Skip to main content

SecureAuth on Google Cloud Platform (GCP) Quickstart

Get started with SecureAuth deployment on Google Cloud Platform (GCP) with Kubernetes and Helm Charts.

Google Cloud Platform and Google Kubernetes Engine

Google Cloud Platform (GCP) and its Google Kubernetes Engine (GKE) allow to deploy, manage, and scale containerized applications to a Kubernetes cluster using Google infrastructure. Running clusters with GKE provides additional benefits such as:

  • Google Cloud's load balancing

  • Node pools to designate subsets of nodes within a cluster

  • Autoscaling of cluster's node instances count

  • Autoupgrades and autorepairs for nodes

  • and more.

If you are running your infrastructure on GCP, why not run the SecureAuth platform and all its components as part of it?

SecureAuth on GCP

To set up the SecureAuth platform on GCP, you will:

  1. Set up all required dependencies such us PostgreSQL and Redis.

  2. Create and define your cluster.

  3. Install the SecureAuth platform.

  4. Optionally, install additional dependencies such as Fission or TimescaleDB.

SecureAuth and its dependencies are installed with Helm Charts - a package manager for K8s.

To learn more about SecureAuth and its deployment on Kubernetes, see Overview.

Set Up Required Dependencies

To set up required dependencies we will use GCP SQL Cloud service and GCP Memorystore. The SecureAuth platform requires two databases to work:

  • Either Cockroach or PostgreSQL database.

    Since GCP Cloud SQL Engine provides a possibility to integrate with MySQL, PostgreSQL, or SQL Server, in this article, we will set up a PostgreSQL database.

  • Redis database to store security tokens such as access tokens or refresh tokens.

Setup PostgreSQL

Note

You may need to enable this API the first time you will visit it.

  1. In GCP, go to Cloud SQL Engine.

    Navigate to GCP SQL
  2. Select Create instance.

    Create SQL instance
  3. Select PostgreSQL.

    Select GCP SQL
  4. Fill out PostgreSQL instance details.

    1. Type instance ID.

    2. Type or generate a password (remember to note it down, as it’ll be later required for connection to database).

    3. Select desired version of database version (the current recommended version is PostgresSQL 14).

    4. Choose region and zonal availability - for testing purposes, you can use a Single zone, but for production purposes, Highly available is recommended.

    5. Select desired Machine Type - for simple testing, Standard 1 vCPU, 3.75 GB is sufficient, but for production, we recommend that you decide based on SecureAuth .

    6. Select desired Storage - recommended type is SSD. For testing purposes, capacity 10 GB should be sufficient, but for production purposes follow SecureAuth sizing recommendations.

    7. The Connections section highly depends on your case. In most cases, if you want to improve security, we recommend selecting only Private IP with the associated network, then selecting the available Allocated IP range (the Kubernetes cluster that you own should be able to access instances within this network).

    8. The Backups setting is user-dependent. You can turn this setting off for testing purposes, but for production, turning it on is highly recommended.

    GCP SQL settings
  5. Select Create instance at the bottom of the page.

  6. Wait for the database to start.

    GCP SQL Select
  7. Note IP address assigned to access database.

    GCP SQL Select

Set Up Redis

Note

You may need to enable this API the first time you will visit it.

  1. In GCP, go to Memorystore.

    GCP SQL Select
  2. Select Create instance.

    GCP SQL Select
  3. Fill out Redis instance details.

    1. Provide an Instance ID.

    2. Define the Display name for your Redis instance.

    3. Select Tier Selection. You can use the Basic tier for testing purposes, but the Standard tier is recommended for production purposes.

    4. Select desired Capacity. For testing purposes, 1GB is enough for the non-production environment. The desired capacity is highly dependent on specific use cases handled by SecureAuth and the number of tokens that are to be stored.

    5. Select desired Choose region and zonal availability.

    6. In Set up connection, select your desired private network.

    7. Optionally, if you want to increase security, you can select the Enable AUTH option in the Security section. Note that Enable in-transit encryption enables TLS for Redis, and you will need to extend its configuration to handle the TCL connection with certificate.

    8. In the Configuration section, select a desired Redis version. We recommend using Redis 7.x, but, currently, GCP only supports versions up to 6.x).

    GCP SQL Select
  4. Select Create instance at the bottom of the page.

  5. Wait for the Memorystore to finish creating.

    GCP SQL Select
  6. Select created Redis instance.

  7. Note Primary Endpoint.

  8. If you enabled AUTH in step #3.7, note Auth String as well.

Create Kubernetes Cluster

In this section, we’ll deploy the cluster using GCP Autopilot. In case You want to deploy a Standard cluster, follow the official GCP documentation for Standard clusters.

Prerequisites

Public Cluster

The simplest option is to create a public cluster in your desired region:

gcloud container clusters create-auto cloudentity-dev \
  --region $REGION \
  --network=$PRIVATE_CLUSTER_NETWORK \
  --subnetwork=cloudentity-usw1            

Private Cluster

In case you want to improve the security and restrict nodes' access to the internet, you can create a private cluster:

gcloud container clusters create-auto cloudentity-dev \
  --region $REGION \
  --enable-private-nodes \
  --network=$PRIVATE_CLUSTER_NETWORK \
  --subnetwork=cloudentity-usw1            

To use SecureAuth with a private cluster, you need to set access to the docker registry (i.e., you can use GCP Artifact Registry ) and override the image registry image.repository in your SecureAuth helm deployment.

Get Credentials for Cluster

After the cluster finishes creating, execute the command below to generate the kubeconfig entry in order for kubectl getting access to your cluster:

gcloud container clusters get-credentials cloudentity-dev --region $REGION            

Deploy SecureAuth Platform to GCP

Setup Kubernetes Namespace

To set up a Kubernetes namespace for your SecureAuth deployment, execute the following commands:

kubectl create namespace acp-system
kubectl create secret docker-registry docker.cloudentity.io \
  --namespace acp-system \
  --docker-server=docker.cloudentity.io \
  --docker-username="$DOCKER_USR" \
  --docker-password="$DOCKER_PWD"            

Install SecureAuth

To install the SecureAuth platform, prepare a values.yaml file with your SecureAuth deployment configuration. If you need, refer to the Advanced Configuration section. You may use the default values.yaml file, but you need to define the address for your Redis instance and an url for your PostgreSQL database.

Example of minimal values.yaml file:

redis:
  address:
  - $REDIS_ADDRESS:6379
sql:
  url: postgres://$PG_USR:$PG_PWD@$PG_ADDRESS:5432/$DATABASE?sslmode=disable            

Once done with configuring the values.yaml file, execute the following command to install the SecureAuth with Helm Charts:

helm repo add acp https://charts.cloudentity.io
helm repo update
helm upgrade acp acp/acp --values ./values.yaml --namespace acp-system --timeout 5m --install            

Congratulations! Your SecureAuth platform instance is now up and running! If you want, you may now move to applying Advanced Configuration or installing Additonal Dependencies.

Install Additional Dependencies

Even though your SecureAuth deployment is up and running, to get it fully working you need to install some additional dependencies:

  • Fission to be able to execute SecureAuth Extensions in a secure environment

  • TimescaleDB to be able to store Audit Events.

Note

For GCP deployment, setting up Fission and TimescaleDB roles used to apply the Helm Charts requires the container.clusterRoles.create permission (i.e., part of Kubernetes Engine Admin role).

Fission

For instructions on how to install and configure fission, refer to the FaaS: Set Up Functions as a Service article.

TimescaleDB

For instructions on how to install and configure TimescaleDB, refer to the Set Up TimescaleDB for Storing Audit Data article.