~/alonge.dev — goodbye-service-account-keys.md
home.mdessays/goodbye-service-account-keys.md
👁 preview
title:goodbye service account keys, hello workload identity federation — building secure apps with gcp
date:2023-02-12
read:3 min
tags:[gcp, security, devops, github-actions]
series:none
aliases:[goodbye-service-account-keys-hello-workload-identity-federation]

goodbye service account keys, hello workload identity federation — building secure apps with gcp

gcpsecuritydevopsgithub-actions

tired of juggling a million service account keys for your cloud-based application? discover keyless authentication with gcp workload identity federation.

Goodbye Service Account Keys, Hello Workload Identity Federation

Tired of juggling a million service account keys for your cloud-based application? Want to up your security game without sacrificing the ease of development?

Service account keys can become a pain to manage when you have your application infrastructure spread across multiple cloud providers. They become a potential security risk for your application with additional management overhead for storage, rotation, and more.

This brings us to the world of workload identity federation on GCP, designed to solve that specific problem.

Today, I cover the following:

  • What is workload identity federation (workload identity pools + IAM)?
  • How to set it up on GCP.
  • Live Example: How to use it with a GitHub actions workflow.

Workload identity federation is simply keyless authentication for service accounts. It solves the problems of storage of access keys, distribution, and rotation using short-lived dynamically provisioned tokens to authenticate your third-party applications to Google Cloud Platform.

Resources

don't miss the next note

open the next note in your inbox.

i'll send each new essay the morning it ships. nothing else.

connected·essays/2023/goodbye-service-account-keys-hello-workload-identity-federation.md·PREVIEW176 words·1,242 chars·ln 1, col 1·● saved