Configuring GCP GKE access
This topic describes the required configurations within your Google Cloud Platform (GCP) project to allow PingOne Privilege to discover and manage your Google Kubernetes Engine (GKE) clusters. The process involves verifying service account permissions, configuring Role-Based Access Control (RBAC) on the GKE cluster, and then onboarding the cluster in PingOne Privilege.
Step 1: Verify service account permissions
First, ensure the service account used to onboard your GCP project to PingOne Privilege has the necessary permissions to manage Kubernetes resources.
-
In the Google Cloud console, go to IAM & Admin > IAM.
-
Find the service account associated with your PingOne Privilege integration.
-
Verify that the service account has the Kubernetes Engine Admin role.
This role allows PingOne Privilege to discover and interact with your GKE clusters. If it doesn’t, edit the principal’s permissions and add this role.
Step 2: Onboard the cluster in PingOne Privilege
After completing the configuration in the GCP console, rescan your account in PingOne Privilege to discover and manage the cluster.
-
In the PingOne Privilege admin console, go to Clouds.
-
Find your GCP cloud account, and click More Info.
-
Go to the Resources tab and click Rescan.