Index
AccessLevel
(message)AccessPolicy
(message)BasicLevel
(message)BasicLevel.ConditionCombiningFunction
(enum)Condition
(message)CustomLevel
(message)DevicePolicy
(message)OsConstraint
(message)ServicePerimeter
(message)ServicePerimeter.PerimeterType
(enum)ServicePerimeterConfig
(message)ServicePerimeterConfig.ApiOperation
(message)ServicePerimeterConfig.EgressFrom
(message)ServicePerimeterConfig.EgressPolicy
(message)ServicePerimeterConfig.EgressSource
(message)ServicePerimeterConfig.EgressTo
(message)ServicePerimeterConfig.IdentityType
(enum)ServicePerimeterConfig.IngressFrom
(message)ServicePerimeterConfig.IngressPolicy
(message)ServicePerimeterConfig.IngressSource
(message)ServicePerimeterConfig.IngressTo
(message)ServicePerimeterConfig.MethodSelector
(message)ServicePerimeterConfig.SourceRestriction
(enum)ServicePerimeterConfig.VpcAccessibleServices
(message)VpcNetworkSource
(message)VpcSubNetwork
(message)
AccessLevel
An AccessLevel
is a label that can be applied to requests to Google Cloud services, along with a list of requirements necessary for the label to be applied.
Fields | |
---|---|
name |
Identifier. Resource name for the The After you create an |
title |
Human readable title. Must be unique within the Policy. |
description |
Description of the |
Union field level . Required. Describes the necessary conditions for the level to apply. level can be only one of the following: |
|
basic |
A |
custom |
A |
AccessPolicy
AccessPolicy
is a container for AccessLevels
(which define the necessary attributes to use Google Cloud services) and ServicePerimeters
(which define regions of services able to freely pass data within a perimeter). An access policy is globally visible within an organization, and the restrictions it specifies apply to all projects within an organization.
Fields | |
---|---|
name |
Output only. Identifier. Resource name of the |
parent |
Required. The parent of this |
title |
Required. Human readable title. Does not affect behavior. |
scopes[] |
The scopes of the
If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list of |
etag |
Output only. An opaque identifier for the current version of the |
BasicLevel
BasicLevel
is an AccessLevel
using a set of recommended features.
Fields | |
---|---|
conditions[] |
Required. A list of requirements for the |
combining_function |
How the |
ConditionCombiningFunction
Options for how the conditions
list should be combined to determine if this AccessLevel
is applied. Default is AND.
Enums | |
---|---|
AND |
All Conditions must be true for the BasicLevel to be true. |
OR |
If at least one Condition is true, then the BasicLevel is true. |
Condition
A condition necessary for an AccessLevel
to be granted. The Condition is an AND over its fields. So a Condition is true if: 1) the request IP is from one of the listed subnetworks AND 2) the originating device complies with the listed device policy AND 3) all listed access levels are granted AND 4) the request was sent at a time allowed by the DateTimeRestriction.
Fields | |
---|---|
ip_subnetworks[] |
CIDR block IP subnetwork specification. May be IPv4 or IPv6. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. Similarly, for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32" is not. The originating IP of a request must be in one of the listed subnets in order for this Condition to be true. If empty, all IP addresses are allowed. |
device_policy |
Device specific restrictions, all restrictions must hold for the Condition to be true. If not specified, all devices are allowed. |
required_access_levels[] |
A list of other access levels defined in the same |
negate |
Whether to negate the Condition. If true, the Condition becomes a NAND over its non-empty fields. Any non-empty field criteria evaluating to false will result in the Condition to be satisfied. Defaults to false. |
members[] |
The request must be made by one of the provided user or service accounts. Groups are not supported. Syntax: |
regions[] |
The request must originate from one of the provided countries/regions. Must be valid ISO 3166-1 alpha-2 codes. |
vpc_network_sources[] |
The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with |
CustomLevel
CustomLevel
is an AccessLevel
using the Cloud Common Expression Language to represent the necessary conditions for the level to apply to a request. See CEL spec at: https://github.com/google/cel-spec
Fields | |
---|---|
expr |
Required. A Cloud CEL expression evaluating to a boolean. |
DevicePolicy
DevicePolicy
specifies device specific restrictions necessary to acquire a given access level. A DevicePolicy
specifies requirements for requests from devices to be granted access levels, it does not do any enforcement on the device. DevicePolicy
acts as an AND over all specified fields, and each repeated field is an OR over its elements. Any unset fields are ignored. For example, if the proto is { os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX, encryption_status: ENCRYPTED}, then the DevicePolicy will be true for requests originating from encrypted Linux desktops and encrypted Windows desktops.
