Teams and Businesses

Connect Google Workspace to 1Password SCIM Bridge

Learn how to set up and use 1Password SCIM Bridge to integrate with Google Workspace.

Important

Before you can integrate with Google Workspace, you’ll need to set up and deploy 1Password SCIM Bridge.

With 1Password Business, you can integrate 1Password with Google Workspace to automate many common administrative tasks:

Provision

  • Create users: Users in selected Google Workspace groups will be provisioned to 1Password.
  • Update user attributes: Changing user attributes in your Google Workspace directory, such as the user’s name and email address, will change the mapped attributes in 1Password.
  • Deactivate users: Suspending or deleting a user in Google Workspace will suspend the user in 1Password.

Manage groups

  • Sync groups: Sync groups from Google Workspace to 1Password.

To integrate 1Password with Google Workspace, you’ll need to create a Google service account and API client, then give it permission to read your directory’s users, groups and group members, and administrator events from Google Workspace. This allows the SCIM bridge to fetch information about and capture events for user creation, suspension, and deletion.

To get started, sign in to your account on the Google Cloud Console  and follow these steps.

Before you begin

Before you can integrate 1Password with Google Workspace, you’ll need a deployed 1Password SCIM Bridge.

Step 1: Create a Google service account, key, and API client

These steps were recorded in November 2022 and may have changed since. Refer to the Google Cloud documentation  for the most up-to-date steps.

1.1: Create a Google service account and key

  1. In the Google Cloud Console, create a new project for 1Password SCIM bridge.

    If you have an existing project that you want to use, click the project name in the top navigation and select it.

  2. Open the Google Cloud Marketplace and find the Admin SDK API.
  3. Click Enable to turn on the API. This will take a moment.
  4. Click the navigation menu in the top left and choose IAM & Admin > Service Accounts.
  5. Click Create Service Account, fill out the Service account name field, then click Done.
  6. Click the service account you just created, then click Keys.
  7. Choose Add Key > Create new key.
  8. Select JSON and click Create. The service account key will be downloaded to your computer.
  9. Save the service account key in 1Password so you can find it later.

The service account page in the Admin SDK API with op-scim as the name

The Keys tab of the service account with one key shown

1.2: Add a new API client

  1. Click the Details tab on the service account you created.
  2. Click Advanced settings, then click to copy the Client ID.
  3. Click View Google Workspace Admin Console and navigate to the Domain-wide Delegation page.
  4. Click Add new, then fill out the information:
    • Client ID: paste the Client ID you copied.
    • OAuth scopes: paste the following:
      • https://www.googleapis.com/auth/admin.directory.user.readonly
      • https://www.googleapis.com/auth/admin.directory.group.readonly
      • https://www.googleapis.com/auth/admin.directory.group.member.readonly
      • https://www.googleapis.com/auth/admin.reports.audit.readonly
  5. Click Authorize.

Step 2: Configure your SCIM bridge

Important

Before you proceed, make sure you’ve set up and deployed your 1Password SCIM Bridge.

2.1: Upload the service account key

  1. Open your SCIM bridge and enter your bearer token.
  2. Scroll down to Google Workspace and click Upload Service Account Key.
  3. Upload the .json key you created earlier.
  4. Go back to the Google Workspace section, then fill out these fields:
    • Actor: the email address of the administrator in Google Workspace that the service account is acting on behalf of.
    • Bridge Address: the URL of your SCIM bridge (not your 1Password account sign-in address). For example: https://scim.example.com
  5. Click Save.
  6. Enter your bearer token again and click Verify. You should see a green checkmark beside Workspace Server.
The Google Workspace configuration section in 1Password SCIM bridge

2.2: Set up provisioning to 1Password

Important

If you have existing users in 1Password, make sure they’re in the Google Workspace group(s) that you plan to provision. If they aren’t in the provisioned group(s), they’ll be suspended in 1Password.

After you’ve connected Google Workspace to your SCIM bridge, you can choose which groups to provision to 1Password:

  1. Scroll down to Google Workspace.
  2. Select the group(s) you would like to provision to 1Password, then click Save.

Next steps

When you turn on provisioning, existing 1Password users will be linked to Google Workspace users if their email address matches. If their email address is different, they’ll be invited to 1Password again, so make sure any affected team members update their email address before you turn on provisioning.

After you set up provisioning, wait a few moments, sign in to your account on 1Password.com, and open the People and Groups to make sure your users are provisioned.

Manage your settings

To manage your Google Workspace provisioning settings, open your SCIM bridge and enter your bearer token, then scroll down to Google Workspace.

  • To stop provisioning a group to 1Password, deselect it, then choose Stop Syncing or Remove from 1Password.
    • When you choose Stop Syncing, any changes made to the group in your directory will not propagate to 1Password.
    • When you choose Remove from 1Password, the group will be removed and everyone in it will be suspended in 1Password, unless they are part of another group that is provisioned to 1Password.
  • To turn off provisioning, sign in to your account on 1Password.com, then open the Integrations page and choose the Google Workspace integration. Turn off Provisioning users & groups. After you turn off provisioning, any changes from your Google Workspace directory will no longer affect users in 1Password, but you can continue to add and remove team members on 1Password.com.

Get help

If users and groups aren’t being provisioned, make sure provisioning is turned on in your 1Password account:

  1. Sign in to your account on 1Password.com.
  2. Choose Integrations in the sidebar.
  3. Choose Automated User Provisioning.
  4. Make sure Provisioning users & groups is turned on.

If you have over 1,000 groups in Google Workspace and deployed your SCIM bridge to Kubernetes, you’ll need to increase your SCIM bridge’s resource allocations to provision them. Learn more about resource recommendations in the 1Password SCIM bridge deployment examples repo .

Still need help?

If this article didn't answer your question, contact 1Password Support.

Published: