GoogleApi.IAP.V1.Model.PolicyDelegationSettings (google_api_iap v0.15.0) View Source
PolicyDelegationConfig allows google-internal teams to use IAP for apps hosted in a tenant project. Using these settings, the app can delegate permission check to happen against the linked customer project. This is only ever supposed to be used by google internal teams, hence the restriction on the proto.
Attributes
-
iamPermission
(type:String.t
, default:nil
) - Permission to check in IAM. -
iamServiceName
(type:String.t
, default:nil
) - The DNS name of the service (e.g. "resourcemanager.googleapis.com"). This should be the domain name part of the full resource names (see https://aip.dev/122#full-resource-names), which is usually the same as IamServiceSpec.service of the service where the resource type is defined. -
policyName
(type:GoogleApi.IAP.V1.Model.PolicyName.t
, default:nil
) - Policy name to be checked -
resource
(type:GoogleApi.IAP.V1.Model.Resource.t
, default:nil
) - IAM resource to check permission on
Link to this section Summary
Functions
Unwrap a decoded JSON object into its complex fields.
Link to this section Types
Specs
t() :: %GoogleApi.IAP.V1.Model.PolicyDelegationSettings{ iamPermission: String.t() | nil, iamServiceName: String.t() | nil, policyName: GoogleApi.IAP.V1.Model.PolicyName.t() | nil, resource: GoogleApi.IAP.V1.Model.Resource.t() | nil }
Link to this section Functions
Specs
Unwrap a decoded JSON object into its complex fields.