The request hits your desk. Deploy an app behind an Identity-Aware Proxy. But user config is dependent. Every decision after this point affects security, latency, and maintainability.
An Identity-Aware Proxy (IAP) sits in front of your application, controlling access based on identity, context, and policy. In most cases, IAP is