{"id":12837,"date":"2020-11-23T00:00:00","date_gmt":"2020-11-23T00:00:00","guid":{"rendered":"https:\/\/e-dialog.group\/blog\/google-cloud-platform-authentication-2\/"},"modified":"2026-02-26T13:38:12","modified_gmt":"2026-02-26T13:38:12","slug":"google-cloud-platform-authentication-2","status":"publish","type":"post","link":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/","title":{"rendered":"Google Cloud Platform Authentication"},"content":{"rendered":"<p><strong>There are basically three different ways to authenticate requests to the Google Cloud APIs:<\/strong><\/p>\n<ul>\n<li>API keys<\/li>\n<li>OAuth 2.0 Client IDs<\/li>\n<li>Service Accounts<\/li>\n<\/ul>\n<p>If you need help choosing the right credentials, GCP can<strong>Credential Wizard<\/strong>be used. Depending on the API used (Google Maps API etc.), the environment (client, server, Chrome application etc.) and the data used (User data and Application data), the appropriate type is then displayed.<\/p>\n<figure><img decoding=\"async\" width=\"800\" height=\"319\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Capture-1.png\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Capture-1.png 900w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Capture-1-300x120.png 300w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Capture-1-768x306.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><figcaption>Source: own screenshot<\/figcaption><\/figure>\n<h2>1 API Keys<\/h2>\n<p>An API key is simply a sequence of characters, here is a screenshot as an example. It is used to identify an application without a principal\/user. They are used to access public data anonymously. In addition, they are always tied to a GCP project and can be done this way<strong>API quotas<\/strong>(e.g. only 1,000 inquiries per day) and costs are charged.<\/p>\n<figure><img decoding=\"async\" width=\"734\" height=\"92\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/API-KEY.png\" alt=\"API Key\" loading=\"lazy\" srcset=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/API-KEY.png 734w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/API-KEY-300x38.png 300w\" sizes=\"auto, (max-width: 734px) 100vw, 734px\"><figcaption>Source: e-dialogue<\/figcaption><\/figure>\n<p>A classic example of using an API key is one of the Google Maps APIs. In order to integrate the following map section from Google Maps on your own website, an API key must first be generated and sent with the Google Maps query. It is important to ensure that the API key is not publicly visible.<\/p>\n<figure><img decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/staticmap.png\" alt=\"Staticmap\" loading=\"lazy\" srcset=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/staticmap.png 600w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/staticmap-300x150.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\"><figcaption>Source: https:\/\/developers.google.com\/<\/figcaption><\/figure>\n<h2>2 OAuth 2.0 Client IDs<\/h2>\n<p>With this type of authentication there is the publicly visible client ID, which identifies the client \/ which in most cases is the developed application itself.<br>There is also the client secret, which is sent to Google in the background to enable authentication.<\/p>\n<p><img decoding=\"async\" width=\"766\" height=\"83\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Client-ID.png\" alt=\"Client ID\" loading=\"lazy\" srcset=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Client-ID.png 766w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Client-ID-300x33.png 300w\" sizes=\"auto, (max-width: 766px) 100vw, 766px\"><\/p>\n<p>In practice, we all know the Google popup to log in to a website or app using our Google accounts, that is<strong>OAuth 2.0.<\/strong>As an example, I have attached a screenshot of the Google Login popup, which also appears when installing a Google Sheet addon. The URL also contains the one mentioned above<strong>Client ID visible<\/strong>.<\/p>\n<figure><img decoding=\"async\" width=\"684\" height=\"672\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/OAuth-2.0.png\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/OAuth-2.0.png 684w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/OAuth-2.0-300x295.png 300w\" sizes=\"auto, (max-width: 684px) 100vw, 684px\"><figcaption>Source: own screenshot<\/figcaption><\/figure>\n<p>This type of authentication enables an application to be accessed on behalf of the end user<strong>Google Cloud APIs<\/strong>can access. Examples include: the application can change Google Analytics accounts or retrieve reports, send and read emails via GMail, access Google Drive documents, retrieve Campaign Manager reports, etc.<\/p>\n<p>If an application requests access using OAuth, it must always do so<strong>OAuth areas \/ OAuth scopes<\/strong>be defined. These are the permitted rights per Google Cloud API.<\/p>\n<p><strong>A complete list of scopes can be found here:<\/strong><a href=\"https:\/\/developers.google.com\/identity\/protocols\/oauth2\/scopes\">https:\/\/developers.google.com\/identity\/protocols\/oauth2\/scopes<\/a><\/p>\n<p><strong>For example, the Google Analytics Reporting API offers these two scopes:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.googleapis.com\/auth\/analytics\">https:\/\/www.googleapis.com\/auth\/analytics<\/a>(View and manage your Google Analytics data)<\/li>\n<li><a href=\"https:\/\/www.googleapis.com\/auth\/analytics.readonly\">https:\/\/www.googleapis.com\/auth\/analytics.readonly<\/a>(View your Google Analytics data)<\/li>\n<\/ul>\n<p>These scopes are translated into more understandable terms for the end user. The scopes are listed within the Google Login popup on the second page.<\/p>\n<figure><img decoding=\"async\" width=\"612\" height=\"743\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/GTM-Tools.png\" alt=\"GTM Tools\" loading=\"lazy\" srcset=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/GTM-Tools.png 612w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/GTM-Tools-247x300.png 247w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\"><figcaption>Source: own screenshot<\/figcaption><\/figure>\n<p>To see which applications have been allowed which scopes in the past, you can visit the page:<a href=\"https:\/\/myaccount.google.com\/security\">https:\/\/myaccount.google.com\/security<\/a>call. Among the points<strong>&ldquo;Third-party apps with account access&rdquo;<\/strong>and<strong>&ldquo;Singin in to other sites &gt; Singing in with Google&rdquo;<\/strong>All applications are listed and you can revoke their permissions if necessary.<\/p>\n<figure><img decoding=\"async\" width=\"616\" height=\"710\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Third-Party-Apps.png\" alt=\"Third Party Apps\" loading=\"lazy\" srcset=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Third-Party-Apps.png 616w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Third-Party-Apps-260x300.png 260w\" sizes=\"auto, (max-width: 616px) 100vw, 616px\"><figcaption>Source: own screenshot<\/figcaption><\/figure>\n<h2>3 service accounts<\/h2>\n<p>In one<strong>GCP project<\/strong>Four different member types can be added, one of which is<strong>Service accounts \/ service accounts.<\/strong><\/p>\n<figure><img decoding=\"async\" width=\"800\" height=\"476\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/iam-overview-basics.svg\" alt=\"\" loading=\"lazy\"><figcaption>Source: https:\/\/cloud.google.com\/<\/figcaption><\/figure>\n<p>A service account is a<strong>special account type<\/strong>, which is not used by a person but by an application. A service account is defined by its email address, which is specific to the account.<\/p>\n<p><strong>Other important properties are:<\/strong><\/p>\n<ul>\n<li>Service accounts do not have passwords and cannot log in via browsers or cookies.<\/li>\n<li>Service accounts are associated with private and public RSA key pairs that are used to authenticate with Google.<\/li>\n<li>These keys can be managed either by Google or by a GCP user themselves.<\/li>\n<\/ul>\n<p><strong>An example of a public key:<\/strong><\/p>\n<p>89850be783b604313d51f0c2bf225f35e12dd6ea<\/p>\n<p><strong>An example of a private key:<\/strong><\/p>\n<p><img decoding=\"async\" width=\"617\" height=\"498\" src=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Private-Key.png\" alt=\"Private Key\" loading=\"lazy\" srcset=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Private-Key.png 617w, https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/Private-Key-300x242.png 300w\" sizes=\"auto, (max-width: 617px) 100vw, 617px\"><\/p>\n<p><strong>Applications can then be executed with the help of this &ldquo;robo account&rdquo;. For example, service accounts carry out the following activities for our customers:<\/strong><\/p>\n<ul>\n<li>Daily upload of Floodlight offline conversions<\/li>\n<li>Daily import via the Google Analytics Data Import API<\/li>\n<li>etc.<\/li>\n<\/ul>\n<p>A<strong>Advantage of service accounts<\/strong>is that the execution of the application is independent of employees. If the employee who created the application leaves the company, the service account will continue to carry out its tasks.<\/p>\n<p>If the application is implemented in Compute Engine, Google Kubernetes Engine, App Engine, Cloud Run, or Cloud Functions, a new service account does not need to be created. It can be a so-called<strong>&ldquo;Default Service Account&rdquo;<\/strong>which automatically exists in every GCP project. Accessing and using the keys is also easier and more secure in this case.<\/p>\n<p><strong>There is also a good overview of the authentication types in the GCP documentation:<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<th>Requirement<\/th>\n<th>Recommendation<\/th>\n<th>comment<\/th>\n<\/tr>\n<tr>\n<td>Access public data without credentials<\/td>\n<td>API key<\/td>\n<td>An API key only identifies the application and does not require user authentication. This is sufficient for accessing public data.<\/td>\n<\/tr>\n<tr>\n<td>Access private data on behalf of an end user<\/td>\n<td>OAuth 2.0 client<\/td>\n<td>An OAuth 2.0 client identifies the application and allows end users to authenticate your application with Google. This allows your application to access Google Cloud APIs on behalf of the end user.<\/td>\n<\/tr>\n<tr>\n<td>Access private data on behalf of a service account within Google Cloud environments<\/td>\n<td>Service account provided by the environment<\/td>\n<td>If your application runs in a Google Cloud environment such as Compute Engine, App Engine, GKE, Cloud Run, or Cloud Functions, it should use the service account provided by the environment.<br>Google Cloud client libraries automatically find and use the service account credentials.