Integrations
- Integrations
- 1Password
- Abnormal
- Absolute
- AbuseIPDB
- Adaptive Shield
- Adobe Cloud
- ADP
- Agari Phishing Response
- Airlock
- Airlock Digital
- Akamai Identity Cloud Social
- Alert Logic
- AlgoSec Firewall Analyzer
- AlienVault OTX
- AlienVault USM
- Anodot
- Ansible
- Anvilogic
- Any Run
- Apex One
- ArcSight ESM
- Area 1
- Asana
- Asset Panda
- Atlassian User Management
- Atlassian User Provisioning
- auth0
- Authentik
- Authomize
- Automox
- AWS
- AWS IAM Identity Center
- Axonius
- Azure
- Azure Data Explorer
- Azure DevOps
- Azure Log Analytics
- Azure Storage
- BambooHR
- Big Fix
- BigPanda
- Bitbucket
- Bitdefender
- Bitsight
- Bitwarden
- Black Duck
- Black Kite
- Blink
- BMC Remedy
- Box
- Brinqa
- Cato Networks
- Censys
- Check Point Harmony
- Check Point Infinity Events
- Check Point XDR-XPR
- Check Point Management
- Checkmarx One
- Checkmarx SAST
- Chorus
- Chronicle
- Cisco Advanced Phishing Protection
- Cisco Domain Protection
- Cisco Meraki
- Cisco Talos
- Cisco Umbrella
- Cisco Webex
- Claroty xDome
- ClearPass
- ClickHouse
- ClickUp
- Cloud Custodian
- Cloudflare
- Cobalt
- Compass
- Confluence
- Confluence Data Center
- Coralogix
- Coralogix Incident Management
- Cortex XDR
- Cortex Xpanse
- CredStash
- Cribl
- CrowdStrike
- CyberArk
- Cybersixgill
- CyCognito
- Cyera
- Cylance
- Cyware CTIX
- Darktrace
- Dasera
- Databricks
- Datadog
- DataSet
- Delighted
- Delinea
- Devo
- Discord
- Docusign
- Domo
- Drata
- Dropbox
- Dropbox Business
- Druva
- Duo
- Duo Auth
- Dynatrace
- EasyVista
- EchoTrail
- Egnyte
- Egnyte Secure Govern
- Elasticsearch
- Entro
- Ermetic
- Exabeam
- Exchange Online
- Expel
- F5 BIG IP
- Falcon LogScale
- Falcon Surface
- Flare.io
- Forcepoint DLP
- Forescout
- FortiGate
- Freshservice
- GCP
- Ghostwriter
- Git
- GitHub
- GitLab
- Glean
- Gmail
- Google Calendar
- Google Chat
- Google Docs
- Google Drive
- Google Forms
- Google Looker
- Google Meet
- Google Sheets
- Google Workspace
- Grafana
- Grip Security
- GYTPOL
- Have I Been Pwned
- HiBob
- HubSpot
- Hunters
- Hybrid Analysis
- Hyperproof
- IBM Cloud
- IBM NS1 Connect
- IBM X Force
- Imperva
- incident.io
- Infoblox Cloud Services Portal
- Integrations
- Intercom
- Intezer
- IP API
- IPinfo
- IPWHOIS
- Ironscales
- Ivanti RiskSense
- Jamf
- JetBrains
- JFrog
- Jira
- Jira Data Center
- Joe Sandbox
- JumpCloud
- Kandji
- Keeper Secrets Manager
- Kenna Security
- KnowBe4
- KnowBe4 Events
- Kubernetes
- Lacework
- LaunchDarkly
- Linear
- Litmos
- LogicMonitor
- LogRhythm
- Manage Engine ServiceDesk Plus
- Mattermost
- Maven
- Microsoft Defender For Cloud
- Microsoft Defender For Cloud Apps
