• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1<html><body>
2<style>
3
4body, h1, h2, h3, div, span, p, pre, a {
5  margin: 0;
6  padding: 0;
7  border: 0;
8  font-weight: inherit;
9  font-style: inherit;
10  font-size: 100%;
11  font-family: inherit;
12  vertical-align: baseline;
13}
14
15body {
16  font-size: 13px;
17  padding: 1em;
18}
19
20h1 {
21  font-size: 26px;
22  margin-bottom: 1em;
23}
24
25h2 {
26  font-size: 24px;
27  margin-bottom: 1em;
28}
29
30h3 {
31  font-size: 20px;
32  margin-bottom: 1em;
33  margin-top: 1em;
34}
35
36pre, code {
37  line-height: 1.5;
38  font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39}
40
41pre {
42  margin-top: 0.5em;
43}
44
45h1, h2, h3, p {
46  font-family: Arial, sans serif;
47}
48
49h1, h2, h3 {
50  border-bottom: solid #CCC 1px;
51}
52
53.toc_element {
54  margin-top: 0.5em;
55}
56
57.firstline {
58  margin-left: 2 em;
59}
60
61.method  {
62  margin-top: 1em;
63  border: solid 1px #CCC;
64  padding: 1em;
65  background: #EEE;
66}
67
68.details {
69  font-weight: bold;
70  font-size: 14px;
71}
72
73</style>
74
75<h1><a href="healthcare_v1alpha2.html">Cloud Healthcare API</a> . <a href="healthcare_v1alpha2.projects.html">projects</a> . <a href="healthcare_v1alpha2.projects.locations.html">locations</a> . <a href="healthcare_v1alpha2.projects.locations.datasets.html">datasets</a> . <a href="healthcare_v1alpha2.projects.locations.datasets.fhirStores.html">fhirStores</a> . <a href="healthcare_v1alpha2.projects.locations.datasets.fhirStores.securityLabels.html">securityLabels</a></h1>
76<h2>Instance Methods</h2>
77<p class="toc_element">
78  <code><a href="#getIamPolicy">getIamPolicy(resource, x__xgafv=None)</a></code></p>
79<p class="firstline">Gets the access control policy for a FHIR store or security label within a</p>
80<p class="toc_element">
81  <code><a href="#setIamPolicy">setIamPolicy(resource, body, x__xgafv=None)</a></code></p>
82<p class="firstline">Sets the access control policy for a FHIR store or security label within a</p>
83<h3>Method Details</h3>
84<div class="method">
85    <code class="details" id="getIamPolicy">getIamPolicy(resource, x__xgafv=None)</code>
86  <pre>Gets the access control policy for a FHIR store or security label within a
87FHIR store. Returns NOT_FOUND error if the resource does not exist. Returns
88an empty policy if the resource exists but does not have a policy set.
89
90Authorization requires the Google IAM permission
91'healthcare.fhirStores.getIamPolicy' for a FHIR store or
92'healthcare.securityLabels.getIamPolicy' for a security label
93
94Args:
95  resource: string, REQUIRED: The resource for which the policy is being requested.
96See the operation documentation for the appropriate value for this field. (required)
97  x__xgafv: string, V1 error format.
98    Allowed values
99      1 - v1 error format
100      2 - v2 error format
101
102Returns:
103  An object of the form:
104
105    { # Defines an Identity and Access Management (IAM) policy. It is used to
106      # specify access control policies for Cloud Platform resources.
107      #
108      #
109      # A `Policy` consists of a list of `bindings`. A `binding` binds a list of
110      # `members` to a `role`, where the members can be user accounts, Google groups,
111      # Google domains, and service accounts. A `role` is a named list of permissions
112      # defined by IAM.
113      #
114      # **JSON Example**
115      #
116      #     {
117      #       "bindings": [
118      #         {
119      #           "role": "roles/owner",
120      #           "members": [
121      #             "user:mike@example.com",
122      #             "group:admins@example.com",
123      #             "domain:google.com",
124      #             "serviceAccount:my-other-app@appspot.gserviceaccount.com"
125      #           ]
126      #         },
127      #         {
128      #           "role": "roles/viewer",
129      #           "members": ["user:sean@example.com"]
130      #         }
131      #       ]
132      #     }
133      #
134      # **YAML Example**
135      #
136      #     bindings:
137      #     - members:
138      #       - user:mike@example.com
139      #       - group:admins@example.com
140      #       - domain:google.com
141      #       - serviceAccount:my-other-app@appspot.gserviceaccount.com
142      #       role: roles/owner
143      #     - members:
144      #       - user:sean@example.com
145      #       role: roles/viewer
146      #
147      #
148      # For a description of IAM and its features, see the
149      # [IAM developer's guide](https://cloud.google.com/iam/docs).
150    "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
151      { # Specifies the audit configuration for a service.
152          # The configuration determines which permission types are logged, and what
153          # identities, if any, are exempted from logging.
154          # An AuditConfig must have one or more AuditLogConfigs.
155          #
156          # If there are AuditConfigs for both `allServices` and a specific service,
157          # the union of the two AuditConfigs is used for that service: the log_types
158          # specified in each AuditConfig are enabled, and the exempted_members in each
159          # AuditLogConfig are exempted.
160          #
161          # Example Policy with multiple AuditConfigs:
162          #
163          #     {
164          #       "audit_configs": [
165          #         {
166          #           "service": "allServices"
167          #           "audit_log_configs": [
168          #             {
169          #               "log_type": "DATA_READ",
170          #               "exempted_members": [
171          #                 "user:foo@gmail.com"
172          #               ]
173          #             },
174          #             {
175          #               "log_type": "DATA_WRITE",
176          #             },
177          #             {
178          #               "log_type": "ADMIN_READ",
179          #             }
180          #           ]
181          #         },
182          #         {
183          #           "service": "fooservice.googleapis.com"
184          #           "audit_log_configs": [
185          #             {
186          #               "log_type": "DATA_READ",
187          #             },
188          #             {
189          #               "log_type": "DATA_WRITE",
190          #               "exempted_members": [
191          #                 "user:bar@gmail.com"
192          #               ]
193          #             }
194          #           ]
195          #         }
196          #       ]
197          #     }
198          #
199          # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
200          # logging. It also exempts foo@gmail.com from DATA_READ logging, and
201          # bar@gmail.com from DATA_WRITE logging.
202        "auditLogConfigs": [ # The configuration for logging of each type of permission.
203          { # Provides the configuration for logging a type of permissions.
204              # Example:
205              #
206              #     {
207              #       "audit_log_configs": [
208              #         {
209              #           "log_type": "DATA_READ",
210              #           "exempted_members": [
211              #             "user:foo@gmail.com"
212              #           ]
213              #         },
214              #         {
215              #           "log_type": "DATA_WRITE",
216              #         }
217              #       ]
218              #     }
219              #
220              # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
221              # foo@gmail.com from DATA_READ logging.
222            "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
223                # permission.
224                # Follows the same format of Binding.members.
225              "A String",
226            ],
227            "logType": "A String", # The log type that this config enables.
228          },
229        ],
230        "service": "A String", # Specifies a service that will be enabled for audit logging.
231            # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
232            # `allServices` is a special value that covers all services.
233      },
234    ],
235    "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
236        # prevent simultaneous updates of a policy from overwriting each other.
237        # It is strongly suggested that systems make use of the `etag` in the
238        # read-modify-write cycle to perform policy updates in order to avoid race
239        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
240        # systems are expected to put that etag in the request to `setIamPolicy` to
241        # ensure that their change will be applied to the same version of the policy.
242        #
243        # If no `etag` is provided in the call to `setIamPolicy`, then the existing
244        # policy is overwritten blindly.
245    "bindings": [ # Associates a list of `members` to a `role`.
246        # `bindings` with no members will result in an error.
247      { # Associates `members` with a `role`.
248        "role": "A String", # Role that is assigned to `members`.
249            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
250        "condition": { # Represents an expression text. Example: # The condition that is associated with this binding.
251            # NOTE: An unsatisfied condition will not allow user access via current
252            # binding. Different bindings, including their conditions, are examined
253            # independently.
