Skip to main content

App Permissions Dashboard

See every third-party app your team has authorized, what data it can access, and who granted the permission — then take action.

Overview

Every time an employee clicks "Sign in with Google" or authorizes a third-party app, they're granting that app access to your organization's data. Most authorizations are harmless — a project management tool reading a user's profile. But some grant access to email, shared drives, or directory data, and those permissions persist until someone explicitly revokes them.

The App Permissions Dashboard makes this invisible web of access visible. Instead of discovering risky integrations during a security incident, you can monitor and manage them proactively.

App Permissions Dashboard showing authorization metrics, trends, and third-party app listApp Permissions Dashboard showing authorization metrics, trends, and third-party app list

How It Works

ShiftControl pulls OAuth authorization data from Google Workspace and aggregates it into four views:

Header metrics give you the big picture:

MetricWhat It Tells You
Total AppsDistinct third-party apps authorized across your org
Total AuthorizationsActive authorization grants (one app can be authorized by many users)
Unique UsersHow many people have authorized at least one third-party app
At Risk UsersUsers who authorized apps with sensitive or restricted permissions
tip

Use the date filter (top-right) to switch between Year to date, Last 90 days, or All time.

Common Scenarios

Scenario: Quarterly security audit

Your security team runs a quarterly review. Open this dashboard, filter to the last 90 days, and review "Apps with Higher Risk Permissions." You find a marketing tool with email read access authorized by three users. You click into one of those users to check their full App Permissions tab, decide the tool isn't approved, and revoke its access directly from the user's profile.

Scenario: Employee offboarding

When someone leaves, you need to ensure their third-party authorizations are cleaned up. Search for the departing user in "Users Who Granted Permissions" to see every app they authorized. Then click into their user profile and go to the App Permissions tab where you can review and revoke each grant individually.

Scenario: Investigating a suspicious authorization spike

The trend chart shows an unusual spike in new authorizations last Tuesday. You filter the Third-Party Apps list to that date range and discover a team rolled out a new integration without IT approval. You assess its permission scopes and decide whether to allow or revoke it.

Authorizations and Revocations Over Time

The trend chart tracks Authorizations (new grants) and Revocations (removed grants) over time:

  • Steady growth in authorizations — your organization's shadow IT surface is expanding
  • Authorization spikes — a team rolled out a new tool, or a batch onboarding happened
  • Revocation spikes — a security review, offboarding event, or policy enforcement action

Watching both lines together tells you whether third-party access is being actively managed or growing unchecked.

Third-Party Apps and Services

Every app that users have connected through their Google accounts appears here. Filter by:

  • Permission level — all, sensitive only, or restricted only
  • Permission type — focus on specific data access categories

This is your master inventory. When someone asks "what apps have access to our data?" — this is the answer.

Apps with Higher Risk Permissions

Filters specifically to apps with sensitive or restricted permissions — apps that can read email, access shared drives, sync contacts, or modify data on behalf of your users.

For each flagged app, ask:

  • Is it approved for business use? If not, revoke it.
  • Who authorized it? One person using a niche tool is different from half the org.
  • Are the permissions proportional? An app that needs calendar access but also requests email read permissions deserves scrutiny.
warning

Apps with email, file access, or directory data permissions represent the highest data exposure risk. Review these every security audit cycle.

Users Who Granted Permissions

This panel shifts the view from apps to people — showing which users have the most third-party app connections.

Key workflows from this view:

  • Click a user's name to open their full profile in User Management. From there, go to the App Permissions tab to see every active OAuth grant with details about what each app can access.
  • Revoke permissions directly from a user's App Permissions tab — no need to open the Google Admin Console.
  • Spot power authorizers — users with an unusually high number of app connections may be a security risk.

Things to Know

  • Requires Google Workspace. This dashboard pulls data from Google OAuth logs. Without Google Workspace connected, there's no data to display.
  • "At Risk" is based on permission scope. A user is flagged if they authorized any app with sensitive or restricted permissions, regardless of whether IT approved the app.
  • You can revoke from ShiftControl. Click through to a user's App Permissions tab to revoke individual app grants without opening the Google Admin Console.
  • Historical grants are included. An app authorized six months ago that was never revoked still appears in the totals.
  • New apps classify quickly. Freshly authorized apps appear immediately; risk classification updates as ShiftControl processes the permission scopes.