Added in: 5.19.0
Prowler for Google Workspace allows you to audit your organization’s Google Workspace environment for security misconfigurations, including super administrator account hygiene, domain settings, and more.
Prerequisites
Before running Prowler with the Google Workspace provider, ensure you have:- A Google Workspace account with super administrator privileges
- A Google Cloud Platform (GCP) project to host the Service Account
- Authentication configured (see Authentication):
- A Service Account JSON key from a GCP project with Domain-Wide Delegation enabled
Quick Start
Step 1: Set Up Authentication
Set your Service Account credentials file path and delegated user email as environment variables:Step 2: Run Prowler
Authentication
Prowler uses a Service Account with Domain-Wide Delegation to authenticate to Google Workspace. This requires:- A Service Account created in a GCP project
- The Admin SDK API enabled in that project
- Domain-Wide Delegation configured in the Google Workspace Admin Console
- A super admin user email to impersonate
Using Environment Variables (Recommended)
The delegated user must be a super admin email in your Google Workspace organization. The service account credentials must be provided via environment variables (
GOOGLEWORKSPACE_CREDENTIALS_FILE or GOOGLEWORKSPACE_CREDENTIALS_CONTENT).Understanding the Output
When Prowler runs successfully, it will display the credentials being used:directory_super_admin_count check verifies the number of super administrators is within a recommended range (2–4):
- PASS — 2 to 4 super administrators found
- FAIL — 0 or 1 (single point of failure) or 5+ (excessive privilege exposure)
output/) in CSV, JSON-OCSF, and HTML formats.
Configuration
Prowler uses a configuration file to customize provider behavior. To use a custom configuration:Next Steps
- Authentication — Detailed guide on setting up a Service Account and Domain-Wide Delegation

