Please note that the contents of this offline web site may be out of date. To access the most recent documentation visit the online version .
Note that links that point to online resources are green in color and will open in a new window.
We would love it if you could give us feedback about this material by filling this form (You have to be online to fill it)



App Identity Java API Overview

Code sometimes needs to determine the identifier of the application in which it is executing. This may be to generate a URL or email address, or possibly to make some run-time decision. App Engine includes an Application Identity service for this purpose.

  1. Identifying itself
  2. Asserting identity to other App Engine apps
  3. Asserting identity to Google APIs
  4. Asserting identity to other systems

Identifying itself

Application ID

The application ID can be found using the ApiProxy.Environment.getAppId() method.

Versioned hostnames

A related operation is the need to get the hostname part of a URL to the application. You can use the com.google.appengine.runtime.default_version_hostname attribute of the CurrentEnvironment for this purpose. This is useful in certain scenarios when the application is not available at http://your_app_id.appspot.com .

public void doGet(HttpServletRequest req, HttpServletResponse resp) throws IOException {
  resp.setContentType("text/plain");
  Environment env = ApiProxy.getCurrentEnvironment();
  resp.getWriter().println("default_version_hostname: "
      + env.getAttributes().get("com.google.appengine.runtime.default_version_hostname"));
}

Asserting identity to other App Engine apps

If you want to determine the identity of the App Engine app that is making a request to your App Engine app, you can use the request header X-Appengine-Inbound-Appid . This header is added to the request by the URLFetch service and is not user modifiable, so it safely indicates the requesting application's ID, if present.

In order for this header to be added to the request, the app making the request must tell the UrlFetch service to not follow redirects when it invokes URLFetch. That is, your app must specify doNotFollowRedirect if it uses the URLFetchService class. If your app uses java.net , it must set the connection as follows: connection.setInstanceFollowRedirects(false); App Engine will then automatically add the header to the HTTP response.

In your application handler, you can check the incoming ID by reading the X-Appengine-Inbound-Appid header and comparing it to a list of IDs allowed to make requests.

Asserting identity to Google APIs

Many Google APIs support OAuth assertions to identify the source of the request. The App Identity API provides a service that creates tokens that can be used to assert that the source of a request is the application itself. The getAccessToken() method returns an access token for a scope, or list of scopes. This token can then be set in the HTTP headers of a call to identify the calling application.

The following illustrates a REST call to the Google URL Shortener API. Note that the Google Data Client Libraries can also manage much of this for you automatically.

import com.google.appengine.api.appidentity.AppIdentityService;
import com.google.appengine.api.appidentity.AppIdentityServiceFactory;
import java.io.OutputStreamWriter;
import java.net.HttpURLConnection;
import java.net.URL;
import java.util.ArrayList;
// Note that any JSON parser can be used; this one is used for illustrative purposes.
import org.json.JSONObject;
import org.json.JSONTokener;


public String createShortUrl(String longUrl) throws Exception {
    try {
        ArrayList<String> scopes = new ArrayList<String>();
        scopes.add("https://www.googleapis.com/auth/urlshortener");
        AppIdentityService appIdentity = AppIdentityServiceFactory.getAppIdentityService();
        AppIdentityService.GetAccessTokenResult accessToken = appIdentity.getAccessToken(scopes);
        // The token asserts the identity reported by appIdentity.getServiceAccountName()
        JSONObject request = new JSONObject();
        request.put("longUrl", longUrl);

        URL url = new URL("https://www.googleapis.com/urlshortener/v1/url?pp=1");
        HttpURLConnection connection = (HttpURLConnection) url.openConnection();
        connection.setDoOutput(true);
        connection.setRequestMethod("POST");
        connection.addRequestProperty("Content-Type", "application/json");
        connection.addRequestProperty("Authorization", "OAuth " + accessToken.getAccessToken());

        OutputStreamWriter writer = new OutputStreamWriter(connection.getOutputStream());
        request.write(writer);
        writer.close();

        if (connection.getResponseCode() == HttpURLConnection.HTTP_OK) {
            // Note: Should check the content-encoding.
            JSONTokener response_tokens = new JSONTokener(connection.getInputStream());
            JSONObject response = new JSONObject(response_tokens);
            return (String) response.get("id");
        } else {
            throw new Exception();
        }
    } catch (Exception e) {
        // Error handling elided.
        throw e;
    }
}

Note that the application's identity is represented by the service account name, which is typically [email protected] . You can get the exact value by using the getServiceAccountName() method. For services which offer ACLs, you can grant the application access by granting this account access.

Asserting identity to other systems

The token generated by getAccessToken() only works against Google systems. However you can use the underlying signing technology to assert the identity of your application to other systems. The signForApp() method will sign bytes using a private key unique to your application, and the getPublicCertificatesForApp() method will return certificates which can be used to validate the signature.

Authentication required

You need to be signed in with Google+ to do that.

Signing you in...

Google Developers needs your permission to do that.