- 3.48.0 (latest)
- 3.47.0
- 3.44.0
- 3.43.0
- 3.42.0
- 3.41.0
- 3.40.0
- 3.39.0
- 3.38.0
- 3.37.0
- 3.36.0
- 3.35.0
- 3.34.0
- 3.32.0
- 3.31.0
- 3.30.0
- 3.29.0
- 3.28.0
- 3.27.0
- 3.26.0
- 3.25.0
- 3.24.0
- 3.23.0
- 3.22.0
- 3.19.0
- 3.18.0
- 3.17.0
- 3.16.0
- 3.15.0
- 3.14.0
- 3.13.0
- 3.12.0
- 3.11.0
- 3.10.0
- 3.9.0
- 3.8.0
- 3.7.0
- 3.6.0
- 3.4.0
- 3.3.0
- 3.2.0
- 3.1.0
- 3.0.0
- 2.0.0
- 1.2.5
- 1.1.8
- 0.2.0
public abstract static class IAMGrpc.IAMImplBase implements BindableService
Creates and manages Identity and Access Management (IAM) resources. You can use this service to work with all of the following resources:
- Service accounts, which identify an application or a virtual machine (VM) instance rather than a person
- Service account keys, which service accounts use to authenticate with Google APIs
- IAM policies for service accounts, which specify the roles that a principal has for the service account
- IAM custom roles, which help you limit the number of permissions that you grant to principals In addition, you can use this service to complete the following tasks, among others:
- Test whether a service account can use specific permissions
- Check which roles you can grant for a specific resource
- Lint, or validate, condition expressions in an IAM policy When you read data from the IAM API, each read is eventually consistent. In other words, if you write data with the IAM API, then immediately read that data, the read operation might return an older version of the data. To deal with this behavior, your application can retry the request with truncated exponential backoff. In contrast, writing data to the IAM API is sequentially consistent. In other words, write operations are always processed in the order in which they were received.
Implements
io.grpc.BindableServiceConstructors
IAMImplBase()
public IAMImplBase()
Methods
bindService()
public final ServerServiceDefinition bindService()
Type | Description |
io.grpc.ServerServiceDefinition |
createRole(CreateRoleRequest request, StreamObserver<Role> responseObserver)
public void createRole(CreateRoleRequest request, StreamObserver<Role> responseObserver)
Creates a new custom Role.
Name | Description |
request | CreateRoleRequest |
responseObserver | io.grpc.stub.StreamObserver<Role> |
createServiceAccount(CreateServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)
public void createServiceAccount(CreateServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)
Creates a ServiceAccount.
Name | Description |
request | CreateServiceAccountRequest |
responseObserver | io.grpc.stub.StreamObserver<ServiceAccount> |
createServiceAccountKey(CreateServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)
public void createServiceAccountKey(CreateServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)
Creates a ServiceAccountKey.
Name | Description |
request | CreateServiceAccountKeyRequest |
responseObserver | io.grpc.stub.StreamObserver<ServiceAccountKey> |
deleteRole(DeleteRoleRequest request, StreamObserver<Role> responseObserver)
public void deleteRole(DeleteRoleRequest request, StreamObserver<Role> responseObserver)
Deletes a custom Role. When you delete a custom role, the following changes occur immediately:
- You cannot bind a principal to the custom role in an IAM Policy.
- Existing bindings to the custom role are not changed, but they have no effect.
- By default, the response from ListRoles does not include the custom role. You have 7 days to undelete the custom role. After 7 days, the following changes occur:
- The custom role is permanently deleted and cannot be recovered.
- If an IAM policy contains a binding to the custom role, the binding is permanently removed.
Name | Description |
request | DeleteRoleRequest |
responseObserver | io.grpc.stub.StreamObserver<Role> |
deleteServiceAccount(DeleteServiceAccountRequest request, StreamObserver<Empty> responseObserver)
public void deleteServiceAccount(DeleteServiceAccountRequest request, StreamObserver<Empty> responseObserver)
Deletes a ServiceAccount. Warning: After you delete a service account, you might not be able to undelete it. If you know that you need to re-enable the service account in the future, use DisableServiceAccount instead. If you delete a service account, IAM permanently removes the service account 30 days later. Google Cloud cannot recover the service account after it is permanently removed, even if you file a support request. To help avoid unplanned outages, we recommend that you disable the service account before you delete it. Use DisableServiceAccount to disable the service account, then wait at least 24 hours and watch for unintended consequences. If there are no unintended consequences, you can delete the service account.
