UID2 Private Operator for GCP Integration Guide
This guide provides information for setting up the UID2 Operator Service as a Private Operator instance in Confidential Space, a confidential computing option from Google Cloud Platform. Confidential Space offers a secure enclave environment, known as a Trusted Execution Environment (TEE).
UID2 Private Operator for GCP is not supported in these areas: Europe, China.
The Operator Service runs in a Confidential Space "workload"—a containerized Docker image that runs in a secure cloud-based enclave on top of the Confidential Space image.
When the Docker container for the UID2 Operator Confidential Space starts up, it completes the attestation process that allows the UID2 Core Service to verify the authenticity of the Operator Service and the enclave environment that the Operator Service is running in.
When the attestation is successful, the UID2 Core Service provides seed information such as salts and keys to bootstrap the UID2 Operator in the secure Confidential Space container.
Setup Overview
At a high level, the setup steps are as follows:
-
Create your Confidential Space and UID2 Operator accounts and get, or create, the various values that you'll need for configuration and deployment: see Prerequisites.
-
Review information about deployment environments.
Best practice is to deploy in the integration environment first, and then the production environment.
-
Review information about the deployment options available, including the benefits of each, and decide which to use.
We recommend the Terraform template option.
-
Follow the applicable instructions for the deployment option you chose, out of the following:
-
Enable egress rule if required.
- See Confidential Space Account Setup, Step 4.
When all steps are complete, your implementation should be up and running.
Prerequisites
Before setting up your UID2 Operator Service in the Google Cloud Platform using Confidential Space, complete these prerequisite steps:
Confidential Space Account Setup
You can run the UID2 Operator Service on any GCP account and project. However, to support attestation, you'll need to create a service account that you can use to run Confidential Space virtual machines (VMs).
Before choosing your deployment option, complete these Google Cloud setup steps:
-
Create the GCP project that you want the UID2 Operator to run in. We recommend creating a new project for the UID2 Operator Service, but you could also use an existing one. Follow these guidelines:
- Choose a project name; for example,
UID2-Operator-Production
. You'll use this as the{PROJECT_ID}
value in later steps. - Make sure that you define a GCP project with billing enabled.
- Choose a project name; for example,
-
Choose a name for the GCP service account that you'll use to run Confidential Space VMs; for example,
uid2-operator
. You'll use this as the{SERVICE_ACCOUNT_NAME}
value in later steps. -
Install the gcloud CLI, required by both deployment options. Follow the instructions provided by Google: Install the gcloud CLI.
-
Enable egress rule. If your VPC infrastructure only allows egress to known endpoints, you will need to enable an egress rule to allow the operator to retrieve the certificates required for attestation. To enable this, follow the details in this document from Google: VPC Service Controls.
UID2 Operator Account Setup
Ask your UID2 contact to register your organization as a UID2 Operator. If you're not sure who to ask, see Contact Info.
It's a good idea to set up an internal email distribution list of individuals who should be kept informed about new versions and any other technical notifications or requests, and provide that as the email contact.
When the registration process is complete, you'll receive the following:
Item | Description |
---|---|
{OPERATOR_KEY} | An operator key, exclusive to you, that identifies you with the UID2 service as a Private Operator. Use this as the OPERATOR_KEY value during configuration. This value is both your unique identifier and a password; store it securely and do not share it. The operator key is not specific to a version of the operator.NOTE: You'll receive a separate operator key for each deployment environment. |
Instructions | Additional information details, such as instructions for setting up VMs or a link to the applicable information. |
When UID2 account registration is complete, and you've installed the gcloud CLI, your next steps are:
- Review information about deployment environments.
- Review information about the deployment options available, including the benefits of each, and decide which to use.
Operator Versions
The latest ZIP file is linked in the GCP Download column in the following table.
Release | Version | Date | Release Notes | AWS Version | GCP Download | Azure Download |
---|---|---|---|---|---|---|
Q1 2024 | 5.26.19 | February 13, 2024 | v5.26.19-56899dc0d7 | 5.26.19-56899dc0d7 | 5.26.19-56899dc0d7 GCP ZIP | 5.26.19-56899dc0d7 Azure ZIP |
Q2 2024 | 5.37.12 | June 12, 2024 | v5.37.12 | 5.37.12 | gcp-oidc-deployment-files-5.37.12.zip | azure-cc-deployment-files-5.37.12.zip |
Q3 2024 | 5.38.104 | September 12, 2024 | v5.38.104 | 5.38.104 | gcp-oidc-deployment-files-5.38.104.zip | azure-cc-deployment-files-5.38.104.zip |
Q3 2024 Out-of-band | 5.41.0 | October 29, 2024 | v5.41.0 | 5.41.0 | gcp-oidc-deployment-files-5.41.0.zip | azure-cc-deployment-files-5.41.0.zip |
Deployment Environments
The following environments are available, and both deployment options support both environments.
