Fortinet black logo

Google Cloud Platform

Copy Link
Copy Doc ID 92974f8e-fceb-11e9-8977-00505692583a:868927

Google Cloud Platform

FortiCWP offers an API-based approach, pulling data directly from Google Cloud via a RESTful API. FortiCWP uses your service account credentials to generate API queries.

Prerequisites

To use FortiCWP with Google Cloud Platform, you must have a G Suite account,service account, and the JSON private key associated with the service account. The service account must have “G Suite Domain-wide Delegation” enabled and Project Owner/Organization Administrator roles for monitoring.

Steps to setup Google Cloud with FortiCWP

Your G Suite account can be either an existing account or a new account. If you have just created a new account, you must wait for at least 24 hours for the account to take effect before granting it access to FortiCWP. The G Suite account to which you connect from within FortiCWP must have the Super Admin role in your G Suite account.

Configure G Suite Account

Use the following steps to check if your account has the Super Admin role:

  1. Go to https://admin.google.com/ and log in with your Google Suite account credentials.
  2. In the upper-left corner, click the navigation menu , and select Directory>Users.
  3. Click on user account of interest.
  4. Scroll down to the Admin roles and privileges section, click the draw-down button.
  5. In the Roles section, make sure that the Super Admin role has been assigned. Otherwise, hover over the Roles section, click the Edit icon, and select Super Admin in the pop-up window.

Configure Service Account

For your service account, you may either use an existing or new account.

New Service Account Creation
  1. Go to https://console.developers.google.com and log in with your Google Suite account.
  2. Click on the drop-down menu > Select a project.
  3. Select an existing project you want to monitor or Create a New Project by clicking New Project.
  4. Click the Navigation Menu on the top left corner, go to IAM & admin > Service accounts.
  5. Click +Create service account button.
  6. Enter a Service account name of your preference and click create. Service account ID will populate automatically.
  7. Keep the service account ID for later during Google cloud authentication during installation.
  8. Click Continue when prompted for entering service account permissions.
  9. Click on +Create Key and select JSON to create a private key. The JSON private key will be downloaded automatically, then click Done
  10. Keep the JSON key later for Google cloud authentication during installation.
  11. Once service account is created, select the service account created and click on under Actions icon > Edit.
  12. Enable G Suite Domain-wide Delegation.

Using Existing Service Account
  1. Select the project that contains the service account to be used.
  2. Click the Navigation Menu in the upper-left corner of the page, and select IAM & Admin > Service Accounts.
  3. Note:Make sure Domain-wide delegation is enabled. If not, click on Actions icon > Edit to enable it.

  4. If you don’t have a JSON private key, then click Actions icon > Edit , and select +Create Key.
  5. Select JSON in the Key type field, and click CREATE.The JSON private key will automatically downloaded.

Note: Be sure to keep this key and your service account ID for use later during Google cloud authentication.

Once your service account is ready, you must grant it API access to the G Suite API.

Grant Service Account API Access
  1. Click the Navigation Menu in the upper-left corner of the page, and then select IAM & admin > Service Accounts.
  2. In the Domain-wide delegation column, click View Client ID.
  3. In the pop-up window, save the client ID for step 7.
  4. Go to https://admin.google.com and log into the same Google account.
  5. Scroll down and click on More Controls > Security.
  6. In Security, scroll down and select Advanced Settings.
  7. Click Manage API client access.
  8. In the Client Name field, enter the Client ID saved in Step 3. Your Client ID must be a string of numbers.
  9. In the One or More API Scopes field, enter:

"https://www.googleapis.com/auth/admin.directory.user,https://www.googleapis.com/auth/admin.reports.audit.readonly".

After getting your service account ID and JSON private key, grant the service account with Owner and Organization Administrator role for the projects to be monitored.

Grant Service Account Owner Role
  1. Select the project to be monitored.
  2. Click the Navigation Menu on the upper-left corner, select IAM & admin > IAM.
  3. Click the ADD button on the top.
  4. In the New Members field, enter the service account ID you want to use.
  5. In the Select a role field, select Project > Owner.
  6. Click the SAVE button.
  7. Repeat the steps above for all the projects to be monitored.

Additionally, on the same service account, grant Organization Administrator.

Grant service account Organization Administrator role
  1. Select the project to be monitored.
  2. Click the Navigation Menu on the upper-left corner, select IAM & admin > IAM.
  3. Click the ADD button on the top.
  4. In the New members field, enter the service account ID you want to use.
  5. In the Select a role field, select Resource Manager > Organization Administrator
  6. Note: You can also enter "Organization Administrator" in the filter for fast access.

  7. Click the SAVE button.

Enable required APIs

After adding roles to the service account, you must make sure that the following APIs are enabled on all projects for monitoring. This will ensure that FortiCWP can gather information from the Google Cloud.

