1<html><body> 2<style> 3 4body, h1, h2, h3, div, span, p, pre, a { 5 margin: 0; 6 padding: 0; 7 border: 0; 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 13} 14 15body { 16 font-size: 13px; 17 padding: 1em; 18} 19 20h1 { 21 font-size: 26px; 22 margin-bottom: 1em; 23} 24 25h2 { 26 font-size: 24px; 27 margin-bottom: 1em; 28} 29 30h3 { 31 font-size: 20px; 32 margin-bottom: 1em; 33 margin-top: 1em; 34} 35 36pre, code { 37 line-height: 1.5; 38 font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace; 39} 40 41pre { 42 margin-top: 0.5em; 43} 44 45h1, h2, h3, p { 46 font-family: Arial, sans serif; 47} 48 49h1, h2, h3 { 50 border-bottom: solid #CCC 1px; 51} 52 53.toc_element { 54 margin-top: 0.5em; 55} 56 57.firstline { 58 margin-left: 2 em; 59} 60 61.method { 62 margin-top: 1em; 63 border: solid 1px #CCC; 64 padding: 1em; 65 background: #EEE; 66} 67 68.details { 69 font-weight: bold; 70 font-size: 14px; 71} 72 73</style> 74 75<h1><a href="healthcare_v1alpha2.html">Cloud Healthcare API</a> . <a href="healthcare_v1alpha2.projects.html">projects</a> . <a href="healthcare_v1alpha2.projects.locations.html">locations</a> . <a href="healthcare_v1alpha2.projects.locations.datasets.html">datasets</a> . <a href="healthcare_v1alpha2.projects.locations.datasets.fhirStores.html">fhirStores</a> . <a href="healthcare_v1alpha2.projects.locations.datasets.fhirStores.securityLabels.html">securityLabels</a></h1> 76<h2>Instance Methods</h2> 77<p class="toc_element"> 78 <code><a href="#getIamPolicy">getIamPolicy(resource, x__xgafv=None)</a></code></p> 79<p class="firstline">Gets the access control policy for a FHIR store or security label within a</p> 80<p class="toc_element"> 81 <code><a href="#setIamPolicy">setIamPolicy(resource, body, x__xgafv=None)</a></code></p> 82<p class="firstline">Sets the access control policy for a FHIR store or security label within a</p> 83<h3>Method Details</h3> 84<div class="method"> 85 <code class="details" id="getIamPolicy">getIamPolicy(resource, x__xgafv=None)</code> 86 <pre>Gets the access control policy for a FHIR store or security label within a 87FHIR store. Returns NOT_FOUND error if the resource does not exist. Returns 88an empty policy if the resource exists but does not have a policy set. 89 90Authorization requires the Google IAM permission 91'healthcare.fhirStores.getIamPolicy' for a FHIR store or 92'healthcare.securityLabels.getIamPolicy' for a security label 93 94Args: 95 resource: string, REQUIRED: The resource for which the policy is being requested. 96See the operation documentation for the appropriate value for this field. (required) 97 x__xgafv: string, V1 error format. 98 Allowed values 99 1 - v1 error format 100 2 - v2 error format 101 102Returns: 103 An object of the form: 104 105 { # Defines an Identity and Access Management (IAM) policy. It is used to 106 # specify access control policies for Cloud Platform resources. 107 # 108 # 109 # A `Policy` consists of a list of `bindings`. A `binding` binds a list of 110 # `members` to a `role`, where the members can be user accounts, Google groups, 111 # Google domains, and service accounts. A `role` is a named list of permissions 112 # defined by IAM. 113 # 114 # **JSON Example** 115 # 116 # { 117 # "bindings": [ 118 # { 119 # "role": "roles/owner", 120 # "members": [ 121 # "user:mike@example.com", 122 # "group:admins@example.com", 123 # "domain:google.com", 124 # "serviceAccount:my-other-app@appspot.gserviceaccount.com" 125 # ] 126 # }, 127 # { 128 # "role": "roles/viewer", 129 # "members": ["user:sean@example.com"] 130 # } 131 # ] 132 # } 133 # 134 # **YAML Example** 135 # 136 # bindings: 137 # - members: 138 # - user:mike@example.com 139 # - group:admins@example.com 140 # - domain:google.com 141 # - serviceAccount:my-other-app@appspot.gserviceaccount.com 142 # role: roles/owner 143 # - members: 144 # - user:sean@example.com 145 # role: roles/viewer 146 # 147 # 148 # For a description of IAM and its features, see the 149 # [IAM developer's guide](https://cloud.google.com/iam/docs). 150 "auditConfigs": [ # Specifies cloud audit logging configuration for this policy. 151 { # Specifies the audit configuration for a service. 152 # The configuration determines which permission types are logged, and what 153 # identities, if any, are exempted from logging. 154 # An AuditConfig must have one or more AuditLogConfigs. 155 # 156 # If there are AuditConfigs for both `allServices` and a specific service, 157 # the union of the two AuditConfigs is used for that service: the log_types 158 # specified in each AuditConfig are enabled, and the exempted_members in each 159 # AuditLogConfig are exempted. 160 # 161 # Example Policy with multiple AuditConfigs: 162 # 163 # { 164 # "audit_configs": [ 165 # { 166 # "service": "allServices" 167 # "audit_log_configs": [ 168 # { 169 # "log_type": "DATA_READ", 170 # "exempted_members": [ 171 # "user:foo@gmail.com" 172 # ] 173 # }, 174 # { 175 # "log_type": "DATA_WRITE", 176 # }, 177 # { 178 # "log_type": "ADMIN_READ", 179 # } 180 # ] 181 # }, 182 # { 183 # "service": "fooservice.googleapis.com" 184 # "audit_log_configs": [ 185 # { 186 # "log_type": "DATA_READ", 187 # }, 188 # { 189 # "log_type": "DATA_WRITE", 190 # "exempted_members": [ 191 # "user:bar@gmail.com" 192 # ] 193 # } 194 # ] 195 # } 196 # ] 197 # } 198 # 199 # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ 200 # logging. It also exempts foo@gmail.com from DATA_READ logging, and 201 # bar@gmail.com from DATA_WRITE logging. 202 "auditLogConfigs": [ # The configuration for logging of each type of permission. 203 { # Provides the configuration for logging a type of permissions. 204 # Example: 205 # 206 # { 207 # "audit_log_configs": [ 208 # { 209 # "log_type": "DATA_READ", 210 # "exempted_members": [ 211 # "user:foo@gmail.com" 212 # ] 213 # }, 214 # { 215 # "log_type": "DATA_WRITE", 216 # } 217 # ] 218 # } 219 # 220 # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting 221 # foo@gmail.com from DATA_READ logging. 222 "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of 223 # permission. 224 # Follows the same format of Binding.members. 225 "A String", 226 ], 227 "logType": "A String", # The log type that this config enables. 228 }, 229 ], 230 "service": "A String", # Specifies a service that will be enabled for audit logging. 231 # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. 232 # `allServices` is a special value that covers all services. 233 }, 234 ], 235 "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help 236 # prevent simultaneous updates of a policy from overwriting each other. 237 # It is strongly suggested that systems make use of the `etag` in the 238 # read-modify-write cycle to perform policy updates in order to avoid race 239 # conditions: An `etag` is returned in the response to `getIamPolicy`, and 240 # systems are expected to put that etag in the request to `setIamPolicy` to 241 # ensure that their change will be applied to the same version of the policy. 242 # 243 # If no `etag` is provided in the call to `setIamPolicy`, then the existing 244 # policy is overwritten blindly. 245 "bindings": [ # Associates a list of `members` to a `role`. 246 # `bindings` with no members will result in an error. 247 { # Associates `members` with a `role`. 248 "role": "A String", # Role that is assigned to `members`. 249 # For example, `roles/viewer`, `roles/editor`, or `roles/owner`. 250 "condition": { # Represents an expression text. Example: # The condition that is associated with this binding. 251 # NOTE: An unsatisfied condition will not allow user access via current 252 # binding. Different bindings, including their conditions, are examined 253 # independently. 254 # 255 # title: "User account presence" 256 # description: "Determines whether the request has a user account" 257 # expression: "size(request.user) > 0" 258 "description": "A String", # An optional description of the expression. This is a longer text which 259 # describes the expression, e.g. when hovered over it in a UI. 260 "expression": "A String", # Textual representation of an expression in 261 # Common Expression Language syntax. 262 # 263 # The application context of the containing message determines which 264 # well-known feature set of CEL is supported. 265 "location": "A String", # An optional string indicating the location of the expression for error 266 # reporting, e.g. a file name and a position in the file. 267 "title": "A String", # An optional title for the expression, i.e. a short string describing 268 # its purpose. This can be used e.g. in UIs which allow to enter the 269 # expression. 270 }, 271 "members": [ # Specifies the identities requesting access for a Cloud Platform resource. 272 # `members` can have the following values: 273 # 274 # * `allUsers`: A special identifier that represents anyone who is 275 # on the internet; with or without a Google account. 276 # 277 # * `allAuthenticatedUsers`: A special identifier that represents anyone 278 # who is authenticated with a Google account or a service account. 279 # 280 # * `user:{emailid}`: An email address that represents a specific Google 281 # account. For example, `alice@gmail.com` . 282 # 283 # 284 # * `serviceAccount:{emailid}`: An email address that represents a service 285 # account. For example, `my-other-app@appspot.gserviceaccount.com`. 286 # 287 # * `group:{emailid}`: An email address that represents a Google group. 288 # For example, `admins@example.com`. 289 # 290 # 291 # * `domain:{domain}`: The G Suite domain (primary) that represents all the 292 # users of that domain. For example, `google.com` or `example.com`. 293 # 294 "A String", 295 ], 296 }, 297 ], 298 "version": 42, # Deprecated. 299 }</pre> 300</div> 301 302<div class="method"> 303 <code class="details" id="setIamPolicy">setIamPolicy(resource, body, x__xgafv=None)</code> 304 <pre>Sets the access control policy for a FHIR store or security label within a 305FHIR store. Replaces any existing policy. 306 307Authorization requires the Google IAM permission 308'healthcare.fhirStores.setIamPolicy' for a FHIR store or 309'healthcare.securityLabels.setIamPolicy' for a security label 310 311Args: 312 resource: string, REQUIRED: The resource for which the policy is being specified. 313See the operation documentation for the appropriate value for this field. (required) 314 body: object, The request body. (required) 315 The object takes the form of: 316 317{ # Request message for `SetIamPolicy` method. 318 "policy": { # Defines an Identity and Access Management (IAM) policy. It is used to # REQUIRED: The complete policy to be applied to the `resource`. The size of 319 # the policy is limited to a few 10s of KB. An empty policy is a 320 # valid policy but certain Cloud Platform services (such as Projects) 321 # might reject them. 322 # specify access control policies for Cloud Platform resources. 323 # 324 # 325 # A `Policy` consists of a list of `bindings`. A `binding` binds a list of 326 # `members` to a `role`, where the members can be user accounts, Google groups, 327 # Google domains, and service accounts. A `role` is a named list of permissions 328 # defined by IAM. 329 # 330 # **JSON Example** 331 # 332 # { 333 # "bindings": [ 334 # { 335 # "role": "roles/owner", 336 # "members": [ 337 # "user:mike@example.com", 338 # "group:admins@example.com", 339 # "domain:google.com", 340 # "serviceAccount:my-other-app@appspot.gserviceaccount.com" 341 # ] 342 # }, 343 # { 344 # "role": "roles/viewer", 345 # "members": ["user:sean@example.com"] 346 # } 347 # ] 348 # } 349 # 350 # **YAML Example** 351 # 352 # bindings: 353 # - members: 354 # - user:mike@example.com 355 # - group:admins@example.com 356 # - domain:google.com 357 # - serviceAccount:my-other-app@appspot.gserviceaccount.com 358 # role: roles/owner 359 # - members: 360 # - user:sean@example.com 361 # role: roles/viewer 362 # 363 # 364 # For a description of IAM and its features, see the 365 # [IAM developer's guide](https://cloud.google.com/iam/docs). 366 "auditConfigs": [ # Specifies cloud audit logging configuration for this policy. 367 { # Specifies the audit configuration for a service. 368 # The configuration determines which permission types are logged, and what 369 # identities, if any, are exempted from logging. 370 # An AuditConfig must have one or more AuditLogConfigs. 371 # 372 # If there are AuditConfigs for both `allServices` and a specific service, 373 # the union of the two AuditConfigs is used for that service: the log_types 374 # specified in each AuditConfig are enabled, and the exempted_members in each 375 # AuditLogConfig are exempted. 