Documentation Index
Fetch the complete documentation index at: https://docs.provisionr.io/llms.txt
Use this file to discover all available pages before exploring further.
Concepts
API Client
We use the Provisionesta Google API Client to access the API client that was released by our founder as an open source project in 2021. This provides an easy-to-use interface that handles all of the complex authentication, error handling, and pagination logic. We simply need to provide an endpoint, the credentials array, and we get the result back without any headaches.Secrets Storage
We securely store your Google service account credentials using AWS Secrets Manager in the same region as your Provisionr workspace. When you upload your service account JSON key using the Provisionr CLI, it is transmitted securely over TLS to AWS Secrets Manager and stored encrypted at rest.Key Rotation
Provisionr-managed Service Accounts: We handle automatic key rotation for service accounts that we create on your behalf for each integration. Every customer integration uses a different service account. Keys are rotated every 90 days, and after every security incident. Customer-Managed Service Accounts: You are responsible for managing the lifecycle of service account key rotations for your customer-managed service account. Provisionr will continue using this key as long as it is valid, even if it never expires. You can rotate the key at any time using the Provisionr CLI command:OAuth2 Domain-Wide Delegation
These concepts can be complex and confusing. There are many nuances and peculiarities with how the Google API works since each Google service is a microservice with a separate API that we need to grant Provisionr access to. We’ve tried to simplify it as much as possible.
111234567890123456789) that is used to reference the service account in Google Workspace.
In order to access Google Workspace data, we need to use domain-wide delegation of authority. This acts as the authorization layer with underlying roles and permissions for Google Workspace that allows you to grant the service account various API scopes to access different parts of your Google Workspace data.
You can learn more about the process in the Google Workspace API Guide and Google Directory API documentation.
OAuth2 Scopes
Provisionr requires the following OAuth2 scopes to be granted to the service account for domain-wide delegation of authority in order to read Google Workspace Users and manage Groups and Group Members. In future releases, we will be adding support for managing additional resources. You can proactively grant the additional scopes now or wait until those features are released to use that functionality. The scopes below are color coded to indicate which functionality they provide.- Read-Only Functionality
- Read-Write Full Functionality
- Read-Write Restricted Functionality
Easy Button Scopes
This is the list of scopes to grant if you want to use all of the functionality that Provisionr currently supports for your Google integration.Core Functionality
https://www.googleapis.com/auth/admin.directory.user.readonly
Provisionr can read your Google Workspace users and their attributes to build your organizational directory structure. This is required for any functionality in Provisionr to work with Google Workspace.
If a user is created or deactivated in Google Workspace, the Provisionr sync process will pick up those changes during the next sync.
Read the Docs to learn more.
https://www.googleapis.com/auth/admin.directory.orgunit.readonly
This scope is optional iand is not required.2026-Q2 Provisionr can read your Google Workspace organizational units to create a dimension for Organization Units and an attribute for each organization unit that users are assigned to. This is useful if your Google users are already assigned to organizational units that you want to use for access control policies in Provisionr. Read the Docs to learn more.
Google Workspace Groups
Read the Docs to learn more.https://www.googleapis.com/auth/admin.directory.group.readonly
Provisionr can read your existing Google Workspace groups and their users to start building group-based access control policies.
You can also use this scope to audit their existing access without granting Provisionr permission to make any changes.
https://www.googleapis.com/auth/admin.directory.group.member
Provisionr cannot create new groups or delete groups based on custom attributes without the admin.directory.group scope.
With this restrictive scope, Provisionr can add and remove users from existing Google Workspace groups to sync group membership based on the access control policies that you create in Provisionr.
https://www.googleapis.com/auth/admin.directory.group
Provisionr can create, update, and delete Google Workspace groups. This is key feature of Provisionr to automatically create a group for each department, team, project, or other attribute in the Provisionr Directory.
Provisionr can also sync users to new and existing groups based on the access control policies that you create in Provisionr.
Google Cloud Identity Groups
Although some API endpoints allow using the
cloud-platform scope that is already used for managing other GCP resources, Provisionr specifically requests the cloud-identity.* scopes for least privilege security.https://www.googleapis.com/auth/cloud-identity.groups.readonly
2026-Q2 Provisionr can read your Google Cloud Identity groups and their users to start building group-based access control policies. Users can be synced to groups when you later grant the read-write scopes.
https://www.googleapis.com/auth/cloud-identity.inboundsso.readonly
2026-Q2 Provisionr can read the Cloud Identity User SSO metadata if your users use external identity providers besides Google Workspace for authentication.
https://www.googleapis.com/auth/cloud-identity.groups
2026-Q2 Provisionr can create, update, and delete Google Cloud Identity groups and sync users to those groups based on the access control policies that you create in Provisionr.
Google Drive and Docs
Danger, Will Robinson! Danger! These are powerful scopes that allow Provisionr full access to all files in your Google Shared Drives. This may be a concern for security-conscious teams.Only grant this scope if you plan to use the Google Drive resource management functionality that will be released in 2026-2H.You can wait to grant this scope until you are ready to use this functionality.
Google Cloud Platform (GCP)
Provisionr can manage IAM members for GCP Folders, Projects, and Billing Accounts to ensure that only the appropriate users and groups have access to your GCP resources.Do NOT add the
https://www.googleapis.com/auth/cloud-platform scope to the Domain-Wide Delegation list of granted scopes.Otherwise, the service account could impersonate any administrative user and would have access to all GCP resources in your organization which would be a major security risk.cloud-platform OAuth2 scope as part of the API call authentication to say that this is the “category” of endpoints I want to reach, however we have not authorized the service account to do anything yet.
Instead, we need to invite the email address of the service account to the specific GCP resources that you want to manage.
You’re probably familiar with granting IAM Roles and Permissions to users and groups in GCP projects. The same concept applies to service accounts since GCP uses the concept of Principals rather than users, so a Principal has multiple types:
- Google User (
dmurphy@redshirt.systems) - GCP Service Account (
provisionr-a1b2c3-d4e5@project-name.iam.gserviceaccount.com) - Google Workspace Group email (
infra-team@redshirt.systems) - Google Cloud Identity Group email (
infra-team@redshirt.systems)