{"id":518,"date":"2023-12-24T20:30:23","date_gmt":"2023-12-24T20:30:23","guid":{"rendered":"https:\/\/vmlogger.com\/algorithms\/?p=518"},"modified":"2023-12-24T20:34:43","modified_gmt":"2023-12-24T20:34:43","slug":"google-cloud-iap-a-users-perspective","status":"publish","type":"post","link":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/","title":{"rendered":"Google Cloud IAP A User&#8217;s Perspective"},"content":{"rendered":"<p id=\"e6f8\" class=\"pw-post-body-paragraph ll lm gd ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fw bj\" data-selectable-paragraph=\"\">In today\u2019s increasingly interconnected digital landscape, securing access to sensitive data and applications has become paramount. As organizations embrace cloud-based solutions, the need for robust access control mechanisms has never been greater. Google Cloud Identity-Aware Proxy (IAP) emerges as a powerful tool to address this challenge, providing a centralized and granular approach to safeguarding cloud resources.<\/p>\n<p id=\"a965\" class=\"pw-post-body-paragraph ll lm gd ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fw bj\" data-selectable-paragraph=\"\">While working on an open source\u00a0<a class=\"af zz\" href=\"https:\/\/github.com\/google\/data-quality-monitor\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">DQM [Data Quality Monitor]<\/a>\u00a0frontend and backend, I had chosen IAP to secure the frontend of this DQM tool. To secure and control access to the front end, I did not have to create any login page, instead authorization and authentication were completed and taken care of by IAP itself. You can refer to the below design for DQM.<\/p>\n<h1 id=\"aead\" class=\"mx my gd be mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu bj\" data-selectable-paragraph=\"\">Understanding IAP\u2019s Role in Cloud Security<\/h1>\n<p id=\"02ca\" class=\"pw-post-body-paragraph ll lm gd ln b lo nv lq lr ls nw lu lv lw nx ly lz ma ny mc md me nz mg mh mi fw bj\" data-selectable-paragraph=\"\">IAP acts as a gatekeeper, intercepting all traffic destined for your cloud<\/p>\n<p id=\"99cb\" class=\"pw-post-body-paragraph ll lm gd ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi fw bj\" data-selectable-paragraph=\"\">applications and enforcing access policies based on user identities and contextual factors. It eliminates the need to expose applications directly to the internet, shielding them from unauthorized access and potential attacks. This approach aligns with the Zero Trust model, emphasizing the principle of \u201cnever trust, always verify\u201d for every access request.<\/p>\n<figure class=\"mm mn mo mp mq mr mj mk paragraph-image\">\n<div class=\"ms mt ef mu bg mv\" tabindex=\"0\" role=\"button\">\n<div class=\"mj mk anm\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/0*qtepMoqZA1BDoHQQ.png 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/0*qtepMoqZA1BDoHQQ.png 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/0*qtepMoqZA1BDoHQQ.png 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/0*qtepMoqZA1BDoHQQ.png 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/0*qtepMoqZA1BDoHQQ.png 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/0*qtepMoqZA1BDoHQQ.png 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/0*qtepMoqZA1BDoHQQ.png 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" data-testid=\"og\" \/><img loading=\"lazy\" decoding=\"async\" class=\"bg kt mw c\" role=\"presentation\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:1400\/0*qtepMoqZA1BDoHQQ.png\" alt=\"\" width=\"700\" height=\"418\" \/><\/picture><\/div>\n<\/div><figcaption class=\"ann ql ano mj mk anp anq be b bf z dw\" data-selectable-paragraph=\"\">DQM Designed to use IAP for security<\/figcaption><\/figure>\n<h1 id=\"7523\" class=\"mx my gd be mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu bj\" data-selectable-paragraph=\"\">Key Features that Enhance Cloud Protection<\/h1>\n<p id=\"657a\" class=\"pw-post-body-paragraph ll lm gd ln b lo nv lq lr ls nw lu lv lw nx ly lz ma ny mc md me nz mg mh mi fw bj\" data-selectable-paragraph=\"\">IAP boasts a comprehensive set of features that elevate cloud security to new heights:<\/p>\n<ul class=\"\">\n<li id=\"b6d9\" class=\"ll lm gd ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi anr od oe bj\" data-selectable-paragraph=\"\"><strong class=\"ln ge\">Centralized Access Control:<\/strong>\u00a0Manage access policies from a single console, ensuring consistency and simplifying administration.<\/li>\n<li id=\"1f6d\" class=\"ll lm gd ln b lo of lq lr ls og lu lv lw oh ly lz ma oi mc md me oj mg mh mi anr od oe bj\" data-selectable-paragraph=\"\"><strong class=\"ln ge\">Granular Access Levels:<\/strong>\u00a0Define fine-grained access rules based on user groups, attributes, and contextual factors, such as device type and location.<\/li>\n<li id=\"1575\" class=\"ll lm gd ln b lo of lq lr ls og lu lv lw oh ly lz ma oi mc md me oj mg mh mi anr od oe bj\" data-selectable-paragraph=\"\"><strong class=\"ln ge\">Application-Level Security:<\/strong>\u00a0Protect applications hosted on Google Cloud, other cloud providers, or even on-premises infrastructure.<\/li>\n<li id=\"83c6\" class=\"ll lm gd ln b lo of lq lr ls og lu lv lw oh ly lz ma oi mc md me oj mg mh mi anr od oe bj\" data-selectable-paragraph=\"\"><strong class=\"ln ge\">TCP Forwarding:<\/strong>\u00a0Secure SSH and RDP connections to VMs without exposing them to public IP addresses.<\/li>\n<li id=\"f74b\" class=\"ll lm gd ln b lo of lq lr ls og lu lv lw oh ly lz ma oi mc md me oj mg mh mi anr od oe bj\" data-selectable-paragraph=\"\"><strong class=\"ln ge\">Integrated Authentication:<\/strong>\u00a0Leverage existing identity and access management (IAM) solutions, such as Google Cloud IAM or Active Directory, for seamless authentication and authorization.<\/li>\n<\/ul>\n<h1 id=\"659a\" class=\"mx my gd be mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu bj\" data-selectable-paragraph=\"\">Real-World Benefits of Implementing IAP<\/h1>\n<p id=\"385a\" class=\"pw-post-body-paragraph ll lm gd ln b lo nv lq lr ls nw lu lv lw nx ly lz ma ny mc md me nz mg mh mi fw bj\" data-selectable-paragraph=\"\">Adopting IAP brings a multitude of benefits to cloud environments:<\/p>\n<ul class=\"\">\n<li id=\"c5a4\" class=\"ll lm gd ln b lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi anr od oe bj\" data-selectable-paragraph=\"\"><strong class=\"ln ge\">Enhanced Security:<\/strong>\u00a0Reduce the risk of data breaches and unauthorized access by enforcing stringent access controls.<\/li>\n<li id=\"18da\" class=\"ll lm gd ln b lo of lq lr ls og lu lv lw oh ly lz ma oi mc md me oj mg mh mi anr od oe bj\" data-selectable-paragraph=\"\"><strong class=\"ln ge\">Simplified Management:<\/strong>\u00a0Centralize access policy management and streamline user provisioning.<\/li>\n<li id=\"ce0c\" class=\"ll lm gd ln b lo of lq lr ls og lu lv lw oh ly lz ma oi mc md me oj mg mh mi anr od oe bj\" data-selectable-paragraph=\"\"><strong class=\"ln ge\">Improved User Experience:\u00a0<\/strong>Provide users with a secure and consistent access experience across all applications.<\/li>\n<li id=\"6ba0\" class=\"ll lm gd ln b lo of lq lr ls og lu lv lw oh ly lz ma oi mc md me oj mg mh mi anr od oe bj\" data-selectable-paragraph=\"\"><strong class=\"ln ge\">Reduced Operational Costs:\u00a0<\/strong>Eliminate the need for VPNs and simplify network management.<\/li>\n<\/ul>\n<h1 id=\"33d6\" class=\"mx my gd be mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu bj\" data-selectable-paragraph=\"\">A User\u2019s Perspective on IAP Implementation<\/h1>\n<p id=\"47a9\" class=\"pw-post-body-paragraph ll lm gd ln b lo nv lq lr ls nw lu lv lw nx ly lz ma ny mc md me nz mg mh mi fw bj\" data-selectable-paragraph=\"\">As a user, I\u2019ve found IAP to be a valuable tool for securing my cloud applications. Its centralized approach and granular access controls have significantly improved the overall security posture of our organization. The integration with existing IAM solutions has made the implementation process seamless, and the overall user experience has been positive.<\/p>\n<p data-selectable-paragraph=\"\"><img decoding=\"async\" src=\"https:\/\/cloud.google.com\/iap\/images\/iap-tcp-forwarding-diagram.png\" alt=\"Overview of TCP forwarding | Identity-Aware Proxy | Google Cloud\" \/><\/p>\n<h1 id=\"7736\" class=\"mx my gd be mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu bj\" data-selectable-paragraph=\"\">Conclusion: A Powerful Ally in Cloud Security<\/h1>\n<p id=\"56eb\" class=\"pw-post-body-paragraph ll lm gd ln b lo nv lq lr ls nw lu lv lw nx ly lz ma ny mc md me nz mg mh mi fw bj\" data-selectable-paragraph=\"\">Google Cloud IAP stands as a testament to Google\u2019s commitment to providing robust security solutions for cloud environments. Its comprehensive features, ease of implementation, and tangible benefits make it a compelling choice for organizations seeking to safeguard their valuable data and applications. Whether you\u2019re a seasoned cloud administrator or just starting your cloud journey, IAP is an invaluable tool to enhance your organization\u2019s cloud security posture.