254            #
255            #     title: "User account presence"
256            #     description: "Determines whether the request has a user account"
257            #     expression: "size(request.user) > 0"
258          "description": "A String", # An optional description of the expression. This is a longer text which
259              # describes the expression, e.g. when hovered over it in a UI.
260          "expression": "A String", # Textual representation of an expression in
261              # Common Expression Language syntax.
262              #
263              # The application context of the containing message determines which
264              # well-known feature set of CEL is supported.
265          "location": "A String", # An optional string indicating the location of the expression for error
266              # reporting, e.g. a file name and a position in the file.
267          "title": "A String", # An optional title for the expression, i.e. a short string describing
268              # its purpose. This can be used e.g. in UIs which allow to enter the
269              # expression.
270        },
271        "members": [ # Specifies the identities requesting access for a Cloud Platform resource.
272            # `members` can have the following values:
273            #
274            # * `allUsers`: A special identifier that represents anyone who is
275            #    on the internet; with or without a Google account.
276            #
277            # * `allAuthenticatedUsers`: A special identifier that represents anyone
278            #    who is authenticated with a Google account or a service account.
279            #
280            # * `user:{emailid}`: An email address that represents a specific Google
281            #    account. For example, `alice@gmail.com` .
282            #
283            #
284            # * `serviceAccount:{emailid}`: An email address that represents a service
285            #    account. For example, `my-other-app@appspot.gserviceaccount.com`.
286            #
287            # * `group:{emailid}`: An email address that represents a Google group.
288            #    For example, `admins@example.com`.
289            #
290            #
291            # * `domain:{domain}`: The G Suite domain (primary) that represents all the
292            #    users of that domain. For example, `google.com` or `example.com`.
293            #
294          "A String",
295        ],
296      },
297    ],
298    "version": 42, # Deprecated.
299  }</pre>
300</div>
301
302<div class="method">
303    <code class="details" id="setIamPolicy">setIamPolicy(resource, body, x__xgafv=None)</code>
304  <pre>Sets the access control policy for a FHIR store or security label within a
305FHIR store. Replaces any existing policy.
306
307Authorization requires the Google IAM permission
308'healthcare.fhirStores.setIamPolicy' for a FHIR store or
309'healthcare.securityLabels.setIamPolicy' for a security label
310
311Args:
312  resource: string, REQUIRED: The resource for which the policy is being specified.
313See the operation documentation for the appropriate value for this field. (required)
314  body: object, The request body. (required)
315    The object takes the form of:
316
317{ # Request message for `SetIamPolicy` method.
318    "policy": { # Defines an Identity and Access Management (IAM) policy. It is used to # REQUIRED: The complete policy to be applied to the `resource`. The size of
319        # the policy is limited to a few 10s of KB. An empty policy is a
320        # valid policy but certain Cloud Platform services (such as Projects)
321        # might reject them.
322        # specify access control policies for Cloud Platform resources.
323        #
324        #
325        # A `Policy` consists of a list of `bindings`. A `binding` binds a list of
326        # `members` to a `role`, where the members can be user accounts, Google groups,
327        # Google domains, and service accounts. A `role` is a named list of permissions
328        # defined by IAM.
329        #
330        # **JSON Example**
331        #
332        #     {
333        #       "bindings": [
334        #         {
335        #           "role": "roles/owner",
336        #           "members": [
337        #             "user:mike@example.com",
338        #             "group:admins@example.com",
339        #             "domain:google.com",
340        #             "serviceAccount:my-other-app@appspot.gserviceaccount.com"
341        #           ]
342        #         },
343        #         {
344        #           "role": "roles/viewer",
345        #           "members": ["user:sean@example.com"]
346        #         }
347        #       ]
348        #     }
349        #
350        # **YAML Example**
351        #
352        #     bindings:
353        #     - members:
354        #       - user:mike@example.com
355        #       - group:admins@example.com
356        #       - domain:google.com
357        #       - serviceAccount:my-other-app@appspot.gserviceaccount.com
358        #       role: roles/owner
359        #     - members:
360        #       - user:sean@example.com
361        #       role: roles/viewer
362        #
363        #
364        # For a description of IAM and its features, see the
365        # [IAM developer's guide](https://cloud.google.com/iam/docs).
366      "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
367        { # Specifies the audit configuration for a service.