  • Cloud Resource Manager API
  • App Engine Admin API
  • Cloud Key Management Service (KMS) API
  • Compute Engine API
  • Cloud SQL
  • Google Cloud Storage JSON API
  • Google Cloud Storage
  • Cloud SQL Admin API
  • Stackdriver Logging API
  • Admin SDK
  • Identity and Access Management (IAM) API

To enable the APIs, do the following:

  1. Go to the project to be monitored.
  2. Click the Navigation Menu in the upper-left corner, and select APIs & Services>Dashboard.
  3. In the Enabled APIs and services list, make sure that the required APIs are listed (enabled).

If any of the APIs is not enabled, use the below steps to enable it:

  1. Go to the project want to be monitored.
  2. Click the Navigation Menu in the upper-left corner, and select APIs & Services > Dashboard.
  3. Click the ENABLE APIS AND SERVICES button on the top.
  4. In the Search for APIs & Services field, enter the name of a required API.
  5. From the search results, select the API.
  6. Click the ENABLE button.
  7. Wait until Google Cloud has enabled the API.

Note: While you are enabling an API, a dialog may pop up prompting you to enable billing. If that happens, follow the prompts onscreen to enable billing.

Enable activity and alert monitoring

If you would like to enable FortiCWP activity and alert monitoring, you must turn on audit logging using the following steps:

  1. Go to the project to be monitored.
  2. Click the Navigation Menu in the upper-left corner, and select IAM & admin>Audit Logs.
  3. Select Google Cloud Storage in the list.
  4. Enable all log types, i.e., Admin Read, Data Read, and Data Write.
  5. Click the SAVE button.

Installation

Once you have all the prerequisites in place, you can start installing Google Cloud using the following steps:

  1. In the upper right hand corner of the FortiCWP main page, click the setting button or go to Administrator > Cloud Accounts.
  2. From the Cloud Accounts page, click add button next to Google Cloud. The Google Cloud Authentication dialog will open.
  3. In Google Cloud Authentication dialog, for User Email field, enter your email address which you used to create the service account.
  4. In Service Account ID field, enter the ID of your service account. Your service account ID should end in ".gserviceaccount.com".
  5. Give the Google Cloud account an account name on FortiCWP in Account Name field. (optional)
  6. For Service Account Private Key (JSON File), click Choose to browse and upload your service account's private key (i.e., a JSON file), then click OK.
  7. Click Add GoogleCloud button to complete authentication.

You will be redirected back to the FortiCWP dashboard. After adding the Google Cloud accounts, please check for installation status under the Google Cloud authentication page. For detail information, please refer to Account Status.

Google Cloud Platform

FortiCWP offers an API-based approach, pulling data directly from Google Cloud via a RESTful API. FortiCWP uses your service account credentials to generate API queries.

Prerequisites

To use FortiCWP with Google Cloud Platform, you must have a G Suite account,service account, and the JSON private key associated with the service account. The service account must have “G Suite Domain-wide Delegation” enabled and Project Owner/Organization Administrator roles for monitoring.

Steps to setup Google Cloud with FortiCWP

Your G Suite account can be either an existing account or a new account. If you have just created a new account, you must wait for at least 24 hours for the account to take effect before granting it access to FortiCWP. The G Suite account to which you connect from within FortiCWP must have the Super Admin role in your G Suite account.

Configure G Suite Account

Use the following steps to check if your account has the Super Admin role:

  1. Go to https://admin.google.com/ and log in with your Google Suite account credentials.
  2. In the upper-left corner, click the navigation menu , and select Directory>Users.
  3. Click on user account of interest.
  4. Scroll down to the Admin roles and privileges section, click the draw-down button.
  5. In the Roles section, make sure that the Super Admin role has been assigned. Otherwise, hover over the Roles section, click the Edit icon, and select Super Admin in the pop-up window.

Configure Service Account

For your service account, you may either use an existing or new account.

New Service Account Creation
  1. Go to https://console.developers.google.com and log in with your Google Suite account.
  2. Click on the drop-down menu > Select a project.
  3. Select an existing project you want to monitor or Create a New Project by clicking New Project.
  4. Click the Navigation Menu on the top left corner, go to IAM & admin > Service accounts.
  5. Click +Create service account button.
  6. Enter a Service account name of your preference and click create. Service account ID will populate automatically.
  7. Keep the service account ID for later during Google cloud authentication during installation.
  8. Click Continue when prompted for entering service account permissions.
  9. Click on +Create Key and select JSON to create a private key. The JSON private key will be downloaded automatically, then click Done
  10. Keep the JSON key later for Google cloud authentication during installation.
  11. Once service account is created, select the service account created and click on under Actions icon > Edit.
  12. Enable G Suite Domain-wide Delegation.

Using Existing Service Account
  1. Select the project that contains the service account to be used.
  2. Click the Navigation Menu in the upper-left corner of the page, and select IAM & Admin > Service Accounts.
  3. Note:Make sure Domain-wide delegation is enabled. If not, click on Actions icon > Edit to enable it.

