Your Key Access Control List Service (KACLS) is configured without Google's involvement. Below are details about common settings and best practices for configuring your service.
The API should only be available over HTTPS with TLS 1.2 or later with a valid X.509 certificate.
The API server should handle CORS to access Google's authorized end-point:
We recommend a maximum latency of 200 ms for 99% of requests.
Authorization provider settings
Use the settings below to validate the Google-issued authorization tokens during client-side encryption (CSE):
|Google Workspace application context||JWKS endpoint URL||Authorization token issuer||Authorization token audience|
|Google Drive and collaborative content creation tools, like Docs and Sheets||
Identity Provider settings
The settings below are required for each non-Google Identity Provider (IdP) your service works with:
- Method to validate tokens. Tokens are typically validated by the URL to a JSON Web Key Set (JWKS) file, but could also be the public keys themselves.
- Issuer and audience values: The
aud(audience) field values used by each Identity Provider.
The perimeter concept in Google Workspace Client-side encryption (CSE) is used to provide access control to the encryption keys via the KACLS. The perimeters are optional additional checks performed on the authentication and authorization tokens within the KACLS.
Perimeters can be used to:
- Only allow users in allowlisted domains to decrypt keys.
- Blocklist users, such as Google Workspace administrators.
- Provide advanced restrictions. For example:
- Time-based restrictions for on-call employees or people on vacation
- Geolocation restrictions to prevent access from specific locations or networks
- User role- or type-based access, as asserted by an Identity Provider
Verify your KACLS configuration
To check whether your KACLS is active and configured correctly, send a
status request. Internal self checks,
like KMS accessibility or logging system health, can also be performed.