GCP Professional Cloud Security Engineer Practice Question
Your organization uses an on-premises Active Directory that is synchronized to Azure AD. Security policy forbids storing user passwords outside the corporate IdP, yet engineers must sign in to the Google Cloud Console and the gcloud CLI with their existing user principal names (UPNs). A Cloud Identity tenant has already been created and the corporate DNS domain is verified. Which approach meets these requirements while keeping administrative effort low?
Create a Workload Identity Federation pool that trusts Azure AD and have engineers use gcloud auth login --workforce-pool-user-token; no changes to SAML settings are required.
Generate a user-managed service account key for every engineer and instruct them to run gcloud auth activate-service-account when they need console or CLI access.
Enable password synchronization in Google Cloud Directory Sync so hashed passwords are copied from Active Directory to Cloud Identity, allowing users to authenticate directly with Google.
Configure Cloud Identity for SAML 2.0 single sign-on with Azure AD, setting the UPN as the SAML Subject (NameID) and enabling Google-initiated (SP-initiated) SSO for the verified domain.
To keep passwords only in the corporate IdP and still let engineers authenticate to Google-hosted services, Google Cloud must act as a SAML 2.0 service provider and delegate authentication to Azure AD. This is done by enabling third-party SSO in Cloud Identity, importing Azure AD's SAML metadata, and configuring Azure AD to send the user's UPN as the SAML Subject (NameID). After the trust is in place, users start at the Google sign-in page (SP-initiated flow); Google redirects them to Azure AD for authentication and accepts the signed assertion to create a session.
Incorrect answers:
GCDS never synchronizes passwords, so enabling it cannot satisfy the requirement and would still leave authentication at Google.
Distributing user-managed service-account keys gives non-human credentials, does not produce interactive console sessions, and exposes long-lived secrets.
Workload Identity Federation is designed for non-human workloads; engineers cannot open the Cloud Console with those tokens, and extra configuration would exceed the requested minimal overhead.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SAML 2.0 and how does it work in authentication?
Open an interactive chat with Bash
What is UPN and why is it used in this setup?
Open an interactive chat with Bash
What is SP-initiated SSO and how does it differ from IdP-initiated SSO?
Open an interactive chat with Bash
What is SAML 2.0 single sign-on (SSO)?
Open an interactive chat with Bash
What is the SP-initiated SSO flow?
Open an interactive chat with Bash
Why is password synchronization not suitable for this setup?
Open an interactive chat with Bash
GCP Professional Cloud Security Engineer
Configuring Access
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
Pass with Confidence.
IT & Cybersecurity Package
You have hit the limits of our free tier, become a Premium Member today for unlimited access.
Military, Healthcare worker, Gov. employee or Teacher? See if you qualify for a Community Discount.
Monthly
$19.99
$19.99/mo
Billed monthly, Cancel any time.
3 Month Pass
$44.99
$14.99/mo
One time purchase of $44.99, Does not auto-renew.
MOST POPULAR
Annual Pass
$119.99
$9.99/mo
One time purchase of $119.99, Does not auto-renew.
BEST DEAL
Lifetime Pass
$189.99
One time purchase, Good for life.
What You Get
All IT & Cybersecurity Package plans include the following perks and exams .