I am trying to share a google service account email address in a work space that doesn't allow sharing items outside the workspace domain. Admins added the iam.gserviceaccount.com domain to whitelisted domains but there doesn't appear to be settings in the admin console to allow shared drive items to be shared externally with this whitelisted domain.
Hi @seelms I did a test on my side. I have restricted sharing from my test organization, and whitelisted 'iam.gserviceaccount.com' after this action I've got an alert in the admin console
Unfortunately, according to the HC article, a service account isn't supported as a trusted domain. So you would rather need to use API-specific authorization and the scopes as this article recommends.
Hope this helps,
Best,
Marcin
Bad security decisions here by Google -- it's driving people to give service accounts domain-wide delegation access to all files, which is dangerous. Service accounts set up in an organization's google cloud should be able to have files in drive *selectively* shared with them, even for domains that have turned off external sharing.
The best solution we've found is to allow a few trusted people to share drive files externally, put them in a sub-organization where external sharing can be on, and assign ownership of all drive files which need to be accessed by service accounts to those trusted team members.
@Marcin_Milewski Recently I have encountered a similar issue, unfortunately I do not have access to my client's Workspace console, but what if we try by whitelisting the exact domain for my GCP project ?
example: If I have a service account named app1@<my-project-app1>.iam.gserviceaccount.com , then can we simply whitelist <my-project-app1>.iam.gserviceaccount.com domain instead of iam.gserviceaccount.com ? will it reduce the risk scope?
User | Count |
---|---|
1 | |
1 | |
1 | |
1 | |
1 |