All posts

How to Configure Cloud Run Ubiquiti for Secure, Repeatable Access

You click deploy, everything looks fine, and then your Ubiquiti controller times out behind a VPN you forgot existed. Meanwhile, Cloud Run is happily stateless, scaling out faster than your network auth can catch up. That is the moment every DevOps engineer discovers why identity-aware access for mixed cloud and edge setups matters. Cloud Run Ubiquiti integration solves a simple but brutal problem: keeping ephemeral services in Google Cloud connected securely to physical gear that expects predi

Free White Paper

VNC Secure Access + Customer Support Access to Production: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

You click deploy, everything looks fine, and then your Ubiquiti controller times out behind a VPN you forgot existed. Meanwhile, Cloud Run is happily stateless, scaling out faster than your network auth can catch up. That is the moment every DevOps engineer discovers why identity-aware access for mixed cloud and edge setups matters.

Cloud Run Ubiquiti integration solves a simple but brutal problem: keeping ephemeral services in Google Cloud connected securely to physical gear that expects predictable identity. Ubiquiti’s UniFi and UISP platforms handle edge networking and device management. Cloud Run handles your ephemeral API endpoints or automation logic. Together, they let you push intelligence from the cloud straight into switches, routers, or controllers you own, without mangling your security model.

Here’s the trick. Cloud Run runs workloads behind Google’s managed identity layer. Each instance can authenticate through OpenID Connect (OIDC) or a service account. Ubiquiti gear expects authenticated HTTPS requests, often over constrained local networks. You marry these worlds using token exchange or identity proxying, mapping your Cloud Run service identity to a known, minimal Ubiquiti API user. That creates a fixed trust boundary without punching generous firewall holes.

Set credentials as environment variables using Google Secret Manager, not inline configs. Rotate them automatically, or better yet, rely on short-lived OIDC tokens. If you use Okta, you can federate users who trigger deployments or telemetry updates so Cloud Run picks up their claims for audit trails. Every access stays traceable, even though the service itself is transient.

Featured snippet–ready answer:
To integrate Cloud Run with Ubiquiti, expose your Ubiquiti controller through a secure endpoint, authenticate Cloud Run using OIDC or a managed service account, and proxy API calls through a limited-scope identity that enforces per-request authorization.

A few best practices keep things sane:

Continue reading? Get the full guide.

VNC Secure Access + Customer Support Access to Production: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • Align Cloud Run instance roles with least-privilege Ubiquiti API users.
  • Log inbound and outbound requests through Google Cloud Logging and correlate by request ID.
  • Use IAM Conditions for region and time enforcement.
  • Revoke stale tokens on pipeline completion.
  • Verify device fingerprints before executing configuration pushes.

The payoff is real.

  • Fast rollout of firmware policies from CI/CD pipelines.
  • Measurable reduction in manual SSH-to-router sessions.
  • Cleaner mapping between developers and device actions for SOC 2 controls.
  • Instant rollback when an automation goes rogue.

Developers love it because it kills waiting. No more VPN hopping just to update a controller. Once identity is mapped, Cloud Run spins and Ubiquiti answers. You can safely code automations that treat your network like part of the deployment fabric.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. They watch the same identity boundaries you define, only tighter, so your automation has freedom inside its lane and nowhere else.

How do I connect Cloud Run and Ubiquiti controllers?
Expose the Ubiquiti controller via HTTPS, issue it a token or OIDC-client credential, and point Cloud Run to that endpoint. The first successful 200 response usually confirms mutual trust between cloud and edge.

AI systems add another layer. When a copilot triggers device automation or patch rollout from Cloud Run, it inherits the identity context. That means your audit trail doesn’t blur human and machine actions. AI stays helpful without escaping policy.

In short, Cloud Run Ubiquiti integration collapses the network gap between ephemeral compute and persistent gear. Once identity and logs flow the same way, the whole system behaves like one clean deployment surface.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts