gcloud iap web remove-iam-policy-binding

NAME
gcloud iap web remove-iam-policy-binding - remove IAM policy binding from an IAP IAM resource
SYNOPSIS
gcloud iap web remove-iam-policy-binding--member=PRINCIPAL--role=ROLE[--all    |--condition=[KEY=VALUE,…]    |--condition-from-file=PATH_TO_FILE][--region=REGION--resource-type=RESOURCE_TYPE--service=SERVICE--version=VERSION][GCLOUD_WIDE_FLAG]
DESCRIPTION
Removes a policy binding from the IAM policy of an IAP IAM resource. One bindingconsists of a member, a role and an optional condition. See $gcloud iap webget-iam-policy for examples of how to specify an IAP IAM resource.
EXAMPLES
See $gcloud iap webget-iam-policy for examples of how to specify an IAP IAM resource.

To remove an IAM policy binding for the role of 'roles/editor' for the user'test-user@gmail.com' on IAP IAM resource IAP_IAM_RESOURCE, run:

gcloudiapwebremove-iam-policy-binding--resource-type=IAP_IAM_RESOURCE--member='user:test-user@gmail.com'--role='roles/editor'

To remove an IAM policy binding for the role of 'roles/editor' for the user'test-user@gmail.com' on regional IAP IAM resource IAP_IAM_RESOURCE, run:

gcloudiapwebremove-iam-policy-binding--resource-type=IAP_IAM_RESOURCE--member='user:test-user@gmail.com'--role='roles/editor'--region=REGION

To remove an IAM policy binding for the role of 'roles/editor' from allauthenticated users on IAP IAM resource IAP_IAM_RESOURCE,run:

gcloudiapwebremove-iam-policy-binding--resource-type=IAP_IAM_RESOURCE--member='allAuthenticatedUsers'--role='roles/editor'

To remove an IAM policy binding with a condition of expression='request.time< timestamp("2019-01-01T00:00:00Z")', title='expires_end_of_2018', anddescription='Expires at midnight on 2018-12-31' for the role of 'roles/browser'for the user 'test-user@gmail.com' on IAP IAM resource IAP_IAM_RESOURCE, run:

gcloudiapwebremove-iam-policy-binding--resource-type=IAP_IAM_RESOURCE--member='user:test-user@gmail.com'--role='roles/browser'--condition='expression=request.time<    timestamp("2019-01-01T00:00:00Z"),title=expires_end_of_2018,    description=Expires at midnight on 2018-12-31'

To remove all IAM policy bindings regardless of the condition for the role of'roles/browser' and for the user 'test-user@gmail.com' on IAP IAM resourceIAP_IAM_RESOURCE, run:

gcloudiapwebremove-iam-policy-binding--resource-type=IAP_IAM_RESOURCE--member='user:test-user@gmail.com'--role='roles/browser'--all

Seehttps://cloud.google.com/iam/docs/managing-policiesfor details of policy role and member types.

REQUIRED FLAGS
--member=PRINCIPAL
The principal to remove the binding for. Should be of the formuser|group|serviceAccount:email ordomain:domain.

Examples:user:test-user@gmail.com,group:admins@example.com,serviceAccount:test123@example.domain.com, ordomain:example.domain.com.

Deleted principals have an additionaldeleted: prefix and a?uid=UID suffix, whereUID isa unique identifier for the principal. Example:deleted:user:test-user@gmail.com?uid=123456789012345678901.

Some resources also accept the following special values:

  • allUsers - Special identifier that represents anyone who is on theinternet, with or without a Google account.
  • allAuthenticatedUsers - Special identifier that represents anyonewho is authenticated with a Google account or a service account.
--role=ROLE
The role to remove the principal from.
OPTIONAL FLAGS
At most one of these can be specified:
--all
Remove all bindings with this role and principal, irrespective of anyconditions.
--condition=[KEY=VALUE,…]
The condition of the binding that you want to remove. When the condition isexplicitly specified asNone (--condition=None), abinding without a condition is removed. Otherwise, only a binding with acondition that exactly matches the specified condition (including the optionaldescription) is removed. For more on conditions, refer to the conditionsoverview guide:https://cloud.google.com/iam/docs/conditions-overview

When using the--condition flag, include the following key-valuepairs:

expression
(Required) Condition expression that evaluates to True or False. This uses asubset of Common Expression Language syntax.

If the condition expression includes a comma, use a different delimiter toseparate the key-value pairs. Specify the delimiter before listing the key-valuepairs. For example, to specify a colon (:) as the delimiter, do thefollowing:--condition=^:^title=TITLE:expression=EXPRESSION. Formore information, seehttps://cloud.google.com/sdk/gcloud/reference/topic/escaping.

title
(Required) A short string describing the purpose of the expression.
description
(Optional) Additional description for the expression.
--condition-from-file=PATH_TO_FILE
Path to a local JSON or YAML file that defines the condition. To see availablefields, see the help for--condition. Use a full or relative pathto a local file containing the value of condition.
--region=REGION
Region name. Should only be specified with--resource-type=backend-services if it is a regional scoped. Notapplicable for global scoped backend services.
--resource-type=RESOURCE_TYPE
Resource type of the IAP resource.RESOURCE_TYPE must beone of:app-engine,backend-services,forwarding-rule.
--service=SERVICE
Service name.
--version=VERSION
Service version. Should only be specified with--resource-type=app-engine.
GCLOUD WIDE FLAGS
These flags are available to all commands:--access-token-file,--account,--billing-project,--configuration,--flags-file,--flatten,--format,--help,--impersonate-service-account,--log-http,--project,--quiet,--trace-token,--user-output-enabled,--verbosity.

Run$gcloud help for details.

NOTES
These variants are also available:
gcloudalphaiapwebremove-iam-policy-binding
gcloudbetaiapwebremove-iam-policy-binding

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-05-07 UTC.