All posts

The simplest way to make Cloud Run Windows Server Core work like it should

You boot up a container, expect smooth automation, and instead get a permissions puzzle wrapped inside a Microsoft DLL. This is the moment many engineers realize Cloud Run and Windows Server Core were never exactly designed to share coffee. Yet they can, and when done right, the pairing makes secure Windows workloads feel just as portable and fast as Linux ones. Cloud Run gives teams serverless containers with scaling, lazy loading, and built-in IAM pipes for Google-managed identity. Windows Se

Free White Paper

Kubernetes API Server Access + End-to-End Encryption: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

You boot up a container, expect smooth automation, and instead get a permissions puzzle wrapped inside a Microsoft DLL. This is the moment many engineers realize Cloud Run and Windows Server Core were never exactly designed to share coffee. Yet they can, and when done right, the pairing makes secure Windows workloads feel just as portable and fast as Linux ones.

Cloud Run gives teams serverless containers with scaling, lazy loading, and built-in IAM pipes for Google-managed identity. Windows Server Core is Microsoft’s minimal runtime that still carries the full .NET and PowerShell muscle many enterprise apps depend on. Combined, they bridge legacy and cloud-native logic. But bridging these worlds means solving identity and access before performance.

When you run a Windows Server Core container in Cloud Run, the trick is to manage lifecycle and session state without persistent machine accounts. The pattern is simple: use workload identity federation or OIDC to hand short-lived credentials from Cloud IAM into your Windows process. No shared keys, no static tokens. Permissions travel only as far as your container lives.

Here’s how it flows. Cloud Run receives an HTTP request and authenticates it with its built-in identity envelope. That identity can be mapped into a service principal inside Windows Server Core using OAuth-protected configuration files or OIDC tokens from providers like Okta or AWS IAM. The Windows container reads those tokens, verifies them, and executes inside that scoped trust boundary.

A common question is whether Windows Server Core actually runs in Cloud Run. Yes. Containers built on Windows Nano or Core can execute if they follow Open Container Initiative image standards. The Windows layer handles .NET logic, while Cloud Run governs scaling and access. The result feels weirdly natural: Microsoft stack meets Google control plane.

Continue reading? Get the full guide.

Kubernetes API Server Access + End-to-End Encryption: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Best practices:

  • Rotate tokens every deployment to avoid credential drift.
  • Keep your startup script short to minimize cold starts.
  • Use minimal base images—Core beats Full every time.
  • Log to stdout, not event viewer. Cloud Run expects it.
  • Map roles through OIDC groups, not local Admin rights.

The benefits show up fast:

  • Security improves with zero long-lived credentials.
  • Build pipelines shrink because no VM setup is required.
  • Audit trails tie neatly into Cloud Audit Logs.
  • Consistent behavior across environments, from dev laptops to production clusters.
  • Faster debugging when you can inspect containers like normal requests instead of remote Windows sessions.

Developer velocity jumps because you stop thinking about user accounts and start shipping code. You can route approvals automatically, limit policy churn, and move between staging and prod without rewriting credentials. Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. The workflow stays flexible while compliance stays tight.

If you bring AI copilots into the flow, this foundation gets even better. These agents can now act safely inside your Windows Core runtime using pre-scoped identities. They can automate patching and configuration without opening an entire Active Directory floodgate.

How do I connect Cloud Run to a Windows Server Core container?

You build your container image on Windows, publish to Container Registry, and deploy through Cloud Run specifying the Windows base. Cloud IAM manages authentication, while your Windows Core layer runs the app logic. No infrastructure needed, no patch nights.

The takeaway is simple. You can blend Cloud Run’s managed identity and Windows Server Core’s enterprise strength without compromising speed or isolation. It just requires disciplined token handling and lightweight containers.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts