Method: projects.locations.projectDataProfiles.list

Lists project data profiles for an organization.

HTTP request

GET https://dlp.googleapis.com/v2/{parent=projects/*/locations/*}/projectDataProfiles

The URL uses gRPC Transcoding syntax.

Path parameters

Parameters
parent

string

Required. organizations/{org_id}/locations/{loc_id}

Authorization requires the following IAM permission on the specified resource parent:

  • dlp.projectDataProfiles.list

Query parameters

Parameters
pageToken

string

Page token to continue retrieval.

pageSize

integer

Size of the page. This value can be limited by the server. If zero, server returns a page of max size 100.

orderBy

string

Comma separated list of fields to order by, followed by asc or desc postfix. This list is case insensitive. The default sorting order is ascending. Redundant space characters are insignificant. Only one order field at a time is allowed.

Examples: * projectId * sensitivityLevel desc

Supported fields are:

  • projectId: Google Cloud project ID
  • sensitivityLevel: How sensitive the data in a project is, at most.
  • dataRiskLevel: How much risk is associated with this data.
  • profileLastGenerated: When the profile was last updated in epoch seconds.
filter

string

Allows filtering.

Supported syntax:

  • Filter expressions are made up of one or more restrictions.
  • Restrictions can be combined by AND or OR logical operators. A sequence of restrictions implicitly uses AND.
  • A restriction has the form of {field} {operator} {value}.
  • Supported fields/values:
  • The operator must be = or !=.

Examples:

  • projectId = 12345 AND status_code = 1
  • projectId = 12345 AND sensitivityLevel = HIGH

The length of this field should be no more than 500 characters.

Request body

The request body must be empty.

Response body

If successful, the response body contains an instance of ListProjectDataProfilesResponse.

Authorization scopes

Requires the following OAuth scope:

  • https://www.googleapis.com/auth/cloud-platform

For more information, see the Authentication Overview.