Skip to content

Commit da95999

Browse files
CSOAR-4315: Added Google Identity Platform Integration (#6117)
* CSOAR-4315: Added doc for identity platform integration * CSOAR-4315: changed date * Updates from review --------- Co-authored-by: John Pipkin <jpipkin@sumologic.com>
1 parent c341c16 commit da95999

File tree

2 files changed

+106
-0
lines changed

2 files changed

+106
-0
lines changed
Lines changed: 106 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,106 @@
1+
---
2+
title: Google Identity Platform
3+
description: ''
4+
---
5+
6+
import useBaseUrl from '@docusaurus/useBaseUrl';
7+
8+
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/google.png')} alt="google" width="80"/>
9+
10+
***Version: 1.0
11+
Updated: Dec 17, 2025***
12+
13+
Google Identity Platform is a cloud-based authentication service that centralizes user identity management and sign-in flows for applications, offering extensibility and advanced controls suitable for enterprise environments.
14+
15+
## Actions
16+
17+
* **List Users** (*Enrichment*) - List account information for all users.
18+
* **Get User** (*Enrichment*) - Get the user account information.
19+
* **Delete User** (*Containment*) - Remove a user account from the system.
20+
* **Update User Attributes** (*Containment*) - Modify user details such as password, status, or settings.
21+
* **List Sign-in Methods** (*Enrichment*) - View authentication providers linked to a user.
22+
* **Remove MFA** (*Containment*) - Removes the specified multi-factor authentication enrollment from a user account.
23+
24+
## Google Identity Platform Authentication Configuration
25+
26+
Our Google Identity Platform integration supports two types of authentication, Service Account and WIF (Workload Identity Federation). We recommend using WIF since it is more secure and easier to manage. For more information, see [Workload Identity Federation](https://cloud.google.com/iam/docs/workload-identity-federation).
27+
28+
## Required AWS details from Sumo Logic
29+
30+
To configure the Google Identity Platform integration using WIF authentication, you need the following AWS details from Sumo Logic. These details are essential for setting up the Workload Identity Federation (WIF) credentials in Google Workspace:
31+
* Deployment name is the unique name of your Sumo Logic [deployment](/docs/api/about-apis/getting-started/#documentation), for example, `dub`, `fra`, etc.
32+
* Sumo Logic AWS account ID: `926226587429`
33+
* Sumo Logic AWS role: `<deployment_name>-csoar-automation-gcpiam`
34+
* Sumo Logic AWS Lambda function: `<deployment_name>-csoar-automation-gcpiam`
35+
* Full ARN: `arn:aws:sts::926226587429:assumed-role/<deployment_name>-csoar-automation-gcpiam/<deployment_name>-csoar-automation-gcpiam`
36+
37+
38+
### Workload Identity Federation (WIF) authentication
39+
40+
To [create WIF credentials](https://cloud.google.com/iam/docs/workload-identity-federation) in Google Workspace needed to configure the Google Identity Platform integration, follow these steps:
41+
1. Log in to the [Google Cloud](https://console.cloud.google.com) portal.
42+
2. Select a Google Cloud project (or create a new one).
43+
3. Go to the **API&Services**.
44+
4. In the same page click on **ENABLED API AND SERVICES** and search for Cloud Resource Manager API, IAM Service Account Credentials API, Identity and Access Management (IAM) API, Security Token Service API, Google Identity Platform API, and enable it all.
45+
5. Go to the **IAM & Admin** > **Service Accounts** page.
46+
6. Click **CREATE SERVICE ACCOUNT**. A [service account](https://cloud.google.com/iam/docs/service-accounts-create) is required to access the Google Identity Platform.
47+
7. While creating the service account, in **Permissions** add the role **Service Account Token Creator** and click on **DONE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-11.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
48+
8. Go to the **IAM & Admin** > **Workload Identity Federation** page. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-4.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
49+
9. Click **CREATE POOL**, provide the details, and click on **CONTINUE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-5.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
50+
10. Add **Provider details**. Select **AWS** as the provider type and provide the details of the AWS Account ID which is provided by Sumo Logic. Click on **CONTINUE** and **SAVE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-6.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
51+
11. Now you will see the created pool and provider. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-8.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
52+
12. Now we have to build a principal name to configure in Sumo Logic. The format of the principal name is: `principalSet://iam.googleapis.com/projects/{YourProjectID}/locations/global/workloadIdentityPools/{YourPoolName}/attribute.aws_role/arn:aws:sts::{SumoAWSAccountID}:assumed-role/{SumoAWSRole}/{SumoAWSLambdaFunction}`.
53+
13. Go to the **IAM & Admin** > **IAM** page and click on **Grant Access** to add a new principal.
54+