Name | Description |
request | DeleteServiceAccountRequest |
responseObserver | io.grpc.stub.StreamObserver<Empty> |
deleteServiceAccountKey(DeleteServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)
public void deleteServiceAccountKey(DeleteServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)
Deletes a ServiceAccountKey. Deleting a service account key does not revoke short-lived credentials that have been issued based on the service account key.
Name | Description |
request | DeleteServiceAccountKeyRequest |
responseObserver | io.grpc.stub.StreamObserver<Empty> |
disableServiceAccount(DisableServiceAccountRequest request, StreamObserver<Empty> responseObserver)
public void disableServiceAccount(DisableServiceAccountRequest request, StreamObserver<Empty> responseObserver)
Disables a ServiceAccount immediately. If an application uses the service account to authenticate, that application can no longer call Google APIs or access Google Cloud resources. Existing access tokens for the service account are rejected, and requests for new access tokens will fail. To re-enable the service account, use EnableServiceAccount. After you re-enable the service account, its existing access tokens will be accepted, and you can request new access tokens. To help avoid unplanned outages, we recommend that you disable the service account before you delete it. Use this method to disable the service account, then wait at least 24 hours and watch for unintended consequences. If there are no unintended consequences, you can delete the service account with DeleteServiceAccount.
Name | Description |
request | DisableServiceAccountRequest |
responseObserver | io.grpc.stub.StreamObserver<Empty> |
disableServiceAccountKey(DisableServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)
public void disableServiceAccountKey(DisableServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)
Disable a ServiceAccountKey. A disabled service account key can be re-enabled with EnableServiceAccountKey.
Name | Description |
request | DisableServiceAccountKeyRequest |
responseObserver | io.grpc.stub.StreamObserver<Empty> |
enableServiceAccount(EnableServiceAccountRequest request, StreamObserver<Empty> responseObserver)
public void enableServiceAccount(EnableServiceAccountRequest request, StreamObserver<Empty> responseObserver)
Enables a ServiceAccount that was disabled by DisableServiceAccount. If the service account is already enabled, then this method has no effect. If the service account was disabled by other means—for example, if Google disabled the service account because it was compromised—you cannot use this method to enable the service account.
Name | Description |
request | EnableServiceAccountRequest |
responseObserver | io.grpc.stub.StreamObserver<Empty> |
enableServiceAccountKey(EnableServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)
public void enableServiceAccountKey(EnableServiceAccountKeyRequest request, StreamObserver<Empty> responseObserver)
Enable a ServiceAccountKey.
Name | Description |
request | EnableServiceAccountKeyRequest |
responseObserver | io.grpc.stub.StreamObserver<Empty> |
getIamPolicy(GetIamPolicyRequest request, StreamObserver<Policy> responseObserver)
public void getIamPolicy(GetIamPolicyRequest request, StreamObserver<Policy> responseObserver)
Gets the IAM policy that is attached to a ServiceAccount. This IAM
policy specifies which principals have access to the service account.
This method does not tell you whether the service account has been granted
any roles on other resources. To check whether a service account has role
grants on a resource, use the getIamPolicy
method for that resource. For
example, to view the role grants for a project, call the Resource Manager
API's
projects.getIamPolicy
method.
Name | Description |
request | com.google.iam.v1.GetIamPolicyRequest |
responseObserver | io.grpc.stub.StreamObserver<com.google.iam.v1.Policy> |
getRole(GetRoleRequest request, StreamObserver<Role> responseObserver)
public void getRole(GetRoleRequest request, StreamObserver<Role> responseObserver)
Gets the definition of a Role.
Name | Description |
request | GetRoleRequest |
responseObserver | io.grpc.stub.StreamObserver<Role> |
getServiceAccount(GetServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)
public void getServiceAccount(GetServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)
Gets a ServiceAccount.
Name | Description |
request | GetServiceAccountRequest |
responseObserver | io.grpc.stub.StreamObserver<ServiceAccount> |
getServiceAccountKey(GetServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)
public void getServiceAccountKey(GetServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)
Gets a ServiceAccountKey.