Fields | |
---|---|
require_screenlock |
Whether or not screenlock is required for the DevicePolicy to be true. Defaults to |
allowed_encryption_statuses[] |
Allowed encryptions statuses, an empty list allows all statuses. |
os_constraints[] |
Allowed OS versions, an empty list allows all types and all versions. |
allowed_device_management_levels[] |
Allowed device management levels, an empty list allows all management levels. |
require_admin_approval |
Whether the device needs to be approved by the customer admin. |
require_corp_owned |
Whether the device needs to be corp owned. |
OsConstraint
A restriction on the OS type and version of devices making requests.
Fields | |
---|---|
os_type |
Required. The allowed OS type. |
minimum_version |
The minimum allowed OS version. If not set, any version of this OS satisfies the constraint. Format: |
require_verified_chrome_os |
Only allows requests from devices with a verified Chrome OS. Verifications includes requirements that the device is enterprise-managed, conformant to domain policies, and the caller has permission to call the API targeted by the request. |
ServicePerimeter
ServicePerimeter
describes a set of Google Cloud resources which can freely import and export data amongst themselves, but not export outside of the ServicePerimeter
. If a request with a source within this ServicePerimeter
has a target outside of the ServicePerimeter
, the request will be blocked. Otherwise the request is allowed. There are two types of Service Perimeter - Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google Cloud project or VPC network can only belong to a single regular Service Perimeter. Service Perimeter Bridges can contain only Google Cloud projects as members, a single Google Cloud project may belong to multiple Service Perimeter Bridges.
Fields | |
---|---|
name |
Identifier. Resource name for the The After you create a |
title |
Human readable title. Must be unique within the Policy. |
description |
Description of the |
perimeter_type |
Perimeter type indicator. A single project or VPC network is allowed to be a member of single regular perimeter, but multiple service perimeter bridges. A project cannot be a included in a perimeter bridge without being included in regular perimeter. For perimeter bridges, the restricted service list as well as access level lists must be empty. |
status |
Current ServicePerimeter configuration. Specifies sets of resources, restricted services and access levels that determine perimeter content and boundaries. |
spec |
Proposed (or dry run) ServicePerimeter configuration. This configuration allows to specify and test ServicePerimeter configuration without enforcing actual access restrictions. Only allowed to be set when the "use_explicit_dry_run_spec" flag is set. |
use_explicit_dry_run_spec |
Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists for all Service Perimeters, and that spec is identical to the status for those Service Perimeters. When this flag is set, it inhibits the generation of the implicit spec, thereby allowing the user to explicitly provide a configuration ("spec") to use in a dry-run version of the Service Perimeter. This allows the user to test changes to the enforced config ("status") without actually enforcing them. This testing is done through analyzing the differences between currently enforced and suggested restrictions. use_explicit_dry_run_spec must bet set to True if any of the fields in the spec are set to non-default values. |
PerimeterType
Specifies the type of the Perimeter. There are two types: regular and bridge. Regular Service Perimeter contains resources, access levels, and restricted services. Every resource can be in at most ONE regular Service Perimeter.
In addition to being in a regular service perimeter, a resource can also be in zero or more perimeter bridges. A perimeter bridge only contains resources. Cross project operations are permitted if all effected resources share some perimeter (whether bridge or regular). Perimeter Bridge does not contain access levels or services: those are governed entirely by the regular perimeter that resource is in.
Perimeter Bridges are typically useful when building more complex toplogies with many independent perimeters that need to share some data with a common perimeter, but should not be able to share data among themselves.
Enums | |
---|---|
PERIMETER_TYPE_REGULAR |
Regular Perimeter. When no value is specified, the perimeter uses this type. |
PERIMETER_TYPE_BRIDGE |
Perimeter Bridge. |
ServicePerimeterConfig
ServicePerimeterConfig
specifies a set of Google Cloud resources that describe specific Service Perimeter configuration.
