1.9 KiB
GCP authentication
Prowler will use by default your User Account credentials, you can configure it using:
gcloud initto use a new accountgcloud config set account <account>to use an existing account
Then, obtain your access credentials using: gcloud auth application-default login
Otherwise, you can generate and download Service Account keys in JSON format (refer to https://cloud.google.com/iam/docs/creating-managing-service-account-keys) and provide the location of the file with the following argument:
prowler gcp --credentials-file path
???+ note
prowler will scan the GCP project associated with the credentials.
Prowler will follow the same credentials search as Google authentication libraries:
- GOOGLE_APPLICATION_CREDENTIALS environment variable
- User credentials set up by using the Google Cloud CLI
- The attached service account, returned by the metadata server
Those credentials must be associated to a user or service account with proper permissions to do all checks. To make sure, add the Viewer role to the member associated with the credentials.
???+ note Prowler will use the enabled Google Cloud APIs to get the information needed to perform the checks.
Impersonate Service Account
If you want to impersonate a GCP service account, you can use the --impersonate-service-account argument:
prowler gcp --impersonate-service-account <service-account-email>
This argument will use the default credentials to impersonate the service account provided.