class Google::Apis::HealthcareV1::Policy
- IAM documentation](cloud.google.com/iam/docs/).
BwWWja0YfJA= version: 3 “‘ For a description of IAM and its features, see the
expression: request.time < timestamp(’2020-10-01T00:00:00.000Z’) etag:
title: expirable access description: Does not grant access after Sep 2020
user:eve@example.com role: roles/resourcemanager.organizationViewer condition:
gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: -
example.com - domain:google.com - serviceAccount:my-project-id@appspot.
example:** “‘ bindings: - members: - user:mike@example.com - group:admins@
00:00.000Z’)“, ‘ ` ], ”etag“: ”BwWWja0YfJA=“, ”version“: 3 ` “` **YAML
access after Sep 2020”, “expression”: “request.time < timestamp(’2020-10-01T00:
], ”condition“: ‘ ”title“: ”expirable access“, ”description“: ”Does not grant
roles/resourcemanager.organizationViewer“, ”members“: [ ”user:eve@example.com“
serviceAccount:my-project-id@appspot.gserviceaccount.com” -
‘, ` “role”: “
”user:mike@example.com“, ”group:admins@example.com“, ”domain:google.com“, ”
bindings“: [ ` ”role“: ”roles/resourcemanager.organizationAdmin“, ”members“: [
google.com/iam/help/conditions/resource-policies). **JSON example:** “` ` ”
conditions in their IAM policies, see the [IAM documentation](cloud.
the request, the resource, or both. To learn which resources support
evaluates to `true`. A condition can add constraints based on attributes of
logical expression that allows access to a resource only if the expression
Cloud resources, a `binding` can also specify a `condition`, which is a
an IAM predefined role or a user-created custom role. For some types of Google
such as G Suite). A `role` is a named list of permissions; each `role` can be
Principals can be user accounts, service accounts, Google groups, and domains (
A `binding` binds one or more `members`, or principals, to a single `role`.
controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
An Identity and Access Management (IAM) policy, which specifies access
def initialize(**args)
def initialize(**args) update!(**args) end
def update!(**args)
def update!(**args) @audit_configs = args[:audit_configs] if args.key?(:audit_configs) @bindings = args[:bindings] if args.key?(:bindings) @etag = args[:etag] if args.key?(:etag) @version = args[:version] if args.key?(:version) end