Once you’ve signed in on google.com, the
Cloud Console, or any other Google site,
your browser session remains valid for multiple days. Not being prompted to sign
in over and over again is convenient and at least in typical consumer scenarios,
the risk that comes along with keeping the session is limited.
Things can look different in a corporate scenario where users might have access
to sensitive data. Keeping sessions alive for 14 days (which is the default)
might seem a little risky and might not be in line with an enterprise’s idea
of security. G Suite Business and Cloud Identity Premium therefore allow you to
change the default session length
to a different period such as 8 hours. This setting applies to all Google services, not only GCP.
In the last post, we discussed that each request that Cloud IAP passes to a backend appliation contains a X-Goog-Iap-Jwt-Assertion header. This header contains an IAP JWT assertion that looks a bit like an IdToken, but is not an IdToken.
At Google Cloud, we run a series of Cloud Summits each year. A Cloud Summit is essentially
a mini-version of Cloud NEXT – it lasts one day, features multiple tracks of technical sessions,
and is usually held in a location where there is plenty of space for booths where customers
can ask questions.
One question that we frequently get at the Ask an Architect or Ask the Expert booth
is about Cloud Identity-Aware Proxy - what is it for, how does it work, and how to use it?
In this series of blog posts, I am going to address these questions, one at a time:
Part 1: What is it for? – The role of Cloud IAP in zero-trust (this post)