-
Notifications
You must be signed in to change notification settings - Fork 315
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider implementing OpenID Connect ID Token-based credentials for service accounts #130
Comments
I have no idea what to name this thing:
IDK. Thoughts @dhermes @lukesneeringer @matthewg? |
|
/cc @tswast |
+1. This is right now not straightforward at all and is required for |
@jonparrott I'm not sure I understand all the consequences but I was playing around thinking open id would work and it seems like the only thing that needs to change is change from Like I said, no idea what is the other uses of that class, but I did something very simple to get there. The
|
@FranOis that's basically the gist of it. We'd just want a new credentials class to avoid messing with any of the existing ones. |
Closed by #234 |
This would satisfy the Identity-aware Proxy use case as well as a few other niche cases that have come up.
Context:
https://gist.github.com/jonparrott/cffca2fa7881e03fbe6ff7c25773c9cf
https://github.com/GoogleCloudPlatform/python-docs-samples/blob/master/iap/make_iap_request.py#L121
/cc @matthewg
The text was updated successfully, but these errors were encountered: