Quotas and limits

This page lists the quotas and limits that apply to Identity and Access Management(IAM). Both quotas and limits can restrict the number ofrequests that you can send or the number of resources that you can create.Limits can also restrict a resource's attributes, such as the length of theresource's identifier.

If a quota is too low to meet your needs, you can use the Google Cloud console torequest a quota adjustment for your project. If theGoogle Cloud console does not let you request a change for a specific quota,contact Google Cloud support.

Limits cannot be changed.

Quotas

By default, the following IAM quotas apply to everyGoogle Cloud project, with the exception of Workforce Identity Federation andPrivileged Access Manager quotas. Workforce Identity Federation quotas apply toorganizations.

Privileged Access Manager quotas are applicable on both projects and organizations, and are charged as follows depending on the target of the call:

  • For projects that don't belong to an organization, one unit of project quota is charged for a call.
  • For projects belonging to an organization, one unit each of project and organization quotas are charged for a call. A call is denied if either of the two quotas has been exhausted.
  • For calls to folders or organizations, one unit of organization quota is charged.

Default quotas
IAM v1 API
Read requests (for example, getting an allow policy)6,000 per project per minute
Write requests (for example, updating an allow policy)600 per project per minute
IAM v2 API
Read requests (for example, getting a deny policy)5 per project per minute
Write requests (for example, updating a deny policy)5 per project per minute
IAM v3 API
Read requests (for example, getting a principal access boundary policy)5 per project per minute
Write requests (for example, updating a principal access boundary policy)5 per project per minute
Workload Identity Federation
Read requests (for example, getting a workload identity pool)600 per project per minute
6,000 per client per minute
Write requests (for example, updating a workload identity pool)60 per project per minute
600 per client per minute
Workforce Identity Federation
Create/delete/undelete requests60 per organization per minute
Read requests (for example, getting a workforce identity pool)120 per organization per minute
Update requests (for example, updating a workforce identity pool)120 per organization per minute
Subject delete/undelete requests (for example, deleting a workforce identity pool subject)60 per organization per minute
Number of workforce identity pools100 per organization
Workforce OAuth applications
Create/read/update/delete/undelete requests60 per project per minute
Service Account Credentials API
Requests to generate credentials60,000 per project per minute
Requests to sign a JSON Web Token (JWT) or blob60,000 per project per minute
Security Token Service API
Exchange token global requests (not Workforce Identity Federation)6,000 per project per minute
Exchange token regional requests (not Workforce Identity Federation)6,000 per project per region per minute
Exchange token requests (Workforce Identity Federation)1,000 per organization per minute
Intermediary token exchange global requests3,000 per project per minute
Intermediary token exchange regional requests3,000 per project per region per minute
Token introspection global requests6,000 per project per minute
Token introspection regional requests6,000 per project per region per minute
Service accounts
Number of service accounts100 per project
CreateServiceAccount requests Varies depending on the project. To view the quota for a project,view your project's quotas in the Google Cloud console and search forCreate Service Account requests by credential per minute.
Privileged Access Manager API
Entitlement write requests (for example, creating, updating, or deleting an entitlement)100 per project per minute
100 per organization per minute
CheckOnboardingStatus requests300 per project per minute
900 per organization per minute
ListEntitlements requests600 per project per minute
1800 per organization per minute
SearchEntitlements requests600 per project per minute
1800 per organization per minute
GetEntitlement requests3000 per project per minute
9000 per organization per minute
ListGrants requests600 per project per minute
1800 per organization per minute
SearchGrants requests600 per project per minute
1800 per organization per minute
GetGrant requests3000 per project per minute
9000 per organization per minute
CreateGrant requests200 per project per minute
600 per organization per minute
ApproveGrant requests200 per project per minute
600 per organization per minute
DenyGrant requests200 per project per minute
600 per organization per minute
RevokeGrant requests300 per project per minute
900 per organization per minute
GetOperation requests600 per project per minute
1800 per organization per minute
ListOperations requests300 per project per minute
900 per organization per minute

Limits

IAM enforces the following limits on resources. These limitscannot be changed.