As a best practice, we recommend that you test and verify your implementation in the integration environment before deploying in the production environment.
You'll receive separate {OPERATOR_KEY}
values for each environment. Be sure to use the correct one. The {OPERATOR_IMAGE}
value is the same for both environments.
Environment | Details |
---|---|
Integration (integ ) | For testing only. Debug mode is available in the integration environment. |
Production (prod ) | For managing production traffic. For this environment, we recommend deploying via the Terraform template, with load balancing, and with HTTPS enabled. See Deployment Options. |
Deployment Options
There are two deployment options:
Option | Details |
---|---|
Terraform template | This option:
|
gcloud CLI | This option:
|
Both deployment options support both deployment environments.
To determine your next steps, choose the deployment option you want to use. Then, follow the applicable instructions:
Deploy—Terraform Template
For ease of deployment and upgrade, you can use a Terraform template to deploy a UID2 Private Operator implementation with load balancing and auto-scaling features. In this scenario, all VM instances run on Confidential Space VMs, and are deployed in multiple availability zones (AZs).
The Terraform template does the following:
- Activates the required Google Cloud Platform APIs.
- Sets up a service account to run Confidential Space VMs.
- Creates a secret to hold the
operator_key
value. - Creates the following components:
- Network: VPC and subnetwork.
- Instances: Instance template, instance groups (with auto-scaling enabled).
- Ingress: Load balancer (with health check), forwarding rules, and firewall rules.
- Egress: Cloud Network Address Translation (NAT).
- If HTTPS is enabled, provides your HTTPS certificate to Terraform.
The Terraform template uses the gcloud CLI that you installed in Confidential Space Account Setup Step 3.
To deploy a new UID2 Operator in the GCP Confidential Space Enclave, using the Terraform template, follow these steps:
- Install Terraform
- Set Up the Terraform Environment
- Download the Template Files
- Provide Input Values
- Run Terraform
- Test Terraform Using the Health Check Endpoint
For additional information, see:
Install Terraform
Install Terraform if it is not already installed: visit terraform.io.
Set Up the Terraform Environment
-
Create a new project or select an existing one, replacing the
{PROJECT_ID}
placeholder with your own project ID (see Confidential Space Account Setup):gcloud config set project {PROJECT_ID}
-
Configure the environment for Terraform:
gcloud auth application-default login
Download the Template Files
Download the ZIP file listed in Operator Versions in the GCP Download column. Be sure to select the latest version. Unzip the files to a convenient location. You will have the files listed in the following table.
File | Details |
---|---|
main.tf | The Terraform template file. |
variables.tf | Contains the definitions for the template input variables, including name, type, and default value. |
outputs.tf | Includes output definitions. |
terraform.tfvars | Contains the values for the template input variables. |
Provide Input Values
Provide values for the input parameters, as needed, in the terraform.tfvars
file that you downloaded. Some are required, others are optional.
-
Provide values for the required input parameters shown in the following table:
Name Type Default Required Description project_id
string
uid2-test
yes The ID of the GCP project that you want the UID2 Operator to run in; for example, UID2-Operator-Production
.service_account_name
string
tf-test
yes The name of the service account that you want to use for your UID2 Operator instance in GCP Confidential Space. uid_operator_image
string
us-docker.pkg.dev/uid2-prod-project/iabtechlab/uid2-operator:{version_number}
yes The Docker image URL for the UID2 Private Operator for GCP, used in configuration. The version number changes depending on the version being deployed. uid_operator_key
string
n/a yes The UID2 operator key, which you received as part of UID2 Operator Account Setup. uid_operator_key_secret_name
string
secret-operator-key
yes The name of the key to create in Secret Manager. uid_deployment_env
string
integ
yes Valid values: integ
for integration environment,prod
for production environment.
Machine type is determined by the deployment environment:integ
usesn2d-standard-2
andprod
usesn2d-standard-16
.debug_mode
bool
true
yes Set to true
to enable more diagnostic information. For the production environment, this must be set tofalse
or the operator will not start. -
(Optional, strongly recommended) Set the load balancer to HTTPS. Provide values for the parameters shown in the following table:
Name Type Default Required Description ssl
bool
false
no To set the load balancer to use HTTPS, which is recommended, set this flag to true
.
If you're using HTTPS you must also specify values for thecertificate
andprivate_key
parameters.certificate
string
n/a no The contents of the HTTPS certificate. The certificate should be in PEM format.
For example:file('path/to/certificate.pem')
.
Required ifssl
is set totrue
.
For details, see google_compute_ssl_certificate in the Terraform documentation.private_key
string
n/a no The contents of the private key for the HTTPS certificate. The private key should be in PEM format.
For example:file('path/to/private_key.pem')
.
Required ifssl
is set totrue
.
For details, see google_compute_ssl_certificate in the Terraform documentation. -
(Optional) Provide parameter names and values for the additional input parameters shown in the following table. These parameters are always optional, but you might want to modify from the default values to better suit your requirements.
Name Type Default Required Description region
string
us-east1
no The region that you want to deploy to. For a list of valid regions, see Available regions and zones in the Google Cloud documentation.
NOTE: The UID2 Private Operator implementation for GCP Confidential Space is not supported in these areas: Europe, China.network_name
string
uid-operator
no The VPC resource name (also used for rules/ instance tags). min_replicas
number
1
no Indicates the minimum number of replicas you want to deploy. max_replicas
number
5
no Indicates the maximum number of replicas you want to deploy. uid_operator_key_secret_name
string
"secret-operator-key"
no The name that you specify for your operator key secret. The Terraform template creates a secret in the GCP Secret Manager to hold the uid_operator_key
value. You can define the name; for example,uid2-operator-operator-key-secret-integ
.debug_mode
bool
false
no Do not set to true
unless you are working with the UID2 team to debug an issue. In any other circumstances, if you set this flag totrue
, attestation will fail.
Run Terraform
Run the following:
terraform init
terraform apply
When you run terraform apply
, the following file is generated in the same folder: terraform.tfstate
. This file stores state information about your managed infrastructure and configuration, and will be used for future maintenance.
Be sure to follow the recommended practices for Terraform state
files: they are required for maintaining the deployed infrastructure, and they might contain sensitive information. For details, see state in the Terraform documentation.
Test Terraform Using the Health Check Endpoint
Call the health check endpoint to test the health of your implementation. The expected result is HTTP 200 with a response body of OK
.
For instructions, see Health Check—Terraform Template.
Delete All Created Resources
In a scenario where you want to clean up, you can remove the resources created by the template. For example, you might want to test integ
and remove the whole stack later.
To remove all resources created by Terraform, run the following:
terraform destroy
Outputs
The following table summarizes the output value from the Terraform template.
Name | Description |
---|---|
load_balancer_ip | The public IP address of the load balancer. You can use this value to perform the health check or to configure the DNS. |
Deploy—gcloud CLI
To deploy a new UID2 Operator in the GCP Confidential Space Enclave using the gcloud CLI, follow these steps.
For deployment to the production environment we do not recommend this option. We recommend deploying via the Terraform template, with load balancing, and with HTTPS enabled.
- Set Up Service Account Rules and Permissions
- Create Secret for the Operator Key in Secret Manager
- Update the Script with Valid Values
- Run the Script
- Test gcloud Using the Health Check Endpoint
Set Up Service Account Rules and Permissions
To set up and configure the account that you created when you installed the gcloud CLI, complete the following steps. Replace the placeholder values with your own valid values.
-
Switch to the project that you created in Confidential Space Account Setup:
$ gcloud config set project {PROJECT_ID}
-
Enable the following APIs:
Name Description compute.googleapis.com Compute Engine API confidentialcomputing.googleapis.com Confidential Computing API logging.googleapis.com Cloud Logging API secretmanager.googleapis.com Service Management API Run this command to enable the APIs:
$ gcloud services enable compute.googleapis.com \
confidentialcomputing.googleapis.com \
logging.googleapis.com \
secretmanager.googleapis.com -
Create a service account to run the UID2 Operator Service:
$ gcloud iam service-accounts create {SERVICE_ACCOUNT_NAME}
-
Grant the required permissions to the service account.
Permissions are shown in the following table.
Permission Description confidentialcomputing.workloadUser
Provides the permission to generate an attestation token and run a workload in a VM. logging.logWriter
Provides the permission to write log entries in gcloud logging. secretmanager.secretAccessor
Provides the permission to access the operator key that is managed in the GCP Secret Manager. Grant the
confidentialcomputing.workloadUser
permission:$ gcloud projects add-iam-policy-binding {PROJECT_ID} \
--member=serviceAccount:{SERVICE_ACCOUNT_NAME}@{PROJECT_ID}.iam.gserviceaccount.com \
--role=roles/confidentialcomputing.workloadUserGrant the
logging.logWriter
permission:$ gcloud projects add-iam-policy-binding {PROJECT_ID} \
--member=serviceAccount:{SERVICE_ACCOUNT_NAME}@{PROJECT_ID}.iam.gserviceaccount.com \
--role=roles/logging.logWriterGrant the
secretmanager.secretAccessor
permission:$ gcloud projects add-iam-policy-binding {PROJECT_ID} \
--member=serviceAccount:{SERVICE_ACCOUNT_NAME}@{PROJECT_ID}.iam.gserviceaccount.com \
--role=roles/secretmanager.secretAccessor -
Add a VPC rule to allow public access on port 8080, the default exposed port for the UID2 operator:
$ gcloud compute firewall-rules create operator-tcp \
--direction=INGRESS --priority=1000 --network=default --action=ALLOW \
--rules=tcp:8080 \
--source-ranges=10.0.0.0/8 \
--target-service-accounts={SERVICE_ACCOUNT_NAME}@{PROJECT_ID}.iam.gserviceaccount.com
source-ranges
specifies the range of IP addresses from which your clients will call the Private Operator. It is in CIDR notation, and you can use comma-separated values to provide multiple ranges. Example: --source-ranges="10.0.0.0/8,10.10.0.0/16"
. Make sure the ranges are accurate and include only IP addresses that belong to you.
Create Secret for the Operator Key in Secret Manager
As part of setting up your UID2 account (see UID2 Operator Account Setup), you'll receive an operator key for each environment.
The next step is to store the {OPERATOR_KEY}
value in GCP Secret Manager and get a full secret name for it, which you later use to replace the {OPERATOR_KEY_SECRET_FULL_NAME}
placeholder in the deployment script (see Update the Script with Valid Values).
Follow these steps:
-
Run the following script, which creates a new secret, first customizing with your own values:
OPERATOR_KEY="{OPERATOR_KEY}"
echo -n $OPERATOR_KEY | gcloud secrets create {OPERATOR_KEY_SECRET_NAME} \
--replication-policy="automatic" \
--data-file=--
Prepare the script, using your own values:
- For
{OPERATOR_KEY}
, use your own operator key value for the environment. - For
{OPERATOR_KEY_SECRET_NAME}
, specify the name you want to use for your API secret, for this environment. For example:uid2-operator-operator-key-secret-integ
.
- For
-
Run the script.
The script creates the secret in GCP Secret Manager. The secret (display) name is
{OPERATOR_KEY_SECRET_NAME}
and the secret value is{OPERATOR_KEY}
.
-
-
Run the following command to get the full secret name, including the path, first customizing with your own values:
$ gcloud secrets versions describe latest --secret {OPERATOR_KEY_SECRET_NAME} --format 'value(name)'
In this example, the full secret name might be: projects/111111111111/secrets/uid2-operator-operator-key-secret-integ/versions/1
. This is the value that you would use to replace the {OPERATOR_KEY_SECRET_FULL_NAME}
placeholder in the next section.
Update the Script with Valid Values
Update the example script, using your own valid values instead of the placeholder values.
This section includes:
Placeholder Values and Definitions
Placeholder values are defined in the following table.
Placeholder | Actual Value |
---|---|
{INSTANCE_NAME} | Your own valid VM name. |
{ZONE} | The Google Cloud zone that the VM instance will be deployed on. |
{IMAGE_FAMILY} | Use confidential-space for Integration and Production, confidential-space-debug for debugging purposes in Integration only. Note that confidential-space-debug will not work in Production. |
{SERVICE_ACCOUNT} | The service account email that you created as part of creating your account, in this format: {SERVICE_ACCOUNT_NAME}@{PROJECT_ID}.iam.gserviceaccount.com .For details, see Set Up Service Account Rules and Permissions (Step 4). |
{OPERATOR_IMAGE} | The Docker image URL for the UID2 Private Operator for GCP, used in configuration. This can be found in the terraform.tfvars file in the GCP download file (see Operator Versions). |
{OPERATOR_KEY_SECRET_FULL_NAME} | The full name that you specified for the Operator Key secret (see Create Secret for the Operator Key in Secret Manager), including the path, in the format projects/<project_id>/secrets/<secret_id>/versions/<version> . For example: projects/111111111111/secrets/uid2-operator-operator-key-secret-integ/versions/1 . |
Sample Deployment Script—Integ
The following example of the deployment script for the integration environment uses some placeholder values.
$ gcloud compute instances create {INSTANCE_NAME} \
--zone {ZONE} \
--machine-type n2d-standard-2 \
--confidential-compute \
--shielded-secure-boot \
--maintenance-policy Terminate \
--scopes cloud-platform \
--image-project confidential-space-images \
--image-family {IMAGE_FAMILY} \
--service-account {SERVICE_ACCOUNT} \
--metadata ^~^tee-image-reference={OPERATOR_IMAGE}~tee-container-log-redirect=true~tee-restart-policy=Never~tee-env-DEPLOYMENT_ENVIRONMENT=integ~tee-env-API_TOKEN_SECRET_NAME={OPERATOR_KEY_SECRET_FULL_NAME}~tee-env-CORE_BASE_URL=https://core-integ.uidapi.com~tee-env-OPTOUT_BASE_URL=https://optout-integ.uidapi.com
Sample Deployment Script—Prod
The following example of the deployment script for the production environment uses some placeholder values.
A machine-type
value of n2d-standard-16
is required for the production environment.
$ gcloud compute instances create {INSTANCE_NAME} \
--zone {ZONE} \
--machine-type n2d-standard-16 \
--confidential-compute \
--shielded-secure-boot \
--maintenance-policy Terminate \
--scopes cloud-platform \
--image-project confidential-space-images \
--image-family confidential-space \
--service-account {SERVICE_ACCOUNT} \
--metadata ^~^tee-image-reference={OPERATOR_IMAGE}~tee-container-log-redirect=true~tee-restart-policy=Never~tee-env-DEPLOYMENT_ENVIRONMENT=prod~tee-env-API_TOKEN_SECRET_NAME={OPERATOR_KEY_SECRET_FULL_NAME}~tee-env-CORE_BASE_URL=https://core-prod.uidapi.com~tee-env-OPTOUT_BASE_URL=https://optout-prod.uidapi.com
Run the Script
When the script is ready, with the additional valid values, run it.
Test gcloud Using the Health Check Endpoint
Call the health check endpoint to test the health of your implementation. The expected result is HTTP 200 with a response body of OK
.
For instructions, see Health Check—gcloud CLI.
Running the Health Check
Call the health check endpoint to test the health of your implementation.
Running the health check is the same for the integration and production environments, except for the endpoints.
Follow the applicable instructions depending on the deployment option you chose:
Health Check—Terraform Template
The following example shows the health check for the Terraform template option:
-
Get the public IP address for the load balancer:
terraform output load_balancer_ip
-
To test operator status, in your browser, go to the health check endpoint:
http://{IP}/ops/healthcheck
.An HTTP 200 with a response body of
OK
indicates healthy status.
Health Check—gcloud CLI
The following example shows the health check for the gcloud
command line option:
-
Get the public IP address of the deployed instance:
$ gcloud compute instances describe {INSTANCE_NAME} \
--zone={ZONE} \
--format='get(networkInterfaces[0].accessConfigs[0].natIP)' -
To test operator status, in your browser, go to
http://{IP}:8080/ops/healthcheck
.An HTTP 200 with a response body of
OK
indicates healthy status.
When a Private Operator fails to attest with the Core service, one of the following actions happens:
- HTTP 401 response. The Private Operator terminates itself immediately.
- Likely Causes: API key revoked or incorrect.
- Any other non-200 response code. The Private Operator continues to function for 12 hours. If the issue is not resolved in this time frame, it terminates itself.
- Likely Causes: Core service issues, network issues.
Private Operator hosts must have infrastructure in place to handle alerting and restarting operators in the case of an error.
Upgrading
When a new version of UID2 Google Cloud Platform Confidential Space is released, private operators receive an email notification of the update, with a new image version. There is a window of time for upgrade, after which the older version is deactivated and is no longer supported.
If you're upgrading to a new version, the upgrade process depends on the deployment option you chose. Follow the applicable steps:
Upgrading—Terraform Template
If you previously deployed the Private Operator for GCP using the Terraform template, compare the latest version of the template with the one you used when you deployed. If there are changes, make sure to redeploy to include all the updates.
Upgrading—gcloud CLI
If you deployed using the gcloud CLI, you must manually bring up new instances that use the new {OPERATOR_IMAGE}
and then shut down old instances.
If you previously set up a load balancer manually, you'll also need to update the mapping for the load balancer.
Scraping Metrics
The Private Operator for GCP exposes Prometheus-formatted metrics on port 9080 through the /metrics endpoint. You can use a Prometheus-compatible scraper to collect and aggregate these metrics for your own needs.