SaaS Mapping gives you a consolidated view of all SaaS applications and work identities used in your company. It runs through the Google Workspace integration and can be extended with a Chrome extension for coverage beyond Google-based sign in. This article explains how to enable SaaS Mapping, what data is processed, and how to deploy the extension.
Prioritise security and privacy
Factorial IT applies strict safeguards to protect people and data.
- Scope is limited to the professional context.
- Collection is minimal and purpose driven.
- Administrators control activation and device targeting.
What SaaS Mapping processes
SaaS Mapping captures the list of SaaS applications accessed with your company email address and the associated work identity. Nothing more. No message content. No files. No browsing history. No keystrokes. No personal accounts.
Where the Chrome extension runs
The Chrome extension requires to have MDM deployed via Factorial IT. It operates only when a professional email address is in use. Personal Chrome profiles and personal email addresses are out of scope.
Confirm requirements
- You have administrator access to Factorial IT.
- Google Workspace is connected to Factorial IT.
- Your organisation has an active SaaS Management subscription. The Google Workspace integration is free but SaaS Mapping requires the SaaS Management subscription.
Enable SaaS Mapping with Google Workspace
- Open Factorial IT as an administrator.
- Go to Integrations and select Google Workspace.
- Connect the integration following the on screen steps.
- Once connected, SaaS Mapping is enabled automatically. Factorial IT begins mapping SaaS and identities that users accessed with Google sign in using their work account.
Expand coverage with the Chrome extension
Mapping through Google Workspace covers activity where users signed in with Google. To include SaaS accessed with a work email address without Google sign in, deploy the Chrome extension.
- Open Factorial IT and go to MDM Profiles.
- Select the profile you use for your workforce.
- Choose the devices you want to target.
- Open the Chrome card and activate the extension.
- Allow a few minutes for deployment to reach targeted devices.
After activation, Factorial IT maps every SaaS and work identity used with the professional email address, whether Google sign in was used or not.
Verify that mapping is working
- In Factorial IT, open SaaS Mapping in the administration area.
- Confirm that applications and work identities appear for recent activity.
- Filter by profile or device group to check targeted rollouts.
If you do not see data, review the troubleshooting section below.
Manage access and visibility
• Use device targeting in Profiles to include or exclude specific groups.
• Remove a device from the targeted list to stop the extension on that device.
• Deactivate the Chrome card to stop the extension for the selected profile.
Troubleshooting
- No SaaS or identity data appears. Check that Google Workspace is connected and that your SaaS Management subscription is active.
- The extension did not install. Confirm that the device is included in the targeted list, and the Chrome card is activated. Allow time for Chrome policy sync (usually a few minutes).
- Personal activity is visible. By design, personal activity is out of scope. Verify that the user is in the managed Chrome profile and is using a professional email address. Remove any personal Chrome profiles from device targeting.
- A user has multiple Chrome profiles.Only the managed profile you targeted is in scope. Ask the user to switch to the managed profile for work activity.
- Factorial IT observes only work related SaaS usage tied to the company email address.
- Personal profiles and personal email addresses are not included.
- Factorial IT does not capture content, passwords, or browsing unrelated to work.
Availability and billing
- The Google Workspace integration is available at no cost.
- SaaS Mapping requires an active SaaS Management subscription.
- The Chrome extension requires to have MDM deployed via Factorial IT and is controlled by administrators through Profiles.