Skip to content

Activity Insights - Google

To display activity data from Google, you first must create an OAuth application. You’ll then connect the following required sources so that Identity Security Cloud can gather your Google accounts and their activity data.

Required Connectors

Connector Description
Google The identity governance connector allows you to manage your Google accounts in Identity Security Cloud.
Activity Insights - Google The Activity Insights connector works with your Google identity governance connector to provide activity data for identities.

Creating a Service Account in Google

Before activity insights can display in Identity Security Cloud, you must create a service account in Google. You’ll use this account to connect Google to Identity Security Cloud.

  1. Create a project for Google - Activity Insights in Google.
  2. Create a service account. You’ll use this account to connect Google to Identity Security Cloud.
  3. Create a private key for your service account. You'll use this key to connect Google to Identity Security Cloud.

Connecting Google to Identity Security Cloud for Activity Insights

To connect Google to Identity Security Cloud, you’ll need to configure the Google identity governance and Activity Insights - Google sources. This will allow Identity Security Cloud to gather account information and activity data from Google.

Configuring the Google Identity Governance Source

Follow the directions to configure your Google source in Identity Security Cloud. You can also edit an existing one.

Configuring the Activity Insights - Google Source

To display activity data from Activity Insights, you must configure the Activity Insights - Google source in Identity Security Cloud.

  1. Go to Admin > Connections > Sources.
  2. Select Create New to create a new source.
  3. Search for and select the Activity Insights - Google connector.
  4. Enter a name and description for the source.
  5. In the Source Owner field, begin typing the name of an owner. Matches appear after you type two letters.
  6. (Optional) Select a governance group for source management.
  7. Select the checkbox if the source is an authoritative source. 
  8. Select Continue to create the source.
  9. Select Configuration from the left panel.
  10. Enter the following information:

    • Email Address of Service Account - Copy the email address for the service account from the Service accounts page in Google.

    • Email Address of User to Impersonate - Enter the email address of the user to impersonate.

    • Private Key - Copy and paste the private key you created.

  11. Select Save to save your settings.

  12. Select Review and Test from the left panel.
  13. Select Test Connection to test the connection between the applications. You must have a successful connection for Identity Security Cloud to gather activity data. If the test is unsuccessful, retry your credentials or contact SailPoint Support.

To gather account data, you must correlate accounts and run an aggregation for the Google identity governance source. Your activity data will begin syncing immediately but may take up to 24 hours to display. Data will then update daily.

Required Permissions

Your Google service account must have Super Admin access for Identity Security Cloud to pull usage data on Google users.

Requested Scopes

Identity Security Cloud requests the following scopes:

Scope Description
https://www.googleapis.com/auth/admin.reports.audit.readonly View audit reports for your G-Suite domain.
https://www.googleapis.com/auth/admin.reports.usage.readonly View usage reports for your G-Suite domain.

Documentation Feedback

Feedback is provided as an informational resource only and does not form part of SailPoint’s official product documentation. SailPoint does not warrant or make any guarantees about the feedback (including without limitation as to its accuracy, relevance, or reliability). All feedback is subject to the terms set forth at https://developer.sailpoint.com/discuss/tos.