Skip to main content

Generate Google Service Account tokens with your YubiKey

Project description

google-yubikey

Generate Google Service Account tokens with your YubiKey!

Motivation

This is perhaps the most secure way to use Google Service Account credentials outside of Google Cloud, since the private key never leaves the device, and so it cannot be leaked or stolen without physically stealing the YubiKey.

Additionally, each operation is protected with a YubiKey PIN, providing a 2nd factor of authentication as something a user knows (in addition to something a user has, which is the YubiKey itself).

In this way, a single YubiKey can represent the identity of a user across many Service Accounts, without the need to send the private key material over the wire at any point.

This makes it even more secure than Service Account impersonation, where a user's long-term refresh token has been traditionally stored on their machine, and could thus be compromised.

Requirements

YubiKey 4+

Setup

pip3 install google-yubikey

Usage

  1. Set up YubiKey PIN, as explained here.

  2. Run this only once to set up a private key on the YubiKey, or to renew it after expiration:

    google-yubikey generate-key > yubikey.pem
    

    The output yubikey.pem above is public - to be used in the next step.

  3. Install Google Cloud SDK and run:

    gcloud auth login
    gcloud beta iam service-accounts keys upload yubikey.pem \
        --iam-account <service_account_email>
    gcloud auth revoke # optional, but recommended
    

    This is needed only for setting up YubiKey with a Service Account. Your user account must have at least Service Account Key Admin role or iam.serviceAccountKeys.create permission on the target Service Account(s).

    As a good practice, the last command revokes your Google Cloud SDK credentials, which limits the potential for their exposure only to the time of the public key upload.

    Alernatively to step 3, you can upload yubikey.pem from step 2 via Google Cloud Console for the target Service Account(s).

  4. Run this every time you'd like to generate a Service Account token:

    google-yubikey token -a <service_account_email>
    

    By default, this command will generate a Google OAuth 2.0 access token. You can also generate an ID token using -t id.

    The command prints the token to standard output, so it can be easily assigned to a variable for integration into your scripts.

  5. Further customization options are available through:

    google-yubikey [<command>] -h
    

Disclaimer

This tool is still early on in the development. It works, but may have unusual edge cases that make it fail for your setup. Please use with caution, and raise an issue if you come across one.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

google-yubikey-0.3.2.tar.gz (7.2 kB view hashes)

Uploaded Source

Built Distribution

google_yubikey-0.3.2-py3-none-any.whl (6.8 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page