Google Workspace

User Management

Module Overview

In this module, you'll learn about provisioning and managing users in your Cloud Identity domain. The exercises cover how to add new users in various ways and how to configure user identities, settings, and privileges.

Important information before you get started:

1. About User Passwords

In these exercises, as a G Suite administrator you have control over the user passwords. To avoid confusion or being locked out of an account, it's best to keep a consistent policy for password creation. (This isn't an issue in a real-world situation; your users, not you, will be setting their passwords the first time they sign in.)

For these exercises, the default password for all new users is hellohello1, unless you choose the auto-generated temporary password option.

To maintain consistency and to avoid forgotten passwords during these exercises, we suggest changing new user passwords to G00gleidentity (with zeros instead of letter Os) during the first sign-in process. Feel free to choose your own new password, but do remember to take note of it!

User Management

Adding Users Individually

Introduction to Exercise

Before people in your organization can begin using your Cloud Identity service, you need to create user accounts for each person. An account provides users with a name and password for signing in to their cloud services. Each user you add will require a user license.

The deployment of a Cloud Identity domain will often be done in phases. In each deployment phase, you add different types of users based on their particular focus and unique needs. The first phase of your deployment is where you'll add your technical IT users, so that they can begin using your organization’s services and align the settings with your organization's IT policies.

In this exercise, you'll manually add an individual user—Alexa Bell, your IT Manager.

Exercise Directions:

1. Sign into your Google Admin console as the administrator user using your administrator account name and password.

2. Go to the Users section, then click the yellow "Plus" button and select Add User.

Because this is a new domain, there's only one Organization (Org)—the parent org—named the same as your domain. We'll add more orgs later, but for now, we can add Alexa.

Learn more about how to Add users individually.

3. In the “Create a new user” dialog box, create your company's IT Manager user account, entering the following information:

First name: Alexa

Last name: Bell

Primary email address: alexa.bell@yourdomain.com

Note: If your account has multiple domains associated with it, use the domain (next to @) drop-down list to view the available domains. The domain you select will be the portion of the user's email address that appears after the @ symbol.

For this exercise, you should simply allow a temporary password to be assigned.

4. You can also add more profile information for Alexa, such as her contact and employee details. This information is visible in the Admin console.

Click Additional Info and enter the following user information:

Secondary Email Address: (Leave this blank if you don't have one)

Phone: 01 23 45 678

Address: 110 Main St, Cloud City

Click Next to enter Employee Details:

Employee ID:

Employee Type:

Title: IT Manager

Department: IT

Cost Center:

5. Click Create to generate Alexa's account.

Congratulations! You've added your first user in your new domain!

Notice the Show Password link that allows you to see the temporary password generated.

6. (Optional) Click Email instructions or Print instructions to deliver the account information to the new user. Use an email address that's currently accessible to the user.

7. Exit out of the window.

Now that you have a user, you can investigate some of the user-specific settings.

8. Locate Alexa's name in the Users list, click her name, and click Account.

9. In the Password section, ensure that the Require user to change password at next sign-in box is checked.

User Management

Add Several Users at Once

Introduction to Exercise

You've learned how to add users manually; however, when adding many users at once, this method is quite time consuming. Let's see how to bulk upload many users at once.

Note: This task requires being signed in as a super administrator. For more information, see Add several users at once.

Exercise Scenario

You receive this mail from the IT Manager, Alexa:

Hi Admin!

Thanks for creating my Google account. Now our next task is to get the rest of our users accounts created. Below is the list of people.

First Name

Last Name

Email

Password

Employee Title

Ellie

Gray

ellie.gray@yourdomain.com

hellohello1

Executive Assistant

Jon

Baird

jon.baird@yourdomain.com

hellohello1

HR Contractor

Lars

Ericsson

lars.ericsson@yourdomain.com

hellohello1

Project Manager

Samantha

Morse

samantha.morse@yourdomain.com

hellohello1

CEO

Jennifer

Lee

jennifer.lee@yourdomain.com

hellohello1

Finance Manager

Tom

Edison

tom.edison@yourdomain.com

hellohello1

Support Engineer

Will

Marconi

will.marconi@yourdomain.com

hellohello1

Support Engineer

Can you create these accounts using Cloud Identity for us?