- Microsoft Defender For Endpoints
- Microsoft Defender XDR
- Microsoft E-Discovery
- Microsoft Entra ID
- Microsoft Graph
- Microsoft Intune
- Microsoft Office 365 Management Activity
- Microsoft Outlook
- Microsoft Purview
- Microsoft Sentinel
- Microsoft SQL Server
- Microsoft Teams
- Mimecast
- MISP
- Monday
- MongoDB Atlas
- MxToolbox
- Neo4j
- NetBox
- Netography
- Netskope
- New Relic
- Nightfall AI
- NinjaOne
- Notion
- Nozomi Networks
- Nuclei
- Nucleus
- Nutanix Hypervisor
- Obsidian
- Okta
- OneDrive
- OneLogin
- OneTrust
- OpenAI
- OpenCTI
- Opsgenie
- OPSWAT
- Oracle Cloud
- Oracle HCM
- Orca Security
- OWASP ZAP
- PagerDuty
- Palo Alto Cloud NGFW
- Palo Alto Firewall
- Panther
- Pentera
- Perception Point
- PhishLabs
- PhishLabs Incident Data
- PhishLabs Open Web Monitoring
- Pingdom
- PingID
- PingOne
- PlexTrac
- PortSwigger
- Postman
- Postman SCIM
- Power BI
- PowerShell
- Prisma Access
- Prisma Cloud CSPM
- Prisma Cloud CWP
- Prometheus
- Proofpoint
- Proofpoint ITM
- Proofpoint Protection Server
- Proofpoint Security Awareness Training
- Proofpoint TAP
- Proofpoint Threat Response Auto Pull
- Pub-Sub
- QRadar
- Qualys
- Rapid7
- Rapid7 InsightIDR
- Rapid7 InsightVM Cloud
- Rapid7 Threat Command
- Reco
- Recorded Future
- Red Hat IdM
- Rippling
- runZero
- SafeBase
- Sage HR
- SailPoint
- SailPoint IdentityIQ
- Salesforce
- SAP Ariba
- ScienceLogic
- Securin
- Securin VI
- SecurityScorecard
- Securonix
- SemGrep
- SentinelOne
- ServiceNow
- SharePoint
- Shodan
- Shopify
- Silverfort
- Slack
- Smartsheet
- Snipe-IT
- Snowflake
- Snyk
- SolarWinds Service Desk
- SonarQube
- Sophos
- Split
- Splunk
- Splunk Observability
- Splunk SOAR
- Spur
- StrongDM
- Sumo Logic
- Symantec EDR
- Sysdig
- Tableau
- Tanium
- TeamCity
- TeamViewer
- Telegram
- Tenable
- Tenable Security Center
- Terraform
- Terraform Cloud
- TheHive
- Thinkst Canary
- ThreatQuotient
- Trellix Email Security
- Trello
- Trend Vision One
- Twilio
- UKG HR
- Uptycs
- URLScan
- Vault
- Veracode
- Verkada
- Vertica
- VirusTotal
- VMware Carbon Black
- VMware vSphere
- WeChat
- WhatsApp
- Whois
- WildFire
- Wiz
- Workday
- Workspace ONE UEM
- YesWeHack
- Zendesk
- Zero Networks
- Zoom
- Zscaler Internet Access
- Zscaler Private Access
Actions
Get User
Get information about the user with a specific ID.
If the caller is an admin or the caller is the user being specified, then full user information will be returned. Otherwise, a minimal ‘public’ variant of the user information will be returned. This contains The user name and avatar url, but no sensitive information.
To learn more, visit the Google Looker documentation.
