Google Workspace User Provisioning
The Google Workspace native integration allows organizations to automatically sync users and groups from Google Workspace into Verkada Command. This simplifies identity management and provisioning for access control and general user onboarding.
Unlike Verkada’s SCIM integrations with Okta or Azure, this integration uses the Google Workspace Admin SDK and Reports API, authenticated through a Google service account with domain-wide delegation.
With the integration enabled, Command can:
Import users and groups from selected Google Workspace Groups or Organizational Units (OUs)
Sync them into Command as managed users and groups
Maintain directory accuracy with scheduled background syncs and on-demand syncs from the Admin UI
Create a Google service account
To allow Command to read user and group data from your Google Workspace domain, it must authenticate with Google’s APIs using a service account. This type of account is designed for programmatic access and must be configured with the correct API scopes and domain-wide delegation. These settings are configured in your Google Cloud console account.
Verify policies & roles
You must first verify whether your user has permissions to create a service account and to generate the service account JSON Key. To ensure you are not blocked by security policies in your tenant:
Create a service account
In the Google Cloud console, in the top left, open the Project Selector dropdown.
Generate a JSON key
This JSON file contains the credentials that the Google Workspace integration in Command uses to authenticate to Google APIs via OAuth 2.0. Keep this file secure, as it provides access to your Workspace data and should never be shared or made public.
Enable required Google APIs
Verkada Command requires access to specific Google Workspace APIs to read users, groups, domains, and audit logs. These APIs must be enabled in your Google Cloud project before the integration can function.
Go to the Google Cloud console, and sign in with your Super Admin credentials.
Enable Domain-wide delegation
To allow the service account to impersonate an administrator and access user and group data across your domain, you must grant it domain-wide delegation. This enables the service account to perform read operations on behalf of an admin without requiring manual re-authentication.
Navigate to the Google Admin Console and sign in with your Super Administrator credentials for your Google Workspace tenant.
Click Add New and enter the following details:
Client ID: Paste the OAuth 2 Client ID for your service account key file (the
client_idfield in the JSON).OAuth Scopes (comma-separated):
https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.group.readonly, https://www.googleapis.com/auth/admin.directory.orgunit.readonly
The new delegation entry will appear on the page, confirming that the service account can now be used by Verkada Command to query user, group, and audit data.
Set user attribute values
Before syncing users to Verkada Command, confirm that key attributes (such as first name, last name, email, and employee ID) are correctly populated in Google Workspace.
The following attributes can be synced from Google Workspace to Verkada Command:
Google Workspace Attribute Name
Command Field
First name
First Name
Last name
Last Name
Department
Department
Cost center
Department ID
Employee ID
Employee ID
Job title
Employee Title
Phone number (Primary Home/Work/Mobile)
Phone Number
Users and groups synced from Google Workspace are managed exclusively in Workspace and cannot be manually edited in Verkada Command.
Enable the integration in Command
You need Org Admin permissions to configure this integration.
On Org Settings, select Login & Access → User Provisioning → Google Workspace.
a. Enter the email address of your Google Workspace Super Admin. For security and continuity, Verkada recommends using a dedicated service account that has equivalent admin permissions, rather than a personal user account. a. Upload the JSON key you generated in your Google Cloud Console project. b. Once authentication succeeds, click Add to select the Groups and/or Organizational Units you want to sync to Command. c. Click Enable.
Frequently asked questions
Need more help? Contact Verkada Support.
Last updated
Was this helpful?





