Step 1: Click on below link
Click “Create Project” and enter details, click on “CREATE”.
Click on “APIs & Services” -> “Library”
Search “Admin SDK” and click on “Admin SDK’ in results
Click on “Enable”
Click on “APIs & Services” -> ”OAuth consent screen”
Select “Internal” and click on “CREATE”
Enter a custom “Application name” (This Application name will be used in the SecurEnds application when configuring the Google Cloud Connector)
As an example:
applicationName = Securends
Store/copy down the application name you created for later use. This application name is case sensitive
Enter “Authorized domains” domain used during Step 2 when creating the project and click on save
(This domain will be used in the SecurEnds application when configuring the Google Cloud Connector)
Example chosen during Step 2:
domain = securends99.com
Store/copy down the domain for later use.
Click on “Credentials” from left menu
Click “CREATE CREDENTIALS” -> then “Service account”
Enter custom service account details and click on “CREATE”
Service account name = securendsService
Click on “Continue” for Service account permissions (Step 2).
Click on “Create Key” and select “P12” and click on “CREATE”
A p12 file will be downloaded and make a note and save private key password, then click on “CLOSE”
The downloaded p12 file has to be placed in /var/ssl in AWS Cloud instance
Provide the path has below in env_file
Upload the generated certificate to /opt/docker/XXXX/ssl
Restart the SecurEnds CEM application
Click on “Done”
Select the service account created and click on “edit”
Click on “SHOW DOMAIN WIDE DELEGATION”
Select the checkbox “Enable Google Cloud Domain wide Delegation” and click on “Save”
Please make a copy of the email and unique id and click on “Save”.
(This unique id will be used in the SecurEnds application when configuring the Google Cloud Connector)
serviceAccountId = firstname.lastname@example.org
Store/copy down the serviceAccountId for later use.
Now click on https://admin.google.com/ and login with admin credentials.
Click on “Security” settings
Click on “API Controls” by scrolling down.
Click on “Manage Domain-Wide delegation” by scrolling down.
Click on “Add New” behind the API Clients.
Enter the unique ID (From step 20) under client ID and below OAuth scopes under API scopes with comma(,) delimited, then click on “Authorise”.
When utilizing the service account set up steps above, Google can recognize the current customer when my_customer is used as the customerId (customerId = my_customer or Google Cloud Customer ID)
customerId = my_customer
Powered by BetterDocs
Other product and company names mentioned herein are the property of their respective owners.
It’s official, SecurEnds raises $21M Series A! For more details, check out our Press Release and a message from our CEO.