Skip to content
This repository was archived by the owner on Jun 23, 2025. It is now read-only.

Commit 5385d5c

Browse files
Clarify instructions for granting principal access in IAP configuration
1 parent 03bc745 commit 5385d5c

File tree

1 file changed

+1
-1
lines changed
  • tutorials-and-examples/langchain-chatbot

1 file changed

+1
-1
lines changed

tutorials-and-examples/langchain-chatbot/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -320,7 +320,7 @@ kubectl apply -n ${K8S_NAMESPACE} -f backend-config.yaml
320320
kubectl annotate service chat -n ${K8S_NAMESPACE} beta.cloud.google.com/backend-config=chat-ui
321321
```
322322

323-
Finally, go to the IAP page in the GCP Console and enable IAP for the application. Then, click on the checkbox next to the application and on the panel that appears on the right, click "Add Principal". Here you can specify which principals (users, groups, or domains) should be allowed or denied access. Common roles to consider include:
323+
Finally, go to the IAP page in the GCP Console and enable IAP for the application. Then, click on the checkbox next to the application and on the panel that appears on the right, click "Add Principal". Here you can specify which principals (users, groups, or domains) should be allowed or denied access. In order to grant principal access, add it to the list and assign the "IAP-secured Web App User" role. Consider the following types of principals:
324324

325325
- **Individual Users**: Add specific email addresses of users who should have access.
326326
- **Groups**: If you have a Google Group containing users who need access, add the group's email address.

0 commit comments

Comments
 (0)