14. In the **New principals** field, provide the above principal name and select the role **Workload Identity User**. Click on **SAVE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-12.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
55+
15. Go to the **IAM & Admin** > **Workload Identity Federation** page and select the pool which was created above.
56+
16. Click on **Grant Access** > **Grant access using service account impersonation**.
57+
17. Select the service account which created above, select the principle as `aws_role` and provide the arn `arn:aws:sts::{SumoAWSAccountID}:assumed-role/{SumoAWSRole}` and click on **SAVE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-10.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
58+
18. Again go to **Grant Access** > **Grant access using service account impersonation**. Select the service account which was created above. Select the principle as `aws_role` and provide the arn `arn:aws:sts::{SumoAWSAccountID}:assumed-role/{SumoAWSRole}/{SumoAWSLambdaFunction}`. Click on **SAVE**.
59+
19. Download the WIF `conf.json` file. Make sure you save it in a safe place. Use the JSON content to configure the Google Identity Platform integration to use WIF authentication in Automation Service and Cloud SOAR.
60+
61+
### Service Account authentication
62+
63+
To [create service account credentials](https://developers.google.com/workspace/guides/create-credentials) in Google Workspace needed to configure the Google Identity Platform app integration, follow these steps:
64+
65+
1. Log in to the [Google Cloud](https://console.cloud.google.com) portal.
66+
2. Select a Google Cloud project (or create a new one).
67+
3. Go to the **API & Services** > **Credentials** page.
68+
4. In the same page click on **ENABLES API AND SERVICES** and search for Google Identity Platform and enable it.
69+
5. Click **CREATE CREDENTIALS** and select **Service Account**.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-1.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
70+
6. Enter a service account name to display in the Google Cloud console. The Google Cloud console generates a service account ID based on this name.
71+
7. (Optional) Enter a description of the service account.
72+
8. Skip two optional grant permissions steps and click **Done** to complete the service account creation.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-2.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
73+
9. Click on the generated service account to open the details.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-3.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
74+
10. Under the **KEYS** tab, click **ADD KEY** and choose **Create new key**.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-4.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
75+
11. Click on **CREATE** (make sure **JSON** is selected).<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-5.png')} style={{border:'1px solid gray'}} alt="google-drive" width="400"/>
76+
12. The JSON file is downloaded. Make sure you save it in a safe place.
77+
13. Enable the Admin SDK API for the project at [https://console.cloud.google.com/flows/enableapi?apiid=admin.googleapis.com](https://console.cloud.google.com/flows/enableapi?apiid=admin.googleapis.com).
78+
79+
## Configure Google Identity Platform in Automation Service and Cloud SOAR
80+
81+
import IntegrationsAuth from '../../../../reuse/integrations-authentication.md';
82+
import IntegrationCertificate from '../../../../reuse/automation-service/integration-certificate.md';
83+
import IntegrationEngine from '../../../../reuse/automation-service/integration-engine.md';
84+
import IntegrationLabel from '../../../../reuse/automation-service/integration-label.md';
85+
import IntegrationProxy from '../../../../reuse/automation-service/integration-proxy.md';
86+
import IntegrationTimeout from '../../../../reuse/automation-service/integration-timeout.md';
87+
88+
<IntegrationsAuth/>
89+
* <IntegrationLabel/>
90+
* **Private Key Json**. Provide the content of the JSON file generated [above](#google-identity-platform-authentication-configuration). Open the file and copy-paste the whole content in the field.
91+
92+
* **WIF Private Key Json**. Provide the content of the Workload Identity Federation JSON file generated [above](#google-identity-platform-authentication-configuration). Open the file and copy-paste the whole content in the field.
93+
94+
* **scopes**. Default scope is already added as `https://www.googleapis.com/auth/identitytoolkit`, if not then add this scope.
95+
96+
* **Project ID**. Provide the Google Identity Platform Project ID where the identity platform actions will be performed.
97+
* <IntegrationEngine/>
98+
* <IntegrationProxy/>
99+
100+
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-identity-platform/google-identity-platform.png')} style={{border:'1px solid gray'}} alt="Google identity platform configuration" width="400"/>
101+
102+
For information about Google Identity Platform, see [Google identity platform documentation](https://cloud.google.com/security/products/identity-platform).
103+
104+
## Change Log
105+
106+
* December 17, 2025 (v1.0) - First upload
116 KB
Loading

0 commit comments

Comments
 (0)