Parameters
Parameter | Description |
---|---|
Fields | Requested fields. |
User ID | The ID of the user. You can search for a user by their ID, email, first name, or last name. |
Example Output
{ "allow_direct_roles": false, "allow_normal_group_membership": false, "allow_roles_from_normal_groups": false, "avatar_url": "URL for the avatar image (may be generic)", "avatar_url_without_sizing": "URL for the avatar image (may be generic), does not specify size", "can": {}, "credentials_api3": [ { "can": {}, "client_id": "API key client_id", "created_at": "Timestamp for the creation of this credential", "id": "Unique Id", "is_disabled": false, "type": "Short name for the type of this kind of credential", "url": "Link to get this item" } ], "credentials_email": { "account_setup_url": "Url with one-time use secret token that the user can use to setup account", "can": {}, "created_at": "Timestamp for the creation of this credential", "email": "EMail address used for user login", "forced_password_reset_at_next_login": false, "is_disabled": false, "logged_in_at": "Timestamp for most recent login using credential", "password_reset_url": "Url with one-time use secret token that the user can use to reset password", "type": "Short name for the type of this kind of credential", "url": "Link to get this item", "user_id": "Unique Id of the user", "user_url": "Link to get this user" }, "credentials_embed": [ { "can": {}, "created_at": "Timestamp for the creation of this credential", "external_group_id": "Embedder's id for a group to which this user was added during the most recent login", "external_user_id": "Embedder's unique id for the user", "id": "Unique Id", "is_disabled": false, "logged_in_at": "Timestamp for most recent login using credential", "type": "Short name for the type of this kind of credential", "url": "Link to get this item" } ], "credentials_google": { "can": {}, "created_at": "Timestamp for the creation of this credential", "domain": "Google domain", "email": "EMail address", "google_user_id": "Google's Unique ID for this user", "is_disabled": false, "logged_in_at": "Timestamp for most recent login using credential", "type": "Short name for the type of this kind of credential", "url": "Link to get this item" }, "credentials_ldap": { "can": {}, "created_at": "Timestamp for the creation of this credential", "email": "EMail address", "is_disabled": false, "ldap_dn": "LDAP Distinguished name for this user (as-of the last login)", "ldap_id": "LDAP Unique ID for this user", "logged_in_at": "Timestamp for most recent login using credential", "type": "Short name for the type of this kind of credential", "url": "Link to get this item" }, "credentials_looker_openid": { "can": {}, "created_at": "Timestamp for the creation of this credential", "email": "EMail address used for user login", "is_disabled": false, "logged_in_at": "Timestamp for most recent login using credential", "logged_in_ip": "IP address of client for most recent login using credential", "type": "Short name for the type of this kind of credential", "url": "Link to get this item", "user_url": "Link to get this user" }, "credentials_oidc": { "can": {}, "created_at": "Timestamp for the creation of this credential", "email": "EMail address", "is_disabled": false, "logged_in_at": "Timestamp for most recent login using credential", "oidc_user_id": "OIDC OP's Unique ID for this user", "type": "Short name for the type of this kind of credential", "url": "Link to get this item" }, "credentials_saml": { "can": {}, "created_at": "Timestamp for the creation of this credential", "email": "EMail address", "is_disabled": false, "logged_in_at": "Timestamp for most recent login using credential", "saml_user_id": "Saml IdP's Unique ID for this user", "type": "Short name for the type of this kind of credential", "url": "Link to get this item" }, "credentials_totp": { "can": {}, "created_at": "Timestamp for the creation of this credential", "is_disabled": false, "type": "Short name for the type of this kind of credential", "url": "Link to get this item", "verified": false }, "display_name": "Full name for display (available only if both first_name and last_name are set)", "email": "EMail address", "embed_group_folder_id": "(Embed only) ID of user's group folder based on the external_group_id optionally specified during embed user login", "embed_group_space_id": "(DEPRECATED) (Embed only) ID of user's group space based on the external_group_id optionally specified during embed user login", "first_name": "First name", "group_ids": [ "string" ], "home_folder_id": "ID string for user's home folder", "id": "Unique Id", "is_disabled": false, "is_iam_admin": false, "last_name": "Last name", "locale": "User's preferred locale. User locale takes precedence over Looker's system-wide default locale. Locale determines language of display strings and date and numeric formatting in API responses. Locale string must be a 2 letter language code or a combination of language code and region code: 'en' or 'en-US', for example.", "looker_versions": [ "string" ], "models_dir_validated": false, "personal_folder_id": "ID of user's personal folder", "presumed_looker_employee": false, "role_ids": [ "string" ], "roles_externally_managed": false, "sessions": [ { "browser": "User's browser type", "can": {}, "city": "City component of user location (derived from IP address)", "country": "Country component of user location (derived from IP address)", "created_at": "Time when this session was initiated", "credentials_type": "Type of credentials used for logging in this session", "expires_at": "Time when this session will expire", "extended_at": "Time when this session was last extended by the user", "extended_count": 0, "id": "Unique Id", "ip_address": "IP address of user when this session was initiated", "operating_system": "User's Operating System", "state": "State component of user location (derived from IP address)", "sudo_user_id": "Actual user in the case when this session represents one user sudo'ing as another", "url": "Link to get this item" } ], "ui_state": {}, "url": "Link to get this item", "verified_looker_employee": false}
Workflow Library Example
Get User with Google Looker and Send Results Via Email
Preview this Workflow on desktop
Was this page helpful?