Exchanges a credential for a Google OAuth 2.0 access token. The token asserts an external identity within an identity pool, or it applies a Credential Access Boundary to a Google access token. Note that workforce pools do not support Credential Access Boundaries. When you call this method, do not send the Authorization
HTTP header in the request. This method does not require the Authorization
header, and using the header can cause the request to fail.
Required Request Value
The request value is a data-structure with various fields. Each field may be a simple scalar or another data-structure. In the latter case it is advised to set the field-cursor to the data-structure's field to specify values more concisely.
For example, a structure like this:
GoogleIdentityStsV1ExchangeTokenRequest:
audience: string
grant-type: string
options: string
requested-token-type: string
scope: string
subject-token: string
subject-token-type: string
can be set completely with the following arguments which are assumed to be executed in the given order. Note how the cursor position is adjusted to the respective structures, allowing simple field names to be used most of the time.
-r . audience=takimata
- The full resource name of the identity provider; for example:
//iam.googleapis.com/projects//locations/global/workloadIdentityPools//providers/
for workload identity pool providers, or//iam.googleapis.com/locations/global/workforcePools//providers/
for workforce pool providers. Required when exchanging an external credential for a Google access token.
- The full resource name of the identity provider; for example:
grant-type=amet.
- Required. The grant type. Must be
urn:ietf:params:oauth:grant-type:token-exchange
, which indicates a token exchange.
- Required. The grant type. Must be
options=duo
- A set of features that Security Token Service supports, in addition to the standard OAuth 2.0 token exchange, formatted as a serialized JSON object of Options. The size of the parameter value must not exceed 4096 characters.
requested-token-type=ipsum
- Required. An identifier for the type of requested security token. Must be
urn:ietf:params:oauth:token-type:access_token
.
- Required. An identifier for the type of requested security token. Must be
scope=gubergren
- The OAuth 2.0 scopes to include on the resulting access token, formatted as a list of space-delimited, case-sensitive strings. Required when exchanging an external credential for a Google access token.
subject-token=lorem
- Required. The input token. This token is either an external credential issued by a workload identity pool provider, or a short-lived access token issued by Google. If the token is an OIDC JWT, it must use the JWT format defined in RFC 7523, and the
subject_token_type
must be eitherurn:ietf:params:oauth:token-type:jwt
orurn:ietf:params:oauth:token-type:id_token
. The following headers are required: -kid
: The identifier of the signing key securing the JWT. -alg
: The cryptographic algorithm securing the JWT. Must beRS256
orES256
. The following payload fields are required. For more information, see RFC 7523, Section 3: -iss
: The issuer of the token. The issuer must provide a discovery document at the URL/.well-known/openid-configuration
, where` is the value of this field. The document must be formatted according to section 4.2 of the [OIDC 1.0 Discovery specification](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfigurationResponse). -
iat: The issue time, in seconds, since the Unix epoch. Must be in the past. -
exp: The expiration time, in seconds, since the Unix epoch. Must be less than 48 hours after
iat. Shorter expiration times are more secure. If possible, we recommend setting an expiration time less than 6 hours. -
sub: The identity asserted in the JWT. -
aud: For workload identity pools, this must be a value specified in the allowed audiences for the workload identity pool provider, or one of the audiences allowed by default if no audiences were specified. See https://cloud.google.com/iam/docs/reference/rest/v1/projects.locations.workloadIdentityPools.providers#oidc. For workforce pools, this must match the client ID specified in the provider configuration. See https://cloud.google.com/iam/docs/reference/rest/v1/locations.workforcePools.providers#oidc. Example header: ``` { "alg": "RS256", "kid": "us-east-11" } ``` Example payload: ``` { "iss": "https://accounts.google.com", "iat": 1517963104, "exp": 1517966704, "aud": "//iam.googleapis.com/projects/1234567890123/locations/global/workloadIdentityPools/my-pool/providers/my-provider", "sub": "113475438248934895348", "my_claims": { "additional_claim": "value" } } ``` If
subject_tokenis for AWS, it must be a serialized
GetCallerIdentitytoken. This token contains the same information as a request to the AWS [
GetCallerIdentity()](https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity) method, as well as the AWS [signature](https://docs.aws.amazon.com/general/latest/gr/signing_aws_api_requests.html) for the request information. Use Signature Version 4. Format the request as URL-encoded JSON, and set the
subject_token_typeparameter to
urn:ietf:params:aws:token-type:aws4_request. The following parameters are required: -
url: The URL of the AWS STS endpoint for
GetCallerIdentity(), such as