368            # The configuration determines which permission types are logged, and what
369            # identities, if any, are exempted from logging.
370            # An AuditConfig must have one or more AuditLogConfigs.
371            #
372            # If there are AuditConfigs for both `allServices` and a specific service,
373            # the union of the two AuditConfigs is used for that service: the log_types
374            # specified in each AuditConfig are enabled, and the exempted_members in each
375            # AuditLogConfig are exempted.
376            #
377            # Example Policy with multiple AuditConfigs:
378            #
379            #     {
380            #       "audit_configs": [
381            #         {
382            #           "service": "allServices"
383            #           "audit_log_configs": [
384            #             {
385            #               "log_type": "DATA_READ",
386            #               "exempted_members": [
387            #                 "user:foo@gmail.com"
388            #               ]
389            #             },
390            #             {
391            #               "log_type": "DATA_WRITE",
392            #             },
393            #             {
394            #               "log_type": "ADMIN_READ",
395            #             }
396            #           ]
397            #         },
398            #         {
399            #           "service": "fooservice.googleapis.com"
400            #           "audit_log_configs": [
401            #             {
402            #               "log_type": "DATA_READ",
403            #             },
404            #             {
405            #               "log_type": "DATA_WRITE",
406            #               "exempted_members": [
407            #                 "user:bar@gmail.com"
408            #               ]
409            #             }
410            #           ]
411            #         }
412            #       ]
413            #     }
414            #
415            # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
416            # logging. It also exempts foo@gmail.com from DATA_READ logging, and
417            # bar@gmail.com from DATA_WRITE logging.
418          "auditLogConfigs": [ # The configuration for logging of each type of permission.
419            { # Provides the configuration for logging a type of permissions.
420                # Example:
421                #
422                #     {
423                #       "audit_log_configs": [
424                #         {
425                #           "log_type": "DATA_READ",
426                #           "exempted_members": [
427                #             "user:foo@gmail.com"
428                #           ]
429                #         },
430                #         {
431                #           "log_type": "DATA_WRITE",
432                #         }
433                #       ]
434                #     }
435                #
436                # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
437                # foo@gmail.com from DATA_READ logging.
438              "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
439                  # permission.
440                  # Follows the same format of Binding.members.
441                "A String",
442              ],
443              "logType": "A String", # The log type that this config enables.
444            },
445          ],
446          "service": "A String", # Specifies a service that will be enabled for audit logging.
447              # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
448              # `allServices` is a special value that covers all services.
449        },
450      ],
451      "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
452          # prevent simultaneous updates of a policy from overwriting each other.
453          # It is strongly suggested that systems make use of the `etag` in the
454          # read-modify-write cycle to perform policy updates in order to avoid race
455          # conditions: An `etag` is returned in the response to `getIamPolicy`, and
456          # systems are expected to put that etag in the request to `setIamPolicy` to
457          # ensure that their change will be applied to the same version of the policy.
458          #
459          # If no `etag` is provided in the call to `setIamPolicy`, then the existing
460          # policy is overwritten blindly.
461      "bindings": [ # Associates a list of `members` to a `role`.
462          # `bindings` with no members will result in an error.
463        { # Associates `members` with a `role`.
464          "role": "A String", # Role that is assigned to `members`.
465              # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
466          "condition": { # Represents an expression text. Example: # The condition that is associated with this binding.
467              # NOTE: An unsatisfied condition will not allow user access via current
468              # binding. Different bindings, including their conditions, are examined
469              # independently.
470              #
471              #     title: "User account presence"
472              #     description: "Determines whether the request has a user account"
473              #     expression: "size(request.user) > 0"
474            "description": "A String", # An optional description of the expression. This is a longer text which
475                # describes the expression, e.g. when hovered over it in a UI.
476            "expression": "A String", # Textual representation of an expression in
477                # Common Expression Language syntax.
478                #
479                # The application context of the containing message determines which
480                # well-known feature set of CEL is supported.
481            "location": "A String", # An optional string indicating the location of the expression for error
482                # reporting, e.g. a file name and a position in the file.
483            "title": "A String", # An optional title for the expression, i.e. a short string describing
484                # its purpose. This can be used e.g. in UIs which allow to enter the
485                # expression.
