
MGraph Auth Migration

In the threat intelligence landscape, security and agility are foundational. Mandiant previously relied on a combination of PingFederate and Azure AD for authentication and authorization. While functional, this legacy setup presented several challenges as Mgraph(Mandaint Threat-Intel Graph System) became central to internal analytics:
​
-
Operational Friction: Routine workflows often required complex Mesa SSH proxies for human access.
-
Integration Gaps: Coupling with non-Google systems hindered the use of native Google services.
-
Scaling Constraints: Supporting modern access patterns, such as service-to-service calls or notebook exploration, was increasingly cumbersome.​
In 2024, at Google I led the migration of Mgraph (Mandaint Threat-Intel Graph System) to start using Google Native Authentication and Authorization system.
​
Introducing ControlTower
ControlTower is a custom authorization service purpose-built for Mandiant’s first-party applications on Google Cloud Platform (GCP). It replaces scattered authorization logic with a single, well-defined control plane. This service is hosted on Google Prod systems.
​
Key Architectural Pillars
​
-
Identity Source of Truth: The system standardizes on Ganpati Groups to validate both users and services.
-
Token-Based Access: ControlTower issues JSON Web Tokens (JWTs) containing narrowly scoped, application-specific claims to enable precise authorization.
-
Secure Connectivity: Bifrost is utilized to securely connect Google Cloud workloads with internal production systems without exposing services directly.
​
​​
Dual Authentication Flows
ControlTower is designed to optimize both security and usability by supporting two distinct access patterns.
​
1. Human User Access (User Token Flow)
​
To ensure strong security with minimal complexity, human users authenticate via corporate identity systems handled by UberProxy.
-
Exchange: UberProxy (Google proxy connectivity service) provides an X-Uptick-Signed-Token.
-
Validation: ControlTower exchanges this for a signed JWT based on Ganpati group (Google internal AD equivalent)membership
-
Outcome: Users authenticate seamlessly via Google LDAP, eliminating the need for SSH proxies.
​
2. Machine-to-Machine Access (Service Token Flow)
​
For services, the architecture moves away from static secrets in favor of Workload Identity (WKID).
-
Identity: Services run in GKE pods or VMs bound to a WKID service account.
-
Validation: Requests traverse Bifrost ( a connectivity mechanism for connecting from Cloud to Prod) to ControlTower, which verifies the service account and group membership.
-
Outcome: This eliminates long-lived secrets and aligns with zero-trust principles.
Access Flows at a Glance​​
​
​

Strategic Outcomes
The migration to a Google-native framework has resulted in three concrete improvements:
-
Stronger Security: Alignment with Google standards, including GIN logging and Access-on-Demand, provides default defense-in-depth.
-
Enhanced Productivity: Users now experience a frictionless login process.
-
Expanded Capabilities: The new model unlocks secure access from Colab notebooks and direct data consumption by Nirvana services.
​
The deprecation of legacy IDAM and PingFederate represents more than a technical cleanup—it is a strategic upgrade that allows Mandiant to move faster and scale with the complexity of modern threat intelligence.
​