Thanks, Alexa Bell, IT Manager

Exercise Directions

In this exercise, you'll add several users via a comma-separated value (CSV) file.

To add several users at once:

1. Sign into your Google Admin console as the administrator user using your administrator account name and password.

2. Go to the Users section, hover over the yellow plus sign, and select Add multiple users.

In the Add multiple users dialog box, click the Download as .csv button to download a copy of a sample spreadsheet to your local machine with the proper headers formatted. Leave this dialog box open to (later) upload the file after editing.

3. Open the CSV file in a spreadsheet application, such as Microsoft Excel.

4. Edit the file to add the user data. Copy the user information into the CSV file from the table Alexa provided.

The file contains a column for each attribute that appears on the user profile in the Admin console and in your directory contacts.

Note: You must enter values in the Email Address, First Name, Last Name, and Password columns; that information is mandatory for each user. Don't forget to update the domain in the email addresses. The other columns aren't mandatory, so you can enter values or leave them blank. However, Alexa has also provided a column for Employee Title that requires information to complete.

5. Once the editing is complete, save a copy of the CSV file (in a CSV file format) back to your local machine.

6. Return to the Add multiple users dialog box, click Attach File, and browse to the edited spreadsheet you just saved locally.

By default, the Require user to change password at next sign-in checkbox is enabled. This requires the user to change the generic password you entered in the spreadsheet.

7. Click Upload to initiate the creation of the user accounts.

8. Go to your email inbox associated with your Admin account and search for the email report of the bulk upload.

In the Admin console, review the list of users and explore the user settings. (This can take a couple of minutes to appear.)

Congratulations! You uploaded multiple users at once! If you're uploading more than 500 user accounts, you can optimize the experience by splitting your uploads into smaller batches.

Note: It can take up to 24 hours for new user accounts to appear in the searchable domain directory.

User Management

Sync Users to Domain with GCDS

Introduction to the Reading

If your organization has a large, pre-established directory, Google Cloud Directory Sync (GCDS) is a secure tool that we provide that can help you sync your users into your Cloud Identity domain. GCDS allows you to synchronize your user data in your Cloud Identity domain with your Microsoft® Active Directory® or LDAP server. GCDS will ensure that your Google users, groups, and shared contacts are synchronized to match the information in your LDAP server. The data will never be modified nor compromised.

Important Note: Because we’re unable to provide a practice instance and ensure that everyone is able to practice using GCDS during this training, and it also requires advanced and more complex setup, use the information below to learn more about GCDS. If your organization would like more information about setting up your Cloud Identity instance using GCDS, please reach out to our support channels!

Read through the following

Step 1: Get acquainted with the GCDS

This help center article will help you understand: a) how GCDS works; and b) the key benefits of GCDS.

After reading through this article, your organization should be able to gauge the necessity of using GCDS.

Step 2: Walk through how to install and prepare to use GCDS

The steps outlined in this series of articles will explain to you how to download GCDS, and also, they will explain how to prepare your current system to use the toolset.

Remember, you must first ensure that your system meets the system requirements.

As you read through these help center steps, ensure that you are looking through each of the points that apply to your current system.

Step 3: Configure your system to use GCDS

As you configure your systems, remember that GCDS will sync all of the user data and settings that you configure. It’s important that these steps are carefully executed, and this is a more advanced and intensive process.

This article will outline all of the data that is able to be synced using GCDS. Take notice of the data that is not able to be synced. Also, take advantage of the other articles that are linked here to learn more.

Other FAQs for GCDS

This article answers many of the most popular questions that come up when considering the use of GCDS.

Remember: For this training, we will not be practicing using this tool. This is simply a guided reading to serve out our knowledge base articles that exist to help you if your organization needs to do a large migration of users into your Cloud Identity domain. We will provide a larger set of advanced resources at the end of this training to point you in the direction of these more advanced toolsets and use cases.

User Management

Admin Roles and Privileges

Introduction to Exercise

In this exercise, you'll grant the super administrator role to Alexa Bell, the IT Manager. The super administrator role is an example of a pre-built administrator role that's standard in the Admin console and where you can create custom roles to suit your needs.