https://sts.amazonaws.com?Action=GetCallerIdentity&Version=2011-06-15. Regional endpoints are also supported. -
method: The HTTP request method:
POST. -
headers: The HTTP request headers, which must include: -
Authorization: The request signature. -
x-amz-date: The time you will send the request, formatted as an [ISO8601 Basic](https://docs.aws.amazon.com/general/latest/gr/sigv4_elements.html#sigv4_elements_date) string. This value is typically set to the current time and is used to help prevent replay attacks. -
host: The hostname of the
urlfield; for example,
sts.amazonaws.com. -
x-goog-cloud-target-resource: The full, canonical resource name of the workload identity pool provider, with or without an
https:prefix. To help ensure data integrity, we recommend including this header in the
SignedHeadersfield of the signed request. For example: //iam.googleapis.com/projects//locations/global/workloadIdentityPools//providers/ https://iam.googleapis.com/projects//locations/global/workloadIdentityPools//providers/ If you are using temporary security credentials provided by AWS, you must also include the header
x-amz-security-token, with the value set to the session token. The following example shows a
GetCallerIdentitytoken: ``` { "headers": [ {"key": "x-amz-date", "value": "20200815T015049Z"}, {"key": "Authorization", "value": "AWS4-HMAC-SHA256+Credential=$credential,+SignedHeaders=host;x-amz-date;x-goog-cloud-target-resource,+Signature=$signature"}, {"key": "x-goog-cloud-target-resource", "value": "//iam.googleapis.com/projects//locations/global/workloadIdentityPools//providers/"}, {"key": "host", "value": "sts.amazonaws.com"} . ], "method": "POST", "url": "https://sts.amazonaws.com?Action=GetCallerIdentity&Version=2011-06-15" } ``` If the token is a SAML 2.0 assertion, it must use the format defined in [the SAML 2.0 spec](https://www.oasis-open.org/committees/download.php/56776/sstc-saml-core-errata-2.0-wd-07.pdf), and the
subject_token_typemust be
urn:ietf:params:oauth:token-type:saml2. See [Verification of external credentials](https://cloud.google.com/iam/docs/using-workload-identity-federation#verification_of_external_credentials) for details on how SAML 2.0 assertions are validated during token exchanges. You can also use a Google-issued OAuth 2.0 access token with this field to obtain an access token with new security attributes applied, such as a Credential Access Boundary. In this case, set
subject_token_typeto
urn:ietf:params:oauth:token-type:access_token`. If an access token already contains security attributes, you cannot apply additional security attributes.
- Required. The input token. This token is either an external credential issued by a workload identity pool provider, or a short-lived access token issued by Google. If the token is an OIDC JWT, it must use the JWT format defined in RFC 7523, and the
subject-token-type=gubergren
- Required. An identifier that indicates the type of the security token in the
subject_token
parameter. Supported values areurn:ietf:params:oauth:token-type:jwt
,urn:ietf:params:oauth:token-type:id_token
,urn:ietf:params:aws:token-type:aws4_request
,urn:ietf:params:oauth:token-type:access_token
, andurn:ietf:params:oauth:token-type:saml2
.
- Required. An identifier that indicates the type of the security token in the
About Cursors
The cursor position is key to comfortably set complex nested structures. The following rules apply:
- The cursor position is always set relative to the current one, unless the field name starts with the
.
character. Fields can be nested such as in-r f.s.o
. - The cursor position is set relative to the top-level structure if it starts with
.
, e.g.-r .s.s
- You can also set nested fields without setting the cursor explicitly. For example, to set a value relative to the current cursor position, you would specify
-r struct.sub_struct=bar
. - You can move the cursor one level up by using
..
. Each additional.
moves it up one additional level. E.g....
would go three levels up.
Optional Output Flags
The method's return value a JSON encoded structure, which will be written to standard output by default.
- -o out
- out specifies the destination to which to write the server's result to.
It will be a JSON-encoded structure.
The destination may be
-
to indicate standard output, or a filepath that is to contain the received bytes. If unset, it defaults to standard output.
- out specifies the destination to which to write the server's result to.
It will be a JSON-encoded structure.
The destination may be
Optional General Properties
The following properties can configure any call, and are not specific to this method.
-
-p $-xgafv=string
- V1 error format.
-
-p access-token=string
- OAuth access token.
-
-p alt=string
- Data format for response.
-
-p callback=string
- JSONP
-
-p fields=string
- Selector specifying which fields to include in a partial response.
-
-p key=string
- API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.
-
-p oauth-token=string
- OAuth 2.0 token for the current user.
-
-p pretty-print=boolean
- Returns response with indentations and line breaks.
-
-p quota-user=string
- Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters.
-
-p upload-type=string
- Legacy upload protocol for media (e.g. "media", "multipart").
-
-p upload-protocol=string
- Upload protocol for media (e.g. "raw", "multipart").