Skip to content

Running GAMADV XTD3 securely on a Google Compute Engine

Ross Scroggs edited this page Nov 7, 2023 · 8 revisions

Running GAMADV-XTD3 securely on a Google Compute Engine

Thanks

Thanks to Jay Lee for the original version of this document.

Introduction

GAMADV-XTD3 can run on a Linux or Windows Google Compute Engine (GCE) VM and use the attached service account to access Google Workspace APIs. The advantage of this configuration is that no service account private key is accessible to GAMADV-XTD3 directly and there is no risk of the key being stolen/lost.

GAMADV-XTD3 version 6.50.00 or higher is required.

Setup Steps

  1. Create a GCP project.

  2. Create a service account which will be used by GAMADV-XTD3. Continue steps 2 and 3 without granting the new service account any special access to the project and without granting users access to the service account.

  3. Grant the service account rights to generate authentication tokens.

    • go to console.cloud.google.com.
    • go to "IAM & Admin" > Service accounts
    • click on the service account you created (not the default service account).
    • copy the email address of your service account to the clipboard.
    • click on the Permissions tab.
    • click "Grant Access".
    • In the "New principals text box, paste the service account email you copied.
    • Give your service account the "Service Account Key Admin", "Service Account Token Creator" and "View Service Accounts" roles.
  4. Create a Windows or Linux virtual machine.

    • You can choose a region physically close to you though you may be limited in your choices if you want to use the free tier.
    • GAMADV-XTD3 can run on the minimal e2-micro free tier VM though performance may suffer. If you are performing batch operations, raising the CPU count will help performance. If you have a very large and busy Workspace instance downloading reports or Drive file lists may require more RAM.
    • DO NOT use the default service account. Choose the service account you created above instead.
    • GAMADV-XTD3 does not use a significant amount of storage, unless you have specific storage needs the default disk size should suffice.
    • leave other VM instance settings at their defaults unless you know what you are doing.
  5. Install GAMADV-XTD3 on the VM

  6. Logout and log back in to the VM, you should now be able to run GAMADV-XTD3 commands like:

gam version
  1. Create the special oauth2service.json file GAMADV-XTD3 will use:
gam create gcpserviceaccount

If you'd like, take a look at the generated oauth2service.json file; you'll notice that while the file has some fields similar to a normal service account file, there is no private_key attribute containing an RSA private key.

  1. Enable the Google APIs GAMADV-XTD3 will use:
gam enable apis

You are given the option to enable them automatically or manually. Automatic enablement will ask you to authenticate to GAMADV-XTD3. You should authenticate as a user with rights to manage project APIs, probably a project owner. If you are not the project owner you can choose manual enablement and GAMADV-XTD3 will provide two or more URLs which you can send to the project owner. When the owner opens these URLs, they'll be prompted to enable all the APIs GAMADV-XTD3 needs.

  1. Perform admin actions (manage users, groups, orgunits, Chrome devices, etc)

  2. Manage user data

  • Run gam user user@domain.com check serviceaccount and follow the instructions to perform domain-wide delegation.

Update History

Installation

Configuration

Notes and Information

Definitions

Command Processing

Collections

Client Access

Special Service Account Access

Service Account Access

Clone this wiki locally