Authorized Orgs Desc Args
An authorized organizations description describes a list of organizations (1) that have been authorized to use certain asset (for example, device) data owned by different organizations at the enforcement points, or (2) with certain asset (for example, device) have been authorized to access the resources in another organization at the enforcement points. To get more information about AuthorizedOrgsDesc, see:
How-to Guides
Warning: If you are using User ADCs (Application Default Credentials) with this resource, you must specify a
billing_project
and setuser_project_override
to true in the provider configuration. Otherwise the ACM API will return a 403 error. Your account must have theserviceusage.services.use
permission on thebilling_project
you defined.
Example Usage
Access Context Manager Authorized Orgs Desc Basic
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.gcp.accesscontextmanager.AccessPolicy;
import com.pulumi.gcp.accesscontextmanager.AccessPolicyArgs;
import com.pulumi.gcp.accesscontextmanager.AuthorizedOrgsDesc;
import com.pulumi.gcp.accesscontextmanager.AuthorizedOrgsDescArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var test_access = new AccessPolicy("test-access", AccessPolicyArgs.builder()
.parent("organizations/")
.title("my policy")
.build());
var authorized_orgs_desc = new AuthorizedOrgsDesc("authorized-orgs-desc", AuthorizedOrgsDescArgs.builder()
.assetType("ASSET_TYPE_CREDENTIAL_STRENGTH")
.authorizationDirection("AUTHORIZATION_DIRECTION_TO")
.authorizationType("AUTHORIZATION_TYPE_TRUST")
.orgs(
"organizations/12345",
"organizations/98765")
.parent(test_access.name().applyValue(name -> String.format("accessPolicies/%s", name)))
.build());
}
}
Import
AuthorizedOrgsDesc can be imported using any of these accepted formats:
$ pulumi import gcp:accesscontextmanager/authorizedOrgsDesc:AuthorizedOrgsDesc default {{name}}
Constructors
Properties
The direction of the authorization relationship between this organization and the organizations listed in the "orgs" field. The valid values for this field include the following: AUTHORIZATION_DIRECTION_FROM: Allows this organization to evaluate traffic in the organizations listed in the orgs
field. AUTHORIZATION_DIRECTION_TO: Allows the organizations listed in the orgs
field to evaluate the traffic in this organization. For the authorization relationship to take effect, all of the organizations must authorize and specify the appropriate relationship direction. For example, if organization A authorized organization B and C to evaluate its traffic, by specifying "AUTHORIZATION_DIRECTION_TO" as the authorization direction, organizations B and C must specify "AUTHORIZATION_DIRECTION_FROM" as the authorization direction in their "AuthorizedOrgsDesc" resource. Possible values are: AUTHORIZATION_DIRECTION_TO
, AUTHORIZATION_DIRECTION_FROM
.
A granular control type for authorization levels. Valid value is "AUTHORIZATION_TYPE_TRUST". Possible values are: AUTHORIZATION_TYPE_TRUST
.
Resource name for the AuthorizedOrgsDesc
. Format: accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}
. The authorized_orgs_desc
component must begin with a letter, followed by alphanumeric characters or _
. After you create an AuthorizedOrgsDesc
, you cannot change its name
.