Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Pre-Requisite: In order to complete the following onboard steps you will need to have privileges to: create a new GCP project, create a service account, and modify your organizations IAM policy.

...

Click on each link below and then “Enable API” button click on the ENABLE button near the top of the page. Ensure that the newly created project is currently selected in the project list drop down.

...

  1. Enter any name for the “Service account name” of “DataTheoremDiscovery”. For the description field, enter a meaningful description such as:
    "This service account will be used by Data Theorem to perform resource discovery".
    Click on Create and continue near the bottom.
  2. Click on “Continue” on the Service Account Permissions page. You in the following 2 steps. Skip the 2 optional steps, you will be adding permissions later at the organization level.
  3. Complete the service account creation by clicking on "Done".
  4. On the final Service accounts page, click on + CREATE KEY” near the bottom of the page. On the right sidebar, ensure the options icon under "Actions" for the newly created service account, and then click Manage keys
  5. On the "Keys" tab, click on the ADD KEY dropdown and select "Create new key".
  6. Ensure JSON” is selected and then click on CREATE.
  7. Save the JSON (used in Step 6) file. Close the warning dialog that may appear.
  8. Click on “DONE” near the bottom of the page.
  9. Copy the email of the new service account that will now appear in the list of service accounts for your new projectSwitch to the "Details" tab and copy the service account email
    1. It will look like DataTheoremDiscovery@rosy-canyon-234300.iam.gserviceaccount.com where “DataTheoremDiscovery” is the service account name and “rosy-canyon-234300” is the project in which the service account was created

Step 4: Add the new service account as a member to your organization

...

  1. At the top of the page, click the project selection drop-down list (the down arrow). In the window that appears, click on “ALL”  ALL  above the table, and then select your Organization (building icon) from the list of items.
  2. Click on ADD near the top of the page.
  3. In the sidebar that will appear from the right, add the newly created service account’s email in the “New members” field
  4. Click on select a role, and GRANT ACCESS under the VIEW BY PRINCIPALS tab.
  5. Paste the service account email in the "New Principals" text box
  6. Under the "Assign roles" section,  click on the "Select a role" dropdown
  7. type in “Security Reviewer”, select the “Security Reviewer” role from the list below the input field.
  8. Click on Add Another Role and do the same as above for “Firebase Viewer
  9. Click on Add Another Role and do the same as above for “Service Controller
  10. Click on Add Another Role and do the same as above for “App Engine Viewer
  11. Finally, click on “Save

Step 5: Get your organization ID

  1. Go to https://console.cloud.google.com and then, at the top of the page, click on the project selection drop-down list (the down arrow).
  2. On the window that appears, on the right side, click the three vertical dots, then click Settings. Your organization id will appear on the settings page.

...

  1. Copy the organization ID

Step 6a: Submit the JSON file and organization ID via the Data Theorem portal (RECOMMENDED)

Submit the JSON file and organization ID via the ASM setup flow on the Data Theorem portal.

OR

Step 6b: Send the JSON file and organization ID to  Data Theorem support (only if you don't have access to the Data Theorem portal)

Send the JSON file (from Step 3) and organization ID (from step 5) to  support@datatheorem.com

...