Infitialis Blog

View me on GitHub

GCP Service Accounts for External OAuth2

12 Jun 2020

Recently we had a requirement to integrate with a partner that was using their own OAuth2 infrastructure, which required us to use a public/private key pair and signed JWTs, equivalent of Google’s 2LO (2-legged) OAuth2 with their service accounts.

Keeping the public / private key pairs secure in a production environment can be hard, combined with the administration overhead of managing the key pairs in the first place (generating them, distributing them and ensuring they aren’t shared outside of the required environment, plus rotating them if required).

Google have already made this super easy for their internal OAuth2 implementation by using service accounts for managed workloads, which are managed identities that relate to automatically generated key pairs, stored securely that we don’t actually have access to (most of the time).

Running on App Engine, we already use the default service account extensively via the metadata server to identity ourselves to and authenticate with (e.g. OIDC tokens) other services, without really having to think about it.

We had a breakthrough that we could use these Google managed keys with the external OAuth2 provider, signing our JWTs using the signBlob function of the Service Account Credentials API, a part of IAM.

Since it’s already designed to work with OAuth2, it already supported everything our other provider was using: 2048bit RSA keys and SHA256 signatures (RS256), plus a public endpoint exposing the public key in JWK format as a JWKS:

  • RSA public key wrapped in an X.509 v3 certificate: https://www.googleapis.com/service_accounts/v1/metadata/x509/{ACCOUNT_EMAIL}
  • Raw key in JSON format: https://www.googleapis.com/service_accounts/v1/metadata/raw/{ACCOUNT_EMAIL}
  • JSON Web Key (JWK): https://www.googleapis.com/service_accounts/v1/metadata/jwk/{ACCOUNT_EMAIL}

We were doing this in PHP, so we chose to use the JWT library by lcobucci and I wrote a custom signer for that library, that wrapped the Google API.

Here is an excerpt from that code:

$client = new Google_Client();

$client->setApplicationName('GaeSupportLaravel-JWT/0.1');
$client->useApplicationDefaultCredentials();
$client->addScope('https://www.googleapis.com/auth/cloud-platform');

$service = new Google_Service_IAMCredentials($client);

$keyID = sprintf('projects/-/serviceAccounts/%s', $key->getContent());

$requestBody = new Google_Service_IAMCredentials_SignBlobRequest();

$requestBody->setPayload(base64_encode($payload));

$response = $service->projects_serviceAccounts->signBlob($keyID, $requestBody);

return base64_decode($response->getSignedBlob());

An example of this in action as a Lumen route handler is shown below:

$router->get('/debug/jwt', function () use ($router) {
    $time = time();

    $signer = new \A1comms\GaeSupportLaravel\Integration\JWT\Signer\IAMSigner();

    // DEMO_SERVICE_ACCOUNT must be defined in .env as the name of the service account,
    // e.g. [email protected]
    $keyID = new \Lcobucci\JWT\Signer\Key(env('DEMO_SERVICE_ACCOUNT'));

    $token = (new \Lcobucci\JWT\Builder())
        ->issuedBy('demoIss')       // Configures the issuer (iss claim)
        ->permittedFor('demoAud')   // aud claim
        ->relatedTo('demoSub')      // sub claim
        ->issuedAt($time)           // Configures the time that the token was issue (iat claim)
        ->expiresAt($time + 3600)   // Configures the expiration time of the token (exp claim)
        ->getToken($signer, $keyID);

    \Log::info('Signed JWT POC: ' . var_export((string)$token, true));

    return 'OK';
});

You’ll also need to run these composer commands (assuming you already have GaeSupportLaravel included):

$ composer require lcobucci/jwt
$ composer require google/apiclient:"^2.0"

EDIT:

While it wasn’t documented (only hinted at by saying you are required to think about your own key rotation when using downloaded keys for your service account), our experience of using this in production suggests Google are automatically rotating these service account key pairs roughly every 15 days.

This means it’s important you are verifying against their JWKS (or other) endpoint, not storing the public key statically, as we had done while testing.