486          },
487          "members": [ # Specifies the identities requesting access for a Cloud Platform resource.
488              # `members` can have the following values:
489              #
490              # * `allUsers`: A special identifier that represents anyone who is
491              #    on the internet; with or without a Google account.
492              #
493              # * `allAuthenticatedUsers`: A special identifier that represents anyone
494              #    who is authenticated with a Google account or a service account.
495              #
496              # * `user:{emailid}`: An email address that represents a specific Google
497              #    account. For example, `alice@gmail.com` .
498              #
499              #
500              # * `serviceAccount:{emailid}`: An email address that represents a service
501              #    account. For example, `my-other-app@appspot.gserviceaccount.com`.
502              #
503              # * `group:{emailid}`: An email address that represents a Google group.
504              #    For example, `admins@example.com`.
505              #
506              #
507              # * `domain:{domain}`: The G Suite domain (primary) that represents all the
508              #    users of that domain. For example, `google.com` or `example.com`.
509              #
510            "A String",
511          ],
512        },
513      ],
514      "version": 42, # Deprecated.
515    },
516    "updateMask": "A String", # OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only
517        # the fields in the mask will be modified. If no mask is provided, the
518        # following default mask is used:
519        # paths: "bindings, etag"
520        # This field is only used by Cloud IAM.
521  }
522
523  x__xgafv: string, V1 error format.
524    Allowed values
525      1 - v1 error format
526      2 - v2 error format
527
528Returns:
529  An object of the form:
530
531    { # Defines an Identity and Access Management (IAM) policy. It is used to
532      # specify access control policies for Cloud Platform resources.
533      #
534      #
535      # A `Policy` consists of a list of `bindings`. A `binding` binds a list of
536      # `members` to a `role`, where the members can be user accounts, Google groups,
537      # Google domains, and service accounts. A `role` is a named list of permissions
538      # defined by IAM.
539      #
540      # **JSON Example**
541      #
542      #     {
543      #       "bindings": [
544      #         {
545      #           "role": "roles/owner",
546      #           "members": [
547      #             "user:mike@example.com",
548      #             "group:admins@example.com",
549      #             "domain:google.com",
550      #             "serviceAccount:my-other-app@appspot.gserviceaccount.com"
551      #           ]
552      #         },
553      #         {
554      #           "role": "roles/viewer",
555      #           "members": ["user:sean@example.com"]
556      #         }
557      #       ]
558      #     }
559      #
560      # **YAML Example**
561      #
562      #     bindings:
563      #     - members:
564      #       - user:mike@example.com
565      #       - group:admins@example.com
566      #       - domain:google.com
567      #       - serviceAccount:my-other-app@appspot.gserviceaccount.com
568      #       role: roles/owner
569      #     - members:
570      #       - user:sean@example.com
571      #       role: roles/viewer
572      #
573      #
574      # For a description of IAM and its features, see the
575      # [IAM developer's guide](https://cloud.google.com/iam/docs).
576    "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
577      { # Specifies the audit configuration for a service.
578          # The configuration determines which permission types are logged, and what
579          # identities, if any, are exempted from logging.
580          # An AuditConfig must have one or more AuditLogConfigs.
581          #
582          # If there are AuditConfigs for both `allServices` and a specific service,
583          # the union of the two AuditConfigs is used for that service: the log_types
584          # specified in each AuditConfig are enabled, and the exempted_members in each
585          # AuditLogConfig are exempted.
586          #
587          # Example Policy with multiple AuditConfigs:
588          #
589          #     {
590          #       "audit_configs": [
591          #         {
592          #           "service": "allServices"
593          #           "audit_log_configs": [
594          #             {
595          #               "log_type": "DATA_READ",
596          #               "exempted_members": [
597          #                 "user:foo@gmail.com"
598          #               ]
599          #             },
600          #             {
601          #               "log_type": "DATA_WRITE",
602          #             },
603          #             {
604          #               "log_type": "ADMIN_READ",
605          #             }
606          #           ]
607          #         },
608          #         {
609          #           "service": "fooservice.googleapis.com"
610          #           "audit_log_configs": [
611          #             {
612          #               "log_type": "DATA_READ",
613          #             },
614          #             {
615          #               "log_type": "DATA_WRITE",
616          #               "exempted_members": [
617          #                 "user:bar@gmail.com"
618          #               ]
619          #             }
620          #           ]
621          #         }
622          #       ]
623          #     }
624          #
625          # For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
626          # logging. It also exempts foo@gmail.com from DATA_READ logging, and
627          # bar@gmail.com from DATA_WRITE logging.