NOTE: To grant the super administrator role and privileges to a user

You can assign an administrator role to a user on the Users account information page, or on the Admin roles page where you define the administrator roles. On the Admin roles page, you can assign a role to multiple users at the same time. Because we're adding a role to just one user, we'll use the Users method.

Exercise Directions

1. Sign into your Google Admin console as the administrator user using your administrator account name and password

2. Click the Users icon

3. Locate Alexa Bell and click to enter her user page

4. Scroll down and select the Admin roles and privileges option. (You may need to click Show more at the bottom of the profile.)

5. In the Manage roles list, select the predefined Super Admin role and click Save

6. Go to to the main Admin console dashboard and click the Admin Roles icon.

7. Click the Super Admin link to view the current users with Super Admin role.

8. In the Super Admin list of users, select the Privileges tab and review the assigned privileges.

Further Notes:

User Management

Custom Admin Privileges

 

Introduction to Exercise

In this lesson, you will practice creating custom roles that have a custom set of privileges.

Exercise Scenario

A little later you receive a request from the Project Manager, Lars Ericsson.

Hello Admin,

I would like to understand more about how our users are interacting with our cloud-based applications. That way I can create a customized training plan for the company. Is there any way I can run reports that track apps usage and user behaviors?

Regards, Lars Ericsson

You decide that, rather than giving him a pre-built role with extra privileges he doesn't need, it's best to create a custom role. That way you can delegate the ability to run reports, but not give Lars any other administrator privileges.

Note: You can assign more than one administrator role to a user. Creating multiple roles with fewer privileges is, therefore, more versatile than one role with many privileges. If a user handles multiple tasks, just assign multiple roles.

Exercise Directions

1. Sign into your Google Admin console as the administrator user using your administrator account name and password.

2. Click the Admin Roles icon.

3. Click Create a new role.

4. In the Create New Role dialog box, enter the Reporting Role name, give a description for the role, and click Create.

5. In the Privileges tab, you can select the privileges you want users to have with this role.

6. Because you want this custom role to just assign privileges for reporting only, check the Reports box, and click Save.

7. Creating the role is the first step in this process, but for Lars to be assigned the privileges, we must also assign the administrator role to his user account.

Congratulations! You've now built and assigned a custom administrator role to one of your users, which allows you to better delegate administrator tasks in your domain.

User Management

Resetting a User's Password

Introduction to Exercise

Now that users are signing in and using the tools, you're likely to come across a scenario where a user needs a password reset:

Exercise Scenario

Jennifer Lee (from Finance) has just come back from holidays, she calls to ask you to reset her password, because she's forgotten it and is now locked out of her account.

Exercise Directions

1. Sign into your Google Admin console as the administrator user using your administrator account name and password.

2. Click the Users icon.

3. Access the reset password function by one of two ways:

4. In the Reset password for jennifer.lee dialog box:

5. Provide the user with new sign-in information. If you have auto-generated the password, there'll be a show password option.

The next time the user signs in, they'll be prompted to supply the current password and enter a new password.

When they enter the password, the Password strength field evaluates the security level of the password. They can click the link if they want tips for creating strong passwords. Google requires a password that's at least eight characters.

As the administrator, inform Jennifer Lee that her password is now reset and she can now sign in to change it. You can also give her some tips on creating a secure password in line with your company's security policy.

User Management

Rename a User

 

Exercise Introduction

When you are using Cloud Identity as your primary identity provider (IdP), you may make mistakes when entering user data into the console. If for some reason you need to change a user's name in the Google Admin Console, this exercise will walk you through how to rename a user.

More Information

See this help center article to learn more about renaming users.

Exercise Scenario

You receive this mail from the CEO:

Hello Patrick,

Thanks for creating my Google account. However I have to ask for a minor change. My username is samantha.morse@[yourdomain.com] but really most people know me as just “Sam”. Is there anyway to just have my name as Sam Morse?

Regards, Samantha Morse, CEO

Exercise Directions

1. Sign into your Cloud Identity Admin console as the administrator user using your administrator account name and password.

3. Click the Users icon.

4. Search or browse to find the user. If you created an organizational structure, select the organization to which the user belongs.

