Securing Cloud Applications with Identity Aware Proxy (IAP) using Zero-Trust
Google via Google Skills
Power BI Fundamentals - Create visualizations and dashboards from scratch
Get 35% Off CFI Certifications - Code CFI35
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In this lab, we will walk through deploying a sample application and enforcing the access restriction capabilities using Identity-Aware Proxy.
Syllabus
- GSP946
- Overview
- Setup and requirements
- Scenario
- Task 1. Deploy the application and protect it using IAP
- Task 2. Access user identity information
- Congratulations!