Learn how to restrict access selected authenticated users with Identity-Aware Proxy without special programming. Discover how to retrieve user identity information from IAP.
Overview
Syllabus
- GSP499
- Overview
- Introduction
- Setup and requirements
- Task 1. Deploy the application and protect it with IAP
- Task 2. Access user identity information
- Task 3. Use Cryptographic Verification
- Congratulations!