376 # 377 # Example Policy with multiple AuditConfigs: 378 # 379 # { 380 # "audit_configs": [ 381 # { 382 # "service": "allServices" 383 # "audit_log_configs": [ 384 # { 385 # "log_type": "DATA_READ", 386 # "exempted_members": [ 387 # "user:foo@gmail.com" 388 # ] 389 # }, 390 # { 391 # "log_type": "DATA_WRITE", 392 # }, 393 # { 394 # "log_type": "ADMIN_READ", 395 # } 396 # ] 397 # }, 398 # { 399 # "service": "fooservice.googleapis.com" 400 # "audit_log_configs": [ 401 # { 402 # "log_type": "DATA_READ", 403 # }, 404 # { 405 # "log_type": "DATA_WRITE", 406 # "exempted_members": [ 407 # "user:bar@gmail.com" 408 # ] 409 # } 410 # ] 411 # } 412 # ] 413 # } 414 # 415 # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ 416 # logging. It also exempts foo@gmail.com from DATA_READ logging, and 417 # bar@gmail.com from DATA_WRITE logging. 418 "auditLogConfigs": [ # The configuration for logging of each type of permission. 419 { # Provides the configuration for logging a type of permissions. 420 # Example: 421 # 422 # { 423 # "audit_log_configs": [ 424 # { 425 # "log_type": "DATA_READ", 426 # "exempted_members": [ 427 # "user:foo@gmail.com" 428 # ] 429 # }, 430 # { 431 # "log_type": "DATA_WRITE", 432 # } 433 # ] 434 # } 435 # 436 # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting 437 # foo@gmail.com from DATA_READ logging. 438 "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of 439 # permission. 440 # Follows the same format of Binding.members. 441 "A String", 442 ], 443 "logType": "A String", # The log type that this config enables. 444 }, 445 ], 446 "service": "A String", # Specifies a service that will be enabled for audit logging. 447 # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. 448 # `allServices` is a special value that covers all services. 449 }, 450 ], 451 "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help 452 # prevent simultaneous updates of a policy from overwriting each other. 453 # It is strongly suggested that systems make use of the `etag` in the 454 # read-modify-write cycle to perform policy updates in order to avoid race 455 # conditions: An `etag` is returned in the response to `getIamPolicy`, and 456 # systems are expected to put that etag in the request to `setIamPolicy` to 457 # ensure that their change will be applied to the same version of the policy. 458 # 459 # If no `etag` is provided in the call to `setIamPolicy`, then the existing 460 # policy is overwritten blindly. 461 "bindings": [ # Associates a list of `members` to a `role`. 462 # `bindings` with no members will result in an error. 463 { # Associates `members` with a `role`. 464 "role": "A String", # Role that is assigned to `members`. 465 # For example, `roles/viewer`, `roles/editor`, or `roles/owner`. 466 "condition": { # Represents an expression text. Example: # The condition that is associated with this binding. 467 # NOTE: An unsatisfied condition will not allow user access via current 468 # binding. Different bindings, including their conditions, are examined 469 # independently. 470 # 471 # title: "User account presence" 472 # description: "Determines whether the request has a user account" 473 # expression: "size(request.user) > 0" 474 "description": "A String", # An optional description of the expression. This is a longer text which 475 # describes the expression, e.g. when hovered over it in a UI. 476 "expression": "A String", # Textual representation of an expression in 477 # Common Expression Language syntax. 478 # 479 # The application context of the containing message determines which 480 # well-known feature set of CEL is supported. 481 "location": "A String", # An optional string indicating the location of the expression for error 482 # reporting, e.g. a file name and a position in the file. 483 "title": "A String", # An optional title for the expression, i.e. a short string describing 484 # its purpose. This can be used e.g. in UIs which allow to enter the 485 # expression. 486 }, 487 "members": [ # Specifies the identities requesting access for a Cloud Platform resource. 