Name | Description |
request | GetServiceAccountKeyRequest |
responseObserver | io.grpc.stub.StreamObserver<ServiceAccountKey> |
lintPolicy(LintPolicyRequest request, StreamObserver<LintPolicyResponse> responseObserver)
public void lintPolicy(LintPolicyRequest request, StreamObserver<LintPolicyResponse> responseObserver)
Lints, or validates, an IAM policy. Currently checks the
google.iam.v1.Binding.condition field, which contains a condition
expression for a role binding.
Successful calls to this method always return an HTTP 200 OK
status code,
even if the linter detects an issue in the IAM policy.
Name | Description |
request | LintPolicyRequest |
responseObserver | io.grpc.stub.StreamObserver<LintPolicyResponse> |
listRoles(ListRolesRequest request, StreamObserver<ListRolesResponse> responseObserver)
public void listRoles(ListRolesRequest request, StreamObserver<ListRolesResponse> responseObserver)
Lists every predefined Role that IAM supports, or every custom role that is defined for an organization or project.
Name | Description |
request | ListRolesRequest |
responseObserver | io.grpc.stub.StreamObserver<ListRolesResponse> |
listServiceAccountKeys(ListServiceAccountKeysRequest request, StreamObserver<ListServiceAccountKeysResponse> responseObserver)
public void listServiceAccountKeys(ListServiceAccountKeysRequest request, StreamObserver<ListServiceAccountKeysResponse> responseObserver)
Lists every ServiceAccountKey for a service account.
Name | Description |
request | ListServiceAccountKeysRequest |
responseObserver | io.grpc.stub.StreamObserver<ListServiceAccountKeysResponse> |
listServiceAccounts(ListServiceAccountsRequest request, StreamObserver<ListServiceAccountsResponse> responseObserver)
public void listServiceAccounts(ListServiceAccountsRequest request, StreamObserver<ListServiceAccountsResponse> responseObserver)
Lists every ServiceAccount that belongs to a specific project.
Name | Description |
request | ListServiceAccountsRequest |
responseObserver | io.grpc.stub.StreamObserver<ListServiceAccountsResponse> |
patchServiceAccount(PatchServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)
public void patchServiceAccount(PatchServiceAccountRequest request, StreamObserver<ServiceAccount> responseObserver)
Patches a ServiceAccount.
Name | Description |
request | PatchServiceAccountRequest |
responseObserver | io.grpc.stub.StreamObserver<ServiceAccount> |
queryAuditableServices(QueryAuditableServicesRequest request, StreamObserver<QueryAuditableServicesResponse> responseObserver)
public void queryAuditableServices(QueryAuditableServicesRequest request, StreamObserver<QueryAuditableServicesResponse> responseObserver)
Returns a list of services that allow you to opt into audit logs that are not generated by default. To learn more about audit logs, see the Logging documentation.
Name | Description |
request | QueryAuditableServicesRequest |
responseObserver | io.grpc.stub.StreamObserver<QueryAuditableServicesResponse> |
queryGrantableRoles(QueryGrantableRolesRequest request, StreamObserver<QueryGrantableRolesResponse> responseObserver)
public void queryGrantableRoles(QueryGrantableRolesRequest request, StreamObserver<QueryGrantableRolesResponse> responseObserver)
Lists roles that can be granted on a Google Cloud resource. A role is grantable if the IAM policy for the resource can contain bindings to the role.
Name | Description |
request | QueryGrantableRolesRequest |
responseObserver | io.grpc.stub.StreamObserver<QueryGrantableRolesResponse> |
queryTestablePermissions(QueryTestablePermissionsRequest request, StreamObserver<QueryTestablePermissionsResponse> responseObserver)
public void queryTestablePermissions(QueryTestablePermissionsRequest request, StreamObserver<QueryTestablePermissionsResponse> responseObserver)
Lists every permission that you can test on a resource. A permission is testable if you can check whether a principal has that permission on the resource.
Name | Description |
request | QueryTestablePermissionsRequest |
responseObserver | io.grpc.stub.StreamObserver<QueryTestablePermissionsResponse> |
setIamPolicy(SetIamPolicyRequest request, StreamObserver<Policy> responseObserver)
public void setIamPolicy(SetIamPolicyRequest request, StreamObserver<Policy> responseObserver)
Sets the IAM policy that is attached to a ServiceAccount. Use this method to grant or revoke access to the service account. For example, you could grant a principal the ability to impersonate the service account. This method does not enable the service account to access other resources. To grant roles to a service account on a resource, follow these steps:
- Call the resource's
getIamPolicy
method to get its current IAM policy. - Edit the policy so that it binds the service account to an IAM role for the resource.
