Setting up a Zip Security & Google Workspace Identity Integration

This guide will walk you through the steps to configure a Google Workspace Identity client, which you should configure if you use Google Workspace as your IdP or if you want to use our SaaS app monitoring feature.

1. Setting up the Google Cloud Console

If you already set up a project when setting up the Google Device Management integration, then you can proceed to section 2.
  1. Navigate to https://console.cloud.google.com. If you’ve never logged in before, you will see a pop-up asking you to agree to the terms of service. You can click “agree and continue.”
Image without caption
2. Next, select the “Select a project” dropdown.
Image without caption
3. Change the selector to your organization from “no organization”. Our sample organization is zipsecurity.net. Your organization will likely be named after your primary domain. Once you select your organization, click the “NEW PROJECT” button. You may have to refresh the page to get the drop-down.
⚠️
You may need to complete the initial steps of the Google Cloud Organization setup process (Dashboard → Left side menu → IAM & Admin → Identity & Organization) for the Workspace → Cloud organization to be created. Completing step 1, “Enable Cloud Identity and create an organization” should be sufficient.
Image without caption
  1. You will be taken to the below screen. All you should have to fill out is the “project name” field. Name the project “zipsecurity” and then press CREATE.
    1. Image without caption
  1. Once you create the project, you should see the following loading screens. Once the project is created, select “SELECT PROJECT.”
Image without caption
Image without caption

2. Enabling APIs

  1. Navigate to https://console.cloud.google.com. In the drop-down on the top left of the screen, navigate to the project that you created in part one.
  1. Next, you are going to enable the Admin SDK & Cloud Identity APIs for the project. To do this, in the left hand sidebar click “Enabled APIs & services” and select the blue “+ ENABLE APIs & SERVICES” button under the search bar.
Image without caption
  1. Search for the Admin SDK API & enable it. Repeat the process for the Cloud Identity API.
    1. Searching for the APIs
      Searching for the APIs
      Admin SDK API
      Admin SDK API
      Image without caption
      Cloud Identity API
      Cloud Identity API

3. Creating Service Accounts

Now that you have created a project and enabled the APIs, you can move on to creating a service account.
  1. Create a service account by navigating to “Credentials” in the left-hand sidebar and then clicking the “CREATE CREDENTIALS” button, selecting the “Service account” option
    1. Image without caption
      Image without caption
  1. You will be taken to a screen where you can name and configure the service account. Name the service account “Zip Security Workspace Identity” and add an optional description (everything else should auto-fill) and press “Create and continue
    1. Image without caption
  1. Grant the service account “Owner” on the project and then select “Continue
    1. Image without caption
  1. You can skip the last prompt — we don’t need to configure the optional attributes. Select “DONE
    1. Image without caption
  1. You should now see the service account is active. Click on the service account, then navigate to the “Keys” tab to make a new credential and export that credential as a JSON. You will need the exported file again in step #4. You should see the following screens
    1. Image without caption
      Image without caption
      Image without caption
  1. Finally, navigate back to to “Details” tab. Copy the Unique ID field into your clipboard for the next step.
    1. Image without caption

4. Granting permissions to the Zip Service Account

Almost there! Now we have to grant the service account access to certain scopes.
Go to https://admin.google.com/ac/owl/domainwidedelegation and click “Add new”. Paste the Unique ID you just copied in step 2.6 into the ClientID field, and then paste the following scopes into the “scopes” tab. You can see this flow in the screenshots below. Please note that it can take a few minutes for permissions changes to take affect, so if you’re adding new permissions to an existing provider registration you may need to wait about 15 minutes prior to retrying the action.
plain text
https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.device.mobile.readonly, https://www.googleapis.com/auth/admin.directory.user.security, https://www.googleapis.com/auth/admin.reports.audit.readonly, https://www.googleapis.com/auth/admin.directory.customer.readonly, https://www.googleapis.com/auth/cloud-identity.groups.readonly
Note: The last scope, https://www.googleapis.com/auth/cloud-identity.groups.readonly is only used for Zip’s account sync feature with Azure.
The Domain-wide Delegation page looks like this:
Image without caption
Next to API clients, click Add new.
Image without caption
Paste the Unique ID copied from the service account setup step and paste the scopes listed above.
Image without caption
Image without caption

5. Connecting Zip <> Google using the service account

Finally, you can connect Zip to Google! Navigate to https://zipsecinc.cc and log in to your organization. Navigate to the “Organization Settings” page, then press “Add” under the providers section, and add a new Google Workspace Identity provider. Enter the email address of your Google Workspace Administrator (likely you, if you’re setting this up) in the email field. This will be used as the sending email address when you send emails via the Zip Console. Finally, copy/paste the contents of the .json file(s) you download in step 2.5.

Account Sync setup for managing Windows users with Google as a primary IDP

If you are planning to create new Azure accounts for managing Windows devices based off of your Google accounts, you also need to enter in your customer ID, which you can find by following the steps here: Go to Menu > Account > Account Settings > Profile. Next to Customer ID, find your organization's unique ID.
Image without caption
Image without caption
Once all of your required fields are filled, click “Save”! To complete the account sync setup, follow the instructions in our Account Sync documentation.

6. Troubleshooting Resources

If you’re coming across an error after adding the provider, the following may be useful:
In addition, you can always email info@zipsecinc.cc!

Powered by Notaku