Pre-requisites
- GCP Organization Admin or Project Owner role to grant IAM roles to the connector service account
- Google Workspace Super Admin role to configure domain-wide delegation
Steps to Integrate GCP with Oleria Workspace
Oleria supports two integration scopes. Follow the one most appropriate for your organization.- Organization (Recommended) - Oleria sees all projects, folders, and resources across your entire GCP org, including org-level IAM policies and cross-project bindings. Recommended for full visibility.
- Project - Oleria is scoped to IAM bindings, resources, and storage within a single project only. Use this if you don’t have org-level access or only want to connect a specific project.
Integrate GCP Organization
Step 1: Create a Connector Service Account
- Log in to the Google Cloud Console and navigate to IAM & Admin → Service Accounts

- Select Create Service Account. Provide a name such as
oleria-connectorand click Create and Continue

- Skip the optional role grant and user access steps. Click Done
Step 2: Grant IAM Roles to the Connector Service Account at the Organization Level
- In the Google Cloud Console, click the project selector at the top of the page and select your Organization from the resource picker

- Navigate to IAM & Admin → IAM and click Grant Access

- Enter the connector service account email and assign the following roles:
roles/logging.viewer is required for activity sync via Cloud Audit Logs
Step 3: Generate a Service Account Key
- In IAM & Admin → Service Accounts, select the service account you created in Step 1
- Navigate to the Keys tab and click Add Key → Create new key

- Select JSON format and click Create. The key file will be downloaded to your machine. Keep this file secure - you will provide it to Oleria in Step 6.

Step 4: Configure Domain-Wide Delegation in Google Workspace
Domain-wide delegation allows the connector service account to enumerate Google Workspace users and groups on behalf of a delegated admin.- Log in to the Google Workspace Admin Console and navigate to Security → Access and data control → API controls. Under Domain-wide delegation, click Manage Domain Wide Delegation

- Click Add new
- Provide the Client ID of the service account (found under IAM & Admin → Service Accounts → select the SA → Details tab → Unique ID) and add the following OAuth scopes:

- Click Authorize
Step 5: Set Up Audit Log Export for Activity Sync
This step enables Oleria to ingest Cloud Audit Logs for user activity insights.- Open Cloud Shell or your local terminal and create a GCS bucket to receive audit logs:
- Create a Log Sink that exports organization-wide audit logs to the bucket:
- Grant the sink’s writer service account write access to the bucket:
- Grant the connector service account read access to the bucket:
Step 6: Integrate GCP with Your Oleria Workspace
- Log in to your Oleria workspace, select Integrations → select Google Cloud Platform. A side panel opens. Select Organization (Recommended) from the Connector Scope dropdown

- Provide the following and click Authenticate:
- Organization ID: Your numeric GCP Organization ID (e.g.
123456789012). To find it, navigate to IAM & Admin → Settings in the Cloud Console and copy the Organization ID. - Workspace Delegate Email: Email address of the Google Workspace admin whose permissions will be used to enumerate users and groups
- Service Account Credentials: Paste the full contents of the JSON key file downloaded in Step 3
- Find the newly integrated GCP Organization in your Oleria workspace connected integrations
Integrate GCP Project
Step 1: Create a Connector Service Account
- Log in to the Google Cloud Console, select the target project, and navigate to IAM & Admin → Service Accounts

- Select Create Service Account. Provide a name such as
oleria-connectorand click Create and Continue

- Skip the optional role grant and user access steps. Click Done
Step 2: Grant IAM Roles to the Connector Service Account at the Project Level
- In the Google Cloud Console, navigate to IAM & Admin → IAM for the target project and click Grant Access

- Enter the connector service account email and assign the following roles:
roles/logging.viewer is required for activity sync via Cloud Audit Logs
Step 3: Generate a Service Account Key
- In IAM & Admin → Service Accounts, select the service account you created in Step 1
- Navigate to the Keys tab and click Add Key → Create new key

- Select JSON format and click Create. The key file will be downloaded to your machine. Keep this file secure - you will provide it to Oleria in Step 6.

Step 4: Configure Domain-Wide Delegation in Google Workspace
Domain-wide delegation allows the connector service account to enumerate Google Workspace users and groups on behalf of a delegated admin.- Log in to the Google Workspace Admin Console and navigate to Security → Access and data control → API controls. Under Domain-wide delegation, click Manage Domain Wide Delegation

- Click Add new
- Provide the Client ID of the service account and add the following OAuth scopes:

- Click Authorize
Step 5: Set Up Audit Log Export for Activity Sync
This step enables Oleria to ingest Cloud Audit Logs for user activity insights.- Open Cloud Shell or your local terminal and create a GCS bucket to receive audit logs:
- Create a Log Sink that exports project-level audit logs to the bucket:
- Grant the sink’s writer service account write access to the bucket:
- Grant the connector service account read access to the bucket:
Step 6: Integrate GCP with Your Oleria Workspace
- Log in to your Oleria workspace, select Integrations → select Google Cloud Platform. A side panel opens. Select Project from the Connector Scope dropdown

- Provide the following and click Authenticate:
- Project ID: Your GCP Project ID (e.g.
my-project). Found in the Cloud Console project selector at the top of the page. - Workspace Delegate Email: Email address of the Google Workspace admin whose permissions will be used to enumerate users and groups
- Service Account Credentials: Paste the full contents of the JSON key file downloaded in Step 3
- Find the newly integrated GCP Project in your Oleria workspace connected integrations
Enable Remediations (Optional)
Remediations allow Oleria to take automated or one-click corrective actions - such as revoking an IAM binding, removing a group member, or disabling a service account - directly from the Oleria workspace. To allow Oleria to take remediation actions in your GCP environment, grant the connector service account the following additional roles:- To revoke an IAM binding at the project level, grant
roles/resourcemanager.projectIamAdminon the project. - To revoke an IAM binding at the organization level, grant
roles/resourcemanager.organizationIamAdminon the organization. - To remove a member from a Cloud Identity group, grant
roles/cloudidentity.groups.editor. - To disable a service account, grant
roles/iam.serviceAccountAdminon the project that owns the service account.