Fields | |
---|---|
resources[] |
A list of Google Cloud resources that are inside of the service perimeter. Currently only projects and VPCs are allowed. Project format: |
access_levels[] |
A list of |
restricted_services[] |
Google Cloud services that are subject to the Service Perimeter restrictions. For example, if |
vpc_accessible_services |
Configuration for APIs allowed within Perimeter. |
ingress_policies[] |
List of |
egress_policies[] |
List of |
ApiOperation
Identification for an API Operation.
Fields | |
---|---|
service_name |
The name of the API whose methods or permissions the |
method_selectors[] |
API methods or permissions to allow. Method or permission must belong to the service specified by |
EgressFrom
Defines the conditions under which an EgressPolicy
matches a request. Conditions based on information about the source of the request. Note that if the destination of the request is also protected by a ServicePerimeter
, then that ServicePerimeter
must have an IngressPolicy
which allows access in order for this request to succeed.
Fields | |
---|---|
identities[] |
A list of identities that are allowed access through [EgressPolicy]. Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported. The |
identity_type |
Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of |
sources[] |
Sources that this [EgressPolicy]
[google.identity.accesscontextmanager.v1alpha.ServicePerimeterConfig.EgressPolicy] authorizes access from. If this field is not empty, then |
source_restriction |
Whether to enforce traffic restrictions based on |
EgressPolicy
Policy for egress from perimeter.
EgressPolicies
match requests based on egress_from
and egress_to
stanzas. For an EgressPolicy
to match, both egress_from
and egress_to
stanzas must be matched. If an EgressPolicy
matches a request, the request is allowed to span the ServicePerimeter
boundary. For example, an EgressPolicy
can be used to allow VMs on networks within the ServicePerimeter
to access a defined set of projects outside the perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket or query against a BigQuery dataset).
EgressPolicies
are concerned with the resources that a request relates as well as the API services and API actions being used. They do not related to the direction of data movement. More detailed documentation for this concept can be found in the descriptions of EgressFrom
and EgressTo
.
Fields | |
---|---|
egress_from |
Defines conditions on the source of a request causing this |
egress_to |
Defines the conditions on the |
EgressSource
The source that [EgressPolicy] [google.identity.accesscontextmanager.v1alpha.ServicePerimeterConfig.EgressPolicy] authorizes access from inside the [ServicePerimeter] [google.identity.accesscontextmanager.v1alpha.ServicePerimeter] to somewhere outside the [ServicePerimeter] [google.identity.accesscontextmanager.v1alpha.ServicePerimeter] boundaries.
Fields | |
---|---|
Union field source . Allowed egress source. source can be only one of the following: |
|
access_level |
An [AccessLevel]
[google.identity.accesscontextmanager.v1alpha.AccessLevel] resource name that allows protected resources inside the [ServicePerimeters]
[google.identity.accesscontextmanager.v1alpha.ServicePerimeter] to access outside the [ServicePerimeter]
[google.identity.accesscontextmanager.v1alpha.ServicePerimeter] boundaries. [AccessLevels]
[google.identity.accesscontextmanager.v1alpha.AccessLevel] listed must be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1alpha.ServicePerimeter]. Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1alpha.AccessLevel] will cause an error. If an [AccessLevel]
[google.identity.accesscontextmanager.v1alpha.AccessLevel] name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: |
EgressTo
Defines the conditions under which an EgressPolicy
matches a request. Conditions are based on information about the ApiOperation
intended to be performed on the resources
specified. Note that if the destination of the request is also protected by a ServicePerimeter
, then that ServicePerimeter
must have an IngressPolicy
which allows access in order for this request to succeed. The request must match operations
AND resources
fields in order to be allowed egress out of the perimeter.
Fields | |
---|---|
resources[] |
A list of resources, currently only projects in the form |
operations[] |
A list of |
external_resources[] |
A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported formats are s3://BUCKET_NAME, s3a://BUCKET_NAME, and s3n://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed. |
IdentityType
Specifies the types of identities that are allowed access in either IngressFrom
or EgressFrom
rules.