488 # `members` can have the following values: 489 # 490 # * `allUsers`: A special identifier that represents anyone who is 491 # on the internet; with or without a Google account. 492 # 493 # * `allAuthenticatedUsers`: A special identifier that represents anyone 494 # who is authenticated with a Google account or a service account. 495 # 496 # * `user:{emailid}`: An email address that represents a specific Google 497 # account. For example, `alice@gmail.com` . 498 # 499 # 500 # * `serviceAccount:{emailid}`: An email address that represents a service 501 # account. For example, `my-other-app@appspot.gserviceaccount.com`. 502 # 503 # * `group:{emailid}`: An email address that represents a Google group. 504 # For example, `admins@example.com`. 505 # 506 # 507 # * `domain:{domain}`: The G Suite domain (primary) that represents all the 508 # users of that domain. For example, `google.com` or `example.com`. 509 # 510 "A String", 511 ], 512 }, 513 ], 514 "version": 42, # Deprecated. 515 }, 516 "updateMask": "A String", # OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only 517 # the fields in the mask will be modified. If no mask is provided, the 518 # following default mask is used: 519 # paths: "bindings, etag" 520 # This field is only used by Cloud IAM. 521 } 522 523 x__xgafv: string, V1 error format. 524 Allowed values 525 1 - v1 error format 526 2 - v2 error format 527 528Returns: 529 An object of the form: 530 531 { # Defines an Identity and Access Management (IAM) policy. It is used to 532 # specify access control policies for Cloud Platform resources. 533 # 534 # 535 # A `Policy` consists of a list of `bindings`. A `binding` binds a list of 536 # `members` to a `role`, where the members can be user accounts, Google groups, 537 # Google domains, and service accounts. A `role` is a named list of permissions 538 # defined by IAM. 539 # 540 # **JSON Example** 541 # 542 # { 543 # "bindings": [ 544 # { 545 # "role": "roles/owner", 546 # "members": [ 547 # "user:mike@example.com", 548 # "group:admins@example.com", 549 # "domain:google.com", 550 # "serviceAccount:my-other-app@appspot.gserviceaccount.com" 551 # ] 552 # }, 553 # { 554 # "role": "roles/viewer", 555 # "members": ["user:sean@example.com"] 556 # } 557 # ] 558 # } 559 # 560 # **YAML Example** 561 # 562 # bindings: 563 # - members: 564 # - user:mike@example.com 565 # - group:admins@example.com 566 # - domain:google.com 567 # - serviceAccount:my-other-app@appspot.gserviceaccount.com 568 # role: roles/owner 569 # - members: 570 # - user:sean@example.com 571 # role: roles/viewer 572 # 573 # 574 # For a description of IAM and its features, see the 575 # [IAM developer's guide](https://cloud.google.com/iam/docs). 576 "auditConfigs": [ # Specifies cloud audit logging configuration for this policy. 577 { # Specifies the audit configuration for a service. 578 # The configuration determines which permission types are logged, and what 579 # identities, if any, are exempted from logging. 580 # An AuditConfig must have one or more AuditLogConfigs. 581 # 582 # If there are AuditConfigs for both `allServices` and a specific service, 583 # the union of the two AuditConfigs is used for that service: the log_types 584 # specified in each AuditConfig are enabled, and the exempted_members in each 585 # AuditLogConfig are exempted. 586 # 587 # Example Policy with multiple AuditConfigs: 588 # 589 # { 590 # "audit_configs": [ 591 # { 592 # "service": "allServices" 593 # "audit_log_configs": [ 594 # { 595 # "log_type": "DATA_READ", 596 # "exempted_members": [ 597 # "user:foo@gmail.com" 598 # ] 599 # }, 600 # { 601 # "log_type": "DATA_WRITE", 602 # }, 603 # { 604 # "log_type": "ADMIN_READ", 605 # } 606 # ] 607 # }, 608 # { 609 # "service": "fooservice.googleapis.com" 610 # "audit_log_configs": [ 611 # { 612 # "log_type": "DATA_READ", 613 # }, 614 # { 615 # "log_type": "DATA_WRITE", 616 # "exempted_members": [ 617 # "user:bar@gmail.com" 618 # ] 619 # } 620 # ] 621 # } 622 # ] 623 # } 624 # 625 # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ 626 # logging. It also exempts foo@gmail.com from DATA_READ logging, and 627 # bar@gmail.com from DATA_WRITE logging. 628 "auditLogConfigs": [ # The configuration for logging of each type of permission. 