View, update, and delete entitlements in Privileged Access Manager Stay organized with collections Save and categorize content based on your preferences.
After you havecreated an entitlement, youcan view, update, or delete it. Changes to an entitlement's requesters and approversmight take a few minutes to propagate.
Before you begin
To get the permissions that you need to manage entitlements, ask your administrator to grant you the following IAM roles on the organization, folder, or project:
- To manage entitlements for an organization:
- Privileged Access Manager Admin (
roles/privilegedaccessmanager.admin) - Security Admin (
roles/iam.securityAdmin)
- Privileged Access Manager Admin (
- To manage for a folder:
- Privileged Access Manager Admin (
roles/privilegedaccessmanager.admin) - Folder IAM Admin (
roles/resourcemanager.folderAdmin)
- Privileged Access Manager Admin (
- To manage entitlements for a project:
- Privileged Access Manager Admin (
roles/privilegedaccessmanager.admin) - Project IAM Admin (
roles/resourcemanager.projectIamAdmin)
- Privileged Access Manager Admin (
- To view audit logs: Logs Viewer (
roles/logs.viewer)
For more information about granting roles, seeManage access to projects, folders, and organizations.
These predefined roles contain the permissions required to manage entitlements. To see the exact permissions that are required, expand theRequired permissions section:
Required permissions
The following permissions are required to manage entitlements:
- To manage entitlements for an organization:
resourcemanager.organizations.getresourcemanager.organizations.setIamPolicyprivilegedaccessmanager.entitlements.createprivilegedaccessmanager.entitlements.deleteprivilegedaccessmanager.entitlements.getprivilegedaccessmanager.entitlements.listprivilegedaccessmanager.entitlements.setIamPolicyprivilegedaccessmanager.operations.deleteprivilegedaccessmanager.operations.getprivilegedaccessmanager.operations.list
- To view entitlements for an organization:
resourcemanager.organizations.getprivilegedaccessmanager.entitlements.getprivilegedaccessmanager.entitlements.listprivilegedaccessmanager.operations.getprivilegedaccessmanager.operations.list
- To manage entitlements for a folder:
resourcemanager.folders.getresourcemanager.folders.setIamPolicyprivilegedaccessmanager.entitlements.createprivilegedaccessmanager.entitlements.deleteprivilegedaccessmanager.entitlements.getprivilegedaccessmanager.entitlements.listprivilegedaccessmanager.entitlements.setIamPolicyprivilegedaccessmanager.operations.deleteprivilegedaccessmanager.operations.getprivilegedaccessmanager.operations.list
- To view entitlements for a folder:
resourcemanager.folders.getprivilegedaccessmanager.entitlements.getprivilegedaccessmanager.entitlements.listprivilegedaccessmanager.operations.getprivilegedaccessmanager.operations.list
- To manage entitlements for a project:
resourcemanager.projects.getresourcemanager.projects.getIamPolicyprivilegedaccessmanager.entitlements.createprivilegedaccessmanager.entitlements.deleteprivilegedaccessmanager.entitlements.getprivilegedaccessmanager.entitlements.listprivilegedaccessmanager.entitlements.setIamPolicyprivilegedaccessmanager.operations.deleteprivilegedaccessmanager.operations.getprivilegedaccessmanager.operations.list
- To view entitlements for a project:
resourcemanager.projects.getprivilegedaccessmanager.entitlements.getprivilegedaccessmanager.entitlements.listprivilegedaccessmanager.operations.getprivilegedaccessmanager.operations.list
- To view audit logs:
logging.logEntries.list
You might also be able to get these permissions withcustom roles or otherpredefined roles.
View, update, and delete entitlements using the Google Cloud console
Go to thePrivileged Access Manager page.
Select the organization, folder, or project you want to manage entitlementsin.
In theEntitlements tab, click theEntitlements for all users tab.Here you can find the available entitlements, the roles they grant, andtheir valid requesters and approvers.
In the table, clickMore options in the same row as an entitlement you want to inspect.
