Fixed
Status Update
Comments
al...@google.com <al...@google.com>
[Deleted User] <[Deleted User]> #2
If I understand this feature request properly, then I agree. Right now in the console, you can only see a user's organization-level or project-level IAM roles. So if I grant a user a role on a BUCKET or BigQuery TABLE, I can't look it up anywhere as far as I can tell (other than by looking at the bucket or table permissions). It won't show this permission when I go to IAM&Admin->Admin.
For managing all permissions across my organization, I would like to be able to look up, in one place, all permissions that a user has (all of the permissions at the organization, project, and lower levels, all together in one chart).
The initial feature request is to allow this with gcloud, but I think it applies to the console too.
For managing all permissions across my organization, I would like to be able to look up, in one place, all permissions that a user has (all of the permissions at the organization, project, and lower levels, all together in one chart).
The initial feature request is to allow this with gcloud, but I think it applies to the console too.
ni...@gmail.com <ni...@gmail.com> #3
Hi all,
we currently have the same issue. We gave a user who only briefly worked on a few of our projects permissions. We would like to completely remove the user from our system but that is difficult to do when we are unable to get an overview which projects/folders/etc. the user was given permissions on.
It would be great to enter look up for each individual user (or other type of identity) where permissions were given.
Best Regards
Nikita
we currently have the same issue. We gave a user who only briefly worked on a few of our projects permissions. We would like to completely remove the user from our system but that is difficult to do when we are unable to get an overview which projects/folders/etc. the user was given permissions on.
It would be great to enter look up for each individual user (or other type of identity) where permissions were given.
Best Regards
Nikita
li...@google.com <li...@google.com> #4
1. Who are granted a given permission in my org?
gcloud asset search-all-iam-policies \
--scope=organizations/123456 \
--query='policy.role.permissions:resourcemanager.projects.setIamPolicy'
2. Which policies under my folder contain a given user?
gcloud asset search-all-iam-policies \
--scope=folders/123456 \
--query='policy:foo@bar.com'
3. Which policies grant a given role under my project?
gcloud asset search-all-iam-policies \
--scope=projects/my-project \
--query='policy:roles/owner'
Note that we only support IAM policies for resource types as listed under "Searchable asset types":
https://cloud.google.com/asset-inventory/docs/supported-asset-types#searchable_asset_types
More query examples:
https://cloud.google.com/asset-inventory/docs/searching-iam-policies-samples
How to start:https://cloud.google.com/asset-inventory/docs/searching-iam-policies
gcloud asset search-all-iam-policies \
--scope=organizations/123456 \
--query='policy.role.permissions:resourcemanager.projects.setIamPolicy'
2. Which policies under my folder contain a given user?
gcloud asset search-all-iam-policies \
--scope=folders/123456 \
--query='policy:foo@bar.com'
3. Which policies grant a given role under my project?
gcloud asset search-all-iam-policies \
--scope=projects/my-project \
--query='policy:roles/owner'
Note that we only support IAM policies for resource types as listed under "Searchable asset types":
More query examples:
How to start:
sa...@google.com <sa...@google.com>
sa...@google.com <sa...@google.com> #5
Hello,
I’m pleased to inform you that our product engineering team has resolved the reported issue. Please verify if the problem has been resolved from your end as well.
Product Engineer Team Comments:
If you encounter any further issues or have any additional concerns, please don't hesitate to create a new issue on the
I will now proceed to close this issue. If you have any other questions or need further assistance, please feel free to let us know.
Description
Currently, we can get only the list all IAM roles for a specific user
gcloud projects get-iam-policy Project_Name | grep -E 'USER|role'
gcloud iam roles describe roles/compute.admin