Limits
Custom roles
Custom roles for an organization1300
Custom roles for a project1300
ID of a custom role64 bytes
Title of a custom role100 bytes
Description of a custom role300 bytes
Permissions in a custom role3,000
Total size of the title, description, and permission names for a custom role64 KB
Allow policies and role bindings
Allow policies per resource1
Total number of principals (including domains and Google groups) in all role bindings andaudit-logging exemptions within a single policy21,500
Domains and Google groups in all role bindings within a single allow policy3250
Logic operators in a role binding's condition expression12
Role bindings in an allow policy that include the same role and the same principal, but different condition expressions20
Deny policies and deny rules
Deny policies per resource500
Deny rules per resource500
Domains and Google groups in all of a resource's deny policies4500
Total number of principals (including domains and Google groups) in all of a resource's deny policies42500
Deny rules in a single deny policy500
Logic operators in a deny rule's condition expression12
Principal access boundary policies
Rules in a single principal access boundary policy500
Resources in all rules in a single principal access boundary policy500
Number of principal access boundary policies that can be bound to a resource10
Principal access boundary policies per organization1000
Logic operators in a policy binding's condition expression10
Access policies
Number of access policies that can be bound to a resource5
Number of resources that you can bind a single access policy to5
Service accounts
Service account ID30 bytes
Service account display name100 bytes
Service account keys for a service account10
Workforce Identity Federation
Workforce identity pool providers per pool200
Deleted workforce identity pool subjects per pool100,000
Workforce OAuth applications
Workforce OAuth clients per project100
Workforce OAuth client credentials per client10
Workload Identity Federation and Workforce Identity Federation attribute mapping
Mapped subject127 bytes
Mapped workforce identity pool user display name100 bytes
Mapped attributes total size8,192 bytes
Number of custom attribute mappings50
Short-lived credentials
Access boundary rules in aCredential Access Boundary 10
Maximum lifetime of an access token5

3,600 seconds (1 hour)

1 If you create custom roles at the project level, those custom rolesdon't count towards the limit at the organization level.

2 For the purposes of this limit, IAM countsall appearances of each principal in the allow policy's role bindings, as well as the principals that the allow policyexempts from Data Access audit logging. It doesnot deduplicate principals that appear in more than one role binding. For example, if an allow policy contains only role bindings for the principaluser:my-user@example.com, and this principal appears in 50 role bindings, then you can add another 1,450 principals to the role bindings in the allow policy.

Also, for the purposes of this limit, each appearance of a domain or Google group is counted as a single principal, regardless of the number of individual members in the domain or group.

If you use IAM Conditions, or if you grant roles to many principals with unusually long identifiers, then IAM might allow fewer principals in the allow policy.

3 For the purposes of this limit, Cloud Identity domains, Google Workspace accounts, and Google groups are counted as follows:

  • For Google groups, each unique group is counted only once, regardless of how many times the group appears in the allow policy. This is different from how groups are counted for the limit on the total number of principals in an allow policy—for that limit, each appearance of a group counts towards the limit.
  • For Cloud Identity domains or Google Workspace accounts, IAM countsall appearances of each domain or account in the allow policy's role bindings. It doesnot deduplicate domains or accounts that appear in more than one role binding.

For example, if your allow policy contains only one group,group:my-group@example.com, and the group appears in the allow policy 10 times, then you can add another 249 Cloud Identity domains, Google Workspace accounts, or unique groups before you reach the limit.

Alternatively, if your allow policy contains only one domain,domain:example.com, and the domain appears in the allow policy 10 times, then you can add another 240 Cloud Identity domains, Google Workspace accounts, or unique groups before you reach the limit.

4 IAM countsall appearances of each principal in allof the deny policies attached to a resource. It doesnot deduplicate principals that appearin more than one deny rule or deny policy. For example, if the deny policies attached to a resourcecontain only deny rules for the principaluser:my-user@example.com, and this principal appears in20 deny rules, then you could add another2,480 principals to the resource's denypolicies.

5 For OAuth 2.0 access tokens, you can extend the maximum lifetime to12 hours(43,200 seconds). To extend the maximum lifetime,identify the service accounts that need an extended lifetime for tokens, thenadd these service accounts to an organization policy thatincludes theconstraints/iam.allowServiceAccountCredentialLifetimeExtensionlist constraint.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-19 UTC.