Documentation Index
Fetch the complete documentation index at: https://conductorone-docs-ad-account-provisioning-setup.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
title: “Set up a Google Kubernetes Engine connector” og:title: “Set up a Google Kubernetes Engine connector” description: “C1 provides identity governance for Google Kubernetes Engine (GKE). Integrate your GKE cluster with C1 to run user access reviews (UARs) and manage Kubernetes RBAC roles and the GCP IAM role bindings on the cluster’s project.” og:description: “C1 provides identity governance for Google Kubernetes Engine (GKE). Integrate your GKE cluster with C1 to run user access reviews (UARs) and manage Kubernetes RBAC roles and the GCP IAM role bindings on the cluster’s project.” sidebarTitle: “Google Kubernetes Engine”
Capabilities
| Resource | Sync | Provision |
|---|---|---|
| Accounts | ||
| Groups | ||
| Service Accounts |
| Resource | Sync | Provision |
|---|---|---|
| Cluster Roles | ||
| GCP IAM Role Bindings | ||
| Roles |
- Cluster Roles and Roles are Kubernetes RBAC resources scoped to the connected cluster.
- GCP IAM Role Bindings are the IAM bindings from the GCP project where the cluster is located — only those assigned on that specific project, not all IAM roles across your organization.
Before you begin
This connector requires a working GCP connector to source user and group identities. If you have not already done so, set up the GCP connector before you proceed.Gather GKE credentials
To configure the GKE connector, you need a GCP service account. Follow the steps below to create one and obtain the required credentials.You are redirected to the credentials page. Find your new service account in the list. Copy its email address (you will need it later), then click on the service account to open it.
Select JSON as the key type and click Create. A JSON credentials file is downloaded to your computer. This is the file you provide to the connector.
Grant the service account the required permissions by creating a custom IAM role with the sync permissions listed above and assigning it to the service account at the project level.If you also want to use provisioning (Grant/Revoke), extend the custom role with the additional provisioning permissions listed above.
In the Kubernetes Engine section of the Google Cloud console, locate your cluster in the list. Note the name and location (region or zone) — you will need both when configuring the connector.
For provisioning only: Grant the service account cluster-admin privileges inside the Kubernetes cluster. Kubernetes prevents granting permissions the caller does not already hold, so the service account must have cluster-admin access to manage RBAC bindings.Connect to your cluster and run:Replace
<service-account-numeric-id> with the numeric ID of the GCP service account (found in the client_id field of the service account JSON key file).If you are only using the connector for sync (read-only), you can skip this step.Configure the GKE connector
- Cloud-hosted
- Self-hosted
Follow these instructions to use a built-in, no-code connector hosted by C1.That’s it! Your GKE connector is now pulling access data into C1.
Choose how to set up the new GKE connector:
- Add the connector to a currently unmanaged app (select from the list of apps that were discovered in your identity, SSO, or federation provider that aren’t yet managed with C1)
- Add the connector to a managed app (select from the list of existing managed apps)
- Create a new managed app
Set the owner for this connector. You can manage the connector yourself, or choose someone else from the list of C1 users. Setting multiple owners is allowed.If you choose someone else, C1 will notify the new connector owner by email that their help is needed to complete the setup process.
Enter the required configuration:
- Service Account Credentials JSON (required): Upload the GCP service account JSON key file
- GKE Cluster Name (required): The name of the GKE cluster to connect to
- GKE Cluster Location (required): The location (region or zone) of the GKE cluster