Documentation Index
Fetch the complete documentation index at: https://docs.ravenna.ai/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
Before you begin, ensure you have:- Google Workspace Super Admin access
- Google Cloud Platform project access (or ability to create one)
- Your Google Workspace primary domain
Setup guide
Create service account in Google Cloud
Access Google Cloud Console
Enable required APIs
- Admin SDK API
- Cloud Identity API
- Group Settings API
Create service account
- Go to IAM & Admin > Service Accounts
- Click Create Service Account
- Enter a name (e.g., “Google Workspace Integration”)
- Click Create and Continue
- Skip the optional steps and click Done
Create service account key
- Click on the newly created service account
- Go to the Keys tab
- Click Add Key > Create new key
- Select JSON format
- Click Create - the key file will download automatically
Configure domain-wide delegation
Access Google Workspace Admin Console
Navigate to API controls
- Go to Security > Access and data control > API controls
- Scroll to Domain-wide delegation
- Click Manage Domain Wide Delegation
Add new API client
- Click Add new
- Enter the Client ID from your service account
- Add the following OAuth scopes (comma-separated):
admin.datatransfer scope is optional and only required if you plan to use the Transfer User Data workflow action for offboarding.- Click Authorize
Add integration
Navigate to integrations
- Go to Settings > Integrations
- Find Google Workspace in the Software Access section
Configure service account credentials
client_email field)Enter workspace details
company.com)Complete setup
- Validate the service account credentials
- Test API connectivity
- Begin initial sync of users, groups, and applications
Enable data transfer (optional)
- Go to Org Settings > Google Workspace > Settings
- In the settings modal, enable the Enable User Data Transfer toggle
- Save your changes
https://www.googleapis.com/auth/admin.datatransfer scope configured in Domain Wide Delegation.Enable multi-domain sync (optional)
- Go to Org Settings > Google Workspace > Settings
- Enable the Sync All Domains toggle
- Save your changes
User sync behavior
After setup, Ravenna syncs only active users from Google Workspace. Suspended and archived users are excluded from sync.- If a user is suspended or archived in Google Workspace and does not exist in Ravenna, no record is created for them.
- If a previously synced user becomes suspended, their status is updated to
Suspendedin Ravenna on the next sync cycle. The Ravenna user record is preserved so existing tickets remain valid. - If a previously synced user becomes archived, their status is updated to
Deprovisionedin Ravenna on the next sync cycle. The Ravenna user record is preserved so existing tickets remain valid.
Multi-domain sync
By default, Ravenna filters users and groups by your primary domain during sync. If your Google Workspace account includes secondary domains (e.g.,subsidiary.com alongside company.com), users on those domains are not synced unless you enable Sync All Domains in the integration settings.
When enabled, Ravenna queries all users and groups across every domain in your Google Workspace account instead of filtering by the primary domain.
Admin role requirements
The admin email user must have sufficient privileges to manage users and groups in your Google Workspace organization.Recommended roles
Use one of the following configurations:- Super Admin role (has all required privileges), OR
- Both Groups Admin AND User Management Admin roles
Required privileges
If creating a custom admin role, the following privileges are required:Users privileges
Users privileges
| Privilege | Sub-privilege | Used For |
|---|---|---|
| Create | - | Creating new users |
| Read | - | Listing and syncing users |
| Update | Add/Remove Aliases | Creating email aliases |
| Force Password Change | Requiring password reset on next login | |
| Reset Password | Resetting user passwords | |
| Suspend Users | Suspending and unsuspending users |
Security privileges
Security privileges
| Privilege | Used For |
|---|---|
| Manage Security Settings | Resetting MFA/2-Step Verification |
Groups privileges
Groups privileges
| Privilege | Used For |
|---|---|
| Read | Listing and syncing groups, viewing members |
| Create | Creating new groups |
| Update | Adding/removing group members, updating settings |
| Delete | Deleting groups |
Role scope
The admin role must apply to the entire organization (Customer scope) or cover all organizational units where users and groups will be managed.Troubleshooting
Invalid credentials error
Invalid credentials error
- Verify the JSON key file is correct and not corrupted
- Ensure the service account still exists in Google Cloud
- Create a new key if the current one is expired
Insufficient admin permissions error
Insufficient admin permissions error
Not Authorized to access this resource/apiCause: The admin email user lacks required admin roles or privileges.Solution:- Assign the Super Admin role to the admin user, OR
- Assign both Groups Admin and User Management Admin roles
- Ensure the role applies to the entire organization (Customer scope)
- See Admin role requirements for detailed privilege requirements
Insufficient permissions error
Insufficient permissions error
- Verify all required OAuth scopes are authorized in Google Workspace Admin Console
- Check that domain-wide delegation is enabled for the service account
- Ensure the correct Client ID is used for delegation
Domain not found error
Domain not found error
- Verify the domain matches your Google Workspace primary domain
- Ensure the domain is active and not suspended
- Check for typos in the domain name
API not enabled error
API not enabled error
- Enable Admin SDK API in Google Cloud Console
- Enable Cloud Identity API in Google Cloud Console
- Enable Group Settings API in Google Cloud Console
- Wait a few minutes for API enablement to propagate