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>In today\u2019s increasingly interconnected digital landscape, securing access to sensitive data and applications has become paramount. As organizations embrace cloud-based solutions, the need for robust access control mechanisms has never been greater. Google Cloud Identity-Aware Proxy (IAP) emerges as a powerful tool to address this challenge, providing a centralized and granular approach to safeguarding cloud [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":{"facebook_10221221723514640_204908552914904":"","facebook_10221221723514640_265947966839052":"","twitter_aTo1MTIwNTUyMDQ7_512055204":""},"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"categories":[12],"tags":[],"class_list":["post-518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.5 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Google Cloud IAP A User&#039;s Perspective - Algorithms<\/title>\n<meta name=\"description\" content=\"What is IAP? How to setup IAP using terraform? Google Cloud Identity-Aware Proxy | Secure your web app without an authentication page\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Cloud IAP A User&#039;s Perspective\" \/>\n<meta property=\"og:description\" content=\"What is IAP? How to setup IAP using terraform? Google Cloud Identity-Aware Proxy | Secure your web app without an authentication page\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/\" \/>\n<meta property=\"og:site_name\" content=\"Algorithms\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/vmlogger\" \/>\n<meta property=\"article:author\" content=\"http:\/\/www.facebook.com\/vmlogger\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-24T20:30:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-24T20:34:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vishwamitra Mishra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/www.twitter.com\/learnexcelmacro\" \/>\n<meta name=\"twitter:site\" content=\"@learnexcelmacro\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vishwamitra Mishra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/\"},\"author\":{\"name\":\"Vishwamitra Mishra\",\"@id\":\"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/7500a107b0b2d35a8492acf0d11fc8e5\"},\"headline\":\"Google Cloud IAP A User&#8217;s Perspective\",\"datePublished\":\"2023-12-24T20:30:23+00:00\",\"dateModified\":\"2023-12-24T20:34:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/\"},\"wordCount\":521,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/7500a107b0b2d35a8492acf0d11fc8e5\"},\"image\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png\",\"articleSection\":[\"Cloud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/\",\"url\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/\",\"name\":\"Google Cloud IAP A User's Perspective - Algorithms\",\"isPartOf\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png\",\"datePublished\":\"2023-12-24T20:30:23+00:00\",\"dateModified\":\"2023-12-24T20:34:43+00:00\",\"description\":\"What is IAP? How to setup IAP using terraform? Google Cloud Identity-Aware Proxy | Secure your web app without an authentication page\",\"breadcrumb\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#primaryimage\",\"url\":\"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png\",\"contentUrl\":\"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png\",\"width\":2240,\"height\":1260,\"caption\":\"IAP In Google Cloud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/vmlogger.com\/algorithms\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Cloud IAP A User&#8217;s Perspective\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vmlogger.com\/algorithms\/#website\",\"url\":\"https:\/\/vmlogger.com\/algorithms\/\",\"name\":\"Algorithms\",\"description\":\"Welcome to the World of Algorithms\",\"publisher\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/7500a107b0b2d35a8492acf0d11fc8e5\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vmlogger.com\/algorithms\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/7500a107b0b2d35a8492acf0d11fc8e5\",\"name\":\"Vishwamitra Mishra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/03\/welcome-1.png\",\"contentUrl\":\"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/03\/welcome-1.png\",\"width\":1963,\"height\":843,\"caption\":\"Vishwamitra Mishra\"},\"logo\":{\"@id\":\"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/image\/\"},\"description\":\"My name is Vishwamitra Mishra. Friends Call me Vishwa. I hold a Bachelor\u2019s Degree in Computer Science from D.A.V.V. Indore &amp; currently working as a Technical Lead having over 7 years of experience.