Workforce Identity Federation lets your workforce—employees, vendors, partners,
and other users—access Google Cloud products by using an identity provider
(IdP). Your workforce can access Google Cloud through the
Google Cloud Workforce Identity Federation console, also known as the console (federated), the Google Cloud CLI, or a
Google Cloud API.
Workforce Identity Federation limitations for the console (federated), the
Google Cloud CLI, and Google Cloud API are listed in UI and API entries
for each product.
Workload Identity Federation
Workload Identity Federation lets your workloads programmatically access
Google Cloud products by using workload-provided identities such as
IAM roles for AWS workloads, Kubernetes service accounts for GKE workloads, or
GitHub identities for your deployment pipelines.
Workload Identity Federation limitations for the Google Cloud CLI and
Google Cloud APIs, collectivelyAPI limitations, are listed inGoogle Cloud API
limitationsentries for each product, later in this document.
Google Cloud products and limitations
The table in this section lists products, their level of support for identity
federation, limitations, and other information.
Organization
The limitations table is organized in the following way:
Product:The product name.
Identity federation launch stage:Refers to thelaunch stageof the product's support for identity federation. Launch stage doesn't
refer to the launch stage of the product itself.
Columns that describe supported products:
Google Cloud API:The product's identity federation-related
limitations that are associated with API methods and the
gcloud CLI commands that access those methods.
Other:The product's identity federation-related limitations that
aren't Google Cloud API or console (federated) limitations.
Columns that describe unsupported products:
Alternatives:For products that don't support identity
federation, this column describes alternative products that support
identity federation and provide similar features.
The Classic Apigee UI isn't supported for Workforce Identity Federation users. Buttons to
switch to the Classic Apigee UI aren't available. The following features that can only be
accessed using the Classic Apigee UI aren't supported for Workforce Identity Federation users:
Apigee API Monetization
Developer analysis
End User analysis
Integrated portals
Features inPreviewaren't supported for
Workforce Identity Federation users. This includes the following features:
Federated identities can't check the membership of Google groups in
allow policies. As a result, when federated identities analyze
access for a principal, the query results don't include permissions and
roles that the principal has due to their membership in a group.
When analyzing access, federated identities can't enable theexpand_groupsoption.
analyzeMoveisn't supported by
identity federation.
Cloud Composer supports Workforce Identity Federation only for environments created in
Composer version 2.1.11 or later and Airflow version 2.4.3 or later. Upgrading an environment from
an earlier version does not enable Workforce Identity Federation support.
Email messages sent from Airflow only include the Airflow UI link that is accessible by Google accounts.
To access Airflow UI as a Workforce Identity Federation user, the link must be manually updated
(changed to theURL for Workforce Identity Federation).
Cloud Storage limitations apply to Cloud Composer environment bucket.
Workforce Identity Federation users can upload—but not download—support case-related files. These files are visible to the Support Engineers who handle your cases.
Contact details (e.g. Email Address) cannot be changed for Workforce Identity Federation users once interaction with Support has started.
Workforce Identity Federation users cannot create cases using the live chat support channel.
Google Cloud API:
Cloud Support API doesn't support identity federation.
Cloud DNS has a limitation on the number of name server shards. To
learn more, seeName server limits.
Before allocating the final name server shard, Cloud DNS verifies
ownership of the domain, which cannot be performed by federated identities.
The App Engine Cron Jobs tab isn't available for Workforce Identity Federation users.
The App Engine option in the target type configuration isn't available for Workforce Identity Federation users.
Google Cloud API:
The Cloud Scheduler API doesn't support identity federation for
jobs that have theirtargetattribute set toappEngineHttpTarget.
To send a job to an App Engine target using identity federation,
create your job with thetargettype set tohttpTargetand theurifield set to the full URI path of your App Engine target.
The App Engine routing override option isn't available for Workforce Identity Federation users.
Google Cloud API:
The Cloud Tasks API doesn't support identity federation
for tasks that have App Engine targets—for example:
App Engine queues:Since App Engine queues (queues
that are created using aqueue.yamlorqueue.xmlfile) contain only tasks with App Engine
targets, tasks in these queues aren't supported.
Regular queues:For regular Cloud Tasks queues,
tasks with HTTP targets are supported. Tasks with App Engine
targets aren't supported (even though the queue isn't an
App Engine queue).
Workforce Identity Federation users who want to launch a Cloud Workstations must either
use the Google Cloud console or the Workstations API. To use the Workstation API, seeConnect to the
workstation in your browser. Workforce Identity Federation doesn't support re-authentication by directly accessing an existing
Workstation, for example, if you've bookmarked your Workstation in the past. Instead, Workforce Identity Federation users can re-authenticate as described earlier in this section.
InAdd principals to the Google Cloud console & APIs, theGroup IDtext field doesn't support autocomplete or provide validation for Workforce Identity Federation users.
For Workforce Identity Federation users, Google Groups are identified by their IDs rather than their names.
Workforce Identity Federation users can perform create, view, update, and delete operations in Cluster, Jobs, and Batches list pages. Workflows, Autoscaling policies, and component exchange aren't available to Workforce Identity Federation.