To view the entitlement details, clickView entitlement details.
To view grants associated with the entitlement, clickView associated grants.
To revoke all active grants for the entitlement, clickRevoke all grants.
To delete the entitlement, clickDelete entitlement. You can't deletean entitlement with active grants. You must revoke the grants first.
To update an entitlement, clickEdit entitlement in the same row as the entitlement you want to update.
Keep the following things in mind when updating an entitlement:
The updated entitlement configuration only applies to grants requested afterthe update is made. Approver changes, however, also apply to existing grantrequests that haven't yet been approved or denied.
To make changes to an entitlement's approval workflow that require asecond level of approval, or more than one approval in any level,you must have the Security Command Center Premium or Enterprise tier activated atthe organization level. This feature is available inpreview.
You can make the following structural changes to an entitlement's approvalworkflow only if no grants for that entitlement are awaiting approval:
- Adding or removing an approval level.
- Changing the number of required approvals for any level.
This feature is available inpreview.
You can change the list of approvers inany approval level, even if there are grants awaiting approval.
View entitlements programmatically
To view entitlements programmatically, you can search, list, get, and exportthem.
List entitlements
gcloud
Thegcloud alpha pam entitlements list command lists entitlements that belong to a specificscope.
Before using any of the command data below, make the following replacements:
RESOURCE_TYPE: Optional. The resource type that the entitlement belongs to. Use the valueorganization,folder, orproject.RESOURCE_ID: Used withRESOURCE_TYPE. The ID of the Google Cloud project, folder, or organization that you want to manage entitlements for. Project IDs are alphanumeric strings, likemy-project. Folder and organization IDs are numeric, like123456789012.
Execute the following command:
Linux, macOS, or Cloud Shell
gcloudalphapamentitlementslist\--location=global\--RESOURCE_TYPE=RESOURCE_ID
Windows (PowerShell)
gcloudalphapamentitlementslist`--location=global`--RESOURCE_TYPE=RESOURCE_ID
Windows (cmd.exe)
gcloudalphapamentitlementslist^--location=global^--RESOURCE_TYPE=RESOURCE_ID
You should receive a response similar to the following:
additionalNotificationTargets: adminEmailRecipients: - alex@example.comapprovalWorkflow: manualApprovals: requireApproverJustification: true steps: - id: step-1 approvalsNeeded: 3 approvers: - principals: - user:alex@example.com - user:dev-team@example.com - id: step-2 approvalsNeeded: 1 approvers: - principals: - user:alex@example.comcreateTime: '2024-04-09T02:39:37.011866832Z'eligibleUsers:- principals: - user:bola@example.cometag: 00000000000000000000000000000000000000000000000000000000000=maxRequestDuration: 7200sname: projects/PROJECT_ID/locations/global/entitlements/ENTITLEMENT_IDprivilegedAccess: gcpIamAccess: resource: //cloudresourcemanager.googleapis.com/projects/PROJECT_ID resourceType: cloudresourcemanager.googleapis.com/Project roleBindings: - role: roles/storage.admin id: hwarq_1 conditionExpression: "request.time.getHours() >= 8"requesterJustificationConfig: unstructured: {}state: AVAILABLEupdateTime: '2024-04-09T02:39:40.066770306Z'REST
The Privileged Access Manager API'slistEntitlements method lists entitlements that belong to a specificscope.
Before using any of the request data, make the following replacements:
SCOPE: The organization, folder, or project that the entitlement is in, in the format oforganizations/ORGANIZATION_ID,folders/FOLDER_ID, orprojects/PROJECT_ID. Project IDs are alphanumeric strings, likemy-project. Folder and organization IDs are numeric, like123456789012.FILTER: Optional. Returns entitlements whose field values match an AIP-160 expression.PAGE_SIZE: Optional. The number of items to return in a response.PAGE_TOKEN: Optional. Which page to start the response from, using a page token returned in a previous response.
HTTP method and URL:
GET https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements?filter=FILTER&pageSize=PAGE_SIZE&pageToken=PAGE_TOKEN
To send your request, expand one of these options:
curl (Linux, macOS, or Cloud Shell)
Note: The following command assumes that you have logged in to thegcloud CLI with your user account by runninggcloud init orgcloud auth login , or by usingCloud Shell, which automatically logs you into thegcloud CLI . You can check the currently active account by runninggcloud auth list.Execute the following command:
curl -X GET \
-H "Authorization: Bearer $(gcloud auth print-access-token)" \
"https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements?filter=FILTER&pageSize=PAGE_SIZE&pageToken=PAGE_TOKEN"
PowerShell (Windows)
Note: The following command assumes that you have logged in to thegcloud CLI with your user account by runninggcloud init orgcloud auth login . You can check the currently active account by runninggcloud auth list.Execute the following command:
$cred = gcloud auth print-access-token
$headers = @{ "Authorization" = "Bearer $cred" }
Invoke-WebRequest `
-Method GET `
-Headers $headers `
-Uri "https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements?filter=FILTER&pageSize=PAGE_SIZE&pageToken=PAGE_TOKEN" | Select-Object -Expand Content
You should receive a JSON response similar to the following:
[ { "name": "projects/PROJECT_ID/locations/global/entitlements/ENTITLEMENT_ID", "createTime": "2023-11-21T17:28:39.962144708Z", "updateTime": "2023-11-21T17:28:43.160309410Z", "eligibleUsers": [ { "principals": [ "user:alex@example.com" ] } ], "approvalWorkflow": { "manualApprovals": { "steps": [ { "approvers": [ { "principals": [ "user:bola@example.com" ] } ], "approvalsNeeded": 1, "id": "step-1" }, { "approvers": [ { "principals": [ "user:bob@example.com", "user:jacob@example.com" ] } ], "approvalsNeeded": 2, "id": "step-2" } ] } }, "privilegedAccess": { "gcpIamAccess": { "resourceType": "cloudresourcemanager.googleapis.com/Project", "resource": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID", "roleBindings": [ { "role": "roles/storage.admin", "id": "hwqrt_1", "conditionExpression": "request.time.getHours() >= 8" } ] } }, "maxRequestDuration": "14400s", "state": "AVAILABLE", "requesterJustificationConfig": { "unstructured": {} }, "additionalNotificationTargets": { "adminEmailRecipients": [ "alex@example.com" ] }, "etag": "00000000000000000000000000000000000000000000000000000000000=" }]Get entitlements
gcloud
Thegcloud alpha pam entitlements describe command retrieves a specific entitlement.
Before using any of the command data below, make the following replacements:
ENTITLEMENT_ID: The ID of the entitlement you want the details for.RESOURCE_TYPE: Optional. The resource type that the entitlement belongs to. Use the valueorganization,folder, orproject.RESOURCE_ID: Used withRESOURCE_TYPE. The ID of the Google Cloud project, folder, or organization that you want to manage entitlements for. Project IDs are alphanumeric strings, likemy-project. Folder and organization IDs are numeric, like123456789012.
