🌐
HashiCorp
developer.hashicorp.com › hashicorp cloud platform › documentation › hashicorp cloud platform › service principals › workload identity federation
Workload identity federation | HashiCorp Cloud Platform | HashiCorp Developer
September 5, 2025 - Workload identity federation enables external workloads to access HCP services through an external identity provider. Learn about workload identity federation, how it works, and how to use credential files.
🌐
HackerNoon
hackernoon.com › beyond-passwords-architecting-zero-trust-data-access-with-workload-identity
Beyond Passwords: Architecting Zero-Trust Data Access with Workload Identity | HackerNoon
1 month ago - Move beyond static passwords.As we move toward more decentralized systems, cryptographically proven identity becomes the only reliable anchor for trust
Discussions

GCloud workload-identity-pools providers create-oidc INVALID_ARGUMENT error
GCloud workload-identity-pools providers create-oidc INVALID_ARGUMENT error More on github.com
🌐 github.com
4
5
Workload Identity Federation (WIF) is one such gem, enabling secure, keyless authentication
Thanks for sharing. The last part with recommendations for GCP caught my attention. If there are other suggestions from the broader community around WIF, we're always open to listening. More on reddit.com
🌐 r/googlecloud
32
48
May 13, 2025
GitHub and workload-identity-pools providers create-oidc INVALID_ARGUMENT error
Hi All I am trying to set up things to be able to run Actions to query gcloud. As part of the set up, I have so far been able to Create a Workload Identity Pool but when I try to Create a Workload Identity Provider usi… More on discuss.google.dev
🌐 discuss.google.dev
1
0
September 21, 2024
google cloud platform - GKE workload identity pool VS workload identity pools from workload identity federation - Stack Overflow
Google docu says that workload identity could be used to authorise GKE pods to consume services provided by Google APIs (and it works fine). It also says that there would be one automatically created More on stackoverflow.com
🌐 stackoverflow.com
🌐
Datatonic
datatonic.com › insights › workload-identity-federation-google-cloud
Authenticating a Service Identity into Google Cloud with Workload Identity Federation
This is where Workload Identity Federation comes into the picture. Rather than creating a static API key that needs to be managed (both through updates and to ensure it doesn’t get exploited), we can configure Google Cloud to accept tokens that are authenticated by our external identity provider directly.
🌐
Google
docs.cloud.google.com › iam › identity and access management (iam) › best practices for using workload identity federation
Best practices for using Workload Identity Federation | Identity and Access Management (IAM) | Google Cloud Documentation
In these cases, check if an additional token exchange lets you convert the ambient credential into a type of credential that you can use for Workload Identity Federation. For example, if your application runs in an Active Directory environment, it might have access to Kerberos credentials. If you have an identity provider such as Active Directory Federation Services (AD FS) in your environment that supports Integrated Windows Authentication, you can use these Kerberos credentials to authenticate to the identity provider and obtain an OAuth access token that uses the JWT format.
🌐
CyberArk
docs.cyberark.com › mis-saas › vcs-platform › serviceaccounts › c-about-workload-identity-federation
What is workload identity federation? - Machine Identity Security Docs
Workload identity federation (WIF) allows your applications to securely authenticate with cloud services without having to manage and secure long-lived credentials (like passwords or API keys). Instead, it uses short-lived tokens obtained from a trusted Identity Provider (IdP).
🌐
Medium
medium.com › google-cloud › how-does-the-gcp-workload-identity-federation-work-with-github-provider-a9397efd7158
How does the GCP Workload Identity Federation work with Github Provider? | by Pradeep Kumar Singh | Google Cloud - Community | Medium
July 22, 2022 - Workload Identity Provider: Workload Identity Provider describes the relationship between an external identity such as Github and Google Cloud. It basically establishes trust between external identity and GCP.
🌐
GitHub
github.com › orgs › community › discussions › 139154
GCloud workload-identity-pools providers create-oidc ...
Failed to add the identity provider. Error code: 400. The attribute condition must reference one of the provider's claims. For more information, see https://cloud.google.com/iam/docs/workload-identity-federation-with-deployment-pipelines#conditions Tracking number: c7111599542253349
Find elsewhere
🌐
Security Boulevard
securityboulevard.com › home › security bloggers network › the trivy compromise: the fallacy of secrets management and the case for workload identity
The Trivy Compromise: The Fallacy of Secrets Management and the Case for Workload Identity - Security Boulevard
3 weeks ago - Kubernetes ServiceAccounts provide pod-level identity within a cluster and can be projected as OIDC tokens for federation with cloud IAM. This approach works well within a single cloud but requires federation for cross-cloud access. Implement workload identity federation with centralized policy.
🌐
Google Cloud
cloud.google.com › blog › products › identity-security › enable-keyless-access-to-gcp-with-workload-identity-federation
Enable keyless access to GCP with workload Identity Federation | Google Cloud Blog
April 8, 2021 - Workload identity federation is a new keyless application authentication mechanism that allows your workloads running on-premises, in AWS, or in Azure to federate with an external Identity provider (IdP) and call Google Cloud resources without ...
🌐
Google
docs.cloud.google.com › iam › identity and access management (iam) › workload identity federation
Workload Identity Federation | Identity and Access Management (IAM) | Google Cloud Documentation
You can use Workload Identity Federation with workloads that authenticate using X.509 client certificates; that run on Amazon Web Services (AWS) or Azure; on-premises Active Directory; deployment services, such as GitHub and GitLab; and with any identity provider (IdP) that supports OpenID Connect (OIDC) or Security Assertion Markup Language (SAML) V2.0.
🌐
Firefly
firefly.ai › academy › setting-up-workload-identity-federation-between-github-actions-and-google-cloud-platform
Firefly | Setting Up Workload Identity Federation Between GitHub Actions and Google Cloud Platform
With the pool created, the next step is to configure your external identity provider, in this case, GitHub. GitHub will issue identity tokens to authenticate users or workflows, which will then be validated by Google Cloud. Go to the Workload Identity Pools section and click on Add Provider.
🌐
GitLab
docs.gitlab.com › integration › google_cloud_iam
Google Cloud Workload Identity Federation and IAM policies | GitLab Docs
In the Display name column, select your workload identity pool. In the Providers section, next to the workload identity provider you want to edit, select Edit ( ) to open Provider details.
🌐
Reddit
reddit.com › r/googlecloud › workload identity federation (wif) is one such gem, enabling secure, keyless authentication
r/googlecloud on Reddit: Workload Identity Federation (WIF) is one such gem, enabling secure, keyless authentication
May 13, 2025 -

Google Cloud Platform (GCP) offers a robust set of tools, but some of its most powerful features remain underutilized due to lackluster marketing and sparse documentation. Workload Identity Federation (WIF) is one such gem, enabling secure, keyless authentication for external systems like GitHub Actions to access GCP APIs without the risks of long-lived credentials like service account keys.

https://medium.com/@rasvihostings/gcp-workload-identity-federation-1a0be28722d4

🌐
Microsoft Learn
learn.microsoft.com › en-us › entra › workload-id › workload-identity-federation
Workload Identity Federation - Microsoft Entra Workload ID | Microsoft Learn
You use workload identity federation to configure a user-assigned managed identity or app registration in Microsoft Entra ID to trust tokens from an external identity provider (IdP), such as GitHub or Google.
🌐
Google Cloud
cloud.google.com › workforce-identity-federation
Workforce Identity Federation | Google Cloud
Supports multiple identity protocols like OpenID Connect (OIDC) or SAML 2.0 and multiple identity providers (IdPs) per identity pool including Okta, Ping Identity, Active Directory Federation Services, and Azure Active Directory.
Top answer
1 of 2
4

Finding correct name to product is sometime difficult. 2 very similar name for 2 different products. -> That's your mistake.


Workload Identity is a GKE Addon. Before going deeper, you have to know that, on Google Cloud Platform, you don't need to use service account key file because the service account are automatically loaded on every services (Compute Engine, App Engine, Cloud Run, Cloud Function, Cloud Build,...) and accessible through the metadata server . The Google Cloud client libraries automatically detect the environment and use the metadata server if present.

The problem with GKE is that you can run container on several different Compute Engine instances (the nodes) and your different service (K8S services) can have different level of authorization. If you rely on the Compute Engine service account (default behavior without the Workload identity addon), all the pods on the same instances use the same service account (and thus have the same permissions).

To solve that, the Workload Identity addon creates a proxy that intercept the metadata server calls and reply with the correct bind service account for this pods/service on GKE


Workload identity pool is totally different. The principle is to configure third party identity providers (such as AWS, Okta, or even custom) and to define the conditions to accept the third party token (email, claims,...).

When the token is accepted, you can perform a call to impersonate a service account, and thus generate a new token (a Google compliant one this time), that you will be able to use in subsequent calls.

The principle here is to avoid to use service account key file, and to rely on third party identity provider to interact with GCP. For example, on AWS you need to call BigQuery, you can create a token with Workload identity pool and your AWS identity and then call BigQuery without the need to exchanges secrets between the platforms.

Note: the best way to keep a secret secure is not to have secret!

2 of 2
1

My guess is that historically Google started with GKE Workload Identity as a GKE-specific feature a came to a generic approach titled Workload Identity Federation. Both approaches allow you to create access bindings for external identities but use slightly different syntax. Again, I guess they started with GKE and then came to more generic and flexible scheme.

Another platforms, like AWS or Azure do the same k8s magic with Workload Identity Federation feature.

🌐
GitLab
docs.gitlab.com › ci › cloud_services › google_cloud
Configure OpenID Connect with GCP Workload Identity Federation | GitLab Docs
POOL_ID is the ID of the workload identity pool created in the first section. PROVIDER_ID is the ID of the workload identity provider created in the second section.