Back to Integrations

GCP Integration

Secure privileged access to your Google Cloud Platform infrastructure with unified identity, just-in-time access, and comprehensive audit trails.

Features

Comprehensive GCP Coverage

Secure access to all your Google Cloud services with unified authentication and authorization.

Cloud IAM Integration

Seamlessly integrate with Google Cloud IAM for federated authentication and service account management.

Compute Engine Access

SSH access to GCE instances with automatic discovery and OS Login integration.

Cloud SQL Protection

Secure database access to Cloud SQL instances with protocol-aware proxying and IAM authentication.

Secret Manager Integration

Integration with Google Cloud Secret Manager for centralized credential management.

Capabilities

Enterprise-Grade GCP Integration

Cloud IAM integration
GCE instance discovery
Cloud SQL proxying
GKE cluster access
Cloud Storage audit logs
Cloud Logging integration
Workload Identity support
Secret Manager sync
Cloud Functions access
Managed instance groups
VPC Service Controls
Organization policy support
Setup

Get Started in Minutes

Follow these simple steps to integrate TigerAccess with your GCP infrastructure.

1

Create Service Account

Create a service account in GCP with permissions to discover and manage access to resources.

gcloud iam service-accounts create tigeraccess \
  --display-name="TigerAccess Service Account"

gcloud projects add-iam-policy-binding PROJECT_ID \
  --member="serviceAccount:tigeraccess@PROJECT_ID.iam.gserviceaccount.com" \
  --role="roles/compute.viewer"
2

Configure GCP Integration

Add the GCP integration in TigerAccess with your project ID and service account credentials.

tacctl integrations add gcp \
  --project-id=my-project \
  --credentials-file=/path/to/service-account-key.json \
  --regions=us-central1,us-east1
3

Verify Resource Discovery

Verify that TigerAccess has discovered your GCP resources and they are available for access.

tac ls
# Shows all discovered GCP resources:
# - GCE instances
# - Cloud SQL databases
# - GKE clusters
Use Cases

Real-World GCP Scenarios

Secure GKE Access

Provide developers secure access to GKE clusters with just-in-time permissions and automatic credential rotation.

Multi-Project Management

Manage privileged access across multiple GCP projects and organizations with unified authentication and audit trails.

Database Access Control

Secure access to Cloud SQL databases with automatic credential rotation and comprehensive session recording.

Compliance Automation

Automatically collect and store audit logs in Cloud Storage for compliance with SOC 2, HIPAA, and other frameworks.

FAQ

Frequently Asked Questions

How does TigerAccess integrate with Google Cloud IAM?

TigerAccess can impersonate service accounts and leverage Cloud IAM for authentication. Users authenticate to TigerAccess using your identity provider, and TigerAccess issues short-lived GCP credentials through service account impersonation.

Does TigerAccess support GCP Workload Identity?

Yes. TigerAccess fully supports GCP Workload Identity for GKE clusters, enabling secure authentication without requiring service account keys.

Can I use TigerAccess with Google Workspace for SSO?

Absolutely. TigerAccess integrates with Google Workspace via SAML 2.0 or OIDC, allowing you to use your existing Google identities for infrastructure access.

Where are audit logs stored?

Audit logs can be automatically exported to Cloud Storage buckets or streamed to Cloud Logging. TigerAccess also integrates with Cloud Audit Logs for comprehensive visibility.

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available