Skip to main content

Google Firebase

google

Version: 1.0
Updated: Nov 19, 2025

Google Firebase Authentication is a secure, scalable identity management service that enables user sign-up, sign-in, and access control across web and mobile applications.

Actions​

  • List Users (Enrichment) - List account information for all users.
  • Get User (Enrichment) - Get the user account information.
  • Delete User (Containment) - Remove a user account from the system.
  • Update User Attributes (Containment) - Modify user details such as password, status, or settings.
  • List Sign-in Methods (Enrichment) - View authentication providers linked to a user.

Google Firebase Authentication Configuration​

Our Google Firebase integration support two types of authentication, Service Account and WIF (Workload Identity Federation). We recommend using WIF since it is more secure and easier to manage. For more information, see Workload Identity Federation.

Required AWS details from Sumo Logic​

To configure the Google Firebase integration using WIF authentication, you need the following AWS details from Sumo Logic. These details are essential for setting up the Workload Identity Federation (WIF) credentials in Google Workspace:

  • Deployment name is the unique name of your Sumo Logic deployment, for example, dub, fra, etc.
  • Sumo Logic AWS account ID: 926226587429
  • Sumo Logic AWS role: <deployment_name>-csoar-automation-gcpiam
  • Sumo Logic AWS Lambda function: <deployment_name>-csoar-automation-gcpiam
  • Full ARN: arn:aws:sts::926226587429:assumed-role/<deployment_name>-csoar-automation-gcpiam/<deployment_name>-csoar-automation-gcpiam

Workload Identity Federation (WIF) authentication​

To create WIF credentials in Google Workspace needed to configure the Google Firebase integration, follow these steps:

  1. Log in to the Google Cloud portal.
  2. Select a Google Cloud project (or create a new one).
  3. Go to the API&Services
  4. In the same page click on ENABLED API AND SERVICES and search for Cloud Resource Manager API, IAM Service Account Credentials API, Identity and Access Management (IAM) API, Security Token Service API, Google Firebase API and enable it all.
  5. Go to the IAM & Admin > Service Accounts page.
  6. Click CREATE SERVICE ACCOUNT. A service account is required to access the Google Firebase.
  7. While creating the service account, in Permissions add the role Service Account Token Creator and click on DONE.
    google-chat
  8. Go to the IAM & Admin > Workload Identity Federation page.
    google-chat
  9. Click CREATE POOL, provide the details, and click on CONTINUE.
    google-chat
  10. Add Provider details. Select AWS as the provider type and provide the details of the AWS Account ID which is provided by Sumo Logic. Click on CONTINUE and SAVE.
    google-chat
  11. Now you will see the created pool and provider.
    google-chat
  12. Now we have to build a principal name to configure in Sumo Logic. The format of the principal name is: principalSet://iam.googleapis.com/projects/{YourProjectID}/locations/global/workloadIdentityPools/{YourPoolName}/attribute.aws_role/arn:aws:sts::{SumoAWSAccountID}:assumed-role/{SumoAWSRole}/{SumoAWSLambdaFunction}.
  13. Go to the IAM & Admin > IAM page and click on Grant Access to add a new principal.
  14. In the New principals field, provide the above principal name and select the role Workload Identity User. Click on SAVE.
    google-chat
  15. Go to the IAM & Admin > Workload Identity Federation page and select the pool which was created above.
  16. Click on Grant Access > Grant access using service account impersonation.
  17. Select the service account which created above, select the principle as aws_role and provide the arn arn:aws:sts::{SumoAWSAccountID}:assumed-role/{SumoAWSRole} and click on SAVE.
    google-chat
  18. Again go to Grant Access > Grant access using service account impersonation. Select the service account which was created above. Select the principle as aws_role and provide the arn arn:aws:sts::{SumoAWSAccountID}:assumed-role/{SumoAWSRole}/{SumoAWSLambdaFunction}. Click on SAVE.
  19. Download the WIF conf.json file. Make sure you save it in a safe place. Use the JSON content to configure the Google Firebase integration to use WIF authentication in Automation Service and Cloud SOAR.

Service Account authentication​

To create service account credentials in Google Workspace needed to configure the Google Firebase app integration, follow these steps:

  1. Log in to the Google Cloud portal.
  2. Select a Google Cloud project (or create a new one).
  3. Go to the API & Services > Credentials page.
  4. In the same page click on ENABLES API AND SERVICES and search for Google Firebase and enable it.
  5. Click CREATE CREDENTIALS and select Service Account.
    google-drive
  6. Enter a service account name to display in the Google Cloud console. The Google Cloud console generates a service account ID based on this name.
  7. (Optional) Enter a description of the service account.
  8. Skip two optional grant permissions steps and click Done to complete the service account creation.
    google-drive
  9. Click on the generated service account to open the details.
    google-drive
  10. Under the KEYS tab, click ADD KEY and choose Create new key.
    google-drive
  11. Click on CREATE (make sure JSON is selected).
    google-drive
  12. The JSON file is downloaded. Make sure you save it in a safe place.
  13. Enable the Admin SDK API for the project at https://console.cloud.google.com/flows/enableapi?apiid=admin.googleapis.com.

Configure Google Firebase in Automation Service and Cloud SOAR​

Before you can use this automation integration, you must configure its authentication settings so that the product you're integrating with can communicate with Sumo Logic. For general guidance, see Configure Authentication for Automation Integrations.

How to open the integration's configuration dialog
  1. Access App Central and install the integration. (You can configure at installation, or after installation with the following steps.)
  2. Go to the Integrations page.
    Classic UI. In the main Sumo Logic menu, select Automation and then select Integrations in the left nav bar.
    New UI. In the main Sumo Logic menu, select Automation > Integrations. You can also click the Go To... menu at the top of the screen and select Integrations.
  3. Select the installed integration.
  4. Hover over the resource name and click the Edit button that appears.
    Edit a resource

In the configuration dialog, enter information from the product you're integrating with. When done, click TEST to test the configuration, and click SAVE to save the configuration:

  • Label. Enter the name you want to use for the resource.

  • Private Key Json. Provide the content of the JSON file generated above. Open the file and copy-paste the whole content in the field.
  • WIF Private Key Json. Provide the content of the Workload Identity Federation JSON file generated above. Open the file and copy-paste the whole content in the field.
  • scopes. Default scope is already added as https://www.googleapis.com/auth/identitytoolkit, if not then add this scope.
  • Project ID. Provide the Google Firebase Project ID where the firebase actions will be performed.
  • Automation Engine. Select Cloud execution for this certified integration. Select a bridge option only for a custom integration. See Cloud or Bridge execution.

  • Proxy Options. Select whether to use a proxy. (Applies only if the automation engine uses a bridge instead of cloud execution.)

    • Use no proxy. Communication runs on the bridge and does not use a proxy.
    • Use default proxy. Use the default proxy for the bridge set up as described in Using a proxy.
    • Use different proxy. Use your own proxy service. Provide the proxy URL and port number.
Google Firebase configuration

For information about Google Firebase, see Google Firebase documentation.

Change Log​

  • November 19, 2025 (v1.0) - First upload
Status
Legal
Privacy Statement
Terms of Use
CA Privacy Notice

Copyright © 2025 by Sumo Logic, Inc.