Introduction
To leverage Reco's full potential in enhancing security and generating contextual insights, it is essential to connect it seamlessly with your Google Workspace Active Directory (AD). By doing so, Reco gains access to pertinent information, pulling user details, user groups, and domain data. Follow the steps below to establish a robust connection between Reco and your Google Workspace AD.
Disclosure
Reco AI's use and transfer of information received from Google APIs to any other application complies with the Google API Services User Data Policy, including the limited use requirements.
Prerequisites:
The user performing the integration must have the G-Suite Super Admin role assigned
A Reco user with Admin Role
Integrate Google Workspace AD with Reco
Login to the Reco Platform
Click on "Configurations" then click on "Integrations"
Locate the "Google Workspace" object and click on "Add Integration"
If the integration is successful, the Google Workspace Integration status will become "Active"
5. You might get the following error message from Google due to a config (we are during a verification process): The app is blocked
Kindly login to your Google admin account
Go to the API Controls - "Manage Third Party App Access"β
What do we ingest exactly?
Scope | Meaning | Reference |
admin.directory.user.readonly | Scope for only retrieving users or user aliases. | |
admin.directory.group.readonly | Scope for only retrieving group, group alias, and member information. | |
admin.directory.group.member.readonly | Scope for only retrieving group member roles and information. | |
admin.directory.domain | Scope for access to all domain operations. | |
admin.directory.domain.readonly | Scope for only retrieving domains. | |
admin.directory.rolemanagement.readonly | Scope for retrieving roles. | |
directory.readonly | Scope for ingesting people data. | |
admin.reports.usage.readonly | Scope for ingesting user usage reports. | |
calendar | Scope for ingesting calendars' access control rules. |