Get desktop application:
View/edit binary Protocol Buffers messages
Creates and manages service account objects. Service account is an account that belongs to your project instead of to an individual end user. It is used to authenticate calls to a Google API. To create a service account, specify the `project_id` and `account_id` for the account. The `account_id` is unique within the project, and used to generate the service account email address and a stable `unique_id`. All other methods can identify accounts using the format `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`. Using `-` as a wildcard for the project will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
Lists [ServiceAccounts][google.iam.admin.v1.ServiceAccount] for a project.
The service account list request.
Required. The resource name of the project associated with the service accounts, such as `projects/my-project-123`.
Optional limit on the number of service accounts to include in the response. Further accounts can subsequently be obtained by including the [ListServiceAccountsResponse.next_page_token][google.iam.admin.v1.ListServiceAccountsResponse.next_page_token] in a subsequent request.
Optional pagination token returned in an earlier [ListServiceAccountsResponse.next_page_token][google.iam.admin.v1.ListServiceAccountsResponse.next_page_token].
The service account list response.
The list of matching service accounts.
To retrieve the next page of results, set [ListServiceAccountsRequest.page_token][google.iam.admin.v1.ListServiceAccountsRequest.page_token] to this value.
Gets a [ServiceAccount][google.iam.admin.v1.ServiceAccount].
The service account get request.
The resource name of the service account in the following format: `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`. Using `-` as a wildcard for the project will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
Creates a [ServiceAccount][google.iam.admin.v1.ServiceAccount] and returns it.
The service account create request.
Required. The resource name of the project associated with the service accounts, such as `projects/my-project-123`.
Required. The account id that is used to generate the service account email address and a stable unique id. It is unique within a project, must be 6-30 characters long, and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])` to comply with RFC1035.
The [ServiceAccount][google.iam.admin.v1.ServiceAccount] resource to create. Currently, only the following values are user assignable: `display_name` .
Updates a [ServiceAccount][google.iam.admin.v1.ServiceAccount]. Currently, only the following fields are updatable: `display_name` . The `etag` is mandatory.
Deletes a [ServiceAccount][google.iam.admin.v1.ServiceAccount].
The service account delete request.
The resource name of the service account in the following format: `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`. Using `-` as a wildcard for the project will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
Lists [ServiceAccountKeys][google.iam.admin.v1.ServiceAccountKey].
The service account keys list request.
The resource name of the service account in the following format: `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`. Using `-` as a wildcard for the project, will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
Filters the types of keys the user wants to include in the list response. Duplicate key types are not allowed. If no key type is provided, all keys are returned.
The service account keys list response.
The public keys for the service account.
Gets the [ServiceAccountKey][google.iam.admin.v1.ServiceAccountKey] by key id.
The service account key get by id request.
The resource name of the service account key in the following format: `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}/keys/{key}`. Using `-` as a wildcard for the project will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
The output format of the public key requested. X509_PEM is the default output format.
Creates a [ServiceAccountKey][google.iam.admin.v1.ServiceAccountKey] and returns it.
The service account key create request.
The resource name of the service account in the following format: `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`. Using `-` as a wildcard for the project will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
The output format of the private key. `GOOGLE_CREDENTIALS_FILE` is the default output format.
Which type of key and algorithm to use for the key. The default is currently a 2K RSA key. However this may change in the future.
Deletes a [ServiceAccountKey][google.iam.admin.v1.ServiceAccountKey].
The service account key delete request.
The resource name of the service account key in the following format: `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}/keys/{key}`. Using `-` as a wildcard for the project will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
Signs a blob using a service account's system-managed private key.
The service account sign blob request.
The resource name of the service account in the following format: `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`. Using `-` as a wildcard for the project will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
The bytes to sign.
The service account sign blob response.
The id of the key used to sign the blob.
The signed blob.
Signs a JWT using a service account's system-managed private key. If no expiry time (`exp`) is provided in the `SignJwtRequest`, IAM sets an an expiry time of one hour by default. If you request an expiry time of more than one hour, the request will fail.
The service account sign JWT request.
The resource name of the service account in the following format: `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`. Using `-` as a wildcard for the project will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
The JWT payload to sign, a JSON JWT Claim set.
The service account sign JWT response.
The id of the key used to sign the JWT.
The signed JWT.
Returns the IAM access control policy for a [ServiceAccount][google.iam.admin.v1.ServiceAccount].
Sets the IAM access control policy for a [ServiceAccount][google.iam.admin.v1.ServiceAccount].
Tests the specified permissions against the IAM access control policy for a [ServiceAccount][google.iam.admin.v1.ServiceAccount].
Queries roles that can be granted on a particular resource. A role is grantable if it can be used as the role in a binding for a policy for that resource.
The grantable role query request.
Required. The full resource name to query from the list of grantable roles. The name follows the Google Cloud Platform resource format. For example, a Cloud Platform project with id `my-project` will be named `//cloudresourcemanager.googleapis.com/projects/my-project`.
Optional limit on the number of roles to include in the response.
Optional pagination token returned in an earlier QueryGrantableRolesResponse.
The grantable role query response.
The list of matching roles.
To retrieve the next page of results, set `QueryGrantableRolesRequest.page_token` to this value.
Lists the Roles defined on a resource.
The request to get all roles defined under a resource.
The resource name of the parent resource in one of the following formats: `` (empty string) -- this refers to curated roles. `organizations/{ORGANIZATION_ID}` `projects/{PROJECT_ID}`
Optional limit on the number of roles to include in the response.
Optional pagination token returned in an earlier ListRolesResponse.
Optional view for the returned Role objects.
Include Roles that have been deleted.
The response containing the roles defined under a resource.
The Roles defined on this resource.
To retrieve the next page of results, set `ListRolesRequest.page_token` to this value.
Gets a Role definition.
The request to get the definition of an existing role.
The resource name of the role in one of the following formats: `roles/{ROLE_NAME}` `organizations/{ORGANIZATION_ID}/roles/{ROLE_NAME}` `projects/{PROJECT_ID}/roles/{ROLE_NAME}`
Creates a new Role.
The request to create a new role.
The resource name of the parent resource in one of the following formats: `organizations/{ORGANIZATION_ID}` `projects/{PROJECT_ID}`
The role id to use for this role.
The Role resource to create.
Updates a Role definition.
The request to update a role.
The resource name of the role in one of the following formats: `roles/{ROLE_NAME}` `organizations/{ORGANIZATION_ID}/roles/{ROLE_NAME}` `projects/{PROJECT_ID}/roles/{ROLE_NAME}`
The updated role.
A mask describing which fields in the Role have changed.
Soft deletes a role. The role is suspended and cannot be used to create new IAM Policy Bindings. The Role will not be included in `ListRoles()` unless `show_deleted` is set in the `ListRolesRequest`. The Role contains the deleted boolean set. Existing Bindings remains, but are inactive. The Role can be undeleted within 7 days. After 7 days the Role is deleted and all Bindings associated with the role are removed.
The request to delete an existing role.
The resource name of the role in one of the following formats: `organizations/{ORGANIZATION_ID}/roles/{ROLE_NAME}` `projects/{PROJECT_ID}/roles/{ROLE_NAME}`
Used to perform a consistent read-modify-write.
Undelete a Role, bringing it back in its previous state.
The request to undelete an existing role.
The resource name of the role in one of the following formats: `organizations/{ORGANIZATION_ID}/roles/{ROLE_NAME}` `projects/{PROJECT_ID}/roles/{ROLE_NAME}`
Used to perform a consistent read-modify-write.
Lists the permissions testable on a resource. A permission is testable if it can be tested for an identity on a resource.
A request to get permissions which can be tested on a resource.
Required. The full resource name to query from the list of testable permissions. The name follows the Google Cloud Platform resource format. For example, a Cloud Platform project with id `my-project` will be named `//cloudresourcemanager.googleapis.com/projects/my-project`.
Optional limit on the number of permissions to include in the response.
Optional pagination token returned in an earlier QueryTestablePermissionsRequest.
The response containing permissions which can be tested on a resource.
The Permissions testable on the requested resource.
To retrieve the next page of results, set `QueryTestableRolesRequest.page_token` to this value.
`KeyType` filters to selectively retrieve certain varieties of keys.
Used in:
Unspecified key type. The presence of this in the message will immediately result in an error.
User-managed keys (managed and rotated by the user).
System-managed keys (managed and rotated by Google).
A permission which can be included by a role.
Used in:
The name of this Permission.
The title of this Permission.
A brief description of what this Permission is used for.
This permission can ONLY be used in predefined roles.
The current launch stage of the permission.
The current custom role support level.
The state of the permission with regards to custom roles.
Used in:
Permission is fully supported for custom role use.
Permission is being tested to check custom role compatibility.
Permission is not supported for custom role use.
A stage representing a permission's lifecycle phase.
Used in:
The permission is currently in an alpha phase.
The permission is currently in a beta phase.
The permission is generally available.
The permission is being deprecated.
A role in the Identity and Access Management API.
Used as response type in: IAM.CreateRole, IAM.DeleteRole, IAM.GetRole, IAM.UndeleteRole, IAM.UpdateRole
Used as field type in:
, , ,The name of the role. When Role is used in CreateRole, the role name must not be set. When Role is used in output and other input such as UpdateRole, the role name is the complete path, e.g., roles/logging.viewer for curated roles and organizations/{ORGANIZATION_ID}/roles/logging.viewer for custom roles.
Optional. A human-readable title for the role. Typically this is limited to 100 UTF-8 bytes.
Optional. A human-readable description for the role.
The names of the permissions this role grants when bound in an IAM policy.
The current launch stage of the role.
Used to perform a consistent read-modify-write.
The current deleted state of the role. This field is read only. It will be ignored in calls to CreateRole and UpdateRole.
A stage representing a role's lifecycle phase.
Used in:
The user has indicated this role is currently in an alpha phase.
The user has indicated this role is currently in a beta phase.
The user has indicated this role is generally available.
The user has indicated this role is being deprecated.
This role is disabled and will not contribute permissions to any members it is granted to in policies.
The user has indicated this role is currently in an eap phase.
A view for Role objects.
Used in:
,Omits the `included_permissions` field. This is the default value.
Returns all fields.
A service account in the Identity and Access Management API. To create a service account, specify the `project_id` and the `account_id` for the account. The `account_id` is unique within the project, and is used to generate the service account email address and a stable `unique_id`. If the account already exists, the account's resource name is returned in util::Status's ResourceInfo.resource_name in the format of projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}. The caller can use the name in other methods to access the account. All other methods can identify the service account using the format `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`. Using `-` as a wildcard for the project will infer the project from the account. The `account` value can be the `email` address or the `unique_id` of the service account.
Used as request type in: IAM.UpdateServiceAccount
Used as response type in: IAM.CreateServiceAccount, IAM.GetServiceAccount, IAM.UpdateServiceAccount
Used as field type in:
,The resource name of the service account in the following format: `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`. Requests using `-` as a wildcard for the project will infer the project from the `account` and the `account` value can be the `email` address or the `unique_id` of the service account. In responses the resource name will always be in the format `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}`.
@OutputOnly The id of the project that owns the service account.
@OutputOnly The unique and stable id of the service account.
@OutputOnly The email address of the service account.
Optional. A user-specified description of the service account. Must be fewer than 100 UTF-8 bytes.
Used to perform a consistent read-modify-write.
@OutputOnly. The OAuth2 client id for the service account. This is used in conjunction with the OAuth2 clientconfig API to make three legged OAuth2 (3LO) flows to access the data of Google users.
Represents a service account key. A service account has two sets of key-pairs: user-managed, and system-managed. User-managed key-pairs can be created and deleted by users. Users are responsible for rotating these keys periodically to ensure security of their service accounts. Users retain the private key of these key-pairs, and Google retains ONLY the public key. System-managed key-pairs are managed automatically by Google, and rotated daily without user intervention. The private key never leaves Google's servers to maximize security. Public keys for all service accounts are also published at the OAuth2 Service Account API.
Used as response type in: IAM.CreateServiceAccountKey, IAM.GetServiceAccountKey
Used as field type in:
The resource name of the service account key in the following format `projects/{PROJECT_ID}/serviceAccounts/{SERVICE_ACCOUNT_EMAIL}/keys/{key}`.
The output format for the private key. Only provided in `CreateServiceAccountKey` responses, not in `GetServiceAccountKey` or `ListServiceAccountKey` responses. Google never exposes system-managed private keys, and never retains user-managed private keys.
Specifies the algorithm (and possibly key size) for the key.
The private key data. Only provided in `CreateServiceAccountKey` responses. Make sure to keep the private key data secure because it allows for the assertion of the service account identity. When decoded, the private key data can be used to authenticate with Google API client libraries and with <a href="/sdk/gcloud/reference/auth/activate-service-account">gcloud auth activate-service-account</a>.
The public key data. Only provided in `GetServiceAccountKey` responses.
The key can be used after this timestamp.
The key can be used before this timestamp.
Supported key algorithms.
Used in:
,An unspecified key algorithm.
1k RSA Key.
2k RSA Key.
Supported private key output formats.
Used in:
,Unspecified. Equivalent to `TYPE_GOOGLE_CREDENTIALS_FILE`.
PKCS12 format. The password for the PKCS12 file is `notasecret`. For more information, see https://tools.ietf.org/html/rfc7292.
Google Credentials File format.
Supported public key output formats.
Used in:
Unspecified. Returns nothing here.
X509 PEM format.
Raw public key.