628        "auditLogConfigs": [ # The configuration for logging of each type of permission.
629          { # Provides the configuration for logging a type of permissions.
630              # Example:
631              #
632              #     {
633              #       "audit_log_configs": [
634              #         {
635              #           "log_type": "DATA_READ",
636              #           "exempted_members": [
637              #             "user:foo@gmail.com"
638              #           ]
639              #         },
640              #         {
641              #           "log_type": "DATA_WRITE",
642              #         }
643              #       ]
644              #     }
645              #
646              # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
647              # foo@gmail.com from DATA_READ logging.
648            "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
649                # permission.
650                # Follows the same format of Binding.members.
651              "A String",
652            ],
653            "logType": "A String", # The log type that this config enables.
654          },
655        ],
656        "service": "A String", # Specifies a service that will be enabled for audit logging.
657            # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
658            # `allServices` is a special value that covers all services.
659      },
660    ],
661    "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
662        # prevent simultaneous updates of a policy from overwriting each other.
663        # It is strongly suggested that systems make use of the `etag` in the
664        # read-modify-write cycle to perform policy updates in order to avoid race
665        # conditions: An `etag` is returned in the response to `getIamPolicy`, and
666        # systems are expected to put that etag in the request to `setIamPolicy` to
667        # ensure that their change will be applied to the same version of the policy.
668        #
669        # If no `etag` is provided in the call to `setIamPolicy`, then the existing
670        # policy is overwritten blindly.
671    "bindings": [ # Associates a list of `members` to a `role`.
672        # `bindings` with no members will result in an error.
673      { # Associates `members` with a `role`.
674        "role": "A String", # Role that is assigned to `members`.
675            # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
676        "condition": { # Represents an expression text. Example: # The condition that is associated with this binding.
677            # NOTE: An unsatisfied condition will not allow user access via current
678            # binding. Different bindings, including their conditions, are examined
679            # independently.
680            #
681            #     title: "User account presence"
682            #     description: "Determines whether the request has a user account"
683            #     expression: "size(request.user) > 0"
684          "description": "A String", # An optional description of the expression. This is a longer text which
685              # describes the expression, e.g. when hovered over it in a UI.
686          "expression": "A String", # Textual representation of an expression in
687              # Common Expression Language syntax.
688              #
689              # The application context of the containing message determines which
690              # well-known feature set of CEL is supported.
691          "location": "A String", # An optional string indicating the location of the expression for error
692              # reporting, e.g. a file name and a position in the file.
693          "title": "A String", # An optional title for the expression, i.e. a short string describing
694              # its purpose. This can be used e.g. in UIs which allow to enter the
695              # expression.
696        },
697        "members": [ # Specifies the identities requesting access for a Cloud Platform resource.
698            # `members` can have the following values:
699            #
700            # * `allUsers`: A special identifier that represents anyone who is
701            #    on the internet; with or without a Google account.
702            #
703            # * `allAuthenticatedUsers`: A special identifier that represents anyone
704            #    who is authenticated with a Google account or a service account.
705            #
706            # * `user:{emailid}`: An email address that represents a specific Google
707            #    account. For example, `alice@gmail.com` .
708            #
709            #
710            # * `serviceAccount:{emailid}`: An email address that represents a service
711            #    account. For example, `my-other-app@appspot.gserviceaccount.com`.
712            #
713            # * `group:{emailid}`: An email address that represents a Google group.
714            #    For example, `admins@example.com`.
715            #
716            #
717            # * `domain:{domain}`: The G Suite domain (primary) that represents all the
718            #    users of that domain. For example, `google.com` or `example.com`.
719            #
720          "A String",
721        ],
722      },
723    ],
724    "version": 42, # Deprecated.
725  }</pre>
726</div>
727
728</body></html>