  4. If you don’t have a JSON private key, then click Actions icon > Edit , and select +Create Key.
  5. Select JSON in the Key type field, and click CREATE.The JSON private key will automatically downloaded.

Note: Be sure to keep this key and your service account ID for use later during Google cloud authentication.

Once your service account is ready, you must grant it API access to the G Suite API.

Grant Service Account API Access
  1. Click the Navigation Menu in the upper-left corner of the page, and then select IAM & admin > Service Accounts.
  2. In the Domain-wide delegation column, click View Client ID.
  3. In the pop-up window, save the client ID for step 7.
  4. Go to https://admin.google.com and log into the same Google account.
  5. Scroll down and click on More Controls > Security.
  6. In Security, scroll down and select Advanced Settings.
  7. Click Manage API client access.
  8. In the Client Name field, enter the Client ID saved in Step 3. Your Client ID must be a string of numbers.
  9. In the One or More API Scopes field, enter:

"https://www.googleapis.com/auth/admin.directory.user,https://www.googleapis.com/auth/admin.reports.audit.readonly".

After getting your service account ID and JSON private key, grant the service account with Owner and Organization Administrator role for the projects to be monitored.

Grant Service Account Owner Role
  1. Select the project to be monitored.
  2. Click the Navigation Menu on the upper-left corner, select IAM & admin > IAM.
  3. Click the ADD button on the top.
  4. In the New Members field, enter the service account ID you want to use.
  5. In the Select a role field, select Project > Owner.
  6. Click the SAVE button.
  7. Repeat the steps above for all the projects to be monitored.

Additionally, on the same service account, grant Organization Administrator.

Grant service account Organization Administrator role
  1. Select the project to be monitored.
  2. Click the Navigation Menu on the upper-left corner, select IAM & admin > IAM.
  3. Click the ADD button on the top.
  4. In the New members field, enter the service account ID you want to use.
  5. In the Select a role field, select Resource Manager > Organization Administrator
  6. Note: You can also enter "Organization Administrator" in the filter for fast access.

  7. Click the SAVE button.

Enable required APIs

After adding roles to the service account, you must make sure that the following APIs are enabled on all projects for monitoring. This will ensure that FortiCWP can gather information from the Google Cloud.

  • Cloud Resource Manager API
  • App Engine Admin API
  • Cloud Key Management Service (KMS) API
  • Compute Engine API
  • Cloud SQL
  • Google Cloud Storage JSON API
  • Google Cloud Storage
  • Cloud SQL Admin API
  • Stackdriver Logging API
  • Admin SDK
  • Identity and Access Management (IAM) API

To enable the APIs, do the following:

  1. Go to the project to be monitored.
  2. Click the Navigation Menu in the upper-left corner, and select APIs & Services>Dashboard.
  3. In the Enabled APIs and services list, make sure that the required APIs are listed (enabled).

If any of the APIs is not enabled, use the below steps to enable it:

  1. Go to the project want to be monitored.
  2. Click the Navigation Menu in the upper-left corner, and select APIs & Services > Dashboard.
  3. Click the ENABLE APIS AND SERVICES button on the top.
  4. In the Search for APIs & Services field, enter the name of a required API.
  5. From the search results, select the API.
  6. Click the ENABLE button.
  7. Wait until Google Cloud has enabled the API.

Note: While you are enabling an API, a dialog may pop up prompting you to enable billing. If that happens, follow the prompts onscreen to enable billing.

Enable activity and alert monitoring

If you would like to enable FortiCWP activity and alert monitoring, you must turn on audit logging using the following steps:

  1. Go to the project to be monitored.
  2. Click the Navigation Menu in the upper-left corner, and select IAM & admin>Audit Logs.
  3. Select Google Cloud Storage in the list.
  4. Enable all log types, i.e., Admin Read, Data Read, and Data Write.
  5. Click the SAVE button.

Installation

Once you have all the prerequisites in place, you can start installing Google Cloud using the following steps:

  1. In the upper right hand corner of the FortiCWP main page, click the setting button or go to Administrator > Cloud Accounts.
  2. From the Cloud Accounts page, click add button next to Google Cloud. The Google Cloud Authentication dialog will open.
  3. In Google Cloud Authentication dialog, for User Email field, enter your email address which you used to create the service account.
  4. In Service Account ID field, enter the ID of your service account. Your service account ID should end in ".gserviceaccount.com".
  5. Give the Google Cloud account an account name on FortiCWP in Account Name field. (optional)
  6. For Service Account Private Key (JSON File), click Choose to browse and upload your service account's private key (i.e., a JSON file), then click OK.
  7. Click Add GoogleCloud button to complete authentication.

You will be redirected back to the FortiCWP dashboard. After adding the Google Cloud accounts, please check for installation status under the Google Cloud authentication page. For detail information, please refer to Account Status.