サポートと今すぐチャット
サポートとのチャット

Identity Manager 9.0 LTS - Administration Guide for Connecting to Google Workspace

Mapping a Google Workspace environment in One Identity Manager Synchronizing a Google Workspace customer
Setting up initial synchronization of a Google Workspace customer Customizing the synchronization configuration for Google Workspace Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing Google Workspace user accounts and employees
Account definitions for Google Workspace user accounts Assigning employees automatically to Google Workspace user accounts Manually linking employees to Google Workspace user accounts Supported user account types Specifying deferred deletion for Google Workspace user accounts
Login information for Google Workspace user accounts Managing Google Workspace entitlement assignments Mapping of Google Workspace objects in One Identity Manager
Google Workspace customers Google Workspace user accounts Google Workspace groups Google Workspace products and SKUs Google Workspace organizations Google Workspace domains Google Workspace domain aliases Google Workspace admin roles Google Workspace admin privileges Google Workspace admin role assignments Google Workspace external email addresses Reports about Google Workspace objects
Handling of Google Workspace objects in the Web Portal Basic configuration data for managing a Google Workspace customer Troubleshooting the connection to a Google Workspace customer Configuration parameters for managing a Google Workspace environment Default project template for Google Workspace API scopes for the service account Processing methods of Google Workspace system objects Special features in the assignment of Google Workspace groups

Effectiveness of Google Workspace entitlement assignments

When groups are assigned to user accounts an employee may obtain two or more groups, which are not permitted in this combination. To prevent this, you can declare mutually exclusive groups. To do this, you specify which of the two groups should apply to the user accounts if both are assigned.

It is possible to assign an excluded group at any time either directly, indirectly, or with an IT Shop request. One Identity Manager determines whether the assignment is effective.

NOTE:

  • You cannot define a pair of mutually exclusive groups. That means, the definition "Group A excludes group B" AND "Group B excludes groups A" is not permitted.
  • You must declare each group to be excluded from a group separately. Exclusion definitions cannot be inherited.
  • One Identity Manager does not check if membership of an excluded group is permitted in another group (GAPGroupInGroup table).

The effectiveness of the assignments is mapped in the GAPUserInGroup and GAPBaseTreeHasGroup tables by the XIsInEffect column.

Example: The effect of group memberships
  • The groups A, B, and C are defined in a customer.
  • Group A is assigned through the "Marketing" department, group B through "Finance", and group C through the "Control group" business role.

Jo User1 has a user account in this customer. They primarily belong to the "Marketing" department. The "Control group" business role and the "Finance" department are assigned to them secondarily. Without an exclusion definition, the user account obtains all the permissions of groups A, B, and C.

By using suitable controls, you want to prevent an employee from obtaining authorizations of groups A and group B at the same time. That means, groups A, B, and C are mutually exclusive. A user, who is a member of group C cannot be a member of group B at the same time. That means, groups B and C are mutually exclusive.

Table 19: Specifying excluded groups (GAPGroupExclusion table)

Effective group

Excluded group

Group A

Group B

Group A

Group C

Group B

Table 20: Effective assignments

Employee

Member in role

Effective group

Pat Identity1

Marketing

Group A

Jan User3

Marketing, finance

Group B

Jo User1

Marketing, finance, control group

Group C

Chris User2

Marketing, control group

Group A, Group C

Only the group C assignment is in effect for Jo User1. It is published in the target system. If Jo User1 leaves the "control group" business role at a later date, group B also takes effect.

The groups A and C are in effect for Chris User2 because the groups are not defined as mutually exclusive. If this should not be allowed, define further exclusion for group C.

Table 21: Excluded groups and effective assignments

Employee

Member in role

Assigned group

Excluded group

Effective group

Chris User2

 

Marketing

Group A

 

Group C

 

Control group

Group C

Group B

Group A

Prerequisites
  • The QER | Structures | Inherite | GroupExclusion configuration parameter is set.

    In the Designer, set the configuration parameter and compile the database.

    NOTE: If you disable the configuration parameter at a later date, model components and scripts that are not longer required, are disabled. SQL procedures and triggers are still carried out. For more information about the behavior of preprocessor relevant configuration parameters and conditional compiling, see the One Identity Manager Configuration Guide.

  • Mutually exclusive groups belong to the same customer.

To exclude a group

  1. In the Manager, select the Google Workspace > Groups category.

  2. Select a group in the result list.

  3. Select the Exclude groups task.

  4. In the Add assignments pane, assign the groups that are mutually exclusive to the selected group.

    - OR -

    In the Remove assignments pane, remove the groups that are no longer mutually exclusive.

  5. Save the changes.

Inheritance of Google Workspace entitlements based on categories

In One Identity Manager, user accounts can selectively inherit entitlements. To do this, entitlements, and user accounts are divided into categories. The categories can be freely selected and are specified using a mapping rule. Each category is given a specific position within the template. The mapping rule contains different tables. Use the user account table to specify categories for target system dependent user accounts. In the other tables, enter your categories for the permissions. Each table contains the category positions position 1 to position 63.

Every user account can be assigned to one or more categories. Each entitlement can also be assigned to one or more categories. If at least one of the category positions between the user account and the assigned entitlement is the same, the entitlement is inherited by the user account. If the entitlement or the user account is not classified in a category, the entitlement is also inherited by the user account.

NOTE: Inheritance through categories is only taken into account when entitlements are assigned indirectly through hierarchical roles. Categories are not taken into account when entitlements are directly assigned to user accounts.
Table 22: Category examples
Category position Categories for user accounts Categories for entitlements
1 Default user Default group
2 Administrator Administrator group

Figure 2: Example of inheriting through categories.

To use inheritance through categories

  1. Define the categories for the Google Workspace customer.
  2. Assign categories to user accounts through their main data.
  3. Assign categories to groups, products, and SKUs through their main data.
Related topics

Assigning Google Workspace groups to an external user

You can add an external user as a member in different groups by assigning the external email address directly to the groups. The Allow external members option must be enabled on the groups.

To assign groups directly to an external email address

  1. In the Manager, select the Google Workspace > External email addresses.

  2. Select the external email address in the result list.

  3. Select the Assign groups category.

  4. In the Add assignments pane, assign the groups.

    TIP: In the Remove assignments pane, you can remove the assignment of groups.

    To remove an assignment

    • Select the group and double-click .

  5. Save the changes.
Related topics

Assigning external users to a Google Workspace group

By assigning external email addresses to a group, you add external users as members to the group. The Allow external members option must be enabled for this group.

To assign external email addresses directly to a group

  1. In the Manager, select the Google Workspace > Groups category.

  2. Select the group in the result list.

  3. Select the Assign external email addresses task.

  4. In the Add assignments pane, assign the external email addresses.

    TIP: In the Remove assignments pane, you can remove external email addresses.

    To remove an assignment

    • Select the external email address and click .
  5. Save the changes.
Related topics
関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択