From 7efb4546c85838c8b28025143884996b8db224de Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Wed, 13 Nov 2024 19:23:11 +0000 Subject: [PATCH 1/4] [Email Security] Gmail BCC setup guide --- .../api-setup/gmail-bcc-deployment.png | Bin 0 -> 30256 bytes .../gmail-bcc-setup/connect-domains.mdx | 38 +++++++++++ .../gmail-bcc-setup/enable-auto-moves.mdx | 13 ++++ .../enable-gmail-integration.mdx | 63 ++++++++++++++++++ .../gmail-bcc-setup/gmail-bcc-setup.mdx | 15 +++++ .../bcc-setup/gmail-bcc-setup/index.mdx | 13 ++++ 6 files changed, 142 insertions(+) create mode 100644 src/assets/images/email-security/deployment/api-setup/gmail-bcc-deployment.png create mode 100644 src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-auto-moves.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/index.mdx diff --git a/src/assets/images/email-security/deployment/api-setup/gmail-bcc-deployment.png b/src/assets/images/email-security/deployment/api-setup/gmail-bcc-deployment.png new file mode 100644 index 0000000000000000000000000000000000000000..0cc84dfa0716577e812dbac7a02c3e79f5177d06 GIT binary patch literal 30256 zcmeGEcTiJZ)IJPHxdD|XO0PCrkjK&OA6VFKRC9yGB5Ud}$hYZC|pv0VK7dkU1D%Llx9D$vaEHmGJ? zXahL-$3yp#E(lbY%5wCC5d;bzymv>}BJ|Yu;@RB17Y;IX!Zok#rhDz2oSx^z=`7y| zSXvz(T?tP=-SYbMvx#f*_w6pd=BjYKe70=jd-kj9Um1-S7O(!b%&2q(Cp@-#Wc%@o zNzU!4owWbqIG&4F9Sa;Mt1c7vXC`fcVS+#=QD;y6 zedXpf`1@+Y|Ag!BVfz0b{;xIu*BSnIE&Sg?!H2&#+WkWQ_`VLmq|=c+LB2R;Oz#N|rxK3R^k3T}q=Vb2T^l#id>3_?7MNR$c zzYmkL!k-MRlCQWQKOfjGC_7GFSw9Q%boeR`^5neEA(8|YZ4(ng|H)S&i8__%J+EIL zd6*S!HEO$8kwx(taX|(aTuhR?o~p0WD7Iopcs&a>l#bXuIeDF>qPfzUX<+}Qg2zZx zJLwD~$o7$;hX?Ev6DTQT95duPbGScHJVQ6l4PBk&tN8H1Q2^JqB`in%V9bGtWTwln z^wcD%kn;HI=d=Zg41zul{w25%ccBR#zYR`+{hgl_-mD0j= z_kk3r_*vR#6>x{PAhAs}B^2p%wfiKm=>^P#QC1_MH_VoNuKGLPliYlD5p~%_Q%(ky z^sWm|QT9K1=OmPIsbV5*`?1Dh%8S7kIMLF7Rl7%^@%?x_?L=kefwrQCu0`rr*X5OE zSP4&1o=8%i#A$WTVb>!W_E{9_43D4oH*6a4j+zG=UN_cX(h zZ+|cxnnKIeX*c38!I}ijvMJ|Oy$Cff9@SM?DIvj}k^1TQgwubf@=A&ZU+=Hc{GXgY zK2Lt^ZMo;k8;a|t4EpRNQu2nPe>PHB47YSGTs^Z;*u58H31Tu?LOQ{(OhG0eG3taw zX2%md|A1wB*=^k0;<~La<$)I1+Gqa*mj1cJK`(Vvma7Ci(K-y=P^j$7=Kun)x8eAV zK^K&RuaQdr7XkJ`c?;Zii}`^t7Gk#@X-^eO_&l>y+p?bSCT7888k?p^IjUrcOjxZ5 z<2c^QR-upi=})ID92fX6uM{L3F45V+km_H<44fx>Me!$x)$#8Qivsq+>lMSNV?ULZ z*icq(l;*a0PxXZ#^sSHl@fxJ(e6++bxSMAAKu$joJ4>3ko+~`qP(c5b;bGFTUaAvYVT9fH*0Kn)jX3OTUab%tmI}6aT0r=5)%F!EAlv>!W74;kj6{zY_``q@&BDL#r9_Go(qS``{)x8P z*8;Z(ghNYsC&K?T$3>17t3=0It&_R+2lU2s-{5R){+2`Qma3-S$USL z668`djQHA;5->hVn)l*=SUq`P$+>MYfG?tfY9i?*FQz25f9hN#gTEYTq9aeeIFKq? z95_|L|7>ZLf#VL&uPXkamxfk|KP~Z=oY-uyS?sl*7CmO&`2xPJRR*rr=3j72w`sT} zfeSiYR0u6gav9Cmgx(&_|JM&}tu7ie!6J>Boviu2R`_$syXh8 zcbH#@jQXZ(28?RyM?;q{xw#mKz8Fe|7T#?PST$EN96JbUR1-=eVN78QAErb5BaFnrc0gl@Wzd z`)FWi1D(35%hg!Vzrc2`$KT-|CE^LWb{r+=?0SO4 zdF+oPRqsek6l6xgnir1;N+YR9i+dSlSL#>(Q;lV|;!|PMo9jn^obCvz@wxs~?%~gq ztW7$2&tb5=EDGuu>rWHvTtqvQ-4)&;qQhfmbM^*)%Iw*{R%)3kku06@@H>Tn#5b5_ z!6CmC4olUMU`Va%oU0>yPN+TrlPJ@|+lU7=C{GAZv^K@n;_Qe@l^e(Lm1K zt+4JmyRB|D%s3*zjN{W1-NaX_>7`uwvrZ^n>Hwe5?L&>glC9V;MDb*TAx&RO$kvV` zc?E}elFmXx3~}h0JNCzj_#wn^U#Y@?2aXdFOlESk5nH?nI&+1fHcW-5b`FA!D5LU* zjLjl#?0RP}CAmDz(FEW2ZQJY=k=&fNp6l?+>{~0AYB?bZhKu~F?tJQgOhw|@JoNxb zA+9Yaj4wk22YxGwbkhn>`15MJrB-TB>bpdlCqfdYe+%ekvVH=*9R3jX*0yWI89LZ$ z04&PE!T`SLqeOT6$962m$S8~BMq9pjk}amyLKfXCv4+Mra(>5dfi8M@7SBK%G0KY; z1DsorkpE1Ir(_(vK5k6e09Ofw zd=NhKhV+6S2L=LRI%mtX*D5e6TSPyHzHh6RniD*1;A-kX zXt0LbX-@}!4)d-Pbt?FwP$9Ncy#mZ1I|SxAbgTGQ)0_~oREF|)oz`6N>Pgg@=6 zv&-kM-%Z5#kS$#&_7oW@I~9lXgRNu_?H;W?V{K(bHM3~a_%bbTJz|9L^Lr{!*`2Qa zo?>#n)9djZrNPiW?8T`Sz3ce`IzEyWF&P>?IA%fqwZWz8CZjer-W(2VyF*0QHy) zV}<($V6TkRg*sPAQiAUYZHgmkG0qRFfT+w}Y1$h$$55H!x4HwrGBZrD%YT{+pd^(9 zeoE+DYcqLRiM(IqE4>h5hq_-AVXrFc1AafmnBdcO?F0U(*6j@I`?s2(XT<-jm&58OFwLCfG@TvzsTqn5ozlhH z5Zz2vlZ?NLm)Qh=vngd&LR}hkCihjgs5>6(K#eRu@>z68{7#A_?)>>wPV|sD$~#z` zfk}vH5NNIo$lq&(aE~DRS|tEFcs_qo+T9@f_mRzh zCW)5z=X~T<&p*6MoL7$cw|h5N4AXL7A}$BMm$Ghu_%0p=4|!VgDMje@_=`?WwV5Nw zf&4`|N9+(#W*jiDP~u>+A;I1;QFWK}avgzNZ&Fr*x$H{nSpQERhTU~bysq3u=so!D zq@A|g{N0gVY5DN;9v`c!?SGgDgP<;XPwF=r<7+|Yxfo@`rv7vFPWlH^gKs-=90A*|bV_wr!)}jsRKb&a! zpA}xeqqE+Tv-QlU{4W5ex{~pl45JHLOzHi75~L#4pAh@a;DDma`qhWplR zZlqWH+kCK?J&bX!!&G#oHx7c2zfL|Tb~9)`(*`mQpAm-p+iZm#UDb`5mSz~}=dOsO zx$ej8MefE0=k03Ltj{y*1wAM29yAot7Z3W~;KIwQCnt&iJ}2~e?Qm--w!{9EUvG1S zlp5UMYXGOE{w%tzD)talj2j|z&^@K&vjty@^EuT!$e{Pa1%2}?=abW_khbA?y7|j8 zeN_IBU9D4?9Hh9>WECz#V+05Tdz0U{L^tx|(#XXj_Q$<97*Ior3+!V|>3(6DHo!iz ztr&i7ZYNr@@qmw3)4#9)niJyHdrS~#4E%6t{Ro*^jM+T7Nc>t*1AX;#Bx*E&aWbqQ za#bsW+*%VGez5wf^>A3hb*ip3=KMKCZP7WejV7AQ(D=p0(iw(wMaUMng=&je>(hhA zaB|da1bWhZ+>ZM0M%@!?Bgpew(h3*;$9?N`0CodF=KsiJq~FYk?Eemz%?xZj*9Mi3 zmoF2FMO~djCB8WR3c-vl?_VTtR$C7>_IJ40hyUuB44X#ATOXMPRfW3_?DA`(P7pK2 zWFS|kZ)v+~bYKo_{Heb^1|6=W*dq^}$y@Hzc6$PG@i?LK2+$;Ju-*JLh-R7YA=|cXdcd|M_7C19nZGDd$fxZtB)NX4L=}nI=b7Lt@MW2(K?{5a9 zT^8Ge>jH7(p32wN{v8;Sp<_e)H{r>CW6)D+_s!t z&s+ZU8H~DiK5K=N;0j#7-u%7A71!!+7r|YtLo0V8;}UKFp<6J3Vmge&Lz3)Y0WoX^3p3LQB?GH@$u$?nnyk#}CzUrp@K0>6jpgwA{H)rbcO5g7pCwXDWfCgk zV4tJqf>4Lt+(H5O&al=%v(CK<1&n1JOdK$cl@45BKl*ez@rLAwfWj~Z)kqENzLDua zhwtE-3=@JLCh5|S4KmLbLau=hF%D9>v0|tk9`dqk+mJI^=uek3YgJ>5D{fLm@=QsD z#+u&bvwB4_Y-gIqKV~h9A$Fq$+S>DzdI~rM#BrC|AGMIUl1X1y$K*OJvm(0Ts#@wb z8l=&K)Qh-(SPd|+FK0eA`_6s0qVT6c7&a@um`+3qW%MmoUt##f`r+{0n{xp4 zEB2^R(l}Wu=?6>`-!ofUI`@R|t@{UA^C>sb7e*>CT0J3el?=&C<|!DIC%v5dAys%o zB0+w_%TRf#Tbrln_@juf1^YA9shyYN^QI#4$)C@ar&*f8_w{N4b79Ph=^i)FA!;1* z-mj#l<_l_v{b7759$V$F{rDdczw1OK*Z$_}n$H!=azm7O7|MfAwo3=Itzjz9U_^9LLx1mV-J1G!RD7mz zxYg0x?-NdUJ^yyZChU2uTg(K&uNCJ_GbbsZedBISh(`lOiC~6tW!zo@$|J0YO~Rv!FHsueb@D+0vv$&^wgW@5tZZ`B#@o=k z1shv5w$TB;MpD|Hm-d45Ic4n;-(j--sR+>1GI`${r!!q*zh_%NOb(f{wp%LlFs|T` zlZi8?2FBh`mJX#QKDYh2`?*2yV|gov@?8QM zrUApWbo2Gl_kC7k3ea4_a$43oJ})5Z*AWT*s06zdO)(2SxeEv+OjZ&SEBR}frz(Ka zB$lJi+g^Rcr^dV)>!xU-zz@)j7FtW)?ho8R?<=ubWJH$(3LrGS1!CQrY?|A-r!DX< zxc=+LVN%o+`-Yzbzu%yrRZB=A&T1;lo|b=8(bA+?)dQ~&N`w*>IG>x%IbBOx72U%Re&Zc4{XEIT?H!;)i~yAa%G0@af&&NE_? zk>Y%pDN)OWT(s-wE+NnSo)%<65QRqGiwhr(%hvV_@cl2cDoELeZT!KGWX=$lla-eq zpFpK7?_!^mQ&A_=2Q2`|EYmBkhZ=Ueu6lyQhG{idjbB%$+H>75s}tLorcNgyNU-PP z@=sd{AKx?BhSgZ^PG@8?AX+-T)(R!w)*s)DZsR7XPY5I2Aj`nOg)Dq*pN)v23KsUj zkmRVR&zPM%M01hPtq z7DedwxC|!TKb>Wz)#~Npir3lh@PPW+Q?iW_Kz1Tc{EG5RxM8@*T2NPZ7=OBM|3e}W``cujj zz!_}ne*fH55Erg_+=K@ouT1L3xfS2Qxwx4yvvNG)O8RnmA3`|F7wPXyOy5(oS1Ro` zbC?dupPv8zurh7mRWEV8(VMr@x;6!jZf3+wa}4ZslE>xDxu5%f9SB7w(q*4@9JmqH zmAmA}=g8HCimNz09O4_&S)uhQVpl7d@2qO#F#QV@3;VN&_7er75OOoqUD~hu8k%GU z)(X9kHR^g)!y_W?6yctma^8jd9ZymUt?HYtEi;+aB&z- zS)02>n_%sIIX?4bvUz{?RVenO$KVKuCVZ69bYmq^hJAkK@gfJi#Z2yJbM*HRQQu^K zGyY8}nWjnZdTAMkPg86~=la`R?3?k}H@gUlvhd)UCfe4td9_q@S%^RF2sZN&SJl!yV8Y-psNVA!+2q{&I}riv-%h9hL8J z;_X%)AsQIzCnqU}J@vSGJ$c$Y(r>KoQjOi=(g89?o3r+)#|Kjdb$2bEGclq|9rw26^aJN-|Xr(Xf$pl@l*^2(8Vst2^(?(hdv{AG*WrLz$Lbp zqIrq_#xXX%QM)#<48gd0{Z#)0K1Oakpd_UHxgPz|<3-bEhFzsC*vXj3|fy9c%=$-W0+xJi~32g7_$ zh#D%sZk+ywl00+#OUEr{GEd!jH|s^??~8`szXt{$+Yl4H?RuU!4w(?YK5xQWiV+AU zGmlaeWpZbgz>t<|P07gLIPtW0Zi43d>Pt?!h-e}Ed|eZ6Nx+A{e+>7@=O+I;8wSdl z2E_ma+M8}eyt4p+gnb%E*J1H1^gRO>Z*72|2 zTY{e56+A^!5qqBw-w-68dQSN^bym%OEBqvk9y+uI0||eCWlx32Ei9N2(TdCcQWgI_ zpZRM4Tk+uJ&-KM_ov%#GTY!B33$8J^$P^9K>6Wo9b zwLP6Pvs-qB&H9eUC$Qh_qcXe?FWn-j6VKtY|3aH{h|sO>+&IUatAkhYxBY2aN#N zvI$KFQU;S{dzSWpOp~nHd$YGf$2km!q~W~8hRh!@uVsdujKFc#$-2G$V%L7im9@v$ zUjB5}RtW`A%F~P;mQd*V>8YI~lQVFhI<>`E?9{wkyu{OA??nxiS)la-(vqb}ORuY9 z1t`R(g5JoJr{zgS<0jpc>6LS16^wVVpo+)D8h^%a`f5TLFsN&PX;K#N|F6&%iUn1P zHh35gDbDEQQja|GnBUqJ_=h2kdTG-pEOf)5qaC{|`4omz)n8%H*X7g7ybGz1eMh#8 zo3U8p-G=5apk100ieCEe17S*x&FCM#Xke9@g)>86M?IJD-D;{#o9yT5km^-r61|m-$BL z$eUTb!hUeWnUITjCU0*u#~E9#ONED^P~^Zu>PGWBEVeP0Ie~!V^T#0B%enGm)SPdq~!&Fy&t_#w_ z@a1E+yqKC5-72V)cFc)7>MrD%%h)gCH5?j)a}#@DHw)8eIoNxIJeT;ap6Z*ob@|Ey zkY_g;BD&u8!@bMQbJ2#9jzi?I9ydEFZ>8bw8}W)vclF#nRg*-3`0*|m-}skU<(Ka! zz57sioEPXyQw)SO{sdgq?X!hV?1K@%&?-YqOGm?+A1?@y`~_E)aOBUP&c#kBA4dYi zO=f4k-K*L>!f=@RfbmIf;cJ_QBG)l=F(z+De^gbykb5j&vxB|}dmg&0I1wRBs7-MG zJQq>sJA$Uy*fep7Uq^(dr)sv4-{Fk4u${i>5mjS7HqiTzSlRZY2hpY`92qsROG?Z1 zf%Bs^mob4Z{caADH?g^;tZ9d~UNU;0o7mEgRR46grlie$=pPv&g)o0VWX9j*=q2^~ zOqD!h?=>2l!`&GQ7Q9kZ&Uo|vb>>uBAI@ON2`aV1>nI}Uez^hrMXL3J#G)CB!dpMi_Opj+R7$% zzU3q5N(0WP;e%Sbut(+IWvy0RyFyu)sjA*_GkMlav%Y`puO#-l5hE>7-gaeqrU4-~sajo{7zEAa!8B z<;QwY$xq$Z?|Ab;a~9=iMrO4arcSz68`^}IZuR~HhNw1n)>R+@Kg*CkC((FV;!xW7 z!%fn$c@>*mw)C_&P1l^sD8~KC&v!VAmS-zn*>9{TY~_*pQmSPW?P&^^tTXv$Qc4b> zewcv=Mp)g`#FkI`FCyY+9LojHmBn3420!g$yCpME`l)o*h@^&q*g3)zfTZsf$x9Xt z8H>%Rjrhie4>OTFSt&d{_~#Emj^4E)rkyfvUZq@*F3A7 zkrAs~0Mtsxw(n0j&p2Ib+PTVX%x~Mhd12bqMDcH81Q6jh%%;??H{3@2mlS=mxeu8d&LnI82OUp-`0em2`J z6i=s1Vc2BG4BtD?5yAGVyCWtQHt3}o>+PK;unY=ig_H*XHHdZR3=dx#P-;Pt-eER< zjo4%yyPA%~Dz?7bZ;O`$L5fjuDXahPO=o<+b;`n&({l7J@{9M_rD%EQ+=>_lVFFEO z!0_Z>pwFPSGHK}Y(B_ZcB#}l)YISx5?f%=J^vK#M6;K)ww4|A{aT>+$>1zD;Zu%Cn zR$~>P`Lb9)XY}m%mY2?aEz9G`i+4+eFhT$F=tBguOs*%e+Ajb`i9F)+r6hNRv+@~B z%6zcl2xt19F_YPOwDFH=3~O`1m$31AiI(&3Xh$aVt;{i1JndZ4MHxs~&{1zg5m^|1 z-XFK;39(_L`1EiRM`}m0!>0?iA2`akIl7tGAUCSrsvK2=$LP+hPZ=#-xh;yN{j&Lc z*Po}I?XPll2%<2QRt05Nu7F#s6#Mf!{kCMb!oH;MYm3IIn)OC%;@T#OecFkwN5Oc_ zg`;xg$s1`r${cJuOmV^QK9aQ=_x7knKxgjXwysvju=nLa*Z)%Pua3c$4!<# z;)uQHT4`q+G?{i-_$S0GSd!^eZR_v4ov5u2j@%@yvW6{3$>`hDOcj{xJOE9()o z`FJ=T&S_{D;s2@u^*W{M)nQDg{zE10fB4z~Kk?IRj9PFrSC}SW3#4(jA!CDJgNT!c)6ObCn6rDHg@Yz?RrrkhQ}PVA0@IPY7UOY9@3IiqA|#29!-z8* zQ$qtOT}SM)Cc?D`>FWoHJt|1G=msz)g4zp;pCUGAXFV7| zjVu7oUFpMrBfFX63Q}8B@*LlDYLGLHi^)XDr zrx}8lsDGDT{J1EM7{9g5T?esF$`UfuI*BWC#iOt06GuTH=OC}C=u^Yqg+dDs>_t2d zw>~>^-g10dc3W#HVu5tDI5Vrm)PQfklWmGLZVgYj9nZm7Yi>61i{ z97a_jGfVf_^F%tAF1x!ke{y`}`T z$eT5tf2}$235(Lu>z%)$oH-}ARt8@4@fdepQd^>@#Gep5L7>8572BtGZK2Im&xhMg zupy1NAcwEQC*-ZHM${eVnw1Hiuj>v=78fmD0SyE92Vj_mtIx^Peo2ozRn)9|F0cHK zTWLJn7MmpgY~pNiX9j_)^>ajS)d3Czq$r}BoOhd)6OOV%~L;(@7R;x@x5bhTH1@7^gm|OUNF$T*Nm<1_Oh;$usr-EG};C9 zuqB}3rW~8zXpgXd5ZST`5V9z=NcKjKWpfJy(!2peb#-l|vNMaf?$1X+!b6r}0fB5Y zWzUIZPHW6LHh=t>?eVuGOvd5>)grxZSF8n9G9O|~uD8)NLgCwhgf86T!ztD~Lo&zr zrR@)&55yP~XdHoe!|3>eMK1qI{Zk+vpTHotNkyDzpP#l#!9`2)*q~aV`78Te)eyjW zM<(cB2?2=dGtZsih#;SV1gFHTg{PG7fvBx>AL|pmNe8xzT%baSv&DS-0gA1x_mMzv z_GY#jM-fRqS{YbghkH5NgruD*`8T#eS4h)pnSt+(LSQR3rwEg}Buq>z4JlY4u4Ebv zE&Ddvihy)-)evt@Ca5HF_T2&eRPzuBwhP#)2f^sB?{!k+rNo zM%IN_^Ei)0n8bgJflA-MGn7gX9Y{U7GjJ>MJ_yt(X!tVe0e`Gi7yYeBVA9|2%9c!y zgOhN|@AqH`c|3=&@`2uO1<->3a$PtjP3Ih68W3JHI?pC_oC3|KzX(WD2N-?j|DiRl zxl#7IKhAu^&-!c%8?LD5&@PlG&tmd502s{YUPu73j9|DipfwTcP;CzM`7 zHtSKzz6#V5ulfxKNarJox_pDJZ!A^XY?oqVC2}d5W3R_D3obU4QcF!@7RGbD(GWo9 zLQ&By$gFxNVO%ZwBh5dh~16a_$oCb3L;X8uC>59bJU`mc{odTt%wvEhmx4Kfk8b=M?cyufQHTZO8DIlQb1Nv@BH*7f5qmd((SU1X8hH}20AF4RG zx_!0kG3m%l^X0%%e)O2aLjVe$eV@M?%6fO%LN)#`I{npnyev~PWz9h0s;iE2PlG@c zOBM!lC2l!0FDpgQ0H-fhJX6d!#o7z(V~G4&^avOrC=ywgRD_rATpvC3_D$lTMlb+h z>wab0*rm_=s2u)xpFp*74q&DKzv5sWM)yY>XFT--$FulBAWQjPA&`V@OGqaiReVYs z2Pw_HIFS;v0MP)F&jftW%&_VRJ+3mxFS`kIUNgr8qawU?Ivxj2^49^)R|Z64Ow$SON!4F* zp}ym8Rm#CAN63KFvRJZ9P#%13`=B@xes#S0oe22p67`}BmFmF+!W%m%fh?|h7#uIL zTpxG<)9DZ?_Anb72&Fa1B=U|yVIWWvQ~F=g=!Yf_%E=%7i!0@UMhLb7%gg#r;~yfd z7LHyj52DT%fg(*m$)5vBgjh+xX%GMXYBqfCRVdwD?RFm5RWJf*Ln8<$F$ai5y8U@Z zP?8#OO4<8s+HF_0NR`6=xEELHZn$p;BnHmqMPA|reOv`5FCpjuQoKrH$|q`K;f9AH zxBJg$TaeOxLE{1~W!P%&iHxJhJ|l6pe0o6%qytw|^8p+K1d=HHpXvWkxD6^xlKs2g zB@+4nw!?>iZ##RwGc0fcM#EDIaHs-NN$Z+zGQqmqmK(CSU49a=@i`OmPV7O^V)f&? zA{x$ZBxA5hKhZ^HHDnBLH{0lC4#GqO=KFPPd$#WCvrZ!7P}f`J(<#>nsd<;Szd!3KRsOQk6l) zs~1v8hRnf4-Wd-2bJZfRR-q1E;grIgQ|!!6R1GfXcU0(Dwj!lKkmK4+t&@|sCliy* zzUbD^>O?j{rCXZXCtcW54FC9Y2pUWw;4g_<*PYzO7LYXx4j4eW_xT3D2$Ww~suSlh z1M*3c_$EC*OIQkX(KJUlsn@@d`5nL6*<$BEq-C?%?zVz0W4fUI7iV3~H%RYttIUr! zJA(3_g2Ph$k@X~6O5dwL*!{QErKjQqV^T9&&A{8qt_CK&dHf*y_<2z$cpe+g#+O=E z!d!gK=^(Jzjo84DHEAkzSBcKbT2NI6FeOw!X-T#~tGh6_KaCMo(hfQCXG?(dGV*7Q zgJ51>UL8=UGi&Me$UprCUC31pT=~i(vrR`XH;fbtnJ6NmUa_>~%#o>j#`X^ywZ+B7 z^z^=Z_IC#aITf}JwAz&#)K+f=kgA5iI7>!niq?w&}`9Hf6~$4+Yp zG1TNWRU!hPI-uz^KiDZANv&(CMYz64(3V<-kthg08e`-fTAt+cgBxrXef&>n>w=E9 z8-LA+lA|FU$FYB%rq{OQQu6Kja;8+<4vE8{?AKcOs zl3XP#(Gsc*JGXeS0h5E&9&l;&WX8Q#R@d&?pT3z@u%0PnZhuo7OQ_x~JlNIj38x80 zrdg_CdFrb!jBQRFId=LXq1IvSKK{0CFK_LqhkZDbD9EQxl3*>Sb)k25;>c>TkSYVK zuWP|LD3b98lE6szSJtXAX!Apjc0086K>v( zzb!ZP#e`+N>^h6Lk+4YUiYaImULo&C!?5P=$G*#aSL|7mGJ};J>)Aae4$f)AZMRGuxEi8TC zVbDkSgX}p(^V@U9Ozpr#` zO&HYaLupmqCjY^zt*^hQjRT#!ZK@$i(T}*?9%~ zns5}E>1u6h>&{9zxg7}>w@Gmj>C7ulA4xHHRCdD(52PbzOov3oam8Z}8^&Ic*;8c4uQ49v-`I?aMBduIXB`p1t9X(+$4FQG1 zP)f-zALG+-ywU>643I$Wx3ug|`yJyE+WXGrm8O3e!?&uVmogbvwfAL!;f+VxDu!o5?{vq6YWhN6H2OiD<$?xyKt5*kw5F{g5#YF{kaW?YZ@3bgy@1(wrzL8Ld$OWNNXr2Y3?DQKB~bUi^?W;i6uV#E z>Ed?Q3ZZ2lqWSI(VLX~@J+tJyHjdh)TBUkHlKm4(Sax*0`bz651-G z`##wHYxTv7Jc_#)l|O5?ByuWbCr zi$}bvC`*&rwPJhkcP>G;!gJqeujt1%jAN$H*eN^RVt;P~H6A;S35Segojq>d>NvqF z8;#wcW{mpV6Nm_Qp^k7ylZXtRE+1iXpH)o5~cneM8q62u} z$KW;~LbI z*U_IQqUw#cES?