- Call the resource's
setIamPolicy
method to update its IAM policy. For detailed instructions, see Manage access to project, folders, and organizations or Manage access to other resources.
Name | Description |
request | com.google.iam.v1.SetIamPolicyRequest |
responseObserver | io.grpc.stub.StreamObserver<com.google.iam.v1.Policy> |
signBlob(SignBlobRequest request, StreamObserver<SignBlobResponse> responseObserver)
public void signBlob(SignBlobRequest request, StreamObserver<SignBlobResponse> responseObserver)
Note: This method is deprecated. Use the
signBlob
method in the IAM Service Account Credentials API instead. If you currently
use this method, see the migration
guide for
instructions.
Signs a blob using the system-managed private key for a ServiceAccount.
Name | Description |
request | SignBlobRequest |
responseObserver | io.grpc.stub.StreamObserver<SignBlobResponse> |
signJwt(SignJwtRequest request, StreamObserver<SignJwtResponse> responseObserver)
public void signJwt(SignJwtRequest request, StreamObserver<SignJwtResponse> responseObserver)
Note: This method is deprecated. Use the
signJwt
method in the IAM Service Account Credentials API instead. If you currently
use this method, see the migration
guide for
instructions.
Signs a JSON Web Token (JWT) using the system-managed private key for a
ServiceAccount.
Name | Description |
request | SignJwtRequest |
responseObserver | io.grpc.stub.StreamObserver<SignJwtResponse> |
testIamPermissions(TestIamPermissionsRequest request, StreamObserver<TestIamPermissionsResponse> responseObserver)
public void testIamPermissions(TestIamPermissionsRequest request, StreamObserver<TestIamPermissionsResponse> responseObserver)
Tests whether the caller has the specified permissions on a ServiceAccount.
Name | Description |
request | com.google.iam.v1.TestIamPermissionsRequest |
responseObserver | io.grpc.stub.StreamObserver<com.google.iam.v1.TestIamPermissionsResponse> |
undeleteRole(UndeleteRoleRequest request, StreamObserver<Role> responseObserver)
public void undeleteRole(UndeleteRoleRequest request, StreamObserver<Role> responseObserver)
Undeletes a custom Role.
Name | Description |
request | UndeleteRoleRequest |
responseObserver | io.grpc.stub.StreamObserver<Role> |
undeleteServiceAccount(UndeleteServiceAccountRequest request, StreamObserver<UndeleteServiceAccountResponse> responseObserver)
public void undeleteServiceAccount(UndeleteServiceAccountRequest request, StreamObserver<UndeleteServiceAccountResponse> responseObserver)
Restores a deleted ServiceAccount. Important: It is not always possible to restore a deleted service account. Use this method only as a last resort. After you delete a service account, IAM permanently removes the service account 30 days later. There is no way to restore a deleted service account that has been permanently removed.
Name | Description |
request | UndeleteServiceAccountRequest |
responseObserver | io.grpc.stub.StreamObserver<UndeleteServiceAccountResponse> |
updateRole(UpdateRoleRequest request, StreamObserver<Role> responseObserver)
public void updateRole(UpdateRoleRequest request, StreamObserver<Role> responseObserver)
Updates the definition of a custom Role.
Name | Description |
request | UpdateRoleRequest |
responseObserver | io.grpc.stub.StreamObserver<Role> |
updateServiceAccount(ServiceAccount request, StreamObserver<ServiceAccount> responseObserver)
public void updateServiceAccount(ServiceAccount request, StreamObserver<ServiceAccount> responseObserver)
Note: We are in the process of deprecating this method. Use
PatchServiceAccount instead.
Updates a ServiceAccount.
You can update only the display_name
field.
Name | Description |
request | ServiceAccount |
responseObserver | io.grpc.stub.StreamObserver<ServiceAccount> |
uploadServiceAccountKey(UploadServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)
public void uploadServiceAccountKey(UploadServiceAccountKeyRequest request, StreamObserver<ServiceAccountKey> responseObserver)
Uploads the public key portion of a key pair that you manage, and associates the public key with a ServiceAccount. After you upload the public key, you can use the private key from the key pair as a service account key.
Name | Description |
request | UploadServiceAccountKeyRequest |
responseObserver | io.grpc.stub.StreamObserver<ServiceAccountKey> |