Execute the following command:
Linux, macOS, or Cloud Shell
gcloudalphapamentitlementsdescribe\ENTITLEMENT_ID\--location=global\--RESOURCE_TYPE=RESOURCE_ID
Windows (PowerShell)
gcloudalphapamentitlementsdescribe`ENTITLEMENT_ID`--location=global`--RESOURCE_TYPE=RESOURCE_ID
Windows (cmd.exe)
gcloudalphapamentitlementsdescribe^ENTITLEMENT_ID^--location=global^--RESOURCE_TYPE=RESOURCE_ID
You should receive a response similar to the following:
additionalNotificationTargets: adminEmailRecipients: - alex@example.comapprovalWorkflow: manualApprovals: requireApproverJustification: true steps: - id: step-1 approvalsNeeded: 3 approvers: - principals: - user:alex@example.com - user:dev-team@example.com - id: step-2 approvalsNeeded: 1 approvers: - principals: - user:alex@example.comcreateTime: '2024-04-09T02:39:37.011866832Z'eligibleUsers:- principals: - user:bola@example.cometag: 00000000000000000000000000000000000000000000000000000000000=maxRequestDuration: 7200sname:RESOURCE_TYPE/RESOURCE_ID/locations/global/entitlements/ENTITLEMENT_IDprivilegedAccess: gcpIamAccess: resource: //cloudresourcemanager.googleapis.com/projects/PROJECT_ID resourceType: cloudresourcemanager.googleapis.com/Project roleBindings: - role: roles/storage.admin id: hwarq_1 conditionExpression: "request.time.getHours() >= 8"requesterJustificationConfig: unstructured: {}state: AVAILABLEupdateTime: '2024-04-09T02:39:40.066770306Z'REST
The Privileged Access Manager API'sgetEntitlement method retrieves a specific entitlement.
Before using any of the request data, make the following replacements:
SCOPE: The organization, folder, or project to get the entitlement from, in the format oforganizations/ORGANIZATION_ID,folders/FOLDER_ID, orprojects/PROJECT_ID. Project IDs are alphanumeric strings, likemy-project. Folder and organization IDs are numeric, like123456789012.ENTITLEMENT_ID: The ID of the entitlement you want the details for.
HTTP method and URL:
GET https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements/ENTITLEMENT_ID
To send your request, expand one of these options:
curl (Linux, macOS, or Cloud Shell)
Note: The following command assumes that you have logged in to thegcloud CLI with your user account by runninggcloud init orgcloud auth login , or by usingCloud Shell, which automatically logs you into thegcloud CLI . You can check the currently active account by runninggcloud auth list.Execute the following command:
curl -X GET \
-H "Authorization: Bearer $(gcloud auth print-access-token)" \
"https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements/ENTITLEMENT_ID"
PowerShell (Windows)
Note: The following command assumes that you have logged in to thegcloud CLI with your user account by runninggcloud init orgcloud auth login . You can check the currently active account by runninggcloud auth list.Execute the following command:
$cred = gcloud auth print-access-token
$headers = @{ "Authorization" = "Bearer $cred" }
Invoke-WebRequest `
-Method GET `
-Headers $headers `
-Uri "https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements/ENTITLEMENT_ID" | Select-Object -Expand Content
You should receive a JSON response similar to the following:
{ "name": "projects/PROJECT_ID/locations/global/entitlements/ENTITLEMENT_ID", "createTime": "2023-11-21T17:28:39.962144708Z", "updateTime": "2023-11-21T17:28:43.160309410Z", "eligibleUsers": [ { "principals": [ "user:alex@example.com" ] } ], "approvalWorkflow": { "manualApprovals": { "steps": [ { "approvers": [ { "principals": [ "user:bola@example.com" ] } ], "approvalsNeeded": 1, "id": "step-1" }, { "approvers": [ { "principals": [ "user:bob@example.com", "user:jacob@example.com" ] } ], "approvalsNeeded": 2, "id": "step-2" } ] } }, "privilegedAccess": { "gcpIamAccess": { "resourceType": "cloudresourcemanager.googleapis.com/Project", "resource": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID", "roleBindings": [ { "role": "roles/storage.admin", "id": "hwqrt_1", "conditionExpression": "request.time.getHours() >= 8" } ] } }, "maxRequestDuration": "14400s", "state": "AVAILABLE", "requesterJustificationConfig": { "unstructured": {} }, "additionalNotificationTargets": { "adminEmailRecipients": [ "alex@example.com" ] }, "etag": "00000000000000000000000000000000000000000000000000000000000="}Export entitlements using the gcloud CLI
Thegcloud alpha pam entitlements export command exports a specific entitlement to a YAMLfile.
