LogoLogo
  • Introducing dope.swg
    • Changing the Rules...
    • Quick Start Guide
      • Create a dope.swg Account
      • Get Started with the dope.endpoint
      • Import User and Group Data
      • Create a dope.swg Web Policy
    • Mitre ATT&CK and Nist CSF
  • dope.console
    • Analytics
      • Overview dashboard
      • Policy View
      • Productivity
      • Shadow IT
      • Detail View
    • dope.swg Policy
      • Editing the Base Policy
      • Adding Policy Exceptions
      • Assigning a Block Page
      • Creating Custom Categories
      • URL Bypass List
      • Application Bypass List
      • Default Bypass List
      • Cloud Application Control (CAC)
        • Microsoft O365
        • Google
        • Box
        • Salesforce
        • Dropbox
        • Slack
        • WebEx
      • Custom Policy
      • Policy Assignment
      • Policy Inheritance and Customization
    • CASB Neural
      • Microsoft 365 - Authentication
      • Google - Authentication
      • CASB DLP
        • DLP Files Table
    • Endpoint Manager View
      • Searching the View
      • Filtering and Sorting the Endpoint View
      • Endpoint Count
      • Running Diagnostics
      • Disable Endpoint
    • Settings
      • General
      • Block Pages
      • Endpoints
      • Users
        • Importing from Google
        • Why not SAML & SCIM?
      • Audit Log
      • SIEM Integration
        • Category & Verdict Mappings
      • API Client Credentials
      • Billing Details
    • Notifications
      • SSL Errors
  • dope.endpoint
    • Trusted Process Names
    • Generate Diagnostics
    • Disable Endpoint
    • Installing using MDM on Mac
      • Using JAMF
      • Using Kandji
      • Using Intune
    • Installing using Intune on Win
    • Mac Installer
      • Installation Process - Silent
      • Uninstall
      • Endpoint Authentication
    • Windows Installer
      • Installation Process - Silent
      • Uninstall
      • Endpoint Authentication
    • dope.endpoint UI
      • Windows UI
      • macOS UI
    • Automatic Updates
  • Release Notes
  • DOPE.APIs
    • Public API Specification
Powered by GitBook
On this page
  • Authentication
  • Google Workspace Super Admin Email
  1. dope.console
  2. CASB Neural

Google - Authentication

UX = dope.security. That's why it takes seconds to get CASB Neural scanning your Google Drive.

PreviousMicrosoft 365 - AuthenticationNextCASB DLP

Last updated 4 months ago

Authentication

Under CASB, select Google. Self-enroll with the URL or send it to your Google admin.

These are the required Google scopes

"https://www.googleapis.com/auth/drive", "https://www.googleapis.com/auth/admin.directory.user", "https://www.googleapis.com/auth/admin.directory.domain.readonly", "https://www.googleapis.com/auth/admin.directory.customer.readonly", "https://www.googleapis.com/auth/drive.activity.readonly", "https://www.googleapis.com/auth/admin.directory.group.readonly", "https://www.googleapis.com/auth/admin.directory.user.readonly", "https://www.googleapis.com/auth/admin.directory.user.security", "https://www.googleapis.com/auth/admin.reports.audit.readonly", "https://www.googleapis.com/auth/gmail.settings.basic",

Scope
Purpose

admin.directory.user

admin.directory.domain.readonly admin.directory.customer.readonly admin.directory.group.readonly admin.directory.user.readonly

Retrieves group member information for user/group import, identify posture (2FA/Admin) for CASB Neural SSPM

admin.directory.user.security

Retrieves OAuth tokens and allows deletion for CASB Neural SSPM

admin.reports.audit.readonly

Retrieves logs for OAuth apps for CASB Neural SSPM

gmail.settings.basic

Retrieves mail rules (not email content) to find suspicious mail rules for CASB Neural SSPM

drive drive.activity.readonly

Retrieves drive information for CASB Neural DLP

About Google Admin Console Configuration

To complete authorization the Google admin will need to copy & paste the scopes into the Google Admin Console. You must be a Google admin to continue.

From here, you will add a new domain-wide delegation to their account. This includes CASB Neural's client ID and the required scopes (provided).

Google Workspace Super Admin Email

The final step is to provide the Google Workspace super admin email

Once the correct email is entered, you're done! It's that simple. dope.security will now scan your tenant, uncover any publicly shared files with sensitive data, and classify them.

SSPM Coming Soon: Uncover all third-party apps connected to your Microsoft 365 or Google SaaS tenant, neatly organized by access type: global, limited, or login access.

Your Google admin will need to copy & paste permissions into the Google admin console (Underneath API Controls -> )

Because of CASB Neural's sensitive permissions, the scopes are added to Domain Wide Delegation page. It's under: in the Google Admin Console.

See Google help docs

Domain-Wide Delegation
Security > API Controls > MANAGE DOMAIN WIDE DELEGATION
here
Google Authentication Link to be used by Admin
Admins must copy/paste this information into the Workspace Admin Console
Add the super admin email used here.