Identity and Access Management (IAM) API는 Kubernetes 커스텀 리소스를 사용하여 ID 제공업체의 액세스 제어를 관리합니다.
IAM API를 사용하려면 GDC 콘솔을 사용하세요. 애플리케이션에서 자체 라이브러리를 사용하여 API를 호출하는 경우 다음 섹션의 서비스 엔드포인트 예시와 전체 API 정의를 채택하여 요청을 빌드하세요.
서비스 엔드포인트 및 검색 문서
IAM API의 API 엔드포인트는 https://MANAGEMENT_API_SERVER_ENDPOINT/apis/iam.gdc.goog/v1입니다. 여기서 MANAGEMENT_API_SERVER_ENDPOINT은 관리 API 서버의 엔드포인트입니다.
kubectl proxy 명령어를 사용하여 브라우저에서 URL에 액세스하여 IAM API의 검색 문서를 가져옵니다. kubectl proxy 명령어는 로컬 머신의 Kubernetes API 서버에 127.0.0.1:8001의 프록시를 엽니다. 명령어가 실행되면 다음 URL에서 문서에 액세스합니다.
http://127.0.0.1:8001/apis/iam.gdc.goog/v1
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[[["\u003cp\u003eThe Identity and Access Management (IAM) API leverages Kubernetes custom resources to manage access control for identity providers.\u003c/p\u003e\n"],["\u003cp\u003eThe IAM API is accessible through the GDC console, or you can use your own libraries, adopting the example service endpoint and full API definition to build requests.\u003c/p\u003e\n"],["\u003cp\u003eThe IAM API endpoint is located at \u003ccode\u003ehttps://\u003c/code\u003e\u003cvar translate=no\u003eGDCH_API_SERVER_ENDPOINT\u003c/var\u003e\u003ccode\u003e/apis/iam.gdc.goog/v1\u003c/code\u003e, where \u003cvar translate=no\u003eGDCH_API_SERVER_ENDPOINT\u003c/var\u003e represents the GDC API server endpoint.\u003c/p\u003e\n"],["\u003cp\u003eThe discovery document for the IAM API can be obtained by using the \u003ccode\u003ekubectl proxy\u003c/code\u003e command and then accessing \u003ccode\u003ehttp://127.0.0.1:8001/apis/iam.gdc.goog/v1\u003c/code\u003e in your browser.\u003c/p\u003e\n"]]],[],null,["# Identity and Access Management API overview\n\nThe Identity and Access Management (IAM) API uses Kubernetes custom resources\nto manage the control access for identity providers.\n\nTo use the IAM API, use the GDC console. If\nyour application uses your own libraries to call the API, adopt the example\nservice endpoint in the following section, and the\n[full API definition](./identity-v1) to build your requests.\n\nService endpoint and discovery document\n---------------------------------------\n\nThe API endpoint for the IAM API is\n`https://`\u003cvar translate=\"no\"\u003eMANAGEMENT_API_SERVER_ENDPOINT\u003c/var\u003e`/apis/iam.gdc.goog/v1`,\nwhere \u003cvar translate=\"no\"\u003eMANAGEMENT_API_SERVER_ENDPOINT\u003c/var\u003e is the endpoint of\nthe Management API server.\n\nUsing the `kubectl proxy` command, access the URL in your browser to\nobtain the discovery document for the IAM API. The `kubectl proxy` command opens\nup a proxy on `127.0.0.1:8001` to the Kubernetes API server on your local\nmachine. Once that command is running, access the document at the\nfollowing URL:\n`http://127.0.0.1:8001/apis/iam.gdc.goog/v1`\n\nExample resources\n-----------------\n\nThe following is a sample resource: \n\n apiVersion: iam.gdc.goog/v1\n kind: IdentityProviderConfig\n metadata:\n name: example-provider\n namespace: platform\n spec:\n - oidc:\n clientID: clientID\n clientSecret: clientSecret\n groupPrefix: example-\n groupsClaim: groups\n issuerURI: https://test-oidc-provider.example.com\n scopes: openid email profile\n userClaim: user-email@example.com\n userPrefix: example-"]]