Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Connect to GCS and KMS using GKE workload identity federation #99

Open
abhinavg6 opened this issue Feb 21, 2024 · 0 comments · Fixed by #113
Open

Connect to GCS and KMS using GKE workload identity federation #99

abhinavg6 opened this issue Feb 21, 2024 · 0 comments · Fixed by #113
Assignees
Labels
enhancement New feature or request Priority-P1 High priority designation

Comments

@abhinavg6
Copy link

abhinavg6 commented Feb 21, 2024

In dedicated, we currently access customer-managed "external" buckets (BYOB) and KMS using a W&B deployment IAM service account created per deployment. Customer adds that W&B deployment IAM service account to their bucket & key policies and allows the required actions. It works but it's not the most secure form of cross-project / tenant access. Standard is service account impersonation across projects / tenants - https://cloud.google.com/iam/docs/service-account-impersonation using https://cloud.google.com/iam/docs/create-short-lived-credentials-direct.

We would like to support service account impersonation based access such that a W&B deployment IAM service account can impersonate an intermediary cross-project/tenant service account in customer's project to perform the necessary GCS and KMS actions. Customer on their part would configure the cross-project service account to trust the W&B deployment service account and allow required actions to GCS and KMS. And we would like to do this using the GKE workload identity federation - https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity.

Would be good to have a migration plan in place such that for older customers we can continue to support current direct service account based mechanism until they're ready to make changes to use the service account impersonation based mechanism.

@abhinavg6 abhinavg6 changed the title Connect to GCS and KMS using GKE workload identity Connect to GCS and KMS using GKE workload identity federation Feb 21, 2024
@abhinavg6 abhinavg6 added enhancement New feature or request Priority-P1 High priority designation labels Feb 21, 2024
@jsbroks jsbroks linked a pull request Apr 30, 2024 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request Priority-P1 High priority designation
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants