Skip to content

Workload Identity Federation Implementation

Containers need cloud access. But service account keys are static credentials that never rotate, frequently get stolen, and live forever.

Workload Identity Federation lets containers prove their identity to cloud providers without ever storing keys. The Kubernetes cluster itself becomes a trusted identity provider.

Production Hardening

Workload Identity eliminates the largest attack surface in containerized environments. This is foundational. Get it right.

What is Workload Identity Federation?

Instead of storing a static key, your container presents a signed JWT token to prove it's running in your cluster.

Approach Token Rotation Revocation Audit
Service Account Keys Static, never changes Manual Manual Weak
Workload Identity Dynamic, short-lived Automatic Immediate Full

Service account keys are abandoned credentials. Workload Identity is ephemeral proof.

How It Works

  1. Pod requests token - Kubernetes API issues signed JWT
  2. Token presented to GCP - GCP validates signature
  3. GCP issues access token - Short-lived credential for GCP APIs
  4. Automatic rotation - Token refreshes before expiration

Architecture

sequenceDiagram
    participant Pod
    participant K8s API
    participant GCP STS
    participant GCP API

    Pod->>K8s API: Request token (ServiceAccount JWT)
    K8s API->>Pod: Return signed JWT (1hr expiry)
    Pod->>GCP STS: Exchange JWT for access token
    GCP STS->>GCP STS: Validate JWT signature
    GCP STS->>Pod: Return GCP access token
    Pod->>GCP API: Call API with access token
    GCP API->>Pod: Return data

    %% Ghostty Hardcore Theme
    style K8s API fill:#2D4263
    style GCP STS fill:#4A7A8C
    style GCP API fill:#6B8E9F

Implementation Guide

This guide is split into focused modules:

Setup

Application Integration

Operations

Quick Start

# 1. Enable Workload Identity on cluster
gcloud container clusters update my-cluster \
  --workload-pool=PROJECT_ID.svc.id.goog \
  --zone us-central1-a

# 2. Create Kubernetes ServiceAccount
kubectl create serviceaccount app-sa -n production

# 3. Create GCP service account
gcloud iam service-accounts create app-gcp \
  --display-name "App workload identity"

# 4. Grant GCP permissions
gcloud projects add-iam-policy-binding PROJECT_ID \
  --member="serviceAccount:app-gcp@PROJECT_ID.iam.gserviceaccount.com" \
  --role="roles/storage.objectViewer"

# 5. Bind Kubernetes SA to GCP SA
gcloud iam service-accounts add-iam-policy-binding \
  app-gcp@PROJECT_ID.iam.gserviceaccount.com \
  --role="roles/iam.workloadIdentityUser" \
  --member="serviceAccount:PROJECT_ID.svc.id.goog[production/app-sa]"

# 6. Annotate Kubernetes ServiceAccount
kubectl annotate serviceaccount app-sa \
  -n production \
  iam.gke.io/gcp-service-account=app-gcp@PROJECT_ID.iam.gserviceaccount.com

# 7. Deploy pod with annotated ServiceAccount
kubectl apply -f deployment.yaml

Verification

Test authentication from inside a pod:

kubectl run -it --image=google/cloud-sdk:slim test-wi \
  --serviceaccount=app-sa \
  -n production \
  -- gcloud auth list

Benefits

Security

  • No static credentials: Tokens expire automatically
  • Immediate revocation: Disable service account, access stops
  • Audit trail: Cloud Audit Logs track all impersonation
  • Least privilege: Fine-grained IAM per workload

Operations

  • Zero key management: No rotation, no storage, no exposure
  • Simplified onboarding: Annotate ServiceAccount, deploy
  • Cross-project access: Impersonate service accounts in other projects
  • External identity: GitHub Actions, external OIDC providers

Common Mistakes

  • Forgetting to annotate the Kubernetes ServiceAccount
  • Using wrong format in IAM binding (serviceAccount:PROJECT_ID.svc.id.goog[NAMESPACE/SA_NAME])
  • Not granting roles/iam.workloadIdentityUser role
  • Metadata server enabled on nodes (workloadMetadataConfig.mode must be GKE_METADATA)

Migration from Service Account Keys

Before (Static Keys)

# Kubernetes Secret with private key
apiVersion: v1
kind: Secret
metadata:
  name: app-sa-key
type: Opaque
stringData:
  key.json: |
    {
      "type": "service_account",
      "private_key": "-----BEGIN RSA PRIVATE KEY-----\n..."
    }

Problems:

  • Key never expires
  • If leaked, must manually revoke and rotate
  • Stored in cluster (potential exposure)
  • No audit trail of usage

After (Workload Identity)

# Kubernetes ServiceAccount with annotation
apiVersion: v1
kind: ServiceAccount
metadata:
  name: app-sa
  annotations:
    iam.gke.io/gcp-service-account: app-gcp@PROJECT_ID.iam.gserviceaccount.com

Benefits:

  • Token expires every hour (automatic rotation)
  • Revoke by disabling GCP service account
  • No secrets stored in cluster
  • Full audit trail in Cloud Audit Logs

See Migration Guide for detailed migration steps.

Use Cases

Cloud Storage Access

from google.cloud import storage

# Credentials automatic
client = storage.Client(project='PROJECT_ID')
bucket = client.bucket('my-bucket')
blob = bucket.blob('data.txt')
blob.download_to_filename('data.txt')

Secret Manager Access

from google.cloud import secretmanager

client = secretmanager.SecretManagerServiceClient()
secret_name = f"projects/PROJECT_ID/secrets/api-key/versions/latest"
response = client.access_secret_version(request={"name": secret_name})
api_key = response.payload.data.decode('UTF-8')

Cross-Project Access

# SERVICE_ACCOUNT_A in PROJECT_A can impersonate SERVICE_ACCOUNT_B in PROJECT_B
gcloud iam service-accounts add-iam-policy-binding \
  service-account-b@PROJECT_B.iam.gserviceaccount.com \
  --role="roles/iam.serviceAccountUser" \
  --member="serviceAccount:service-account-a@PROJECT_A.iam.gserviceaccount.com"

References

Workload Identity eliminates static keys. Tokens rotate automatically. Access revokes immediately. Audit trail complete. Zero-trust credential model in place.

Comments