5. In the user list, find Samantha, click the pencil icon.

6. In the Rename user dialog box, read the warning message and enter the following:

Note: The First and Last name settings represent the Display Name.

7. Click Rename user.

If successful, you should see a banner stating that the changes have been saved.

It can take up to 10 minutes for a new primary email address to be reflected throughout the system, 24 hours for domain and personal contact changes to take effect, and up to 3 days before the user can use chat.

User Management

Suspend a User

Introduction to Exercise

As a Cloud Identity administrator, you can temporarily block a user's access to your organization's cloud services by suspending the user's account. This disables the account without deleting the user's profile and related information, such as documents, calendar events, and email. If the user has shared any documents, sites, or secondary calendars, these shared assets are still accessible to collaborators. A suspended user can't sign in to the account, and new information, such as emails and calendar invitations, are blocked.

Note: A suspended user still requires a user license; therefore, a fee still applies.

More Information

Exercise Scenario

After setting up your initial directory in Cloud Identity, you receive an email from Lars Ericsson:

Hey Cloud Identity Admin,

I had a contractor working with me last week for a project, his name is Jon Baird. He has an account to sign in to our system but for the next few weeks he'll be working somewhere else. Is there a way to prevent him from signing in without losing all the work he's done already? He'll be back to work with us soon.

Regards,

Lars Ericsson

Exercise Directions

1. Sign into your Google Admin console as the administrator user using your administrator account name and password.

2. Click the Users icon.

3. To suspend Jon Baird, find his name on the user list, click the three-dot elipsis, and choose Suspend user in the drop-down menu.

4. Click Suspend.

On Jon Baird's user account page, an exclamation point indicates Jon's suspended status.

5. Return to the main user list. In the Filters list at the side (if you don't see this list, click the Filters button), choose Suspended users in the User Type drop-down list.

The list now should contain user Jon Baird and any other currently suspended users.

Exercise Scenario Continued

A few weeks later, you receive another email from Lars Ericsson:

Hey Patrick,

I have a contractor, Jon Baird, who will be working with us again next week. He had an account before but is locked out at my request. Can you please re-enable him?

Regards, Lars Ericsson

As a Cloud Identity administrator, you can restore a user you (or another administrator) suspended.

Exercise Directions Continued

1. In the user list, filter for suspended users. Locate Jon Baird in the suspended users list and click his name to enter his account page.

2. To restore Jon’s suspended account, click the exclamation point and select Reactivate.

After Jon's user account is restored, his name should no longer be in the Suspended users list—he should now be back in Active users. Restored users can sign in and regain full access to their services.

Further Notes

User Management

Delete a User

Introduction to Exercise

If a user leaves your organization, you might want to delete their Google account. Data is purged within a matter of days. It's important to understand the different implications of suspending and deleting users, build a process for users leaving the company, and create a deletion policy that best suits your business needs.

However, be aware that there are many other considerations that should be handled before deleting an account; there may be many other types of data that could be lost without following proper steps.

Exercise Scenario

After some time working in your Cloud Identity domain, you get another email from Lars Ericsson:

Hey Admin,

That contractor I had working with me, Jon Baird, has finished up his project. Can you please delete his account from the system as he won't be working here anymore?

Regards,

Lars Ericsson

Exercise Directions

1. Sign into your Google Admin console as the administrator user using your administrator account name and password.

2. Click the Users icon.

3. To delete Jon Baird, find his name on the user list, click the check box to the right of his name, click the three-dot ellipsis in the right hand corner, and choose Delete user in the drop-down menu.

Note: Because the user is suspended first, if you restore a deleted user, the Admin console restores the user as a suspended user.

4. Return to the user list and confirm that Jon Baird is no longer listed. Search for the user in the user search bar. You should see the result: There are no results to display.

 

User Management

Restore a Recently Deleted User

Introduction to Exercise

You can restore a recently deleted user account for up to 20 days. After this period, the Admin console permanently deletes the user account and it can't be recovered, even if you contact Google technical support.

In most cases, restoring a deleted user account also restores the user's associated data, however, Google doesn't guarantee full data recovery for a deleted user.

Important:

Exercise Scenario

The next day you get a high priority email from Lars Ericsson:

Hello Cloud Identity Admin,

I'm afraid I was a little premature in getting you to delete our HR contractor Jon Baird. We've decided to extend his contract and hire him as a full-time employee.

Is there any way you can restore his user account?

Regards, Lars Ericsson

Exercise Directions

1. Sign into your Google Admin console as the administrator user using your administrator account name and password.

2. Click the Users icon.

3. In the Filters list (click the Filters button if you don't see this list), choose Recently deleted users in the User Type drop-down list.

Note: If you have multiple organizations in your domain, stay at the top-level organization—deleted users lose their organization details and are moved to the top-level organization.

4. Locate Jon Baird in the list and check the box next to his name.

If a deleted user's name isn't in this list, the account has been fully deleted and can no longer be restored.

5. Click Recover user to restore Jon's user account and choose the organization to place him.

Note: You can restore only one user at a time.

6. In the Filters list, choose Suspended users in the User Type drop-down list.

7. Restore the suspension and put Jon Baird back in the Active users list:

User Management

Create an Organization Unit

Introduction to Exercise

As a Cloud Identity administrator, you may want to create an organizational structure within your domain. There are several reasons why you would do this:

Learn more about how user and device policies and organizational structures work.

Exercise Scenario

You receive a new email from the IT Manager, Alexa Bell, requesting to restructure your domain.

Hey Admin,

As you know we now have two people working in Support, their names are Will and Tom (see below for details). I want to set up a helpdesk to offer technical support to our employees and customers.

Is there any way you can set these guys up with some different settings than the rest of the employees? For example they will need access to some different services like chat, that I want blocked for everyone else.

Thanks, Alexa Bell

Employee

Position

Will Marconi

Support

Tom Edison

Support

Exercise Directions

1. Sign into your Google Admin console as the administrator user using your administrator account name and password.

2. Click the Users icon.

3. In the toolbar, click the Filters icon to see your organizations (also called orgs or organizational units).

4. Hover over the top-level parent org, most likely called yourdomain.com, to add a new sub organization, and click the elipses that appears to the right.

5. Click Add sub organization.

6. In the Create new organization dialog box, fill in the details of the new Support organization and click Create Organization.

7. Return to the parent organization users page, and from the list, select your two Support users: Will Marconi and Tom Edison.

8. In the toolbar on the top right, click the Move to another organization icon and choose your new Support org.

9. When the confirmation prompts, click OK.

You should now see your two users moved to your designated Support org.

User Management

Create an Admin-Managed Group

Introduction to Groups

This lesson will take you through the different types of groups available in G Suite, and you'll work through how to create groups for your organization. Google Groups make it easy for your users to communicate with people they contact often. As the administrator, you can create and manage groups in the Google Admin console.

Help Center Articles

Review the following Help Center Articles in order to learn more about Groups

Introduction to Exercise

Read through the scenario and directions below in order to practice creating admin-managed groups.

Exercise Scenario

The company wants to create the following groups that can be managed only by the system administrators as follows:

Exercise Directions:

1. Sign into your Google Admin console as the administrator user using the your administrator account name and password.

2. From the dashboard, click Groups

3. Click the plus button at the bottom of the groups page.

4. Enter the following details in the Create new group box:

5. Click Create. You’ll be taken to the group’s page in the Admin console.

6. For the following group, Management, repeat the steps above, but do not add all users from the organization to this group.

7. Once on the Management groups page, click Manage users in Management.

8. In the "Add new members" box, add the following users by typing their full Google accounts, including the domain, into the box. Ensure that you are adding them as "members."

NOTE: After you’ve create a group in the Admin console you can edit it to add or remove members, change a member’s group role, change a group’s name or description, and more.

Security

Security Overview

This module will walk you through some of the security features that are available to you as the Cloud Identity admin. Make sure that you explore the Help Center articles that are linked below.

Help Center Articles

Review the following Help Center Articles in order to learn more about Security. We will be using these throughout these exercises to both guide our directions. You will see them referenced throughout the following exercises.

Security

Navigate the Security Center

Introduction to Exercise

The Security center gives you a security dashboard and security health recommendations. The security center brings together security analytics, actionable insights and best practice recommendations from Google to empower you to protect your organization, data and users.

• See the Security Center articles to learn more.

