To manage Google users, Workspace ONE requires a Gmail administrator account with specific privileges. Either a super user account or an administrator account with specific privileges can be used.
- Log into your Google dashboard and navigate to Admin Roles.
- Select Create A NEW ROLE.
Result: Create New Role form displays.
- Enter the Name and Description for the role, and then select Create.
- On the Privileges tab, select the privileges for the new role.
The required privileges include:
Admin console Privileges
- Organization Units - Read
- Users - Read
- Update - Rename users, Move users, Reset Password, Force Password, Add or Remove Aliases, Suspend Users
- Security - To allow an admin with a custom role to revoke G tokens, enable the User Security Management on both Admin console privileges and Admin API privileges.
- Admin API Privileges
- Organization Units - Read
- Users - Read
- Update - Rename users, Move users, Reset Password, Force Password, Add/Remove Aliases, Suspend Users
- Groups - To allow an admin with a custom role to revoke G tokens, enable the User Security Management on both Admin console privileges and Admin API privileges.
- Select Save.
- Select the Admins tab and then Assign admins to assign the created role to an administrator and then select Confirm Assignment.
Enable the Google API
Use the Google control panel to enable the Google API.
For Workspace ONE UEM to provision the users' passcodes, enable the Google API using the Google control panel. This is optional for Direct Integration with Directory API type of configuration.
- Sign in to the Google Admin console.
- Once logged in, navigate to .
- Check Enable API access.
- Click Save.
Create a Service Account Certificate
The Service Account Certificate is required to use the Google APIs. You can create the certificate from the Google Admin console and then upload it on the UEM console while configuring the email integration.
- Navigate to https://console.developers.google.com and log in using your super admin credentials. The API Dashboard page is displayed.
- Select the projects list drop-down menu and then select + to create a project.
- Enter the Project name and select Create. The project ID is generated. Note: The project ID cannot be changed once the project is created. In case you wish to change the project ID, select Edit before you create the project.
- Select Enable API.
- Select Library from the API Manager sidebar.The list of Google APIs is displayed.
- Select Admin SDK available under G Suite APIs and then select Enable.
- Select Credentials from the API Manager sidebar.
- On the Credentials page, elect Create credentials and then select Service account key.
- Select New service account from the Service account drop-down menu and provide the Service account name, Service account ID, and the Role for the service account email address.
- Select P12 as the Key type.
- Select Create. The new service account has been created. Save the .p12 certificate with private key to your machine. Please make a note of the generated password for the private key.
- Select Manage service accounts on the credentials page.
- Select the service account you created and then select Edit from the corresponding menu.
- Check Enable G Suite Domain-wide Delegation check box. Click Save.
Now, the Client ID is generated and the View Client ID appears under the Options for your service account in the Service accounts page. Currently, there is no way to delete a Client ID once the ID is generated. The only alternative is to delete and re-create the whole project. Select View Client ID to view the generated Client ID and the service account email address.
- Navigate to the Google Admin Console https://admin.google.com and login with your super admin credentials.
- Select .
- Select Manage API client Access hyperlink from the Advanced settings pop-up menu.
- Enter the previously generated Client ID (as mentioned in step 8 of On the Google Developer console section) in the Client Name field.
- Authorize your client ID for the required API scopes. Enter the API scopes for the applications as listed in the One or More API Scopes field and then select Authorize
https://www.googleapis.com/auth/admin.directory.user.security.Note: The API Scopes must be added as a comma-delimited string containing no spaces.