StackShareStackShare
Follow on
StackShare

Discover and share technology stacks from companies around the world.

Product

  • Stacks
  • Tools
  • Companies
  • Feed

Company

  • About
  • Blog
  • Contact

Legal

  • Privacy Policy
  • Terms of Service

© 2025 StackShare. All rights reserved.

API StatusChangelog
Google Cloud Identity-Aware Proxy

Google Cloud Identity-Aware Proxy

#58in Authentication
Discussions0
Followers3
OverviewDiscussions

What is Google Cloud Identity-Aware Proxy?

It lets you establish a central authorization layer for applications accessed by HTTPS, so you can use an application-level access control model instead of relying on network-level firewalls.

Google Cloud Identity-Aware Proxy is a tool in the Authentication category of a tech stack.

Key Features

Control access to your cloud-based and on-premises applications and VMs running on Google CloudVerify user identity and use context to determine if a user should be granted accessWork from untrusted networks without the use of a VPNImplement a zero-trust access model

Google Cloud Identity-Aware Proxy Pros & Cons

Pros of Google Cloud Identity-Aware Proxy

No pros listed yet.

Cons of Google Cloud Identity-Aware Proxy

No cons listed yet.

Google Cloud Identity-Aware Proxy Alternatives & Comparisons

What are some alternatives to Google Cloud Identity-Aware Proxy?

Auth0

Auth0

A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.

Keycloak

Keycloak

It is an Open Source Identity and Access Management For Modern Applications and Services. It adds authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.

JSON Web Token

JSON Web Token

JSON Web Token is an open standard that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed.

OAuth2

OAuth2

It is an authorization framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.

Amazon Cognito

Amazon Cognito

You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline.

Spring Security

Spring Security

It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.

Try It

Visit Website

Adoption

On StackShare

Companies
2
MF
Developers
3
YVA