GCP Integration
Secure privileged access to your Google Cloud Platform infrastructure with unified identity, just-in-time access, and comprehensive audit trails.
Comprehensive GCP Coverage
Secure access to all your Google Cloud services with unified authentication and authorization.
Cloud IAM Integration
Seamlessly integrate with Google Cloud IAM for federated authentication and service account management.
Compute Engine Access
SSH access to GCE instances with automatic discovery and OS Login integration.
Cloud SQL Protection
Secure database access to Cloud SQL instances with protocol-aware proxying and IAM authentication.
Secret Manager Integration
Integration with Google Cloud Secret Manager for centralized credential management.
Enterprise-Grade GCP Integration
Get Started in Minutes
Follow these simple steps to integrate TigerAccess with your GCP infrastructure.
Create Service Account
Create a service account in GCP with permissions to discover and manage access to resources.
gcloud iam service-accounts create tigeraccess \
--display-name="TigerAccess Service Account"
gcloud projects add-iam-policy-binding PROJECT_ID \
--member="serviceAccount:tigeraccess@PROJECT_ID.iam.gserviceaccount.com" \
--role="roles/compute.viewer"Configure GCP Integration
Add the GCP integration in TigerAccess with your project ID and service account credentials.
tacctl integrations add gcp \
--project-id=my-project \
--credentials-file=/path/to/service-account-key.json \
--regions=us-central1,us-east1Verify Resource Discovery
Verify that TigerAccess has discovered your GCP resources and they are available for access.
tac ls
# Shows all discovered GCP resources:
# - GCE instances
# - Cloud SQL databases
# - GKE clustersReal-World GCP Scenarios
Secure GKE Access
Provide developers secure access to GKE clusters with just-in-time permissions and automatic credential rotation.
Multi-Project Management
Manage privileged access across multiple GCP projects and organizations with unified authentication and audit trails.
Database Access Control
Secure access to Cloud SQL databases with automatic credential rotation and comprehensive session recording.
Compliance Automation
Automatically collect and store audit logs in Cloud Storage for compliance with SOC 2, HIPAA, and other frameworks.
Frequently Asked Questions
How does TigerAccess integrate with Google Cloud IAM?
TigerAccess can impersonate service accounts and leverage Cloud IAM for authentication. Users authenticate to TigerAccess using your identity provider, and TigerAccess issues short-lived GCP credentials through service account impersonation.
Does TigerAccess support GCP Workload Identity?
Yes. TigerAccess fully supports GCP Workload Identity for GKE clusters, enabling secure authentication without requiring service account keys.
Can I use TigerAccess with Google Workspace for SSO?
Absolutely. TigerAccess integrates with Google Workspace via SAML 2.0 or OIDC, allowing you to use your existing Google identities for infrastructure access.
Where are audit logs stored?
Audit logs can be automatically exported to Cloud Storage buckets or streamed to Cloud Logging. TigerAccess also integrates with Cloud Audit Logs for comprehensive visibility.
Ready to Secure Your Infrastructure?
Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.
No credit card required • 14-day free trial • Enterprise support available