Enums | |
---|---|
IDENTITY_TYPE_UNSPECIFIED |
No blanket identity group specified. |
ANY_IDENTITY |
Authorize access from all identities outside the perimeter. |
ANY_USER_ACCOUNT |
Authorize access from all human users outside the perimeter. |
ANY_SERVICE_ACCOUNT |
Authorize access from all service accounts outside the perimeter. |
IngressFrom
Defines the conditions under which an IngressPolicy
matches a request. Conditions are based on information about the source of the request. The request must satisfy what is defined in sources
AND identity related fields in order to match.
Fields | |
---|---|
sources[] |
Sources that this |
identities[] |
A list of identities that are allowed access through [IngressPolicy]. Identities can be an individual user, service account, Google group, or third-party identity. For third-party identity, only single identities are supported and other identity types are not supported. The |
identity_type |
Specifies the type of identities that are allowed access from outside the perimeter. If left unspecified, then members of |
IngressPolicy
Policy for ingress into ServicePerimeter
.
IngressPolicies
match requests based on ingress_from
and ingress_to
stanzas. For an ingress policy to match, both the ingress_from
and ingress_to
stanzas must be matched. If an IngressPolicy
matches a request, the request is allowed through the perimeter boundary from outside the perimeter.
For example, access from the internet can be allowed either based on an AccessLevel
or, for traffic hosted on Google Cloud, the project of the source network. For access from private networks, using the project of the hosting network is required.
Individual ingress policies can be limited by restricting which services and/or actions they match using the ingress_to
field.
Fields | |
---|---|
ingress_from |
Defines the conditions on the source of a request causing this |
ingress_to |
Defines the conditions on the |
IngressSource
The source that IngressPolicy
authorizes access from.
Fields | |
---|---|
Union field source . Allowed ingress source. It can be one of AccessLevel or Google Cloud resource. source can be only one of the following: |
|
access_level |
An |
resource |
A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects and VPCs are allowed. Project format: |
IngressTo
Defines the conditions under which an IngressPolicy
matches a request. Conditions are based on information about the ApiOperation
intended to be performed on the target resource of the request. The request must satisfy what is defined in operations
AND resources
in order to match.
Fields | |
---|---|
operations[] |
A list of |
resources[] |
A list of resources, currently only projects in the form |
MethodSelector
An allowed method or permission of a service specified in ApiOperation
.
Fields | |
---|---|
Union field kind . The API method name or Cloud IAM permission name to allow. kind can be only one of the following: |
|
method |
A valid method name for the corresponding |
permission |
A valid Cloud IAM permission for the corresponding |
SourceRestriction
Whether to enable the enforcement of traffic based on on the sources
field. Only applies to [EgressFrom]
[google.identity.accesscontextmanager.v1alpha.ServicePerimeterConfig.EgressFrom].
Enums | |
---|---|
SOURCE_RESTRICTION_UNSPECIFIED |
Enforcement preference unspecified, will not enforce traffic restrictions based on |
SOURCE_RESTRICTION_ENABLED |
Enforcement preference enabled, traffic restrictions will be enforced based on |
SOURCE_RESTRICTION_DISABLED |
Enforcement preference disabled, will not enforce traffic restrictions based on |
VpcAccessibleServices
Specifies how APIs are allowed to communicate within the Service Perimeter.
Fields | |
---|---|
enable_restriction |
Whether to restrict API calls within the Service Perimeter to the list of APIs specified in 'allowed_services'. |
allowed_services[] |
The list of APIs usable within the Service Perimeter. Must be empty unless 'enable_restriction' is True. You can specify a list of individual services, as well as include the 'RESTRICTED-SERVICES' value, which automatically includes all of the services protected by the perimeter. |
VpcNetworkSource
The originating network source in Google Cloud.
Fields | |
---|---|
Union field kind . The type of the originating network source of the request. kind can be only one of the following: |
|
vpc_subnetwork |
Sub-segment ranges of a VPC network. |
VpcSubNetwork
Sub-segment ranges inside of a VPC Network.
Fields | |
---|---|
network |
Required. Network name. If the network is not part of the organization, the |
vpc_ip_subnetworks[] |
CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. If empty, all IP addresses are allowed. |