I’m trying to secure a Cloud Run service with Identity-Aware Proxy in a Cloud Identity Free org (no Workspace subscription).
-
IAP is enabled on the Cloud Run service.
-
My user has roles/iap.httpsResourceAccessor.
-
The IAP-managed service account (
service-PROJECT_NUMBER@gcp-sa-iap.iam.gserviceaccount.com
) has roles/run.invoker. -
An Internal OAuth consent screen is configured in the same project.
-
All “Additional Google Services” (including Google Cloud / IAP) are turned ON for my OU in the Admin Console.
-
I can log into console.cloud.google.com with this account.
Problem:
When I try to access the Cloud Run URL, I am redirected to: https://access.workspace.google.com/ServiceNotAllowed?application=…
“We are sorry but you do not have access to this service. Please log in to your Admin Console ot enable this service.”
instead of the IAP login/consent screen or the app.
Troubleshooting done:
-
Verified OAuth brand exists (Internal).
-
Tested in Incognito with only corp account signed in.
-
Re-applied IAM bindings for both user and IAP service account.
What else could cause the IAP browser flow to be redirected to ServiceNotAllowed
in a Cloud Identity Free organization, given that all required services and roles appear to be enabled? Is it mandated to have a workspace subscription?