Google Workspace OAuth Token and App Access Audit Events

Cloud & SaaSIdentity & DirectoryGoogle WorkspaceCloud Control PlaneSIEM / Log Aggregator

Location

Google Admin Console > Reporting > Audit and investigation > OAuth log events

Description

Audit events related to OAuth token issuance, third-party app access, API client authorization, and application grants against Google Workspace data.

Forensic Value

OAuth and token events are the main evidence source for consent-style persistence in Google Workspace. They reveal when a malicious application gained token-based access, which user granted that access, and which app or client ID must be revoked to fully remove persistence.

Tools Required

Google Admin ConsoleReports APISIEM

Collection Commands

Google Admin Console

Reporting > Audit and investigation > OAuth log events > Filter by application name, client ID, user, and event > Export the incident window

Reports API

GET https://admin.googleapis.com/admin/reports/v1/activity/users/all/applications/token?startTime=2026-03-01T00:00:00.000Z

Collection Constraints

  • Token and app-access logs show authorization activity, but investigators still need downstream Gmail, Drive, or Vault evidence to prove what data was accessed.
  • Visibility depends on admin privilege, configured logging, and surviving retention windows.

MITRE ATT&CK Techniques

T1098T1550.001T1528

Related Blockers