Before using any of the command data below, make the following replacements:
ENTITLEMENT_ID: The ID of the entitlement to export.FILENAME: The filename to export the entitlement contents to.RESOURCE_TYPE: Optional. The resource type that the entitlement belongs to. Use the valueorganization,folder, orproject.RESOURCE_ID: Used withRESOURCE_TYPE. The ID of the Google Cloud project, folder, or organization that you want to manage entitlements for. Project IDs are alphanumeric strings, likemy-project. Folder and organization IDs are numeric, like123456789012.
Execute the following command:
Linux, macOS, or Cloud Shell
gcloudalphapamentitlementsexport\ENTITLEMENT_ID\--destination=FILENAME.yaml\--location=global\--RESOURCE_TYPE=RESOURCE_ID
Windows (PowerShell)
gcloudalphapamentitlementsexport`ENTITLEMENT_ID`--destination=FILENAME.yaml`--location=global`--RESOURCE_TYPE=RESOURCE_ID
Windows (cmd.exe)
gcloudalphapamentitlementsexport^ENTITLEMENT_ID^--destination=FILENAME.yaml^--location=global^--RESOURCE_TYPE=RESOURCE_ID
You should receive a response similar to the following:
Exported [projects/my-project/locations/global/entitlements/ENTITLEMENT_ID] to 'FILENAME.yaml'.
Update entitlements programmatically
Keep the following things in mind when updating an entitlement:
The updated entitlement configuration only applies to grants requested afterthe update is made. Approver changes, however, also apply to existing grantrequests that haven't yet been approved or denied.
To make changes to an entitlement's approval workflow that require asecond level of approval, or more than one approval in any level,you must have the Security Command Center Premium or Enterprise tier activated atthe organization level. This feature is available inpreview.
You can make the following structural changes to an entitlement's approvalworkflow only if no grants for that entitlement are awaiting approval:
- Adding or removing an approval level.
- Changing the number of required approvals for any level.
This feature is available inpreview.
You can change the list of approvers inany approval level, even if there are grants awaiting approval.
gcloud
Thegcloud alpha pam entitlements update command updates a specific entitlement.
Before using any of the command data below, make the following replacements:
ENTITLEMENT_ID: The ID of the entitlement to update.RESOURCE_TYPE: Optional. The resource type that the entitlement belongs to. Use the valueorganization,folder, orproject.RESOURCE_ID: Used withRESOURCE_TYPE. The ID of the Google Cloud project, folder, or organization that you want to manage entitlements for. Project IDs are alphanumeric strings, likemy-project. Folder and organization IDs are numeric, like123456789012.FILENAME: A file containing the modified configuration of the entitlement. To create this file,get orexport the existing entitlement, save the response in a YAML file, and then modify it to use as the body of your update request. You must include the ETAG in the body to update the latest version of the entitlement. For available fields you can change or add, see Create entitlements programmatically.
Execute the following command:
Linux, macOS, or Cloud Shell
gcloudalphapamentitlementsupdate\ENTITLEMENT_ID\--entitlement-file=FILENAME.yaml\--location=global\--RESOURCE_TYPE=RESOURCE_ID
Windows (PowerShell)
gcloudalphapamentitlementsupdate`ENTITLEMENT_ID`--entitlement-file=FILENAME.yaml`--location=global`--RESOURCE_TYPE=RESOURCE_ID
Windows (cmd.exe)
gcloudalphapamentitlementsupdate^ENTITLEMENT_ID^--entitlement-file=FILENAME.yaml^--location=global^--RESOURCE_TYPE=RESOURCE_ID
You should receive a response similar to the following:
Request issued for: [ENTITLEMENT_ID]Waiting for operation [RESOURCE_TYPE/RESOURCE_ID/locations/global/operations/OPERATION_ID] to complete...done.Updated entitlement [ENTITLEMENT_ID].additionalNotificationTargets: {}approvalWorkflow: manualApprovals: requireApproverJustification: true steps: - id: step-1 approvalsNeeded: 3 approvers: - principals: - user:alex@example.com - user:dev-team@example.com - id: step-2 approvalsNeeded: 1 approvers: - principals: - user:alex@example.comcreateTime: '2024-04-09T02:39:37.011866832Z'eligibleUsers:- principals: - user:bola@example.cometag: 00000000000000000000000000000000000000000000000000000000000=maxRequestDuration: 7200sname: projects/my-project/locations/global/entitlements/ENTITLEMENT_IDprivilegedAccess: gcpIamAccess: resource: //cloudresourcemanager.googleapis.com/RESOURCE_TYPE/RESOURCE_ID resourceType: cloudresourcemanager.googleapis.com/Project roleBindings: - role: roles/storage.admin id: hwarq_1 conditionExpression: "request.time.getHours() >= 8"requesterJustificationConfig: unstructured: {}state: AVAILABLEupdateTime: '2024-04-09T02:39:40.066770306Z'REST
The Privileged Access Manager API'supdateEntitlement method updates a specific entitlement.
