Access change propagation

In IAM, access changes, such as granting a role or denying apermission, areeventually consistent. This means that it takes time for access changes to propagatethrough the system. In the meantime, recent access changes might not be effectiveeverywhere. For example, principals might still be able to use a recentlyrevoked role or a recently denied permission. Alternatively, they might not beable to use a recently granted role or a permission they were, until recently,denied from using.

The amount of time it takes for an access change to propagate depends on how youmake the access change:

MethodExamplesPropagation time

Change a policy

Change a principal's access by editing an allow or deny policy.

When making policy changes, you can't exceed thelimits on the number of principals allowed in a policy.

  • You edit your organization's allow policy to grant a principal the Organization Administrator role (roles/resourcemanager.organizationAdmin).
  • You edit an organization-level deny policy to deny a principal thecloudresourcemanager.googleapis.com/projects.setIamPolicy permission.
Typically 2 minutes, potentially 7 minutes or longer

Change a group's membership

Change a principal's access by adding or removing them from a Google group that's included in an allow or deny policy.

  • You have a group,org-admins@example.com, that is granted the Organization Administrator role on your organization. You add a principal to the group to give them the Organization Administrator role.
  • You have a group,eng@example.com, that is denied thecloudresourcemanager.googleapis.com/projects.setIamPolicy permission at the organization level. You add a principal to the group to deny them thecloudresourcemanager.googleapis.com/projects.setIamPolicy permission.
Typically several minutes, potentially hours or longer

Change a nested group's membership

Change a principal's access by adding or removing them from anested group whose parent group is included in an allow or deny policy.

  • You have a group,admins@example.com, that is granted the Tag Viewer role (roles/resourcemanager.tagViewer) on your organization. This group's membership is made up of a number of other groups, includingorg-admins@example.com. You add a principal to theorg-admins@example.com group to give them the Tag Viewer role.
  • You have a group,eng@example.com, that is denied thecloudresourcemanager.googleapis.com/projects.setIamPolicy permission at the organization level. This group's membership is made up of a number of other groups, includingeng-prod@example.com. You add a principal to theeng-prod@example.com group to deny them thecloudresourcemanager.googleapis.com/projects.setIamPolicy permission.
Typically several minutes, potentially hours or longer

Also keep in mind the following details for how group membership changespropagate:

  • In general, adding a principal to a group propagates faster than removinga principal from a group.
  • In general, group membership changes propagate faster than nestedgroup membership changes.

You can use these propagation time estimates to inform the way you modify yourprincipals' access.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-12-09 UTC.