Exercise Scenario

In this exercise, you'll navigate to the security center to view and understand your security dashboard and security health recommendations.

Exercise Directions

Access the Security Center dashboard

1. Sign into your Cloud Identity Admin Console as the administrator user using your administrator account name and password.

2. Click the Security icon.

3. Click on Dashboard. From here, you can get overview of key security metrics for:

Failed device login attempts — This report will show you details of failed login attempts on your corporate devices during a specified time range

Note: See the Failed device login attempts report article to learn more.

Compromised device events — This report will show you details of compromised device events.

Note: Use this report to view device IDs, device owners, and the timestamps of compromised devices. See the Compromised device events report article to learn more.

Suspicious device activities — What suspicious device activities have been detected? Details of suspicious activities on your corporate devices during a specified time range

Note: Use this report to view device IDs, device owners, and the timestamps of the suspicious device activities. See the Suspicious device activities report article to learn more.

OAuth grant activity report — This report is ranked by the growth in grants to apps in the current time period compared to the previous time period.

Note: Use this report to monitor the OAuth grant activity in your organization by app, scope, or user. See the OAuth grant activity report article to learn more.

OAuth grants to new apps report—This report shows the new apps that have been provided OAuth grants in the given time period compared to the previous similar time period.

Note: Use this report to monitor the OAuth grant activity in your organization. See the OAuth grants to new apps report article to learn more.

See Security dashboard to learn more.

Access the Security Center health page

1. From the Admin console dashboard, click the Security icon

2. Click on Security health. The security health page enables you to monitor the configuration of your Admin console settings and stay ahead of potential threats by examining security analytics and flagging threats.

• From here you can monitor the security health of the following settings:

Device management settings - you can monitor the configuration of the following Device management settings:

  • Mobile management

  • Blocking of compromised mobile devices

  • Mobile password requirements

  • Device encryption

  • Mobile inactivity reports

  • Auto account wipe for Android

  • Mobile application verification for Android

  • Installation of mobile applications from unknown sources

  • External media storage

Security settings - you can monitor settings related to security and protection of user accounts:

  • 2-step verification for users

  • 2-step verification for admins

  • Security key enforcement for users

See Get started with the security health page to learn more.

Congratulations! You now know how to access the Security center to view and understand your dashboard and health recommendations.

See Security dashboard to learn more.

Security

Configure Common Security Settings

Introduction to Exercise

As an admin, there are some basic security settings you can enable and adjust in the Admin console to improve the overall security of your Cloud Identity instance.

Exercise Scenario

In this exercise, you’ll modify and enable security features and settings for your entire domain.

Exercise Directions

1. Sign into your Google Admin console as the administrator user with your administrator account name and password.

2. From the Admin console dashboard, click on the Security icon.

3. Click on Basic settings to ensure security features and settings are enabled in the following sections:

4. By default, only a domain administrator can reset a user’s password. The Password Recovery setting is applicable where you want to allow users to recover their own passwords. This achieved through the use of a recovery email address or phone number. To enable user password recovery, click the Enable/disable non-admin user password recovery link, and check Enable non-admin user password recovery.

Note:

5. In the 2-Step Verification section, check Allow users to turn on 2-step verification.

Note:

6. In Less secure apps, you can control access to third-party apps that use less secure sign-in technology. You can choose to deny access for these apps, which we recommend, or choose to allow access despite the risks.

Note:

7. Expand the Password management section. This is where password policies are set.

You can enforce strong passwords by checking the Enforce strong password box. You can also set a Password length policy by setting minimum and maximum length values. It is recommended to keep the minimum password length to at least 8 characters. You can enforce the length and strength policies when your users next login to their account or when they next change their password. The default enforcement is when the password is next changed.

The Allow password reuse box allows you to control whether your users can reuse their old passwords. We recommend you leave this option unchecked to prevent reuse.

You can also force your users to change their passwords after a certain number of days or allow them to never expire with the Password expiration setting. We recommend you allow passwords to never expire.

Note:

8. In API reference, check Enable API access to enable programmatic access to your Cloud Identity domain.

Note:

9. In Set up single sign-on (SSO), you can enable your users access to many applications without having to enter their username and password for each application.

Congratulations! You can now view and modify basic security settings for your entire domain.