629 { # Provides the configuration for logging a type of permissions. 630 # Example: 631 # 632 # { 633 # "audit_log_configs": [ 634 # { 635 # "log_type": "DATA_READ", 636 # "exempted_members": [ 637 # "user:foo@gmail.com" 638 # ] 639 # }, 640 # { 641 # "log_type": "DATA_WRITE", 642 # } 643 # ] 644 # } 645 # 646 # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting 647 # foo@gmail.com from DATA_READ logging. 648 "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of 649 # permission. 650 # Follows the same format of Binding.members. 651 "A String", 652 ], 653 "logType": "A String", # The log type that this config enables. 654 }, 655 ], 656 "service": "A String", # Specifies a service that will be enabled for audit logging. 657 # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. 658 # `allServices` is a special value that covers all services. 659 }, 660 ], 661 "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help 662 # prevent simultaneous updates of a policy from overwriting each other. 663 # It is strongly suggested that systems make use of the `etag` in the 664 # read-modify-write cycle to perform policy updates in order to avoid race 665 # conditions: An `etag` is returned in the response to `getIamPolicy`, and 666 # systems are expected to put that etag in the request to `setIamPolicy` to 667 # ensure that their change will be applied to the same version of the policy. 668 # 669 # If no `etag` is provided in the call to `setIamPolicy`, then the existing 670 # policy is overwritten blindly. 671 "bindings": [ # Associates a list of `members` to a `role`. 672 # `bindings` with no members will result in an error. 673 { # Associates `members` with a `role`. 674 "role": "A String", # Role that is assigned to `members`. 675 # For example, `roles/viewer`, `roles/editor`, or `roles/owner`. 676 "condition": { # Represents an expression text. Example: # The condition that is associated with this binding. 677 # NOTE: An unsatisfied condition will not allow user access via current 678 # binding. Different bindings, including their conditions, are examined 679 # independently. 680 # 681 # title: "User account presence" 682 # description: "Determines whether the request has a user account" 683 # expression: "size(request.user) > 0" 684 "description": "A String", # An optional description of the expression. This is a longer text which 685 # describes the expression, e.g. when hovered over it in a UI. 686 "expression": "A String", # Textual representation of an expression in 687 # Common Expression Language syntax. 688 # 689 # The application context of the containing message determines which 690 # well-known feature set of CEL is supported. 691 "location": "A String", # An optional string indicating the location of the expression for error 692 # reporting, e.g. a file name and a position in the file. 693 "title": "A String", # An optional title for the expression, i.e. a short string describing 694 # its purpose. This can be used e.g. in UIs which allow to enter the 695 # expression. 696 }, 697 "members": [ # Specifies the identities requesting access for a Cloud Platform resource. 698 # `members` can have the following values: 699 # 700 # * `allUsers`: A special identifier that represents anyone who is 701 # on the internet; with or without a Google account. 702 # 703 # * `allAuthenticatedUsers`: A special identifier that represents anyone 704 # who is authenticated with a Google account or a service account. 705 # 706 # * `user:{emailid}`: An email address that represents a specific Google 707 # account. For example, `alice@gmail.com` . 708 # 709 # 710 # * `serviceAccount:{emailid}`: An email address that represents a service 711 # account. For example, `my-other-app@appspot.gserviceaccount.com`. 712 # 713 # * `group:{emailid}`: An email address that represents a Google group. 714 # For example, `admins@example.com`. 715 # 716 # 717 # * `domain:{domain}`: The G Suite domain (primary) that represents all the 718 # users of that domain. For example, `google.com` or `example.com`. 719 # 720 "A String", 721 ], 722 }, 723 ], 724 "version": 42, # Deprecated. 725 }</pre> 726</div> 727 728</body></html>