gcloud kms import-jobs remove-iam-policy-binding - remove IAM policy binding for a KMS import job
gcloud kms import-jobs remove-iam-policy-binding (IMPORT_JOB : --keyring=KEYRING --location=LOCATION) --member=PRINCIPAL --role=ROLE [GCLOUD_WIDE_FLAG ...]
Removes a policy binding from the IAM policy of a KMS import job. One binding consists of a member and a role.
To remove an IAM policy binding for the role of 'roles/viewer' for the user 'test-user@gmail.com' on the import job frodo with the keyring fellowship and location global, run:
$ gcloud kms import-jobs remove-iam-policy-binding frodo \ --keyring='fellowship' --location='global' \ --member='user:test-user@gmail.com' --role='roles/viewer'
See https://cloud.google.com/iam/docs/managing-policies for details of policy role and member types.
- Import job resource - The import job from which to remove the IAM policy
binding. The arguments in this group can be used to specify the attributes of this resource. (NOTE) Some attributes are not given arguments in this group but can be set in other ways. To set the project attribute:
- —
provide the argument import_job on the command line with a fully specified name;
- —
provide the argument --project on the command line;
- —
set the property core/project.
This must be specified.
- IMPORT_JOB
ID of the import job or fully qualified identifier for the import job. To set the import_job attribute:
provide the argument import_job on the command line.
This positional argument must be specified if any of the other arguments in this group are specified.
- --keyring=KEYRING
The containing keyring. To set the keyring attribute:
provide the argument import_job on the command line with a fully specified name;
provide the argument --keyring on the command line.
- --location=LOCATION
The location of the resource. To set the location attribute:
provide the argument import_job on the command line with a fully specified name;
provide the argument --location on the command line.
- --member=PRINCIPAL
The principal to remove the binding for. Should be of the form user|group|serviceAccount:email or domain:domain.
Examples: user:test-user@gmail.com, group:admins@example.com, serviceAccount:test123@example.domain.com, or domain:example.domain.com.
Deleted principals have an additional deleted: prefix and a ?uid=UID suffix, where UID is a unique identifier for the principal. Example: deleted:user:test-user@gmail.com?uid=123456789012345678901.
Some resources also accept the following special values:
- —
allUsers - Special identifier that represents anyone who is on the internet, with or without a Google account.
- —
allAuthenticatedUsers - Special identifier that represents anyone who is authenticated with a Google account or a service account.
- --role=ROLE
The role to remove the principal from.
These flags are available to all commands: --access-token-file, --account, --billing-project, --configuration, --flags-file, --flatten, --format, --help, --impersonate-service-account, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity.
Run $ gcloud help for details.
This command uses the cloudkms/v1 API. The full documentation for this API can be found at: https://cloud.google.com/kms/
These variants are also available:
$ gcloud alpha kms import-jobs remove-iam-policy-binding
$ gcloud beta kms import-jobs remove-iam-policy-binding