Connecting Google Workspace with a delegated "Admin Role"

ALLOWED ROLES

List of roles that can connect 

  • Super Admin 

  • Admin - role with following permissions under Admin Console Privileges 

    • Organisation Units : Read

    • Users : Read

    • Skip the services section

    • Security : User Security Management

    • Security : Security Settings

    • Domain Settings

    • Reports

And following permissions under Admin API Privileges

  • Organisation Units : Read

  • Users : Read

  • Groups : Read

  • Skip the services section

  • User Security Management

  • Licence Read

  • Billing Read

  • Domain Management

  • Domain Allowlist Read

 

NOTE  :  

  1. You can verify permissions here by clicking on the role which is assigned to the user

  2. Make sure assigned user has access to all organizatioal units

 

  

STEPS TO CREATE A CUSTOM ROLE

  1. Login to Admin Dashboard .

  2. Click on Accounts -> Admin Roles

  3. Click on create a new role.

  4. Give relevant name and description for the role

  5. Under Admin Console Privileges select the following

    1. Organisation Units : Read

    2. Users : Read

    3. Skip the services section

    4. Security : User Security Management

    5. Security : Security Settings

    6. Domain Settings

    7. Reports

  6. Under Admin API Privileges select the following

    1. Organisation Units : Read

    2. Users : Read

    3. Groups : Read

    4. Skip the services section

    5. User Security Management

    6. Licence Read

    7. Billing Read

    8. Domain Management

    9. Domain Allowlist Read

  1. Click on create role

  2. Assign the role to the user who is going to connect the integration.

  3. When assigning the role make user is is added to all organisational units

  4.  You can refer to this video  for better understanding.

Can’t find what you are looking for? Let us help you!

Connecting Google Workspace with a delegated "Admin Role"

Modified on Wed, 15 Mar, 2023 at 1:28 AM

ALLOWED ROLES

List of roles that can connect 

  • Super Admin 

  • Admin - role with following permissions under Admin Console Privileges 

    • Organisation Units : Read

    • Users : Read

    • Skip the services section

    • Security : User Security Management

    • Security : Security Settings

    • Domain Settings

    • Reports

And following permissions under Admin API Privileges

  • Organisation Units : Read

  • Users : Read

  • Groups : Read

  • Skip the services section

  • User Security Management

  • Licence Read

  • Billing Read

  • Domain Management

  • Domain Allowlist Read

 

NOTE  :  

  1. You can verify permissions here by clicking on the role which is assigned to the user

  2. Make sure assigned user has access to all organizatioal units

 

  

STEPS TO CREATE A CUSTOM ROLE

  1. Login to Admin Dashboard .

  2. Click on Accounts -> Admin Roles

  3. Click on create a new role.

  4. Give relevant name and description for the role

  5. Under Admin Console Privileges select the following

    1. Organisation Units : Read

    2. Users : Read

    3. Skip the services section

    4. Security : User Security Management

    5. Security : Security Settings

    6. Domain Settings

    7. Reports

  6. Under Admin API Privileges select the following

    1. Organisation Units : Read

    2. Users : Read

    3. Groups : Read

    4. Skip the services section

    5. User Security Management

    6. Licence Read

    7. Billing Read

    8. Domain Management

    9. Domain Allowlist Read

  1. Click on create role

  2. Assign the role to the user who is going to connect the integration.

  3. When assigning the role make user is is added to all organisational units

  4.  You can refer to this video  for better understanding.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article