GoogleApi.IAP.V1.Model.PolicyDelegationSettings (google_api_iap v0.15.0) View Source

PolicyDelegationConfig allows google-internal teams to use IAP for apps hosted in a tenant project. Using these settings, the app can delegate permission check to happen against the linked customer project. This is only ever supposed to be used by google internal teams, hence the restriction on the proto.

Attributes

  • iamPermission (type: String.t, default: nil) - Permission to check in IAM.
  • iamServiceName (type: String.t, default: nil) - The DNS name of the service (e.g. "resourcemanager.googleapis.com"). This should be the domain name part of the full resource names (see https://aip.dev/122#full-resource-names), which is usually the same as IamServiceSpec.service of the service where the resource type is defined.
  • policyName (type: GoogleApi.IAP.V1.Model.PolicyName.t, default: nil) - Policy name to be checked
  • resource (type: GoogleApi.IAP.V1.Model.Resource.t, default: nil) - IAM resource to check permission on

Link to this section Summary

Functions

Unwrap a decoded JSON object into its complex fields.

Link to this section Types

Specs

t() :: %GoogleApi.IAP.V1.Model.PolicyDelegationSettings{
  iamPermission: String.t() | nil,
  iamServiceName: String.t() | nil,
  policyName: GoogleApi.IAP.V1.Model.PolicyName.t() | nil,
  resource: GoogleApi.IAP.V1.Model.Resource.t() | nil
}

Link to this section Functions

Specs

decode(struct(), keyword()) :: struct()

Unwrap a decoded JSON object into its complex fields.