AI-generated Key Takeaways
-
Google issues a bearer token (JWT) to authorize encryption and decryption of resources, verified by the Key Access Control List Service (KACLS).
-
This token contains fields like audience, user email, expiration, issuance time, resource name, and role for access control.
-
Different token structures and fields exist for Docs/Drive/Calendar/Meet, Gmail, and KACLS migration, each serving specific purposes and containing relevant information.
-
The KACLS plays a role in preventing abuse by verifying authorization for encryption and decryption operations.
-
Roles like reader, writer, decrypter, signer, migrator, and verifier define the allowed actions within each service.
Bearer token (JWT: RFC 7516) issued by Google to verify that the caller is authorized to encrypt or decrypt a resource.
To prevent abuse, the Key Access Control List Service (KACLS) should verify that the caller is authorized to encrypt the object (file or document) before wrapping the key and to decrypt it before unwrapping the DEK.
Authorization token for Docs & Drive, Calendar and Meet client-side encryption (CSE)
JSON representation | |
---|---|
{ "aud": string, "delegated_to": string, "email": string, "email_type": string, "exp": string, "iat": string, "iss": string, "kacls_url": string, "perimeter_id": string, "resource_name": string, "role": string } |
Fields | |
---|---|
aud |
The audience, as identified by Google. Should be checked against the local configuration. |
delegated_to |
(Optional) The email address of the user who is authorized to access the resource. |
email |
The user's email address. |
email_type |
Contains one of the follow values:
|
exp |
Expiration time. |
iat |
Issuance time. |
iss |
The token issuer. Should be validated against the trusted set of authentication issuers. |
kacls_url |
The configured base KACLS URL, used to prevent person-in-the-middle (PITM) attacks. |
perimeter_id |
(Optional) A value tied to the document location that can be used to choose which perimeter will be checked when unwrapping. Maximum size: 128 bytes. |
resource_name |
An identifier for the object encrypted by the DEK. Maximum size: 128 bytes. |
role |
Contains one of the follow values: |
Authorization token for Gmail CSE
JSON representation | |
---|---|
{ "aud": string, "email": string, "exp": string, "iat": string, "message_id": string, "iss": string, "kacls_url": string, "perimeter_id": string, "resource_name": string, "role": string, "spki_hash": string, "spki_hash_algorithm": string } |
Fields | |
---|---|
aud |
The audience, as identified by Google. Should be checked against the local configuration. |
email |
The user's email address. |
exp |
Expiration time. |
iat |
Issuance time. |
message_id |
An identifier for the message on which the decryption or signing is performed. Used as client reason for auditing purposes. |
iss |
The token issuer. Should be validated against the trusted set of authentication issuers. |
kacls_url |
The configured base KACLS URL, used to prevent person-in-the-middle (PITM) attacks. |
perimeter_id |
(Optional) A value tied to the document location that can be used to choose which perimeter is checked when unwrapping. Maximum size: 128 bytes. |
resource_name |
An identifier for the object encrypted by the DEK. Maximum size: 512 bytes. |
role |
Contains one of the follow values:
|
spki_hash |
Standard base64-encoded digest of the DER-encoded |
spki_hash_algorithm |
Algorithm used to produce |
Authorization token for KACLS migration service
JSON representation | |
---|---|
{ "aud": string, "email": string, "exp": string, "iat": string, "iss": string, "kacls_url": string, "resource_name": string, "role": string } |
Fields | |
---|---|
aud |
The audience, as identified by Google. Should be checked against the local configuration. |
email |
The user's email address. |
exp |
Expiration time. |
iat |
Issuance time. |
iss |
The token issuer. Should be validated against the trusted set of authentication issuers. |
kacls_url |
The configured base KACLS URL, used to prevent person-in-the-middle (PITM) attacks. |
role |
Contains one of the follow values: |