Skip to main content

Connecting to Google Cloud Platform

This article provides step-by-step instructions for setting up the Google Cloud Platform (GCP) Connector in EmpowerID. It explains key configuration attributes, walks through creating an account store to connect to GCP, and outlines verification steps to establish integration between the platforms.

Understanding Key Configuration

Before creating the account store, familiarize yourself with the key configuration attributes required for connecting to GCP. Ensure you have the necessary configuration values by consulting with the deployment team or EmpowerID to streamline the setup process. For detailed technical deployment information, refer to the Deployment of the GCP Connector Environment documentation.

Required Attributes

AttributeDescription
App Service Base URLThe URL where the microservices for GCP are deployed on the Google Cloud Platform.
OAUTH2 Token Target AudienceThe Audience parameter for the Google Auth Token in GCP.
Certificate NameThe certificate name created or uploaded for the IAP Service Account.
Service Account EmailThe IAP Service Account used for OAuth2 authentication between EmpowerID and the microservice.

Step 1: Create a GCP Account Store

To connect Google Cloud Platform with EmpowerID, you need to create an account store. This allows EmpowerID to import and manage user and group information from GCP, synchronizing it with connected back-end directories.

Creating the Account Store

  1. Log in to the EmpowerID portal.

  2. Navigate to Admin → Applications and Directories and click Account Stores and Systems.

  3. On the Account Stores page, click the Actions tab and then click Create Account Store.

  4. Under System Types, search for Google Cloud Platform SCIM, select the corresponding record, and click Submit.

    This opens the Google Cloud Platform SCIM form, which is where you enter the information needed to connect EmpowerID.

  5. Provide the required information:

    • Account Store Name: Enter a unique, descriptive name.
    • App Service Base URL: Provide the deployment URL of the GCP microservices (must start with https:// and end with /).
    • OAUTH2 Token Target Audience: Specify the Audience parameter for the Google Auth Token created in GCP.
    • Certificate Name: Select the certificate configured for the IAP Service Account.
    • Service Account Email: Enter the IAP Service Account email used for OAuth2 authentication.
  6. Click Submit to create the account store.

Once completed, your Google Cloud Platform account store is successfully created.

Step 2: Verify Resource System Parameters

After creating the account store, default resource system parameters are configured. Verify these settings to ensure they meet your requirements.

  1. Navigate to Admin → Applications and Directories → Account Stores and Systems.

  2. Select the Account Stores tab.

  3. Search for the GCP account store and click the Account Store link.

    This directs you to the Account Store and Resource System page for the Google SCIM connector.

  4. On the Account Store and Resource System page, select the Resource System tab.

  5. Expand the Configuration Parameters section.

  6. Review the listed parameters and modify them as needed:

    • Click the Edit button next to a parameter.
    • Enter the new value in the Value field.
    • Click Save.

Ensure all required configurations are correctly set before proceeding.

Details
Attribute NameDescription
AccountAttributeSyncDirtyIndicates whether the account attribute synchronization is marked as dirty. The default value is false.
AppServiceBaseUrlThe microservices for GCP are deployed on the Google Cloud platform and have a specific URL, which is the app service base URL. The URL starts with the protocol HTTPS and ends with a leading slash (/).
AuditLogGraceTimePeriodInMinutesTime period in minutes for grace period in audit logs. The default value is 120.
AuthorizationProviderFullAssemblyNameFull assembly name of the authorization provider.
AuthorizationProviderTypeType of the authorization provider used.
CreateGroupUrlURL endpoint to create a group. The default value is /v1/Groups.
CreateOrUpdateGroupJsonTemplateJSON template for creating or updating a group. The default value is {"displayName":null, "description": null, "email": null}.
CreateOrUpdateUserJsonTemplateJSON template for creating or updating a user.
CreateUserUrlURL endpoint to create a user. Default value is /v1/users.
ExternalSystemSupportIncrementalMemberIndicates if the external system supports incremental member updates. The default value is false.
GetAddGroupMemberUrlURL endpoint to query group members to add. The default value is /EIDExtension/MemberQuery.
GetDeleteorUpdateGroupByIdUrlURL endpoint to delete or update a group by its ID. The default value is /v1/Groups/{0}.
GetDeleteOrUpdateGroupMemberUrlURL endpoint to delete or update a group member. The default value is /EIDExtension/MemberQuery/{0}/{1}.
GetDeleteorUpdateUserByIdUrlURL endpoint to delete or update a user by its ID. The default value is /v1/Users/{0}.
IsIncrementalInventoryIndicates if the inventory is incremental. The default value is true.
OAuth2PrivateKeyThe certificate's thumbprint created or uploaded for SA2 or the IAP Service Account.
OauthTargetAudienceTarget audience for OAuth2 authentication.
QueryChangedGroupMembersUrlURL endpoint to query changed group members. The default value is /EIDExtension/ChangedMemberQuery.
QueryChangedGroupsUrlURL endpoint to query changed groups.
QueryChangedUsersUrlURL endpoint to query changed users.
QueryGroupMembersUrlURL endpoint to query group members.
QueryGroupsUrlURL endpoint to query groups.
QueryOrganizationsUrlURL endpoint to query organizations.
QueryResourcesUrlURL endpoint to query resources.
QueryUsersUrlURL endpoint to query users.
ServiceAccountEmailThe SA2 Service account, responsible for OAuth2 authentication between EID and the microservice.

Step 3: Verify the GCP Account Store Integration

To confirm that the GCP Connector is operational, check if users and groups are successfully inventoried into EmpowerID.

  1. Navigate to Admin → Applications and Directories → Account Stores and Systems.
  2. Select the Account Stores tab.
  3. Search for the newly created GCP Account Store and click its name.
  4. Click on the User Accounts tab.
  5. Ensure that user accounts have been added. Note that results will only be available after the inventory job has run.

With these steps, you have successfully integrated EmpowerID with Google Cloud Platform. You can now manage user and group information within EmpowerID, leveraging its advanced identity and access management features.