Your team wants to centrally manage GCP IAM permissions from their on-premises Active Directory Service. Your team wants to manage permissions by AD group membership. What should your team do to meet these requirements?
A.
Set up Cloud Directory Sync to sync groups, and set IAM permissions on the groups.
B.
Set up SAML 2.0 Single Sign-On (SSO), and assign IAM permissions to the groups.
C.
Use the Cloud Identity and Access Management API to create groups and IAM permissions from Active Directory.
D.
Use the Admin SDK to create groups and assign IAM permissions from Active Directory.
Correct Answer is A as explained here https://www.udemy.com/course/google-security-engineer-certification/?referralCode=E90E3FF49D9DE15E2855
"In order to be able to keep using the existing identity management system, identities need to be synchronized between AD and GCP IAM. To do so google provides a tool called Cloud Directory Sync. This tool will read all identities in AD and replicate those within GCP.
Once the identities have been replicated then it's possible to apply IAM permissions on the groups. After that you will configure SAML so google can act as a service provider and either you ADFS or other third party tools like Ping or Okta will act as the identity provider. This way you effectively delegate the authentication from Google to something that is under your control."
Explanation:
Cloud Directory Sync (CDS) is the crucial first step. It's the mechanism that synchronizes your on-premises Active Directory groups with your Google Cloud environment. This allows GCP to recognize and utilize the group structures already defined in your AD.
Once the groups are synced, you can then:
Create IAM roles with the appropriate permissions for your GCP resources.
Grant those IAM roles to the synced AD groups. This effectively ties your existing AD group structure directly to the authorization levels within your GCP environment.
Why SAML 2.0 SSO alone is insufficient:
While SAML 2.0 SSO is essential for single sign-on capabilities (allowing users to access GCP with their existing AD credentials), it doesn't directly address the core requirement: managing GCP IAM permissions based on existing AD group memberships.
Correct Answer is A. The keyword is on-prem AD groups which can be synced using Google Dir Sync which then you can apply IAM roles in it.. Without Google Dir Sync, how can you pull the on-prem AD groups? Without it, SSO solution will not work.
Answer is A. GCP Cloud Skills Boost has an exact example on this using the fictitious bank called Cymbal Bank, and clearly call out the GCDS process to push Microsoft AD/LDAP into established Users and Groups in your GCP identity domain
Using third-party IDP connectors for sync
Many identity management vendors (such as Ping and Okta) provide a connector for G Suite and Cloud Identity Global Directory, which sync changes to users via the Admin SDK Directory API.
The identity providers control usernames, passwords and other information used to identify, authenticate and authorize users for web applications that Google hosts—in this context, it’s the GCP console. There are a number of existing open source and commercial identity provider solutions that can help you implement SSO with Google. (Read more about SAML-based federated SSO if you’re interested in using Google as the identity provider.)
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
droogie
Highly Voted 4 years, 3 months agojohnsm
Highly Voted 3 years, 8 months agogoat112
Most Recent 4 months agoManuelY
5 months, 4 weeks agoPleeO
6 months agocloud_monk
7 months, 3 weeks agoK3rber0s
10 months, 1 week agof1veo
1 year, 4 months agoejlp
1 year, 5 months agoPachuco
1 year, 8 months agoDevXr
1 year, 10 months agoshayke
1 year, 10 months agoMeyucho
1 year, 11 months agoPremumar
2 years agothoadmin
2 years, 1 month agoMeyucho
2 years, 1 month agoGCP72
2 years, 2 months ago