#Mq{F*5p9z}Rl30Q51@k)5l?dJsA+SlWh|#O6L3L%G>-b7!RI1I` z8z32rEt-p3z00xvk5T#w9m(tu74GFmG7F7Wlo;H`6mhhnhNHiZkB{#}`l`g$GT_A| zU6BMYQgjVsqWp1WX{XG$V{7WMVeAq$%Er*p5Zae#kWA}Xi5_y1%UlT&@Q5yPG4gVJ z0TUhD+@E@jZYD-gM|5JRkfI?O@bMn61*Ntwq(ZZRQ>K8-`|7tgkDN68y1;(FcFz`j zvS5`#(Pt9``rj;RfxSA%CD>sGNFC9@aUFh164l54UM*3_jE}Ln*dEAU4WV7-ei2hn z(>-WJMz%XGY0_Kx9|NZyUL-juz$tzDA-@!s`3XP$seTCNZY1J9Du#tOqz5;8{DjGj z|2qyvePY{YStU0tfkKR;zx9l9tdK};%f9yilsGK!uR>8n8GVkXb@P0G(w(dmrkhx( zE&N*8Jt?g+DMF7R?s#R|sFtdKmd+Qle~ zHEyY>S?7P2yszyPpTmDQ=61($Z*^#(byeu>!M_h*D<-A*z7S_V3M-sAxbZ^5>N*oE|+<{0yM);X^r$oqPL|N?61SDSy z@Ya3Uk-iR#0r}^sXlh_4HdA z&|uVkdcMp#YLTgs6xXRct~P-%iGs@(`A%u{HLSuHZ+o}ugF7XQSl62zuA{um5xLZZ zgucu+{GlCZi8l4hk`uR$pPx{yImUTX97)c-yoKQ&pC;As);?n!O8mrb8!Vbe z`;CZ>eQP14!&A%Lb|MA8`!>6J_FR%Sb*ZSV(5q^mf1Q>WA)4(pSkY6S^>${NR`Jn3 zL`C9rz^<+W5S8+j-}KxNF}B(98L@ms6_9^Z6XT-oP-C&RRnPBC5tC^F(sYnPtZYK_ zTbU!Qaj75&*E#A91I)Wx>XqEgG2Rk{ZWFf0M~V!#9(27SdXT={xXKdvEPBd8xZ=!# zfgL95sgQpp=>j-CpO;K_~LyOdM}=7O#Op4qw^g5<5z$nxAfomT2L7vR_|Hz2_t zNpg0T0vawE~W85 zrC2V`Z(ls9M;K!gXW~fMoDKXGCBk8|)&*dfG&a|FZ@yNtO#8*Yd#OY=jiIovjE~2j z??K1QBHwPJ&IN!jn7p3!Qm*XrA{G$*)W*qSPyLC>Ew*TEa=SF+w5$PC)~w9na9Jj| zN?SSJ%Cf`u-R}>!v;i3>E|a+>75f3;nm~;_>88LZex*Gq;duJ%nOvfe)Yu3>Q4|J0 zI^#Tg!|MFDkBJ|W9QdW<5>To~R+Ir(yjfWcaQk^Lmgb=IjJ)>eA7n`JXGWs|vWoBT zPH^ByqWFL5jsKx@BAWq4b#p5bA;^Zl0?q#bq`9tx3EY%|7ds35fJXN$z>@>& zc2FUB5y&1FwLM~ho&MFvd;s|h(s2X!h5|np2LJCqbO)XTWAfS(*o*%+XV-)SmAD+7 ze)PEY`IEouJP-(R1$dr{j{dVQ%Fo%hKwKm}1V7(Y=RTGVxTR0y#wk!^A#1VHvjyNu zF|Nq~U*yd7bY!V(e+hlu1f}i$<&nB9Yu`lu*jemg069xdmN0{4&&daQ=dz@ei%7el zA7uW7qb^CH4@tXAtIJ$b)6TeudE;)UK(Y7TfD5yDvF3+YCe618`$#!R;aIv8uM6zWThK^3$#ZKK`X*PNTf)6_TgJ z0K3--Xig0k!XQ*eknFp^W-GqL@X;Oo9N+=UP$3eq@!lI~f?1ebmwUQ7^hTWN*lj5Q zuO0(HR2cKr&8&HYTmFrAiO@s95ib7ql*Bdw4m;pCQO_i5pDEAER@k#y*1S6nD$53( zqj2yqANj~w#tQL3b+pswQhMeXH-+T0@%{578MGZ=y54x=2v7A(5UBqVur4QV%b!R7 z#>NE1H~P-i?-VG++qOJgypf5rvEa8zw_ft;^v$0MovZ3aa_=RKWJ?0vG8e<>DZu#S zFD2rPZZMP}yh{V()4<`XfFk8;`m%zGgw@c{^=2gr}IjXH*5d7 zt(jVDe&FJK|2fb#V7@b-b>N%BDQ3l0wn(!4V{aZlx6e}mZI-c zz|@04dY}Iv8Vo$|p_{>p0CS9Z4(PjH_yXHv9@kz3MfL#?bpT0wP&TLQLWwJn0fzN2 z^K4|zWD@28P{Y+u02&n=0&dZmTjhM;W-RUZ0L-Mbj`0 zS!Tu<%kQ4P&pFSZ@I2={k8_-(c+dNO-}iOh*L7dl>-Bo;gN@7>#MjJ!(=Mt0D{A72 zqHU(T^uJFnXyUq5ukMo-O^ayX#2na_7Wy65hMbc z+`n_6P*R`#pL-2Oi2Z`hoT#(~QE_~M)hi1w&HxvSLg1~hqBJ8@7Yr4A!S{hX{=f83 zJ#{coH3FWv&uCkxxKy$U2Hl-uU z4r%%pQm7}RG!2771NH(PpNjmXi&un^Rb%HotY95wnsk}Yo{VE4o^d+P7C_n(-6=y` zdsmywdQ+4iOuID+MsVX*fxD$U@?{ymZ+QNyGD_^?nB~tbG*uiLiW1!?bh1X9Jv7i8 zgKWNqUgg7b`&TEM>jamh!Yjt#c3yf<7?^&dNpDCWxYN}QugiBLp+SoWCUDCUJnC!-w&wyc;ZOZ`XT)0N34Xc33#@_x zVwTBWYS{8^!D<+I7*EdvzPs(&vj;iIaIBuy3kZi>Eff-!*ybFpGw=xN| z9p?2fxOOe1J9y3Z%rcy0^MYQ4^&$Bx(d9EnyHcBRGD@*pGbY0xTL@m*f%W#a8C5iI z@$U+NwwWtK_G|@i?;0su$Y?CU&n4mQx1Qm^35N&EpCf9v zFx|B8cUlGXn-^k~CXD)Uzbm%+v>$04S1}FAUBj8Uh~SV8{#^hvBX0@9tM*5LUa$d> zzgp#h+$%+zQEndcUtX8|svoato8z=~MubsGO-2E`i$i8DC9IKGstRx>cJ^<)T5fv( z*T6e=iKflmGToq*K|=mz8;DQytBteY=Yr|;UnDVx4wxS5 z4sxOwz~kxTUe(@)TEG3gDg(t`RyZ{xOjir64Rc3)Bn-?<)&kIYPc?^oh(1r6HMGsB zr6re~YMg&HQsM42z$>d|k`YeIkT%azSrY1~FL_`8eK=aw>~{s48~_r!8g;3I=zO?z zAZyT(^8#UNs_p8V8j@eT?Ge7ysz1DNjhHpF+)?2GnlBB+ED;g`pm_oU^L9b44*8&W z{1}m(Dn}nRtTloSHgN9ZQvyQ#aw|7j(4CXRNKBf?Ju(g$WetGn8l(1$K_Z41WR0wj zX8xYG!_XUVTJhQ5Pj`hvLBlr)5_sL%l zO12kV`BzKhv+vX6Q0slsrhBOZ;35c4os~7y6i*@GcA24@syX1s9)Y{rwVD_zsf|l& zDmiR9G!GCTmq7G7Ofav}JNyy=FqUWe!y(zq#lwCfqX@G>QY|od9Xcu53+plxa?i{Q ztJ1{0#+fo(WdStG^|`?$1F(SCpw=a3+7{>&v4kDYxmk2@Aj+YYyH(>Sg#JE~~p~HN3znOX?`mrU&;7FQ#$L`b`*&qtCt9-p|#|2P7H6+YL zuSOjk7q3++3<+Vz=JSH;VF4zq6In}P3LYIBzoOPPKZy30C*)P6`3N`O)n~Ow*odT3 z1DZ53$7`R{=5-%82(~34^ZhSGr`$gZqD)%CCn$7JS8;|f-5J2>NC8MN{q<5KNd9iG zNidCm1o3ae&Do?oMps;}zuA;+@2p$ZsjqMjkk9%YaZZ8RJ1kD01$hL3M?%_ejvEs> zw+wTQ+z-6?(S6lrwy~7cY~G0i?o6!JeMm7x;=5j28!ECRz!R(k-3!C-ctE4imU3DX zoB|s)KlO>j^1IHqa+GQfuRNjSV^l{!JQ6rMh;Gm&OM5YQ)tX;(0t>Dg+ZZ?g%W5}! z!T0JyicBY7GU2So2T~K*3+>h!$+%{GlS!R1vd5BZhyv0vD!-i{g{(|RFMU7TNOF|0 z86eMf*Nw@&7)NLs=LDl9Y+?syVkZeGH22jw)4QuAc5rt}LUu(!(xGsea>QJU8I6H-2e?dFJ ze0eT#*ne^Ecm6Co=MG)Cm?NnHysI9eaME41KN-kbeAkqm^1=%IP$7e<-yR4IxnVPi z1Clm+`Tp;RG}1R^ODR~$Y2r?+)(A7rK*FU7GNo${GP9St#2dGNbhv-gMis*9@+a8!&w*e((we ziH85a1OTS$_{LT<-e9f^-8}=jV7nj=`ae3|=Jfdm7<2%4K;&jx$Zn0Hd0#V}47$8n zvs`&^>7b&g=@-N^ME7Gh_;5E>MEV|rob8l}FYw?qufaYbZ_|#(fv8fmhQrs817|tT z@nr^sX8?6lcDF)$Ogfl@7X8*BCkBoeP|IYR@tW2>Ra`XRNd3{uX}WE7M|ge!PhJwL z!QhYKKVd~w7oRiaY`FUyf56SH;fO&w=Yg5T)xmN}SNxsH4F}v+35c@>A;q)j)9&QZ zn^}u=oHXQ@EZ|b`KZu}Pma(He>pP9YyT>P||MnRlG9<5!q;_o^ z-&jTb+itmvYbogpz~HW|wyOwJkmBi$#kU+I^W^vQu=Q2FDe}FBp1v2-j{dgZPoHo0 z`R$+?$2RRAssz!grs*BP`gTN8f1Q%keTd>eix?qTs}r*ht+#hYltr?s7gbDmIIT_I zpEg~3Pj6wy?(YOV+*mA2822BjP?TE?IT%ISs7Dkw&7M{z@Yjb7QfU~~BmOtec4r*< z_v5R+kh@=Mj=8LxQ~dVZ$=I)V_6GJmqmY`EnnWTe^5+}{_r^*4Dg@x$m96T}5#`(Jje1kaW$(O?oT_tp&=cB$UsX?&`e6Th%WxQDKkZro1AG zQZNYE6&3Hn9f4Cj6FPw29mi%P0nEhmyK{4!O^>MOo0^Q@R!uh^k2_k0arYsjH7%I0>P8o#3*$|%iZ*2a1B08&Yu?R1z%d$$} zZmPWyr|gA`xJ{*=FD!Wsx2HOh?grg)(D!h#r&5axR)#7T?ho^ScYOoGLqiMqN+#p- z?{re@FPZ9xjAeSeg5>nL=W^~+x?baT$f#=_28;hj># z`T*JV#&r(PKE5Zzpn`}0eq8}F+xKUlDz==-`wGHgFvrJTm3Cx$<#%XtgvovC+Zo#Y zmu2d&_r<^(uHAcdQ4P%(oEk=MeyMwF$Y*qJd2&@+q8DP<_r8)h73RDcJI8{VeCr}L z3G~!DammUaFW>jZ%YW6VJ_k`n*jXO~uhO zrenc2b0kNdJ_iym-cvAR`i&ypPGR6+aB|q!_ECd9>2uY8&yDZ2QnFKY&N1}3P+0rx z;>%A${|BrO(Mv;N<31~g8NWsZH7|U6YcB;LFED#oyR6v^ey) zrR6UNF?46lJOHHkZS%qc7KnlS!EQF%4Uk7mIZ#sATQ3A*scp4a|(A-wUHCVOx63{gGGTCgxlQJtFny1#ur)$gWp;w#QsMVw=DNM}*yVw>lK|`6@!ts!h2x6xRUgJs_5l z3;?}ODq&YttQJW9f>Aa)+=L8M+w%JjJZTRusI`gFB)tu-O-VVKCmP5m z)9-_1ul@Py%jlNC9s;~Li%ndhZOFgV>sifyUUj2up};@N$tXaXQ%ory;Z=5O6ht~n zT)eCn@IDnaaoBb2;nBt&C#C&m`tDMMPvsm1{!LYSyxp@UQMN*>dmULX1dX9!FwUaL zZ080cN>Y-Sr4po0yMNtS)6&ChSWQ5l{F6lzHj&14Y@6|7a0ulEY_E- z3oq9o<^rO`t<~UC>|n`t;&aMVHK+07lAvA1O$mM8V@+nF&u?fROmwtUFW@Yr3 z4gU5csY3w0EvkeOifY@gjsWSsB;v=?+D_@i$Kh^w3F2L`G@kAS%INEwCF!3Hx-bn{ zgI=>@MC5C6DDGeIpqc+M%zZFN&nS$fY*E*Eo^%|8f+4n=mA2doNVtYR5VNCo{`=yc zA5=Mhj1UI3PKru;`-%&7QT|_NmapWOL{jVQ!@(d9^G4M-Ky8PJnf84r3vcM# z0YxmUq7e`C_}d}%*&bWCFEoHq@DTWDQ6)@1k!HYQJF9DHIvq9EKj_&@nD2;JvRz}A zTCJ@86l}HB{|jopC9)Io=Ll=d@{oUkvL9-l>}esGUbe=d93*TEbDOk1oZk~`MSm%J zuGOKXE^-AAp#MG0LE=VY#zzfWdjZYcT@i&EnAoE@XMiT(F$;D-XIfNZ%lhYU%X#J_ z1;BJZrd(CWT<8*514hGivccaXIJp{_)K_Tz+y_*}-gqE7EU9@YqVS5L7V?wEK}VIj zZa`Ym9ujTzvX0UCh253)A!a{Js#rIZa zF>JR zPW1UD^}Q>s(Rt33?HmUM5NTjk)*cpu?}=@NlFEjIQ=_|qBr>=as7nXmzWiSHQ1qTI z!h-KD>>kM^R%+qbdlRQd6MnqyR0)Yp27Bq;6HvpbFNs90kfLtTE;a(OW(g_7+!a!7 zy4GX1d8Ey0RT|RWF66|eK&Pw0z2z4z8&BrFU0&??rNMHqq1`^l=rsQp@;h3O)%zNh zDp$b@v>r_|r|eweiF0Sw+Y0Cm-)7ppL}ALa#dsmEJdT33>=YJ1p}d(;L-LMmn&-X! z%XakJj*6PY+t8HhGF5bn{YQFW6TdUCw>BLhC($}kCsFnro{&htvYSHGGQRaa7K?+0J##k!}qZ zr+9=vo<@$cIUPH;vRO?