Google Workspace | Entitle

Overview

Google Workspace is a collection of cloud computing, productivity, and collaboration tools, software, and products developed by Google. It consists of Gmail, Contacts, Calendar, Meet, and Chat for communication; Currents for employee engagement; Drive for storage; and the Google Docs Editors suite for content creation.

Entitle can manage groups and admin roles in Google Workspace.

This page will provide you with instructions on how to integrate Entitle and Google Workspace.

General guidelines

ℹ️

In case you have already integrated the Google Workspace as a Directory with Entitle using this guide, the steps on this page are identical to it.**

To integrate your Google Workspace in Entitle, you will need to run the entitle_google_integrator setup that you have downloaded and unzipped on the Google Integrations page, and configure a Domain-Wide Delegation.

Set up Google Workspace to work with Entitle

Stage 1: Run the setup script

The setup will consist of the following actions:

  • Create an Entitle service account in the chosen project
  • Enable the required API service for the integration:
  • Generate a key for the service account and download it to your local machine
  1. Go to your GCP web console.
  2. Choose the project that you chose to create Entitle's service account at the top left corner.
  3. Click on the shell icon at the top right corner.
  1. Navigate to the path of the unzipped folder entitle_google_integrator, and run the following commands:
# For a basic configuration, create a service account in the current project and assign the role to it at the project-level
bash run.sh -i workspace -k

# For more options use the -h flag
bash run.sh -h
  1. Download the created JSON file on setup completion. you will use it later in this guide.

Stage 2: Configure domain-wide delegation

Your service account needs to have domain-wide delegation on a certain scope.

  1. Go to the Manage Domain-Wide Delegation page
  2. Click Add new.
  1. In the Client ID field, enter the 21-digit number obtained from the key JSON file under the client_id field.

  2. In the OAuth scopes field, enter the following scopes.

    https://www.googleapis.com/auth/admin.directory.group,
    https://www.googleapis.com/auth/admin.directory.group.readonly, 
    https://www.googleapis.com/auth/admin.directory.user,
    https://www.googleapis.com/auth/admin.directory.user.readonly,
    
    // This scope is required to allow Entitle to get webhooks on changes in your Workspace
    https://www.googleapis.com/auth/admin.reports.audit.readonly
    
    // These scopes are optional and used for managing admin roles:
    https://www.googleapis.com/auth/admin.directory.rolemanagement,
    https://www.googleapis.com/auth/admin.directory.rolemanagement.readonly

  3. Click Authorize.

Creating the integration in Entitle

  1. Log in to Entitle and go to the Integrations page.
  2. After clicking the Add Integration button, type Google Workspace in the Application field.
  3. In the Connection drop-down, choose Explicit Service Account.
  4. Don’t forget to set Save on correctly on your agent or Entitle’s cloud.
  1. Under the service_account_key field, paste the downloaded key JSON of your service account.

  2. Under credential_subject enter an email of an admin in your organization which has permission to view all users and groups in your organization.

ℹ️

Admin roles are detected automatically based on the granted domain-wide delegation scopes.

Example connection JSON

{
  "service_account_key": {}, // Full service account key JSON from the integration setup
  "credential_subject": "" // Admin email with permission to view all users and groups
}
  1. Click Save.

What's next?

Make sure your setup is complete by testing your integration.


©2003-2026 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.