||
macAddress | string | null | ||
userAgent | string | null | ||
googleStatus | string | null | Any of: ACTIVE DELINQUENT PRE_PROVISIONED DEPROVISIONED DISABLED INACTIVE RETURN_ARRIVED RETURN_REQUESTED SHIPPED UNKNOWN |
Google Device
google_device
inherits from Device
Property | Type | Description | Specifications |
---|---|---|---|
lastSyncedOn | number | ||
ownerType | string | null | ||
deviceType | string | null | ||
securityPatchedOn | number | ||
encryptionState | string | null | ||
serialNumber | string | null | ||
byod * | boolean | Please use BYOD instead. | deprecated: true |
imei | string | null | ||
meid | string | null | ||
wifiMacAddresses | array | null | ||
macAddress | array | null | ||
networkOperator | string | null | ||
releaseVersion | string | null | Examples: 6.0 | |
brand | string | null | Examples: Samsung | |
buildNumber | string | null | ||
kernelVersion | string | null | ||
basebandVersion | string | null | ||
enabledDeveloperOptions | boolean | null | ||
otherAccounts | array | null | ||
enabledUsbDebugging | boolean | null | ||
bootloaderVersion | string | null | ||
managementState | string | null | ||
compromisedState | string | null | ||
androidEnabledUnknownSources | boolean | null | ||
androidSupportsWorkProfile | boolean | null | ||
androidOwnerProfileAccount | boolean | null | ||
androidOwnershipPrivilege | string | null |
Google Chrome Extension
google_chrome_extension
inherits from Application
Property | Type | Description | Specifications |
---|---|---|---|
installType | string | null | ||
source | string | null | ||
type | string | null | ||
deviceCount * | number | null | ||
disabled | boolean | null | ||
uri | string | null | ||
permissions * | string |