The request hit the server. The authentication gateway did not move. Everything depended on the Identity-Aware Proxy Provisioning Key.
An Identity-Aware Proxy (IAP) sits between users and private resources, enforcing access controls at the edge. The Provisioning Key is the artifact that establishes trust between the proxy and the application it protects. Without it, the proxy cannot validate the identity claims sent by your identity provider. With it, you bind infrastructure to identity at the protocol level.
Provisioning Keys are generated during IAP setup and must be handled like any other sensitive credential. A key grants your proxy the authority to request, receive, and verify identity assertions for workloads behind it. Misplacing it or letting it leak means an attacker could impersonate trusted services and bypass your guardrails. Store the key in a secure secrets manager. Never embed it in client code. Rotate it on a schedule and revoke it upon any suspicion of compromise.
To provision an Identity-Aware Proxy using the key, first issue the key from your control plane. Configure the proxy with endpoint URLs for your resource and identity provider. Inject the Provisioning Key into the secure config path. The proxy uses this key to register itself with your IAP backend, enabling signed verification of each session token. This is an explicit handshake—one side proves identity, the other verifies it—and the Provisioning Key is the cryptographic proof that allows the handshake to happen.