Security
Default access permission on documents
Documents created via SuperOffice which are hosted in Google Drive will be given a default-permission that is "accessible to anyone in the Google Workspace" domain. This default behavior can be changed to "inheritance to folder" by contacting Support.
Security-related UI details
Users of SuperOffice Online opening documents hosted in Google Drive will see these documents in their Google drive recent document list. The owner name will be the one used for the Service Account when the service-account was created:
This is how Google Drive collaboration works. The actual SOARC document-tree will not be visible nor accessible in the end-users drive directory tree:
This is not a bug. This is by design.
Set access permission on document archive for cross-domain access
Warning
Items with any link sharing option can be published on the web, and potentially be a risk that other people can get access to it.
Documents are created in Google Drive by the service-account (owner), but users of other domains will by default not have access to open it.
This can be achieved by either sharing the Google Drive folder with specific users or using Google Group (for easier management).
Contact support if you like to put all SuperOffice documents and templates into one Google Drive folder; provide the folder name.
Note
This is an example of custom setup and is not supported by SuperOffice, but can be achieved by configuring your Google Workspace access permissions and is supervised and managed by the customer themselves.
Documents created via SuperOffice that are hosted in Google Drive will be given a default-permission that is "accessible to anyone in the Google Workspace" domain. If your company and business structure use/cross multiple Google Workspace domains (ie. companyA.com, companyB.com, companyC.com) - users belonging to other domains than the domain the service-account belongs to, will get a "You need permission" page, by default.
To add access permission on document archive for cross-domain access:
Tip
Pay attention to which account you sign in with. Different steps require different accounts!
Sign in as Google Admin of the domain that belongs to the service-account.
Add your other domain names to the Whitelisted external domains.
Create a group and edit the group information settings:
- Select Allow members outside your organization
- Modify the group settings to suit your needs (Posting options, who can join, Permissions, and so on)
- For more info, see Google Help: Create a Google Group
Add your other domain-users to this group by selecting the group (clicking check), and click Add users to group. For more info, see Google Help: Add members to the group.
Sign in as SO Google service-account.
Edit Share settings for the folder in Drive to include this group (from step 3).
The users belonging to other domains than the domain the service-account belongs to should now have access.