- NAME
-
- gcloud alpha service-directory namespaces add-iam-policy-binding - adds IAM policy binding to a namespace
- SYNOPSIS
-
-
gcloud alpha service-directory namespaces add-iam-policy-binding
(NAMESPACE
:--location
=LOCATION
)--member
=PRINCIPAL
--role
=ROLE
[GCLOUD_WIDE_FLAG …
]
-
- DESCRIPTION
-
(ALPHA)
Adds IAM policy binding to a namespace. - EXAMPLES
-
To add an IAM policy binding to a Service Directory namespace, run:
gcloud alpha service-directory namespaces add-iam-policy-binding my-namespace --location=us-east1 --role=roles/owner --member=user:foo@gmail.com
- POSITIONAL ARGUMENTS
-
-
Namespace resource - The Service Directory namespace to add IAM policy binding
to. The arguments in this group can be used to specify the attributes of this
resource. (NOTE) Some attributes are not given arguments in this group but can
be set in other ways.
To set the
project
attribute:-
provide the argument
namespace
on the command line with a fully specified name; -
set the property
core/project
.
This must be specified.
NAMESPACE
-
ID of the namespace or fully qualified identifier for the namespace.
To set the
namespace
attribute:-
provide the argument
namespace
on the command line.
This positional argument must be specified if any of the other arguments in this group are specified.
-
provide the argument
--location
=LOCATION
-
The name of the region for the namespace.
To set the
location
attribute:-
provide the argument
namespace
on the command line with a fully specified name; -
provide the argument
--location
on the command line.
-
provide the argument
-
provide the argument
-
Namespace resource - The Service Directory namespace to add IAM policy binding
to. The arguments in this group can be used to specify the attributes of this
resource. (NOTE) Some attributes are not given arguments in this group but can
be set in other ways.
- REQUIRED FLAGS
-
--member
=PRINCIPAL
-
The principal to add the binding for. Should be of the form
user|group|serviceAccount:email
ordomain:domain
.Examples:
user:test-user@gmail.com
,group:admins@example.com
,serviceAccount:test123@example.domain.com
, ordomain:example.domain.com
.Some resources also accept the following special values:
-
allUsers
- Special identifier that represents anyone who is on the internet, with or without a Google account. -
allAuthenticatedUsers
- Special identifier that represents anyone who is authenticated with a Google account or a service account.
-
--role
=ROLE
-
Role name to assign to the principal. The role name is the complete path of a
predefined role, such as
roles/logging.viewer
, or the role ID for a custom role, such asorganizations/{ORGANIZATION_ID}/roles/logging.viewer
.
- GCLOUD WIDE FLAGS
-
These flags are available to all commands:
--access-token-file
,--account
,--billing-project
,--configuration
,--flags-file
,--flatten
,--format
,--help
,--impersonate-service-account
,--log-http
,--project
,--quiet
,--trace-token
,--user-output-enabled
,--verbosity
.Run
$ gcloud help
for details. - NOTES
-
This command is currently in alpha and might change without notice. If this
command fails with API permission errors despite specifying the correct project,
you might be trying to access an API with an invitation-only early access
allowlist. These variants are also available:
gcloud service-directory namespaces add-iam-policy-binding
gcloud beta service-directory namespaces add-iam-policy-binding
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2024-02-06 UTC.