Skip to content

Commit 58ce3cb

Browse files
CSOAR-3557-update: Added GCP IAM info and updated release date (#5997)
* CSOAR-3557-update: added GCP IAM info * CSOAR-3557-update: fixed some typos
1 parent 73885fa commit 58ce3cb

File tree

1 file changed

+39
-2
lines changed

1 file changed

+39
-2
lines changed

docs/platform-services/automation-service/app-central/integrations/google-firestore.md

Lines changed: 39 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
88
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/google.png')} alt="google" width="80"/>
99

1010
***Version: 1.0
11-
Updated: Sep 29, 2025***
11+
Updated: Oct 17, 2025***
1212

1313
Google Firestore is a flexible, scalable NoSQL cloud database, built on Google Cloud infrastructure, to store and sync data for client and server-side development.
1414

@@ -19,6 +19,43 @@ Google Firestore is a flexible, scalable NoSQL cloud database, built on Google C
1919

2020
## Google Firestore configuration
2121

22+
Our Google Firestore integration support two types of authentication, Service Account and WIF (Workload Identity Federation). We recommend using WIF since it is more secure and easier to manage. For more information, see [Workload Identity Federation](https://cloud.google.com/iam/docs/workload-identity-federation).
23+
24+
## Required AWS details from Sumo Logic
25+
26+
To configure the Google Firestore integration using WIF authentication, you need the following AWS details from Sumo Logic. These details are essential for setting up the Workload Identity Federation (WIF) credentials in Google Workspace:
27+
* Deployment name is the unique name of your Sumo Logic [deployment](/docs/api/about-apis/getting-started/#documentation), for example, `dub`, `fra`, etc.
28+
* Sumo Logic AWS account ID: `926226587429`
29+
* Sumo Logic AWS role: `<deployment_name>-csoar-automation-gcpiam`
30+
* Sumo Logic AWS Lambda function: `<deployment_name>-csoar-automation-gcpiam`
31+
* Full ARN: `arn:aws:sts::926226587429:assumed-role/<deployment_name>-csoar-automation-gcpiam/<deployment_name>-csoar-automation-gcpiam`
32+
33+
34+
### Workload Identity Federation (WIF) authentication
35+
36+
To [create WIF credentials](https://cloud.google.com/iam/docs/workload-identity-federation) in Google Workspace needed to configure the Google Firestore integration, follow these steps:
37+
1. Log in to the [Google Cloud](https://console.cloud.google.com) portal.
38+
2. Select a Google Cloud project (or create a new one).
39+
3. Go to the **API&Services**
40+
4. In the same page click on **ENABLED API AND SERVICES** and search for Cloud Resource Manager API, IAM Service Account Credentials API, Identity and Access Management (IAM) API, Security Token Service API, Google Firestore API and enable it all.
41+
5. Go to the **IAM & Admin** > **Service Accounts** page.
42+
6. Click **CREATE SERVICE ACCOUNT** [Service Account](https://cloud.google.com/iam/docs/service-accounts-create) is required to access the Google Firestore.
43+
7. While creating the service account, in **Permissions** add the role **Service Account Token Creator** and click on **DONE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-11.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
44+
8. Go to the **IAM & Admin** > **Workload Identity Federation** page. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-4.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
45+
9. Click **CREATE POOL**, provide the details, and click on **CONTINUE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-5.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
46+
10. Add **Provider details**. Select **AWS** as the provider type and provide the details of the AWS Account ID which is provided by Sumo Logic. Click on **CONTINUE** and **SAVE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-6.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
47+
11. Now you will see the created pool and provider. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-8.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
48+
12. Now we have to build a principal name to configure in Sumo Logic. The format of the principal name is: `principalSet://iam.googleapis.com/projects/{YourProjectID}/locations/global/workloadIdentityPools/{YourPoolName}/attribute.aws_role/arn:aws:sts::{SumoAWSAccountID}:assumed-role/{SumoAWSRole}/{SumoAWSLambdaFunction}`.
49+
13. Go to the **IAM & Admin** > **IAM** page and click on **Grant Access** to add a new principal.
50+
14. In the **New principals** field, provide the above principal name and select the role **Workload Identity User**. Click on **SAVE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-12.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
51+
15. Go to the **IAM & Admin** > **Workload Identity Federation** page and select the pool which was created above.
52+
16. Click on **Grant Access** > **Grant access using service account impersonation**.
53+
17. Select the service account which created above, select the principle as aws_role and provide the arn `arn:aws:sts::{SumoAWSAccountID}:assumed-role/{SumoAWSRole}` and click on **SAVE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-chat/google-chat-10.png')} style={{border:'1px solid gray'}} alt="google-chat" width="800"/>
54+
18. Again go to **Grant Access** > **Grant access using service account impersonation**. Select the service account which was created above. Select the principle as `aws_role` and provide the arn `arn:aws:sts::{SumoAWSAccountID}:assumed-role/{SumoAWSRole}/{SumoAWSLambdaFunction}`. Click on **SAVE**.
55+
19. Download the WIF `conf.json` file. Make sure you save it in a safe place. Use the JSON content to configure the Google Firestore integration to use WIF authentication in Automation Service and Cloud SOAR.
56+
57+
### Service Account authentication
58+
2259
To [create service account credentials](https://developers.google.com/workspace/guides/create-credentials) in Google Workspace needed to configure the Google Firestore app integration, follow these steps:
2360

2461
1. Log in to the [Google Cloud](https://console.cloud.google.com) portal.
@@ -57,4 +94,4 @@ For information about Google Firestore, see [Google Firestore documentation](htt
5794

5895
## Change Log
5996

60-
* September 29, 2025 (v1.0) - First upload
97+
* October 17, 2025 (v1.0) - First upload

0 commit comments

Comments
 (0)