Google Workspace: Managing Access to Google Groups
Last updated
Last updated
In this tutorial, you'll learn how to configure to automate access requests to an Google Workspace Group by attaching a Google Workspace Group Membership. This use case models granting new users memberships to a Google Workspace group.
The main terraform resources we'll be using for Google Workspace are:
We will be using the as a base and replace configuration stubs for our use case.
Make sure you have:
An
An
A GCP account
Access to your organization's
Make sure you setup:
A by following Get a Starter Kit
A Connection to a repo by following Connect a Repo
Grant Kits rely on your GitHub account and repository name to output access changes, which we'll set through Terraform local variables. Update the locals
block in main.tf
with your account_name
and repo_name
Workflow defines who should approve an access request.
Let's update the reviewers
block by adding yourself as the reviewer by switching replace-me@example.com
with the email address you use to sign into Abbey.
Update the value for google_customer_id
in the locals block with that value
Once you have a service account, create a new Key through the console
Save the JSON file, we'll be using the contents later with Github Actions.
Hover on the Groups Admin row and click on Assign Admin. It'll open up to a new page:
Next, add the following repository secrets so Github Actions can access these credentials.
GOOGLE_CREDENTIALS
- copy paste the contents from the credentials key JSON as the value.
You can do this via Github repo page -> Settings -> Secrets and Variables -> Actions -> New Repository Secret and create with the above names.
To deploy your Starter Kit, follow instructions from Deploy Your Grant Kit.
You can now start requesting and approving access by following the Request Access and Approve or Deny Access Requests guides.
Abbey strives to help you automate and secure access management without being intrusive.
To that end, this Pull Request contains native Terraform HCL code using normal open source Terraform Provider libraries. It represents the permissions change. In this case, it's just a simple creation of a new Terraform Resource.
After approving the request, you should be able to see that the user has been added to the google group.
Select the group you are adding a member to
View members
Finally, this starter kit comes with a time-based policy by default, the user will automatically be removed after 1 hour.
To learn more about what Resources you can configure, try one of our Step-by-Step Tutorials.
For more information on how Abbey works, visit the Key Concepts or Grant Kits page.
Now you'll need to link .
Navigate to and copy the Customer ID under your profile.
Make sure that the Admin SDK API and is enabled for your project. You can check by navigating to .
If you don't already have a service account, create one via with owner role. Keep track of the service account email address, it should something like google-workspace-groups-demo@<project-id>.iam.gserviceaccount.com.
Navigate to the and go to Account -> Admin Roles.
Now, click on Assign service accounts and enter in the service account email address from the earlier step. Confirm assigning the role and now your service account has access to the Google Workspace groups APIs
ABBEY_TOKEN
- API token taken from
Congratulations! Abbey is now managing permissions to your Resource for you.
Navigate to