<\/td>\n<\/tr>\n<tr>\n<td>Access private data outside of Google Cloud environments on behalf of a service account<\/td>\n<td>Service account key<\/td>\n<td>You need to create a service account and download the private key as a JSON file. You must pass the file to Google Cloud client libraries so that they can generate the service account credentials at run time. Google Cloud client libraries automatically find and use the service account credentials using the GOOGLE_APPLICATION_CREDENTIALS environment variable.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Source:<a href=\"https:\/\/cloud.google.com\/docs\/authentication\">https:\/\/cloud.google.com\/docs\/authentication<\/a><\/em><\/p>\n<h3>For more information about the Google Cloud Platform, contact our experts:<a href=\"mailto:kontakt@e-dialog.group\">kontakt@e-dialog.group<\/a><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>In order to use the various Google Cloud APIs, requests to these APIs must pass authentication. In this article we explain the basics.<\/p>\n","protected":false},"author":1,"featured_media":4804,"comment_status":"closed","ping_status":"open","sticky":false,"template":"post-old.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,445],"channel":[],"goal":[463],"technology":[40],"c-year":[65],"class_list":{"0":"post-12837","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-analytics","9":"goal-digital-strategy","10":"technology-google-cloud-platform","11":"c-year-65"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Google Cloud Platform Authentication - e-dialog<\/title>\n<meta name=\"description\" content=\"In order to use the various Google Cloud APIs, requests to these APIs must pass authentication. In this article we explain the basics.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Cloud Platform Authentication\" \/>\n<meta property=\"og:description\" content=\"In order to use the various Google Cloud APIs, requests to these APIs must pass authentication. In this article we explain the basics.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/\" \/>\n<meta property=\"og:site_name\" content=\"e-dialog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/edialog.group\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-23T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T13:38:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2200\" \/>\n\t<meta property=\"og:image:height\" content=\"1180\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"digitalists\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"digitalists\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/\"},\"author\":{\"name\":\"digitalists\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#\\\/schema\\\/person\\\/7b481e2ac90c21e4dc393821d35bb518\"},\"headline\":\"Google Cloud Platform Authentication\",\"datePublished\":\"2020-11-23T00:00:00+00:00\",\"dateModified\":\"2026-02-26T13:38:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/\"},\"wordCount\":1011,\"publisher\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cookie-banner-ch.png\",\"articleSection\":[\"Analytics\",\"Analytics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/\",\"name\":\"Google Cloud Platform Authentication - e-dialog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cookie-banner-ch.png\",\"datePublished\":\"2020-11-23T00:00:00+00:00\",\"dateModified\":\"2026-02-26T13:38:12+00:00\",\"description\":\"In order to use the various Google Cloud APIs, requests to these APIs must pass authentication. In this article we explain the basics.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cookie-banner-ch.png\",\"contentUrl\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/cookie-banner-ch.png\",\"width\":2200,\"height\":1180,\"caption\":\"|\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/google-cloud-platform-authentication-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Cloud Platform Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/\",\"name\":\"e-dialog\",\"description\":\"Data-driven Marketing &amp; Strategie\",\"publisher\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#organization\",\"name\":\"e-dialog\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/e-dialog-logo.svg\",\"contentUrl\":\"https:\\\/\\\/e-dialog.group\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/e-dialog-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"e-dialog\"},\"image\":{\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/edialog.group\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/e-dialog-gmbh\\\/\",\"https:\\\/\\\/www.instagram.com\\\/e_dialog\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@e_dialog\"],\"description\":\"Bei e-dialog gestalteten wir gemeinsam die Zukunft des data-driven Marketings - mit einem gro\u00dfartigen Team aus passionierten Expert*innen.\",\"email\":\"kontakt@e-dialog.group\",\"telephone\":\"+43 1 309 09 09\",\"legalName\":\"e-dialog GmbH\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/#\\\/schema\\\/person\\\/7b481e2ac90c21e4dc393821d35bb518\",\"name\":\"digitalists\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g\",\"caption\":\"digitalists\"},\"sameAs\":[\"https:\\\/\\\/e-dialog.group\"],\"url\":\"https:\\\/\\\/e-dialog.group\\\/en\\\/blog\\\/author\\\/digitalists\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Google Cloud Platform Authentication - e-dialog","description":"In order to use the various Google Cloud APIs, requests to these APIs must pass authentication. In this article we explain the basics.