Skip to main content

Generate Google Service Account tokens with your YubiKey

Project description

google-yubikey

Generate Google Service Account tokens with your YubiKey!

Motivation

This is perhaps the most secure way to use Google Service Account (SA) credentials outside of Google Cloud, since the private key never leaves the device, and so it cannot be leaked or stolen without physically stealing the YubiKey.

Additionally, each operation is protected with a YubiKey PIN, providing a 2nd factor of authentication as something a user knows (in addition to something a user has, which is the YubiKey itself).

In this way, a single YubiKey can represent the identity of a user across many SAs, without the need to send the private key material over the wire at any point.

This makes it even more secure than SA impersonation, where a user's long-term refresh token has been traditionally stored on their machine, and could thus be compromised.

Requirements

YubiKey 4+, FIPS and NEO

The key must have PIV feature to be eligible. For the specific list of compatible models, please see here and here.

Please note that the private key is stored on one of the available PIV certificate slots, which does NOT interfere with other functionality, like web 2FA authentication or OpenPGP. You can choose the slot freely (by default, it's 9a).

Setup

pip3 install google-yubikey

Usage

  1. Set up YubiKey PIN, as explained here.

  2. Run this only once to set up a private key on the YubiKey, or to renew it after expiration:

    google-yubikey generate-key > yubikey.pem
    

    The output yubikey.pem key above is public - to be used in the next step.

  3. Install Google Cloud SDK and run:

    gcloud auth login
    gcloud beta iam service-accounts keys upload yubikey.pem \
        --iam-account <service_account_email>
    gcloud auth revoke # optional, but recommended
    

    This is needed only for setting up YubiKey with a SA. Your user account must have at least Service Account Key Admin role or iam.serviceAccountKeys.create permission on the target SA(s).

    As a good practice, the last command revokes your Google Cloud SDK credentials, which limits the potential for their exposure only to the time of the public key upload.

    Alernatively to step 3, you can upload yubikey.pem from step 2 via Google Cloud Console for the target SA(s):

    Uploading existing key to Google Cloud Console

  4. Run this every time you'd like to generate a SA token:

    google-yubikey token -a <service_account_email>
    

    By default, this command will generate a Google OAuth 2.0 access token. You can also generate an ID token using -t id.

    The command prints the token to standard output, so it can be easily assigned to a variable for integration into your scripts.

  5. To use YubiKey for Google Cloud SDK or your existing applications, you can start a local metadata server that emulates Google Compute Engine (GCE) environment for token generation:

    sudo google_yubikey serve -a <service_account_email> -n <numeric_project_id>
    

    Unfortunately, this command needs to be run with elevated privileges, since it opens privileged port 80 on a link-local alias IP, to emulate GCE. However, according to security best practices, it drops privileges for the server workers.

    Once the server is running, you can use regular commands as if you were running them on a GCE instance (!), for example:

    gcloud auth revoke # revoke your user credentials first
    gcloud auth list
    gsutil ls
    docker run --rm -it google/cloud-sdk:alpine bq ls
    node server.js # your JavaScript app that uses Google client libraries
    

    When these commands request a token from the metadata server (behind the scenes), it will ask you for the YubiKey PIN, and cache it and the token for a short time to improve user experience.

    As you can see, there's no need to download SA keys and set GOOGLE_APPLICATION_CREDENTIALS anymore!

  6. Further customization options are available through:

    google-yubikey [<command>] -h
    

Disclaimer

This tool is still early on in the development. It works, but may have unusual edge cases that make it fail for your setup. Please use with caution, and raise an issue if you come across one.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

google-yubikey-0.4.5.tar.gz (224.2 kB view details)

Uploaded Source

Built Distribution

google_yubikey-0.4.5-py3-none-any.whl (12.7 kB view details)

Uploaded Python 3

File details

Details for the file google-yubikey-0.4.5.tar.gz.

File metadata

  • Download URL: google-yubikey-0.4.5.tar.gz
  • Upload date:
  • Size: 224.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.5.0.1 requests/2.24.0 setuptools/49.3.1 requests-toolbelt/0.9.1 tqdm/4.48.2 CPython/3.8.5

File hashes

Hashes for google-yubikey-0.4.5.tar.gz
Algorithm Hash digest
SHA256 efb499ea494f250a17f48f4fae86866e1d54e88af21047fd10f20353a3275d56
MD5 11bfb9bbd3d2acc6ebf940703a8ba76f
BLAKE2b-256 363fc1fb0da880a6c556a5e619f35f9b0e3c7eef949bc037ecc030c8a80be45d

See more details on using hashes here.

File details

Details for the file google_yubikey-0.4.5-py3-none-any.whl.

File metadata

  • Download URL: google_yubikey-0.4.5-py3-none-any.whl
  • Upload date:
  • Size: 12.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.2.0 pkginfo/1.5.0.1 requests/2.24.0 setuptools/49.3.1 requests-toolbelt/0.9.1 tqdm/4.48.2 CPython/3.8.5

File hashes

Hashes for google_yubikey-0.4.5-py3-none-any.whl
Algorithm Hash digest
SHA256 6db01246dbe30c51dd02af3b794c28eb902dedf4ed7b5556af0c09b94fc53ed4
MD5 bb5e1a5a2e3fb7eacd50920f279a3189
BLAKE2b-256 c2de430521e8ebaff19852b75d6e81b6017242a95bfe7571178b962ba5a42191

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page