IntroductionΒΆ

For the purpose of this tutorial, we will assume that your organization has an instance of Google Workspace, populated with several user accounts which typically sign into Google applications with their cloud credentials.

We will deploy a proxy virtual machine into Amazon AWS Cloud and configure it so that these same credentials could be used to sign-in into the proxy. Authenticated user names will then be utilized in web filtering policies, access logs, traffic monitoring and reporting modules.