Service Account
General
For certain functionalities, you'll need to set up a Google Cloud Service Account that has access to extended data within your Workspace instance. This enables Jigo to activate specific features, such as Sharing, which relies on a pre-configured Service Account.
Technical Background
Jigo prioritizes your data privacy. It doesn't store any of your sensitive information directly, but rather saves secure references (“links”) to access linked data within your own authorized user scope (OAuth). Consequently, you maintain complete control and can only ever view or interact with data (such as emails, chats, and events) that you already have permission to access.
To enable broader collaboration, Jigo can utilize a service account. This allows access to the original entity within the scope of the user who initially established the link. This capability is essential for features like displaying these items to colleagues and inviting them to shared workspaces.
Rest assured, the Service Account is used exclusively for app functionality, and the credentials are stored securely with the highest level of protection. No additional data will be stored or accessed beyond what's required for app usage.
We understand that a Google service account setup may not be ideal for every company's infrastructure. Therefore, Jigo provides alternative methods for sharing information among your team. However, configuring a Google service account will consistently deliver the most integrated and seamless sharing solution, enabling advanced features such as entity sharing with colleagues.
How to set up a Service Account
A Google Workspace Admin account is required for setup.
1.) Login to https://console.cloud.google.com/
2.) Before setting up the Service Account, we need a Google Cloud Project for this Service Account. If there is no applicable project yet, create a new project to manage API access and authentication.
For example, "Jigo Service Account"
3.) The Admin SDK API must be enabled for the integration to work. Go to the Google Cloud Console, find your project, and enable the Admin SDK API.
If the API is already enabled, you can skip this step.
Guide to set up the Admin SDK API | |
a.) Select Enable APIs and services | |
b.) Click on Enable APIs and services | |
c.) Search for Admin SDK API | |
d.) Click on Enable |
4.) On the left side panel click in APIs and services on Credentials
5.) Click on Create Credentials
6.) Choose Service Account
7.) Give your Service account a name and click Done
8.) Click no on your created service account
9.) On the Tablist go to Keys
10.) Click on ADD KEY to Create new key
11.) Select JSON and click Create
A JSON file will be downloaded, which will be used for authentication.
Important: We need to access the content of this file later for the credentials of the Service Account.
12.) Important: Copy your Unique ID from the service account on the Details tab
13.) Login to admin.google.com
14.) On the left side panel go to Security / Acces and data control / API controls
15.) Click on Manage Domain-Wide Delegation
16.) Click on Add new
17.) Add your copied Unique ID from your service account (from step 12) and add scopes depending on the features you want to use, then click on AUTHORISE.
App | Scopes | Reason |
---|---|---|
Gmail |
| Display shared emails |
Chat |
| Display shared space names and allow users to join them |
Calendar |
| Display shared events and invite users |
Please make sure the scopes are comma-separated and without any white-spaces. The UI also allows you to enter one scope per line. If you want to use all apps/features, copy the following:
https://www.googleapis.com/auth/gmail.readonly,https://www.googleapis.com/auth/chat.spaces.readonly,https://www.googleapis.com/auth/chat.memberships,https://www.googleapis.com/auth/calendar.events
Attention: These scopes may change over time. Updates to these scopes will be documented in the Release Notes as well.
18.) The last step is to enter the Credentials JSON for the generated Service Account into the Service Account configuration of Jigo. Navigate to the Servie Account section:
Open the downloaded JSON file from step 11 in a text editor of your choice. Copy the whole content of the file and put it into the field Credentials JSON.
A “Valid” flag will show up next to the Service Account heading if everything is entered correctly and the Service Account is working. Finally Save to make sure the entered Credentials can be used. Please note that after saving the Credentials will no longer be readable on the Service Account screen.
Congratulations! You have successfully configured your Google Service Account and can proceed with enabling the extended features in e.g. the Gmail configuration.