| User | Status | ID |
|---|
| Group | Members | ID |
|---|
Drop-in replacement for the Google Admin SDK Directory API.
Point your app at these URLs instead of admin.googleapis.com.
Generate a service account credential file to configure your client application. This mirrors the structure of a Google Cloud service account key.
LDAPS (LDAP over SSL/TLS) allows SaaS applications like Forcepoint, Palo Alto, and others to securely sync users and groups from your directory using the standard LDAP protocol.
Configure how your IdP directory maps to LDAP object classes and attributes. These settings determine how LDAP clients discover and read users and groups.
LDAPS requires a valid TLS certificate. Import the certificate into Forcepoint's trusted store so it can verify the LDAPS connection. Click Download .crt to get the file, then upload it in Forcepoint under SSL Inspection > Trusted Root Certificates.
In Forcepoint ONE / Web Security, navigate to Settings > Identity Management > Add LDAPS. Copy the values below into each field exactly as shown.
Configure the bearer token your SaaS application sends when calling SCIM endpoints.