Google Apigee is a full lifecycle API management platform that enables organizations to design, secure, deploy, monitor, and scale APIs. With its comprehensive set of features and scalable architecture, Google Apigee empowers developers to build efficient, reliable, and secure APIs that drive business growth.
Below you can find the Aembit configuration required to work with the Google Apigee service as a Server Workload using the REST APIs.
Aembit supports multiple authentication/authorization methods for Apigee. This page describes scenarios where the Credential Provider is configured for Apigee via:
OAuth 2.0 Authorization Code
Section titled “OAuth 2.0 Authorization Code”Server Workload Configuration
Section titled “Server Workload Configuration”- Create a new Server Workload.
- Name - Choose a user-friendly name.
- Configure the Service endpoint:
- Host -
apigee.googleapis.com
- Application Protocol - HTTP
- Port - 443 with TLS
- Forward to Port - 443 with TLS
- Authentication method - HTTP Authentication
- Authentication scheme - Bearer
Credential Provider Configuration
Section titled “Credential Provider Configuration”-
Sign in to the Google Cloud Console and navigate to the Credentials page. Ensure you are working within a GCP project for which you have authorization.
-
On the Credentials dashboard, click Create Credentials located in the top left corner and select the OAuth client ID option.
- If there is no configured Consent Screen for your project, you will see a Configure Consent Screen button on the directed page. Click the button to continue.
-
Choose User Type and click Create.
- Provide a name for your app.
- Choose a user support email from the dropdown menu.
- App logo and app domain fields are optional.
- Enter at least one email for the Developer contact information field.
- Click Save and Continue.
- You may skip the Scopes step by clicking Save and Continue once again.
- In the Summary step, review the details of your app and click Back to Dashboard.
-
Navigate back to Credentials page, click Create Credentials, and select the OAuth client ID option again.
- Choose Web Application for Application Type.
- Provide a name for your web client.
- Switch to the Aembit UI to create a new Credential Provider, selecting the OAuth 2.0 Authorization Code credential type. After setting up the Credential Provider, copy the auto-generated Callback URL.
- Return to Google Cloud Console and paste the copied URL into the Authorized redirect URIs field.
- Click Create.
-
A pop-up window will appear. Copy both the Client ID and the Client Secret. Store them for later use in the tenant configuration.
-
Edit the existing Credential Provider created in the previous steps.
- Name - Choose a user-friendly name.
- Credential Type - OAuth 2.0 Authorization Code
- Callback URL (Read-Only) - An auto-generated Callback URL from Aembit Admin.
- Client Id - Provide the Client ID copied from Google.
- Client Secret - Provide the Secret copied from Google.
- Scopes - Enter the scopes you will use for Apigee (e.g.
https://www.googleapis.com/auth/cloud-platform
) A full list of GCP Scopes can be found at OAuth 2.0 Scopes for Google APIs. - OAuth URL -
https://accounts.google.com
Click on URL Discovery to populate the Authorization and Token URL fields, which can be left as populated.
- PKCE Required - Off
- Lifetime - 1 year (A Google Cloud Platform project with an OAuth consent screen configured for an external user type and a publishing status of Testing is issued a refresh token expiring in 7 days).
Google does not specify a refresh token lifetime for the internal user type selected version; this value is recommended by Aembit. For more information, refer to the official Google documentation.
-
Click Save to save your changes on the Credential Provider.
-
In Aembit UI, click the Authorize button. You will be directed to a page where you can choose your Google account first. Then click Allow to complete the OAuth 2.0 Authorization Code flow. You will see a success page and will be redirected to Aembit automatically. You can also verify your flow is complete by checking the State value in the Credential Provider. After completion, it should be in a Ready state.
API Key
Section titled “API Key”Create Apigee API Proxy
Section titled “Create Apigee API Proxy”-
Navigate to the Apigee UI in Cloud console and sign in with your Google Cloud account.
-
In the left navigation pane, select API Proxies under the Proxy development section.
-
On the API Proxies dashboard, click Create in the top left corner.
-
You will be prompted to choose a proxy type; keep the default Reverse proxy option and provide the any other required information.
-
Once you have configured your proxy, deploy it to make the API proxy active.
Server Workload Configuration
Section titled “Server Workload Configuration”To locate the environment group hostname for your proxy in the Apigee UI, follow these steps:
-
Navigate to the Apigee UI and sign in with your Google Cloud account.
-
In the Apigee UI, go to Management > Environments > Groups.
-
Identify the row displaying the environment where your proxy is deployed.
-
Copy the endpoint for later use in the tenant configuration.
- Create a new Server Workload.
- Name - Choose a user-friendly name.
- Configure the service endpoint:
- Host -
<environment-group-hostname>.com
(Provide the endpoint copied from Apigee UI) - Application Protocol - HTTP
- Port - 443 with TLS
- Forward to Port - 443 with TLS
- Authentication method - API Key
- Authentication scheme - Query Parameter
- Query Parameter - apikey
Credential Provider Configuration
Section titled “Credential Provider Configuration”-
Navigate to the Apigee UI in Cloud console and sign in with your Google Cloud account.
-
In the left navigation pane, select Apps to access a list of your applications.
-
Click on the name of the app to view its details.
-
Within the Credentials section, click the icon to Copy to clipboard next to Key and securely store the key for later use in the tenant configuration.
- Create a new Credential Provider.
- Name - Choose a user-friendly name.
- Credential Type - API Key
- API Key - Provide the key copied from Google Cloud Apigee console.
Client Workload Configuration
Section titled “Client Workload Configuration”Aembit now handles the credentials required to access the Server Workload, eliminating the need for you to manage them directly. You can safely remove any previously used credentials from the Client Workload.
If you access the Server Workload through an SDK or library, it is possible that the SDK/library may still require credentials to be present for initialization purposes. In this scenario, you can provide placeholder credentials. Aembit will overwrite these placeholder credentials with the appropriate ones during the access process.
Access Policy
Section titled “Access Policy”- Create an Access Policy for a Client Workload to access the Apigee Server Workload. Assign the newly created Credential Provider to this Access Policy.
Required Features
Section titled “Required Features”- You will need to configure the TLS Decrypt feature to work with the Apigee Server Workload.