Before using any of the request data, make the following replacements:
SCOPE: The organization, folder, or project that the entitlement is in, in the format oforganizations/ORGANIZATION_ID,folders/FOLDER_ID, orprojects/PROJECT_ID. Project IDs are alphanumeric strings, likemy-project. Folder and organization IDs are numeric, like123456789012.ENTITLEMENT_ID: The ID of the entitlement to update.UPDATED_FIELDS: A comma-separated list of fields that are being updated in the entitlement. For example:?updateMask=privilegedAccess,maxRequestDuration
For all updatable fields, set the update mask to
*.REQUEST_ID: Optional. Must be a non-zero UUID. If the server receives a request with a request ID, it checks if another request with that ID has already been completed within the last 60 minutes. If so, the new request is ignored.request.json: A file containing the modified configuration of the entitlement. To create this file,get orexport the existing entitlement, save the response in file namedrequest.json, and then modify it to use as the body of your update request. You must include the ETAG in the body to update the latest version of the entitlement. For available fields you can change or add, see Create entitlements programmatically.
HTTP method and URL:
PATCH https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements/ENTITLEMENT_ID?updateMask=UPDATED_FIELDS&requestId=REQUEST_ID
To send your request, expand one of these options:
curl (Linux, macOS, or Cloud Shell)
Note: The following command assumes that you have logged in to thegcloud CLI with your user account by runninggcloud init orgcloud auth login , or by usingCloud Shell, which automatically logs you into thegcloud CLI . You can check the currently active account by runninggcloud auth list.Execute the following command:
curl -X PATCH \
-H "Authorization: Bearer $(gcloud auth print-access-token)" \
"https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements/ENTITLEMENT_ID?updateMask=UPDATED_FIELDS&requestId=REQUEST_ID"
PowerShell (Windows)
Note: The following command assumes that you have logged in to thegcloud CLI with your user account by runninggcloud init orgcloud auth login . You can check the currently active account by runninggcloud auth list.Execute the following command:
$cred = gcloud auth print-access-token
$headers = @{ "Authorization" = "Bearer $cred" }
Invoke-WebRequest `
-Method PATCH `
-Headers $headers `
-Uri "https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements/ENTITLEMENT_ID?updateMask=UPDATED_FIELDS&requestId=REQUEST_ID" | Select-Object -Expand Content
You should receive a JSON response similar to the following:
{ "name": "projects/my-project/locations/global/operations/OPERATION_ID", "metadata": { "@type": "type.googleapis.com/google.cloud.privilegedaccessmanager.v1beta.OperationMetadata", "createTime": "2024-03-25T01:55:02.544562950Z", "target": "projects/my-project/locations/global/entitlements/ENTITLEMENT_ID", "verb": "update", "requestedCancellation": false, "apiVersion": "v1beta" }, "done": false}To check on the progress of an update operation, you can send aGET request to the following endpoint:
https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/operations/OPERATION_ID
Send aGET request to the following endpoint to list all operations:
https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/operations
Delete entitlements programmatically
gcloud
Thegcloud alpha pam entitlements delete command deletes a specific entitlement.