^Pb^f-#!?y@Z$+vc-Gy;zF)~?qIXl&2mC?Voe7U}8j;fWq zBXIXIC7%QGF;xvDW>`epT)EMc&M!OlLp%ut8$$#1mxp5Ab`)L%EVuIXtdUW}C2Fg> zMlJ8ZORbuc zW35?bpS~+ty_Cn`dmQI-tJD@-z9_CPSFi%!n+BKZ&D6J4HCGPD-7b*0G|1$o?Nb}O zeOYp;UqifzNDAC|DTDFJA64$kiHjS=Lm#DDb8ef2joW$ z;mk7zF&oU~$4-`;ri~n^I)sbnDFsyGwHYfjC{RME^MVh?0Ve>F!zXtnP5v^b^La zrSe}8Z{)7<-;U$cLpq;;IpGG4+Dw2jw;Lis!vaP-PF`o8XO!r&vDU(|Heuf zA;X(u}7CRzQCTP!%_5u;iABG0RcC%CpX=F+Cb9rV!I(B9klWLC_m;Au3(|5R3B5g zm}iV%Z}Iy&URA+H*zCN${ud-6>Z!SQ8}l#H6{qf*-4tms+2(m2o@O#np17=Cy}RZY?ZRJK%}7Bb$m~Z2bu!zaWp(KDOp7kYPG(v20~J|ND}NK@?+t8YFqcf@ZH=svH{l&jp2s% z1tz3U_+7(NXbUEbb80{&0Q3PMsK6XNkM@Sjt3Xb$Okm@PxHl4y?@bsA$sRI;M--M% z&l)`j?mD|}F)-@Znr|!%$;*H|EOhJhsvK~fzp^fH2~2$~yLxr>hn0kF2Ho%8dk+g{ zTw&N>Hil~K)^WM3K=rOnblDCDxLsVPG_`=AqC#^~MRY&iRbdjm z;ku(y^Wk0KL6k%jx3BOPMnlqe{qEV(>(&xB8Fc(V&3->m!ID95W)6c(;5DM1LB!kY z-@AJCL?0#jf{q%#sQyX(zmCXrhOz0?cRTHi? zqP7tDrJ$nLez$G@Hn?f(pQ=shRv>p5?a*`+176C&ly=6=zWxHni} z^?JKi#!$$8Lgg-Y3wn=T2+dkOiol9HZ~}z#jiO82bswXe0%o6XC@Ogp#Ea9r@lm0t zK=bDvAgW1`Tad_hI8rWepI(Xu@~2zD?3@-YozyPzqS%&@lUHgU_;wq6T-#@y@!;3{ zpgg;J|ME>)Ph@{{M$*>(b^9NDw@^B|^!|;n9!PJVi8{pc|0z zpD&|7_-AGXg*~I_N#tSFz)A?lFhZEn~0IHDI zf+T~UI4nzc)C;@;MYIik+PjNo;ZAq9Ket-0qWDcJh&<@BIfLOp{uw3jpDnBgOnx5o za%qYrWGCune7doV&P$)``@4cSpM?PWtyZ1m`3a^r(gcJxu)D3X>G&YAoxnLjUmHSM zyAte{T}+RugB3X^E|uq-*CdNyxy8RzmTpSYakqEREr3!| z@UPDO`qFu?9$6P>L811dqV_Ex$K3=k-0RxilRiQ9w#AN{2y)h*&N@fz$@kBLa)hY3 zW%hbPGcl;+^0BdWVa9#Sc(m}`njQ0S%)s45|8%J9H5b3-&L!Z3&10NU@ zNvZ{z>B*NWpJBSfry1l%<)rODEI{JjX_V6WoL~yjM7M&R8E2elo3IP)>lcDmwB{?4 zkJ#rh1?{6h1Ga*)P3d{Sk=6c3L{pTB0B9(^gFnu?oUn70(23otRTgz^{Iq?9oZR*L zQbl50<@_NH+Po(~j)*~@ia~SQtUabUy?HywyY!&SS&(ri!%_f~kMy(DrKQ>ECuISk zsy3nK`SFSd{Sj~GRM#`URk~XOLoot|5*Pjht)+pg32JPfZ^{dkxWeR>!|C639pKyF zS_*gztQyaO4m^KkU}Qtes8A}W(zm!UeOI^s0hqf`I=N{SD-_hx_oV&>$sYjtpHE}D zPba|F+IfZH?w5LMhnjxBn<@A8v>z7;{74vXe}7T|i>X*%Rd=NdG?q4@n_LQV9*pXS zPHJwV@>*ee^PWHz?c(}=$qWxgmvQ|MUzeSt52<*PHtRc+d=!(J*!F-4&N7t_2Slvq z9R)0I?idfmm9;Cw<@5gAd(SZnR*Y-UR!tq8@pA?ouSLE?j2IUL!E*pkSN#$ew#z&P zwqG~ygVZaSKjrNyfv+GiUNgLXCGTd~WoM-Gp_Vg2T#_%>N@na(ariEGp>r^Ie?(pL z$>JN2ns3S>0Jyj(8&2}^j^)s66C7&3n6Yk3+n1emxPmcBx=F7+O8&$)Ula@Fi3q_% z7wj9{wp0QZnG?#}u?o3swO_Yn1zpv-ovhzSt5M$-cLM5 zwd9tD2GX60r_g(>53~^&s3poC8+-2dsyr!$>FomAibzbyM|;D-^S`O^x$9Zd6ytbo*v!5E(K>JnEz{bDOL_ zI?|<*QlJ#>)@r?GOvF-J3`jKu`kVPhmgU6AMp?L-K!vZMV?jbL0`beV@S_S6U=(35dMCiRTrRnaFxVS;|N?;3O~4#v@F` zUryOw84v+fQ%#a0Qik(S(;Os%Ps<}@lyQoX?0>TrZK*TG(w=W(1c-R^cY43!5)KLP zDc%u?>Rmg;5IPTwR+Yu!S4lvVo{ei#}cD5vfaTJP4$?Q#A5 zDy28XK2nb0ep*8XYPHY-ngJaZzJ)I|XzuOZw>ECY(%X@O;3Mc%6~sg9oh}c25?Us` z^zEy@F6bn;l`y~vBMkl-W~=%v#_*tGmlzv@&WWT74n~A;)@pjw z+tNiLaHj@3EvQibCcJLqhtXK6oRSpvo0}2W0pWTi%Odie36uE==CUm z0BC5imwQiVCen31%$XD{7Gh6zs%jfa+c&Yf(xYKke zAF^QO*KL6xBkD#Z0z*T!{RrQDXkx8?)5!cBQy+cD{NTHmY(#mTOMR*6K($W<5Y5SK zp%9+IG%1xQ^Ecg^CpwVJp6)rbwJ@$4c2@TS9C=udIC11f2)&N&wB}qEL&+?4e1xcy zlU}HXL9y`s2i*#01oOhN*?AIG_xEkkT9Wh-@EskGJn!|CILD+(#Ci=la1kF^%{s$+ zbxKfSxV|wY-x+gavs!$AGSk9fT2laYvl>d#O`*K*$J^xDuZ=XmMc1d>lWkY0>?=xZ+|}IY$Q4zVasr zmgnnM9|(`_piQ2!wC8Q7ox+Cfl8omUIB0qwNLFFHQ@t=bw0Zks{``f~n-sq)-N%$I zve30$QO44d1yEbQ|7aq-Y1}@LYAq{zgQ3}q&IAy&vd*FFNP{0jGuKMJ zer(hk9{#o{`o*`$e|~@G{U1!C{tbY(hag3rKY+z}uv#F4Is=k7z{1$~Cy#ow^-q5F g|1bMLJtco#Q~qKqy?*Zr7zlLk^rcf}C$EM755XB^2LJ#7 literal 0 HcmV?d00001 diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains.mdx new file mode 100644 index 00000000000000..94dbcfd1de122b --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains.mdx @@ -0,0 +1,38 @@ +--- +title: Connect your domains +pcx_content_type: how-to +sidebar: + order: 3 +--- + +import { GlossaryTooltip } from "~/components" + +On the **Set up Email Security** page: + +1. **Connect domains**: Select at least one domain. Then, select **Continue**. +2. (**Optional**) **Add manual domains**: Select **Add domain name** to manually enter additional domains. Then, select **Continue**. +3. (**Optional**) **Adjust hop count**: Enter the number of hops. Then, select **Continue**. +4. (**Optional**, select **Skip for now** to skip this step) **Move messages**: Refer to [Auto-moves](/cloudflare-one/email-security/auto-moves/) to configure auto-moves. Then, select **Continue**. +5. **Configure service address with your third party email provider**: Copy and paste the service address into your third-party email provider to allow BCC/Journaling: `@CF-emailsecurity.com`. +6. **Review details**: Review your connected domains. Then, select **Go to domains.** + +Your domains are now added successfully. + +On the **Domains** page, select the three dots > **View integration**. The dashboard will display your [domain information](/cloudflare-one/email-security/reference/domain-information/). + +Under **Source**, the dashboard will display **Google integration**, along with the **Integration name**. + +## Add additional domains + +To add additional domains: + +1. Go to **Settings**. +2. Select **Connect an integration** > **BCC/Journaling** > **Integrate with Google** > **Authorize**. +3. **Connect domains**: Select the domains you want to add, then select **Next**. +4. (Optional) Select **Add manual domains**: Enter additional domains manually, then select **Next**. +5. (Optional) Select **Adjust hop count**: Enter the number of hops. +6. **Review details**: Review your selected domains, then use the following email to configure the service address with your third-party email provider: + ```txt + @CF-emailsecurity.com + ``` +7. Select **Save**. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-auto-moves.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-auto-moves.mdx new file mode 100644 index 00000000000000..340d161ead2930 --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-auto-moves.mdx @@ -0,0 +1,13 @@ +--- +title: Enable auto-moves +pcx_content_type: how-to +sidebar: + order: 4 +--- + +If you do not have an integration: + +1. Go to **Settings** > **Integrated domains** > Select **View**. +2. Select the three dots > Select **Associate an integration**. +3. Select **Connect an integration**. You will then be redirected to a page where you will [enable your Microsoft integration](/cloudflare-one/email-security/setup/post-delivery-deployment/api/office365-api/#enable-microsoft-integration). +4. Once you have enabled your Microsoft integration, select **Complete Email Security set up**. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx new file mode 100644 index 00000000000000..39a20b0582c077 --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx @@ -0,0 +1,63 @@ +--- +title: Enable Gmail BCC integration +pcx_content_type: how-to +sidebar: + order: 2 +--- + +To enable Gmail BCC integration: + +1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). +2. Select **Zero Trust**. +3. Select **Email Security**. +4. Select **Monitoring**: If you have not purchased Email Security, select **Contact Sales**. Otherwise, select **Set up**. +5. Select **BCC/Journaling**. +6. Select **Integrate with Google** > **Authorize**. + +## Create an integration + +1. Name your integration, then select **Next**. +2. Create a Service Account in your GCP Project: + 1. On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), select **Credentials**. + 2. Select **CREATE CREDENTIALS** > **Service account**. + 3. Fill in the details to create a service account: + - **Service account name**: Enter `Message Retraction Service Account`. + - **Service account ID**: Enter `message-retraction-service-acc`. + - **Service account description**: Enter `Email Security Message Retraction`. + - Select **CREATE AND CONTINUE**. + 4. In **Grant this service account access to project**, select **Select a role** > Choose **Owner**. Select **CONTINUE**, then select **DONE**. + 5. Go back to **Credentials** on the sidebar, and select your service account under **Service Accounts**. In **Details**, take note of the **Unique ID**. + 6. Select **Advanced settings** > **VIEW GOOGLE WORKSPACE ADMIN CONSOLE**, then enter your password. + 7. On the sidebar, select **Security** > **Access and data control** > **API controls** > Select **MANAGE DOMAIN WIDE DELEGATION**. + 8. Select **Add new** > Add a new client ID: + - **Client ID**: Enter the **Unique ID** you took note of in step 5. + - **OAuth scopes**: Enter the following URLs: + + ```txt + https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.group.readonly, https://www.googleapis.com/auth/admin.directory.user.alias.readonly, https://www.googleapis.com/auth/gmail.labels, https://mail.google.com/ + ``` + - Select **AUTHORIZE**. +3. **Create a JSON Key for your Service Account**: + - On the sidebar, select **Service Accounts**. + - Select the three dots, then: + - Select **Manage keys**. + - Select **ADD KEY** > **Create new key**. + - Select **JSON** > Select **CREATE**. This downloads a `.json` file which you will use at a later stage. +4. **Upload JSON Key**: Upload the `.json` file downloaded from step 3. +5. **Enable Necessary Google Workspace APIs in GCP**: Select the links below to enable each API: + - [Enable Google Calendar API](https://console.cloud.google.com/apis/library/calendar-json.googleapis.com?project=winter-surf-439414-h1) + - [Enable Google Drive API](https://console.cloud.google.com/apis/library/drive.googleapis.com?project=winter-surf-439414-h1) + - [Enable Google Admin SDK API](https://console.cloud.google.com/apis/library/admin.googleapis.com?project=winter-surf-439414-h1) + - [Enable Gmail API](https://console.cloud.google.com/apis/library/gmail.googleapis.com?project=winter-surf-439414-h1) + - [Enable Google Service Usage API]([https://console.cloud.google.com/apis/library/serviceusage.googleapis.com?project=winter-surf-439414-h1](https://console.cloud.google.com/apis/library/serviceusage.googleapis.com?project=winter-surf-439414-h1)) +6. **Log in to Google Workspace Admin Console**: Here, you will be given the service account Domain Wide Delegation from the admin console. +7. **Create a Domain-Wide Delegation API Client**: Use the Client ID and copy the scopes to create a new API client. Refer to [Delegate domain-wide authority to your service account]([https://cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-alert-center?_gl=1*skktsb*_ga*MTMxODg5NDExMy4xNzI5NjA1MzYy*_ga_WH2QY8WWF5*MTcyOTc3MDg2Ny40LjEuMTcyOTc3MDg5OC4yOS4wLjA.#delegate_domain-wide_authority_to_your_service_account](https://cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-alert-center?_gl=1*skktsb*_ga*MTMxODg5NDExMy4xNzI5NjA1MzYy*_ga_WH2QY8WWF5*MTcyOTc3MDg2Ny40LjEuMTcyOTc3MDg5OC4yOS4wLjA.#delegate_domain-wide_authority_to_your_service_account)). Then, select **Next**. +8. **Confirm Workspace Administrator Email**: Enter the email associated with the Google Workspace Administrator account. Your email must match the email associated with your Google Workspace account, or else your integration will not work. +9. Select **Create integration**. +10. Once you created your integration, you will be redirected to the **Review details** page, where you will be able to review **Integration details**. +11. Review your details, then select **Complete Email Security set up** > **Continue to Email Security**. + + +## Next steps + +Now that you have created an integration, you will need to [connect your domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/) for Email Security to start scanning your inbox. diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup.mdx new file mode 100644 index 00000000000000..9bb3d404132ce0 --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup.mdx @@ -0,0 +1,15 @@ +--- +title: Overview +pcx_content_type: overview +sidebar: + order: 1 +--- + + +For customers using Gmail as their email provider, setting up Email Security is quick and easy. + +You will need to [enable Gmail BCC on the Zero Trust dashboard](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/), [create an integration](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/), and [connect your domain(s)](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/). You can choose to [add additional domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/) at a later stage. + +Once you set up Gmail BCC integration, Email Security will receive a copy of your email messages. The following email flow shows how this works: + +![Gmail BCC deployment flow](~/assets/images/email-security/deployment/api-setup/gmail-bcc-deployment.png) \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/index.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/index.mdx new file mode 100644 index 00000000000000..06417782c3e3db --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/index.mdx @@ -0,0 +1,13 @@ +--- +title: Gmail BCC setup +pcx_content_type: navigation +sidebar: + order: 1 + group: + hideIndex: true +--- + +import { DirectoryListing } from "~/components" + + + \ No newline at end of file From d1d951c9a7b8024f24cbf082155670c4cba451bc Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 14 Nov 2024 12:34:32 +0000 Subject: [PATCH 2/4] Fix links and add more info --- .../enable-gmail-integration.mdx | 34 ++++++++++--------- 1 file changed, 18 insertions(+), 16 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx index 39a20b0582c077..aecff5813fb397 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx @@ -8,17 +8,16 @@ sidebar: To enable Gmail BCC integration: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). -2. Select **Zero Trust**. -3. Select **Email Security**. -4. Select **Monitoring**: If you have not purchased Email Security, select **Contact Sales**. Otherwise, select **Set up**. -5. Select **BCC/Journaling**. -6. Select **Integrate with Google** > **Authorize**. +2. Select **Zero Trust** > **Settings**. +3. Select **SaaS Integrations**. +4. Select **Add integration** > **Google Workspace**. +5. Select **Select Integration**. ## Create an integration 1. Name your integration, then select **Next**. 2. Create a Service Account in your GCP Project: - 1. On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), select **Credentials**. + 1. On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), go to the sidebar, select **APIs & Services**, then select **Credentials**. 2. Select **CREATE CREDENTIALS** > **Service account**. 3. Fill in the details to create a service account: - **Service account name**: Enter `Message Retraction Service Account`. @@ -27,7 +26,7 @@ To enable Gmail BCC integration: - Select **CREATE AND CONTINUE**. 4. In **Grant this service account access to project**, select **Select a role** > Choose **Owner**. Select **CONTINUE**, then select **DONE**. 5. Go back to **Credentials** on the sidebar, and select your service account under **Service Accounts**. In **Details**, take note of the **Unique ID**. - 6. Select **Advanced settings** > **VIEW GOOGLE WORKSPACE ADMIN CONSOLE**, then enter your password. + 6. Select **Advanced settings** > **VIEW GOOGLE WORKSPACE ADMIN CONSOLE**, then enter your password. This will redirect you to the Google admin portal. 7. On the sidebar, select **Security** > **Access and data control** > **API controls** > Select **MANAGE DOMAIN WIDE DELEGATION**. 8. Select **Add new** > Add a new client ID: - **Client ID**: Enter the **Unique ID** you took note of in step 5. @@ -37,27 +36,30 @@ To enable Gmail BCC integration: https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.group.readonly, https://www.googleapis.com/auth/admin.directory.user.alias.readonly, https://www.googleapis.com/auth/gmail.labels, https://mail.google.com/ ``` - Select **AUTHORIZE**. -3. **Create a JSON Key for your Service Account**: - - On the sidebar, select **Service Accounts**. +3. **Create a JSON Key for your Service Account**: + - On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), select **Service Accounts** on the sidebar: - Select the three dots, then: - Select **Manage keys**. - Select **ADD KEY** > **Create new key**. - Select **JSON** > Select **CREATE**. This downloads a `.json` file which you will use at a later stage. -4. **Upload JSON Key**: Upload the `.json` file downloaded from step 3. -5. **Enable Necessary Google Workspace APIs in GCP**: Select the links below to enable each API: +4. **Upload JSON Key**: On the [Zero Trust dashboard](https://one.dash.cloudflare.com/), upload the `.json` file downloaded on step 3. +5. **Enable Necessary Google Workspace APIs in GCP**: Enable the following APIs on the Google Cloud Console: - [Enable Google Calendar API](https://console.cloud.google.com/apis/library/calendar-json.googleapis.com?project=winter-surf-439414-h1) - [Enable Google Drive API](https://console.cloud.google.com/apis/library/drive.googleapis.com?project=winter-surf-439414-h1) - [Enable Google Admin SDK API](https://console.cloud.google.com/apis/library/admin.googleapis.com?project=winter-surf-439414-h1) - [Enable Gmail API](https://console.cloud.google.com/apis/library/gmail.googleapis.com?project=winter-surf-439414-h1) - - [Enable Google Service Usage API]([https://console.cloud.google.com/apis/library/serviceusage.googleapis.com?project=winter-surf-439414-h1](https://console.cloud.google.com/apis/library/serviceusage.googleapis.com?project=winter-surf-439414-h1)) -6. **Log in to Google Workspace Admin Console**: Here, you will be given the service account Domain Wide Delegation from the admin console. -7. **Create a Domain-Wide Delegation API Client**: Use the Client ID and copy the scopes to create a new API client. Refer to [Delegate domain-wide authority to your service account]([https://cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-alert-center?_gl=1*skktsb*_ga*MTMxODg5NDExMy4xNzI5NjA1MzYy*_ga_WH2QY8WWF5*MTcyOTc3MDg2Ny40LjEuMTcyOTc3MDg5OC4yOS4wLjA.#delegate_domain-wide_authority_to_your_service_account](https://cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-alert-center?_gl=1*skktsb*_ga*MTMxODg5NDExMy4xNzI5NjA1MzYy*_ga_WH2QY8WWF5*MTcyOTc3MDg2Ny40LjEuMTcyOTc3MDg5OC4yOS4wLjA.#delegate_domain-wide_authority_to_your_service_account)). Then, select **Next**. + - [Enable Google Service Usage API](https://console.cloud.google.com/apis/library/serviceusage.googleapis.com?project=winter-surf-439414-h1) +6. **Log in to Google Workspace Admin Console**: Enter your password and log in to the Google Workspace Admin Console. +7. **Create a Domain-Wide Delegation API Client**: + - Copy the **Client ID** and **Scopes** displayed on the Zero Trust dashboard. + - On Google Admin, go to **Security** > **Access and data control** > **API controls**. + - Select **MANAGE DOMAIN WIDE DELEGATION** > **Add new**. + - Use the Client ID and copy the scopes to create a new API client. Refer to [Delegate domain-wide authority to your service account](https://cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-alert-center?_gl=1*skktsb*_ga*MTMxODg5NDExMy4xNzI5NjA1MzYy*_ga_WH2QY8WWF5*MTcyOTc3MDg2Ny40LjEuMTcyOTc3MDg5OC4yOS4wLjA.#delegate_domain-wide_authority_to_your_service_account). Then, select **Next**. 8. **Confirm Workspace Administrator Email**: Enter the email associated with the Google Workspace Administrator account. Your email must match the email associated with your Google Workspace account, or else your integration will not work. 9. Select **Create integration**. 10. Once you created your integration, you will be redirected to the **Review details** page, where you will be able to review **Integration details**. 11. Review your details, then select **Complete Email Security set up** > **Continue to Email Security**. - ## Next steps -Now that you have created an integration, you will need to [connect your domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/) for Email Security to start scanning your inbox. +Now that you have created an integration, you will need to [connect your domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/) for Email Security to start scanning your inbox. \ No newline at end of file From bede660872c2feca52210f0f72bd5207214377d7 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 14 Nov 2024 15:35:15 +0000 Subject: [PATCH 3/4] Adding H3s --- .../enable-gmail-integration.mdx | 92 ++++++++++++------- 1 file changed, 57 insertions(+), 35 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx index aecff5813fb397..b291ef4c081e19 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx @@ -15,50 +15,72 @@ To enable Gmail BCC integration: ## Create an integration -1. Name your integration, then select **Next**. -2. Create a Service Account in your GCP Project: - 1. On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), go to the sidebar, select **APIs & Services**, then select **Credentials**. - 2. Select **CREATE CREDENTIALS** > **Service account**. - 3. Fill in the details to create a service account: - - **Service account name**: Enter `Message Retraction Service Account`. - - **Service account ID**: Enter `message-retraction-service-acc`. - - **Service account description**: Enter `Email Security Message Retraction`. - - Select **CREATE AND CONTINUE**. - 4. In **Grant this service account access to project**, select **Select a role** > Choose **Owner**. Select **CONTINUE**, then select **DONE**. - 5. Go back to **Credentials** on the sidebar, and select your service account under **Service Accounts**. In **Details**, take note of the **Unique ID**. - 6. Select **Advanced settings** > **VIEW GOOGLE WORKSPACE ADMIN CONSOLE**, then enter your password. This will redirect you to the Google admin portal. - 7. On the sidebar, select **Security** > **Access and data control** > **API controls** > Select **MANAGE DOMAIN WIDE DELEGATION**. - 8. Select **Add new** > Add a new client ID: - - **Client ID**: Enter the **Unique ID** you took note of in step 5. - - **OAuth scopes**: Enter the following URLs: - - ```txt - https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.group.readonly, https://www.googleapis.com/auth/admin.directory.user.alias.readonly, https://www.googleapis.com/auth/gmail.labels, https://mail.google.com/ - ``` - - Select **AUTHORIZE**. -3. **Create a JSON Key for your Service Account**: - - On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), select **Service Accounts** on the sidebar: +Name your integration, then select **Next**. + +### Create a Service Account in your GCP Project + +1. Once you have named your integration, select **Next**. +2. On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), go to the sidebar, select **APIs & Services**, then select **Credentials**. +3. Select **CREATE CREDENTIALS** > **Service account**. +4. Fill in the details to create a service account: + - **Service account name**: Enter `Message Retraction Service Account`. + - **Service account ID**: Enter `message-retraction-service-acc`. + - **Service account description**: Enter `Email Security Message Retraction`. + - Select **CREATE AND CONTINUE**. +5. In **Grant this service account access to project**, select **Select a role** > Choose **Owner**. Select **CONTINUE**, then select **DONE**. +6. Go back to **Credentials** on the sidebar, and select your service account under **Service Accounts**. In **Details**, take note of the **Unique ID**. +7. Select **Advanced settings** > **VIEW GOOGLE WORKSPACE ADMIN CONSOLE**, then enter your password. This will redirect you to the Google admin portal. +8. On the sidebar, select **Security** > **Access and data control** > **API controls** > Select **MANAGE DOMAIN WIDE DELEGATION**. +9. Select **Add new** > Add a new client ID: + - **Client ID**: Enter the **Unique ID** you took note of in step 5. + - **OAuth scopes**: Enter the following URLs: + + ```txt + https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.group.readonly, https://www.googleapis.com/auth/admin.directory.user.alias.readonly, https://www.googleapis.com/auth/gmail.labels, https://mail.google.com/ + ``` + - Select **AUTHORIZE**. + +### Create a JSON Key for your Service Account + +On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), select **Service Accounts** on the sidebar: - Select the three dots, then: - Select **Manage keys**. - Select **ADD KEY** > **Create new key**. - Select **JSON** > Select **CREATE**. This downloads a `.json` file which you will use at a later stage. -4. **Upload JSON Key**: On the [Zero Trust dashboard](https://one.dash.cloudflare.com/), upload the `.json` file downloaded on step 3. -5. **Enable Necessary Google Workspace APIs in GCP**: Enable the following APIs on the Google Cloud Console: + +### Upload JSON Key + +On the [Zero Trust dashboard](https://one.dash.cloudflare.com/), upload the `.json` file downloaded on step 3. + +### Enable Necessary Google Workspace APIs in GCP + +Enable the following APIs on the Google Cloud Console: - [Enable Google Calendar API](https://console.cloud.google.com/apis/library/calendar-json.googleapis.com?project=winter-surf-439414-h1) - [Enable Google Drive API](https://console.cloud.google.com/apis/library/drive.googleapis.com?project=winter-surf-439414-h1) - [Enable Google Admin SDK API](https://console.cloud.google.com/apis/library/admin.googleapis.com?project=winter-surf-439414-h1) - [Enable Gmail API](https://console.cloud.google.com/apis/library/gmail.googleapis.com?project=winter-surf-439414-h1) - [Enable Google Service Usage API](https://console.cloud.google.com/apis/library/serviceusage.googleapis.com?project=winter-surf-439414-h1) -6. **Log in to Google Workspace Admin Console**: Enter your password and log in to the Google Workspace Admin Console. -7. **Create a Domain-Wide Delegation API Client**: - - Copy the **Client ID** and **Scopes** displayed on the Zero Trust dashboard. - - On Google Admin, go to **Security** > **Access and data control** > **API controls**. - - Select **MANAGE DOMAIN WIDE DELEGATION** > **Add new**. - - Use the Client ID and copy the scopes to create a new API client. Refer to [Delegate domain-wide authority to your service account](https://cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-alert-center?