know.2nth.ai โ€บ Technology โ€บ tech โ€บ google
tech/google ยท Sub-domain hub

Two product families.
One identity plane.

Google runs two overlapping platforms under one auth system โ€” Google Cloud (GCP) for infrastructure, Google Workspace for productivity APIs. The same service-account identity that grants BigQuery access can also, with domain-wide delegation, act on behalf of every Gmail user in your org. In the 2nth stack GCP is the heavy-lift tier beside AWS โ€” Vertex AI for Gemini + Claude, BigQuery for analytics, Cloud Run for ERPNext โ€” while Workspace powers Penny briefings, intake flows, and diary orchestration.

15
Skill nodes
7
Production depth
1
Live explainer
01 ยท Google Cloud

GCP, by what it's actually good at.

Seven skill nodes under tech/google/cloud/*. Three at production depth (Compute, AI, Data) โ€” the reasons most teams actually reach for GCP instead of AWS. Four still stubs (Security, Storage, Database, Networking) with fast-start snippets and the right decision trees. The pattern: Cloudflare at the edge โ†’ Cloud Run for the heavy lift โ†’ BigQuery / Vertex AI for data + AI.

Production depth ยท 3
Stubs ยท 4
02 ยท Google Workspace

Workspace APIs, as an ops layer.

Five skill nodes under tech/google/workspace/*. Gmail is at production depth โ€” the engine behind the Penny briefing pattern (Watch โ†’ Pub/Sub โ†’ classify โ†’ draft reply โ†’ label). Drive, Sheets, Calendar, and Admin SDK are stubs with the common operations and the auth gotchas. The whole subtree runs on OAuth 2.0 for user-delegated access or service-account domain-wide delegation (DWD) for server jobs that act as any user in the tenant.

03 ยท The shared pattern

One identity plane. Four credential types.

Cloud and Workspace look like different platforms. They're not โ€” both sit on Cloud IAM, both use OAuth 2.0 or service accounts, both grant access through role bindings against principals. The difference is what's being accessed (project-owned infra vs user-owned data) and who consents (the end user, or a Workspace admin once, via domain-wide delegation).

User OAuth vs service account vs DWD vs Workload Identity

Pick the credential by what you're accessing and who's present. The same service account can wear all four hats depending on how it's wired.

# Decision table โ€” which credential for what

User OAuth 2.0      # Access ONE user's Gmail / Drive (they click "Allow")
                     # Stores refresh_token per user; access_token ~1h

Service account     # Server code touching PROJECT-owned GCP resources
                     # (BigQuery, GCS, Vertex AI, Pub/Sub)
                     # JSON key locally OR Workload Identity at runtime

SA + DWD            # Server job acting as ANY user in a Workspace domain
                     # (Gmail, Drive, Calendar, Admin SDK)
                     # Workspace admin grants scopes to the SA's client_id
                     # JWT sub = user@domain.com โ†’ impersonation token

Workload Identity   # GKE / Cloud Run / Functions reach GCP APIs with
Federation          # NO static JSON key. External IdPs (AWS, GitHub OIDC,
                     # Okta) federate into an SA via short-lived tokens.

# The same service account, with the right bindings, can do all four.

The cross-cloud trick: a Cloudflare Worker with one service-account private key stored as a Worker secret mints JWTs via Web Crypto, exchanges them for Google tokens, and reaches Gmail, Drive, Sheets, Calendar, and BigQuery in the trusted tenant โ€” all without Node SDKs. That's the workspace-bridge pattern documented in the skill node. One secret, one Worker, any Workspace API in a trusted domain.

04 ยท Regional context

africa-south1 โ€” fit and gaps.

Google opened a Johannesburg region in 2024. For SA-based clients it's the POPIA-fit default โ€” Cloud Run, Compute Engine, GCS, Cloud SQL, GKE, BigQuery regional, Pub/Sub all land there. Service-availability gaps are the thing to watch: Vertex AI Gemini endpoints, some Dataflow templates, and a handful of newer managed services still ship to europe-west2 (London) or us-central1 first. The design pattern: SA data lives in africa-south1, inference calls hop to europe-west2 with a documented transfer basis, and cross-continent egress stays async via Pub/Sub or scheduled Dataflow โ€” never per-request.

05 ยท Related branches

Where the Google branch connects.

Google sits beside AWS as the second compute substrate, next to Cloudflare as the edge. Vertex AI is the reason many builds pick GCP over AWS; Workspace is the reason Penny briefings and intake automations have anywhere to live. Every leaf here has a twin in the AWS branch and an edge-side counterpart in Cloudflare.