Before using any of the command data below, make the following replacements:
ENTITLEMENT_ID: The ID of the entitlement to delete.RESOURCE_TYPE: Optional. The resource type that the entitlement belongs to. Use the valueorganization,folder, orproject.RESOURCE_ID: Used withRESOURCE_TYPE. The ID of the Google Cloud project, folder, or organization that you want to manage entitlements for. Project IDs are alphanumeric strings, likemy-project. Folder and organization IDs are numeric, like123456789012.
Execute the following command:
Linux, macOS, or Cloud Shell
gcloudalphapamentitlementsdelete\ENTITLEMENT_ID\--location=global\--RESOURCE_TYPE=RESOURCE_ID
Windows (PowerShell)
gcloudalphapamentitlementsdelete`ENTITLEMENT_ID`--location=global`--RESOURCE_TYPE=RESOURCE_ID
Windows (cmd.exe)
gcloudalphapamentitlementsdelete^ENTITLEMENT_ID^--location=global^--RESOURCE_TYPE=RESOURCE_ID
You should receive a response similar to the following:
Delete request issued for: [ENTITLEMENT_ID]Waiting for operation [projects/my-project/locations/global/operations/OPERATION_ID] to complete...done.Deleted entitlement [ENTITLEMENT_ID].
REST
The Privileged Access Manager API'sdeleteEntitlement method deletes a specific entitlement.
Before using any of the request data, make the following replacements:
SCOPE: The organization, folder, or project to delete the entitlement in, in the format oforganizations/ORGANIZATION_ID,folders/FOLDER_ID, orprojects/PROJECT_ID. Project IDs are alphanumeric strings, likemy-project. Folder and organization IDs are numeric, like123456789012.ENTITLEMENT_ID: The ID of the entitlement to delete.REQUEST_ID: Optional. Must be a non-zero UUID. If the server receives a request with a request ID, it checks if another request with that ID has already been completed within the last 60 minutes. If so, the new request is ignored.
HTTP method and URL:
DELETE https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements/ENTITLEMENT_ID?requestId=REQUEST_ID
To send your request, expand one of these options:
curl (Linux, macOS, or Cloud Shell)
Note: The following command assumes that you have logged in to thegcloud CLI with your user account by runninggcloud init orgcloud auth login , or by usingCloud Shell, which automatically logs you into thegcloud CLI . You can check the currently active account by runninggcloud auth list.Execute the following command:
curl -X DELETE \
-H "Authorization: Bearer $(gcloud auth print-access-token)" \
"https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements/ENTITLEMENT_ID?requestId=REQUEST_ID"
PowerShell (Windows)
Note: The following command assumes that you have logged in to thegcloud CLI with your user account by runninggcloud init orgcloud auth login . You can check the currently active account by runninggcloud auth list.Execute the following command:
$cred = gcloud auth print-access-token
$headers = @{ "Authorization" = "Bearer $cred" }
Invoke-WebRequest `
-Method DELETE `
-Headers $headers `
-Uri "https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/entitlements/ENTITLEMENT_ID?requestId=REQUEST_ID" | Select-Object -Expand Content
You should receive a JSON response similar to the following:
{ "name": "projects/my-project/locations/global/operations/OPERATION_ID", "metadata": { "@type": "type.googleapis.com/google.cloud.privilegedaccessmanager.v1beta.OperationMetadata", "createTime": "2024-03-06T02:28:28.020293460Z", "target": "projects/my-project/locations/global/entitlements/ENTITLEMENT_ID", "verb": "delete", "requestedCancellation": false, "apiVersion": "v1beta" }, "done": false}To check on the progress of a delete operation, you can send aGET request to the following endpoint:
https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/operations/OPERATION_ID
Send aGET request to the following endpoint to list all operations:
https://privilegedaccessmanager.googleapis.com/v1beta/SCOPE/locations/global/operations
What's next
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-02-19 UTC.