_gl=1*skktsb*_ga*MTMxODg5NDExMy4xNzI5NjA1MzYy*_ga_WH2QY8WWF5*MTcyOTc3MDg2Ny40LjEuMTcyOTc3MDg5OC4yOS4wLjA.#delegate_domain-wide_authority_to_your_service_account). Then, select **Next**. -8. **Confirm Workspace Administrator Email**: Enter the email associated with the Google Workspace Administrator account. Your email must match the email associated with your Google Workspace account, or else your integration will not work. -9. Select **Create integration**. -10. Once you created your integration, you will be redirected to the **Review details** page, where you will be able to review **Integration details**. -11. Review your details, then select **Complete Email Security set up** > **Continue to Email Security**. + +### Log in to Google Workspace Admin Console + +Log in to Google Workspace Admin Console: Enter your password and log in to the Google Workspace Admin Console. + +### Create a Domain-Wide Delegation API Client + +1. Copy the **Client ID** and **Scopes** displayed on the Zero Trust dashboard. +2. On Google Admin, go to **Security** > **Access and data control** > **API controls**. +3. Select **MANAGE DOMAIN WIDE DELEGATION** > **Add new**. +4. Use the Client ID and copy the scopes to create a new API client. Refer to [Delegate domain-wide authority to your service account](https://cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-alert-center?_gl=1*skktsb*_ga*MTMxODg5NDExMy4xNzI5NjA1MzYy*_ga_WH2QY8WWF5*MTcyOTc3MDg2Ny40LjEuMTcyOTc3MDg5OC4yOS4wLjA.#delegate_domain-wide_authority_to_your_service_account). Then, select **Next**. + +### Confirm Workspace Administrator Email + +Enter the email associated with the Google Workspace Administrator account. Your email must match the email associated with your Google Workspace account, or else your integration will not work. + +### Create integration + +1. Select **Create integration**. +2. Once you created your integration, you will be redirected to the **Review details** page, where you will be able to review **Integration details**. +3. Review your details, then select **Complete Email Security set up** > **Continue to Email Security**. ## Next steps From 7dfb0cc815d3fc6930c97c27ffd2f5f540a3c835 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 14 Nov 2024 16:08:03 +0000 Subject: [PATCH 4/4] Adding numbers to H3s --- .../gmail-bcc-setup/enable-gmail-integration.mdx | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx index b291ef4c081e19..f6aee0f5c83a70 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx @@ -17,7 +17,7 @@ To enable Gmail BCC integration: Name your integration, then select **Next**. -### Create a Service Account in your GCP Project +### 1. Create a Service Account in your GCP Project 1. Once you have named your integration, select **Next**. 2. On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), go to the sidebar, select **APIs & Services**, then select **Credentials**. @@ -40,7 +40,7 @@ Name your integration, then select **Next**. ``` - Select **AUTHORIZE**. -### Create a JSON Key for your Service Account +### 2. Create a JSON Key for your Service Account On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), select **Service Accounts** on the sidebar: - Select the three dots, then: @@ -48,11 +48,11 @@ On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), sel - Select **ADD KEY** > **Create new key**. - Select **JSON** > Select **CREATE**. This downloads a `.json` file which you will use at a later stage. -### Upload JSON Key +### 3. Upload JSON Key On the [Zero Trust dashboard](https://one.dash.cloudflare.com/), upload the `.json` file downloaded on step 3. -### Enable Necessary Google Workspace APIs in GCP +### 4. Enable Necessary Google Workspace APIs in GCP Enable the following APIs on the Google Cloud Console: - [Enable Google Calendar API](https://console.cloud.google.com/apis/library/calendar-json.googleapis.com?project=winter-surf-439414-h1) @@ -61,22 +61,22 @@ Enable the following APIs on the Google Cloud Console: - [Enable Gmail API](https://console.cloud.google.com/apis/library/gmail.googleapis.com?project=winter-surf-439414-h1) - [Enable Google Service Usage API](https://console.cloud.google.com/apis/library/serviceusage.googleapis.com?project=winter-surf-439414-h1) -### Log in to Google Workspace Admin Console +### 5. Log in to Google Workspace Admin Console Log in to Google Workspace Admin Console: Enter your password and log in to the Google Workspace Admin Console. -### Create a Domain-Wide Delegation API Client +### 6. Create a Domain-Wide Delegation API Client 1. Copy the **Client ID** and **Scopes** displayed on the Zero Trust dashboard. 2. On Google Admin, go to **Security** > **Access and data control** > **API controls**. 3. Select **MANAGE DOMAIN WIDE DELEGATION** > **Add new**. 4. Use the Client ID and copy the scopes to create a new API client. Refer to [Delegate domain-wide authority to your service account](https://cloud.google.com/chronicle/docs/soar/marketplace-integrations/google-alert-center?_gl=1*skktsb*_ga*MTMxODg5NDExMy4xNzI5NjA1MzYy*_ga_WH2QY8WWF5*MTcyOTc3MDg2Ny40LjEuMTcyOTc3MDg5OC4yOS4wLjA.#delegate_domain-wide_authority_to_your_service_account). Then, select **Next**. -### Confirm Workspace Administrator Email +### 7. Confirm Workspace Administrator Email Enter the email associated with the Google Workspace Administrator account. Your email must match the email associated with your Google Workspace account, or else your integration will not work. -### Create integration +### 8. Create integration 1. Select **Create integration**. 2. Once you created your integration, you will be redirected to the **Review details** page, where you will be able to review **Integration details**.