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/","og_locale":"en_US","og_type":"article","og_title":"Google Cloud Platform Authentication","og_description":"In order to use the various Google Cloud APIs, requests to these APIs must pass authentication. In this article we explain the basics.","og_url":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/","og_site_name":"e-dialog","article_publisher":"https:\/\/www.facebook.com\/edialog.group","article_published_time":"2020-11-23T00:00:00+00:00","article_modified_time":"2026-02-26T13:38:12+00:00","og_image":[{"width":2200,"height":1180,"url":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","type":"image\/png"}],"author":"digitalists","twitter_card":"summary_large_image","twitter_misc":{"Written by":"digitalists","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/#article","isPartOf":{"@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/"},"author":{"name":"digitalists","@id":"https:\/\/e-dialog.group\/en\/#\/schema\/person\/7b481e2ac90c21e4dc393821d35bb518"},"headline":"Google Cloud Platform Authentication","datePublished":"2020-11-23T00:00:00+00:00","dateModified":"2026-02-26T13:38:12+00:00","mainEntityOfPage":{"@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/"},"wordCount":1011,"publisher":{"@id":"https:\/\/e-dialog.group\/en\/#organization"},"image":{"@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/#primaryimage"},"thumbnailUrl":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","articleSection":["Analytics","Analytics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/","url":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/","name":"Google Cloud Platform Authentication - e-dialog","isPartOf":{"@id":"https:\/\/e-dialog.group\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/#primaryimage"},"image":{"@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/#primaryimage"},"thumbnailUrl":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","datePublished":"2020-11-23T00:00:00+00:00","dateModified":"2026-02-26T13:38:12+00:00","description":"In order to use the various Google Cloud APIs, requests to these APIs must pass authentication. In this article we explain the basics.","breadcrumb":{"@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/#primaryimage","url":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","contentUrl":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/08\/cookie-banner-ch.png","width":2200,"height":1180,"caption":"|"},{"@type":"BreadcrumbList","@id":"https:\/\/e-dialog.group\/en\/blog\/google-cloud-platform-authentication-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/e-dialog.group\/en\/"},{"@type":"ListItem","position":2,"name":"Google Cloud Platform Authentication"}]},{"@type":"WebSite","@id":"https:\/\/e-dialog.group\/en\/#website","url":"https:\/\/e-dialog.group\/en\/","name":"e-dialog","description":"Data-driven Marketing &amp; Strategie","publisher":{"@id":"https:\/\/e-dialog.group\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/e-dialog.group\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/e-dialog.group\/en\/#organization","name":"e-dialog","url":"https:\/\/e-dialog.group\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/e-dialog.group\/en\/#\/schema\/logo\/image\/","url":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/06\/e-dialog-logo.svg","contentUrl":"https:\/\/e-dialog.group\/wp-content\/uploads\/2025\/06\/e-dialog-logo.svg","width":1,"height":1,"caption":"e-dialog"},"image":{"@id":"https:\/\/e-dialog.group\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/edialog.group","https:\/\/www.linkedin.com\/company\/e-dialog-gmbh\/","https:\/\/www.instagram.com\/e_dialog\/","https:\/\/www.tiktok.com\/@e_dialog"],"description":"Bei e-dialog gestalteten wir gemeinsam die Zukunft des data-driven Marketings - mit einem gro\u00dfartigen Team aus passionierten Expert*innen.","email":"kontakt@e-dialog.group","telephone":"+43 1 309 09 09","legalName":"e-dialog GmbH"},{"@type":"Person","@id":"https:\/\/e-dialog.group\/en\/#\/schema\/person\/7b481e2ac90c21e4dc393821d35bb518","name":"digitalists","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8acd1abfb5ef9f78793e3164334d4533968653b26cbd89b6cf0eb4e5483434e4?s=96&d=mm&r=g","caption":"digitalists"},"sameAs":["https:\/\/e-dialog.group"],"url":"https:\/\/e-dialog.group\/en\/blog\/author\/digitalists\/"}]}},"_links":{"self":[{"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/posts\/12837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/comments?post=12837"}],"version-history":[{"count":1,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/posts\/12837\/revisions"}],"predecessor-version":[{"id":13283,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/posts\/12837\/revisions\/13283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/media\/4804"}],"wp:attachment":[{"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/media?parent=12837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/categories?post=12837"},{"taxonomy":"channel","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/channel?post=12837"},{"taxonomy":"goal","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/goal?post=12837"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/technology?post=12837"},{"taxonomy":"c-year","embeddable":true,"href":"https:\/\/e-dialog.group\/en\/wp-json\/wp\/v2\/c-year?post=12837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}