Mantenha tudo organizado com as coleções
Salve e categorize o conteúdo com base nas suas preferências.
A API Identity and Access Management (IAM) usa recursos personalizados do Kubernetes
para gerenciar o controle de acesso dos provedores de identidade.
Para usar a API IAM, use o console do GDC. Se
o aplicativo usar suas próprias bibliotecas para chamar a API, adote o endpoint de serviço
de exemplo na seção a seguir e a
definição completa da API para criar suas solicitações.
Endpoint de serviço e documento de descoberta
O endpoint de API da API IAM é
https://MANAGEMENT_API_SERVER_ENDPOINT/apis/iam.gdc.goog/v1,
em que MANAGEMENT_API_SERVER_ENDPOINT é o endpoint do
servidor da API Management.
Usando o comando kubectl proxy, acesse o URL no navegador para
receber o documento de descoberta da API IAM. O comando kubectl proxy abre
um proxy em 127.0.0.1:8001 para o servidor da API Kubernetes na sua máquina
local. Quando esse comando estiver em execução, acesse o documento no seguinte URL:
http://127.0.0.1:8001/apis/iam.gdc.goog/v1
[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Informações incorretas ou exemplo de código","incorrectInformationOrSampleCode","thumb-down"],["Não contém as informações/amostras de que eu preciso","missingTheInformationSamplesINeed","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-09-04 UTC."],[[["\u003cp\u003eThe Identity and Access Management (IAM) API leverages Kubernetes custom resources to manage access control for identity providers.\u003c/p\u003e\n"],["\u003cp\u003eThe IAM API is accessible through the GDC console, or you can use your own libraries, adopting the example service endpoint and full API definition to build requests.\u003c/p\u003e\n"],["\u003cp\u003eThe IAM API endpoint is located at \u003ccode\u003ehttps://\u003c/code\u003e\u003cvar translate=no\u003eGDCH_API_SERVER_ENDPOINT\u003c/var\u003e\u003ccode\u003e/apis/iam.gdc.goog/v1\u003c/code\u003e, where \u003cvar translate=no\u003eGDCH_API_SERVER_ENDPOINT\u003c/var\u003e represents the GDC API server endpoint.\u003c/p\u003e\n"],["\u003cp\u003eThe discovery document for the IAM API can be obtained by using the \u003ccode\u003ekubectl proxy\u003c/code\u003e command and then accessing \u003ccode\u003ehttp://127.0.0.1:8001/apis/iam.gdc.goog/v1\u003c/code\u003e in your browser.\u003c/p\u003e\n"]]],[],null,["# Identity and Access Management API overview\n\nThe Identity and Access Management (IAM) API uses Kubernetes custom resources\nto manage the control access for identity providers.\n\nTo use the IAM API, use the GDC console. If\nyour application uses your own libraries to call the API, adopt the example\nservice endpoint in the following section, and the\n[full API definition](./identity-v1) to build your requests.\n\nService endpoint and discovery document\n---------------------------------------\n\nThe API endpoint for the IAM API is\n`https://`\u003cvar translate=\"no\"\u003eMANAGEMENT_API_SERVER_ENDPOINT\u003c/var\u003e`/apis/iam.gdc.goog/v1`,\nwhere \u003cvar translate=\"no\"\u003eMANAGEMENT_API_SERVER_ENDPOINT\u003c/var\u003e is the endpoint of\nthe Management API server.\n\nUsing the `kubectl proxy` command, access the URL in your browser to\nobtain the discovery document for the IAM API. The `kubectl proxy` command opens\nup a proxy on `127.0.0.1:8001` to the Kubernetes API server on your local\nmachine. Once that command is running, access the document at the\nfollowing URL:\n`http://127.0.0.1:8001/apis/iam.gdc.goog/v1`\n\nExample resources\n-----------------\n\nThe following is a sample resource: \n\n apiVersion: iam.gdc.goog/v1\n kind: IdentityProviderConfig\n metadata:\n name: example-provider\n namespace: platform\n spec:\n - oidc:\n clientID: clientID\n clientSecret: clientSecret\n groupPrefix: example-\n groupsClaim: groups\n issuerURI: https://test-oidc-provider.example.com\n scopes: openid email profile\n userClaim: user-email@example.com\n userPrefix: example-"]]