Featured resource
2026 Tech Forecast
2026 Tech Forecast

1,500+ tech insiders, business leaders, and Pluralsight Authors share their predictions on what’s shifting fastest and how to stay ahead.

Download the forecast
  • Lab
    • Libraries: If you want this lab, consider one of these libraries.
    • Cloud
Labs

Securing Cloud Run Service to Service Calls with OIDC and IAM

This hands-on lab explores how misconfigurations in Cloud Run services, such as missing authentication and incorrect environment configuration, can lead to failed internal service communication and 403 errors. Learners investigate these failures by analyzing service behavior and logs to identify issues in identity token generation and request flow. By implementing OIDC-based authentication and proper service access configuration, secure service-to-service communication is established and validated through a successful response.

Lab platform
Lab Info
Level
Intermediate
Last updated
Apr 24, 2026
Duration
30m

Contact sales

By clicking submit, you agree to our Privacy Policy and Terms of Use, and consent to receive marketing emails from Pluralsight.
Table of Contents
  1. Challenge

    Deploy a secured Cloud Run service that enforces authenticated access
    1. Enforce access control at the application layer by validating incoming requests and explicitly rejecting those without proper authentication signals.
    2. Design the service to simulate a private API boundary, ensuring only trusted, authenticated calls are processed while all others are denied.
  2. Challenge

    Implement OIDC-based identity token generation for service-to-service communication
    1. Implement identity-based communication by leveraging platform-native token providers to generate short-lived OIDC tokens tied to the service identity.
    2. Ensure secure request propagation by attaching the token to outbound calls, enabling the receiving service to validate the caller’s identity and trust boundary.
  3. Challenge

    Configure Cloud Run IAM permissions and validate secure backend access
    1. Establish a controlled trust boundary by allowing only authorized identities to invoke the service, ensuring access is explicitly granted rather than implicitly open.
    2. Verify end-to-end security by confirming that authenticated requests succeed while unauthorized access is consistently rejected, reinforcing correct policy enforcement.
About the author

Pluralsight Skills gives leaders confidence they have the skills needed to execute technology strategy. Technology teams can benchmark expertise across roles, speed up release cycles and build reliable, secure products. By leveraging our expert content, skill assessments and one-of-a-kind analytics, keep up with the pace of change, put the right people on the right projects and boost productivity. It's the most effective path to developing tech skills at scale.

Real skill practice before real-world application

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Learn by doing

Engage hands-on with the tools and technologies you’re learning. You pick the skill, we provide the credentials and environment.

Follow your guide

All labs have detailed instructions and objectives, guiding you through the learning process and ensuring you understand every step.

Turn time into mastery

On average, you retain 75% more of your learning if you take time to practice. Hands-on labs set you up for success to make those skills stick.

Get started with Pluralsight