\",\"sameAs\":[\"http:\/\/www.learnexcelmacro.com\",\"http:\/\/www.facebook.com\/vmlogger\",\"https:\/\/x.com\/https:\/\/www.twitter.com\/learnexcelmacro\",\"https:\/\/www.youtube.com\/c\/VMLogger\"],\"url\":\"https:\/\/vmlogger.com\/algorithms\/author\/vishwamitra\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Google Cloud IAP A User's Perspective - Algorithms","description":"What is IAP? How to setup IAP using terraform? Google Cloud Identity-Aware Proxy | Secure your web app without an authentication page","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/","og_locale":"en_US","og_type":"article","og_title":"Google Cloud IAP A User's Perspective","og_description":"What is IAP? How to setup IAP using terraform? Google Cloud Identity-Aware Proxy | Secure your web app without an authentication page","og_url":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/","og_site_name":"Algorithms","article_publisher":"http:\/\/www.facebook.com\/vmlogger","article_author":"http:\/\/www.facebook.com\/vmlogger","article_published_time":"2023-12-24T20:30:23+00:00","article_modified_time":"2023-12-24T20:34:43+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png","type":"image\/png"}],"author":"Vishwamitra Mishra","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/www.twitter.com\/learnexcelmacro","twitter_site":"@learnexcelmacro","twitter_misc":{"Written by":"Vishwamitra Mishra","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#article","isPartOf":{"@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/"},"author":{"name":"Vishwamitra Mishra","@id":"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/7500a107b0b2d35a8492acf0d11fc8e5"},"headline":"Google Cloud IAP A User&#8217;s Perspective","datePublished":"2023-12-24T20:30:23+00:00","dateModified":"2023-12-24T20:34:43+00:00","mainEntityOfPage":{"@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/"},"wordCount":521,"commentCount":0,"publisher":{"@id":"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/7500a107b0b2d35a8492acf0d11fc8e5"},"image":{"@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#primaryimage"},"thumbnailUrl":"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png","articleSection":["Cloud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/","url":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/","name":"Google Cloud IAP A User's Perspective - Algorithms","isPartOf":{"@id":"https:\/\/vmlogger.com\/algorithms\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#primaryimage"},"image":{"@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#primaryimage"},"thumbnailUrl":"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png","datePublished":"2023-12-24T20:30:23+00:00","dateModified":"2023-12-24T20:34:43+00:00","description":"What is IAP? How to setup IAP using terraform? Google Cloud Identity-Aware Proxy | Secure your web app without an authentication page","breadcrumb":{"@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#primaryimage","url":"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png","contentUrl":"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/12\/iap.png","width":2240,"height":1260,"caption":"IAP In Google Cloud"},{"@type":"BreadcrumbList","@id":"https:\/\/vmlogger.com\/algorithms\/2023\/12\/24\/google-cloud-iap-a-users-perspective\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vmlogger.com\/algorithms\/"},{"@type":"ListItem","position":2,"name":"Google Cloud IAP A User&#8217;s Perspective"}]},{"@type":"WebSite","@id":"https:\/\/vmlogger.com\/algorithms\/#website","url":"https:\/\/vmlogger.com\/algorithms\/","name":"Algorithms","description":"Welcome to the World of Algorithms","publisher":{"@id":"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/7500a107b0b2d35a8492acf0d11fc8e5"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vmlogger.com\/algorithms\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/7500a107b0b2d35a8492acf0d11fc8e5","name":"Vishwamitra Mishra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/image\/","url":"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/03\/welcome-1.png","contentUrl":"https:\/\/vmlogger.com\/algorithms\/wp-content\/uploads\/sites\/15\/2023\/03\/welcome-1.png","width":1963,"height":843,"caption":"Vishwamitra Mishra"},"logo":{"@id":"https:\/\/vmlogger.com\/algorithms\/#\/schema\/person\/image\/"},"description":"My name is Vishwamitra Mishra. Friends Call me Vishwa. I hold a Bachelor\u2019s Degree in Computer Science from D.A.V.V. Indore &amp; currently working as a Technical Lead having over 7 years of experience.","sameAs":["http:\/\/www.learnexcelmacro.com","http:\/\/www.facebook.com\/vmlogger","https:\/\/x.com\/https:\/\/www.twitter.com\/learnexcelmacro","https:\/\/www.youtube.com\/c\/VMLogger"],"url":"https:\/\/vmlogger.com\/algorithms\/author\/vishwamitra\/"}]}},"_links":{"self":[{"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/posts\/518"}],"collection":[{"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/comments?post=518"}],"version-history":[{"count":4,"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/posts\/518\/revisions"}],"predecessor-version":[{"id":526,"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/posts\/518\/revisions\/526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/media?parent=518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/categories?post=518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vmlogger.com\/algorithms\/wp-json\/wp\/v2\/tags?post=518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}