Cluster create functionality is available, except for Dataproc on GKE cluster creation, Dataproc Compute Engine cluster with personal authentication, or with Component Gateway enabled.
TheOutputsection in the Batch and Job detail page isn't available for Workforce Identity Federation users.
TheRecommend Alertsection in the Cluster and Job list page isn't available for Workforce Identity Federation users.
Google Cloud API:
The following methods don't support identity federation:
When you log into any external (GKE Enterprise) clusters, the optionUse your Google identityisn't available for Workforce Identity Federation.
When you create or attach any external (GKE Enterprise) clusters, you
won't automatically be added as an administrator for Workforce Identity Federation.
Google Cloud API:
No known limitations
Other:
gkeadm,gkectlandbmctldon't support Workforce Identity Federation.
Enabling Identity Platform through the Google Cloud Workforce Identity Federation console is not supported. Workforce Identity Federation administrators must enable Identity Platform either through the Firebase Authentication console or by logging into the Google Cloud console using a Cloud Identity or Workspace account before Workforce Identity Federation users can access Identity Platform through the console (federated).
The following Policy Intelligence features have limitations for Workforce Identity Federation users who use the Google Cloud Workforce Identity Federation console:
Policy Troubleshooter:
Workforce Identity Federation users can't troubleshoot access in the console (federated).
Policy Analyzer:
Workforce Identity Federation users can't analyze access in the console (federated).
Policy Simulator:
Workforce Identity Federation users can't simulate changes to an allow policy within the
console (federated).
IAM
Recommender: Workforce Identity Federation users can't view recommendations in the
console (federated).
Google Cloud API:
The following Policy Intelligence features have API limitations for federated identities:
Policy Troubleshooter:
Federated identities can't check the membership of Google groups in allow
and deny policies, or the membership of Cloud Identity accounts
(domains) in deny policies. When federated identities call theiam.troubleshootmethod, role bindings and deny rules that contain groups or domains have an access result ofUnknown, unless the role binding or deny rule also explicitly includes the principal.
Federated identities can't check the membership of Google groups in
allow policies. As a result, when federated identities analyze
access for a principal, the query results don't include permissions
and roles that the principal has due to their membership in a group.
When analyzing access, federated identities can't enable theexpand-groupsoption.
Federated identities can't use the following API methods:
In theEntitlementssection, when you type requester and approver principals, only service account names are autocompleted.
Google Cloud API:
No known limitations
Other:
Automatedemail notificationsaren't sent for entitlement and grant changes. For notifications to be sent, administrators or requesters can explicitly configure email addresses.
Workforce Identity Federation users can only view and operate on the organization for which Workforce Identity Federation was configured. Other organizations to which the users are added are not displayed in the Google Cloud console.
Wait times for certain operations to be reflected in the UI are long—for example, creating a project or folder.
Identity federation users must sign in through the Secure Source Manager instanceweb interfaceafter every session expiry to continue using Git SSH CLI commands with user SSH keys.
Other:
A new Secure Source Manager instance must be created to use Workforce Identity Federation. Existing instances can't be updated.
Workforce identity pool providers used for Secure Source Manager must providegoogle.subjectandgoogle.emailattribute mappings.
You can only use your federated identity to log in to a Secure Source Manager instance that is configured to use Workforce Identity Federation.
Email notifications from Secure Source Manager are not supported for Workforce Identity Federation configured instances.
Service Management API:
Creating a managed service doesn't support identity federation.
To verify domain ownership and create a managed service, do the following:
TheGrantbutton, which grants the Workforce Identity Federation user the Service Account
User (roles/iam.serviceAccountUser) role on the project, is inactive.
Google Cloud API:
TheWorkflowsandWorkflow ExecutionsAPIs support identity federation; however, when invoking other services
during a workflow execution, identity federation isn't supported.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-03 UTC."],[[["\u003cp\u003eIdentity federation enables access to Google Cloud products using external identity providers for both workforce (employees/partners) and workloads (e.g., AWS roles, K8s service accounts).\u003c/p\u003e\n"],["\u003cp\u003eWorkforce Identity Federation users interact with a limited "console (federated)" that has restricted features compared to the standard Google Cloud console, including limited access to language options, notifications, and other settings.\u003c/p\u003e\n"],["\u003cp\u003eMany Google Cloud products have limitations when accessed via identity federation, such as certain API calls being unavailable, specific console features being unsupported, or some tools like Cloud Shell or App Engine being completely unsupported, and this also means that some products do not support workforce identity federation at all.\u003c/p\u003e\n"],["\u003cp\u003eProduct limitations for identity federation are detailed and organized by product name, launch stage, Google Cloud API, console limitations, other limitations, and alternatives for unsupported products.\u003c/p\u003e\n"],["\u003cp\u003eWhile most core services support identity federation to some degree, specific functionalities within services, like BigQuery's saving queries or Cloud Storage's signed URLs, might be unavailable, and various console features such as policy management and security settings are often restricted.\u003c/p\u003e\n"]]],[],null,[]]