Set and manage IAM policies on managed folders

This page describes how to set Identity and Access Management (IAM) policies on managed folders, so you can get fine-grained access control over specific groups of objects within a bucket.

If you're looking for other methods of access control, see the following resources:

Required roles

To get the permissions that you need to set and manage IAM policies for managed folders, ask your administrator to grant you the Storage Folder Admin (roles/storage.folderAdmin) IAM role for the bucket that contains the managed folders.

This role contain the following permissions, which are required to set and manage IAM policies for managed folders:

  • storage.managedfolders.getIamPolicy

  • storage.managedfolders.setIamPolicy

You can also get these permissions with custom roles.

For information about granting roles for buckets, see Set and manage IAM policies on buckets.

Set an IAM policy on a managed folder

Console

  1. In the Google Cloud console, go to the Cloud Storage Buckets page.

    Go to Buckets

  2. In the list of buckets, click the name of the bucket that contains the managed folder you want to set an IAM policy on.

  3. In the Bucket details page, click the More options icon in the Folder browser pane next to the managed folder you want to set an IAM policy on.

    If the folder you want to control access for is a simulated folder, follow the steps in Create a managed folder to first convert the simulated folder to a managed folder.

  4. Click Edit access.

  5. In the Permissions for MANAGED_FOLDER_NAME pane, click Add principal .

  6. In the New principals field, enter the principal for which you want to grant access. For more information about principals you can include, see Principal identifiers.

  7. In the Assign roles section, use the Select a role drop-down to specify the level of access you want to grant to the principal.

  8. Click Save.

Command line

  1. Create a JSON file that contains the following information:

    {
      "bindings":[
        {
          "role": "IAM_ROLE",
          "members":[
            "PRINCIPAL_IDENTIFIER"
          ]
        }
      ]
    }

    Where:

    • IAM_ROLE is the IAM role you are granting. For example, roles/storage.objectViewer.

    • PRINCIPAL_IDENTIFIER identifies who you are granting managed folder access to. For example, user:jane@gmail.com. For a list of principal identifier formats, see Principal identifiers.

  2. Use the gcloud storage managed-folders set-iam-policy command:

    gcloud storage managed-folders set-iam-policy gs://BUCKET_NAME/MANAGED_FOLDER_NAME POLICY_FILE

    Where:

    • BUCKET_NAME is the name of the bucket that contains the managed folder to which you want to apply the IAM policy. For example, my-bucket.

    • MANAGED_FOLDER_NAME is the name of the managed folder to which you want to apply the IAM policy. For example, my-managed-folder/.

    • POLICY_FILE is the path to the JSON file you created in step 1.

REST APIs

JSON

  1. Have gcloud CLI installed and initialized, in order to generate an access token for the Authorization header.

    Alternatively, you can create an access token using the OAuth 2.0 Playground and include it in the Authorization header.

  2. Create a JSON file that contains the following information:

    {
      "bindings":[
        {
          "role": "IAM_ROLE",
          "members":[
            "PRINCIPAL_IDENTIFIER"
          ]
        }
      ]
    }

    Where:

    • IAM_ROLE is the IAM role you are granting. For example, roles/storage.objectViewer.

    • PRINCIPAL_IDENTIFIER identifies who you are granting managed folder access to. For example, user:jane@gmail.com. For a list of principal identifier formats, see Principal identifiers.

  3. Use cURL to call the JSON API with a PUT setIamPolicy request:

    curl -X PUT --data-binary @POLICY_FILE \
      -H "Authorization: Bearer $(gcloud auth print-access-token)" \
      -H "Content-Type: application/json" \
      "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAME/iam"

    Where:

    • POLICY_FILE is the path to the JSON policy file that you created in the previous step.

    • BUCKET_NAME is the name of the bucket that contains the managed folder to which you want to apply the IAM policy. For example, my-bucket.

    • MANAGED_FOLDER_NAME is the name of the managed folder to which you want to give the principal access. For example, my-managed-folder/.

View the IAM policy for a managed folder

Console

  1. In the Google Cloud console, go to the Cloud Storage Buckets page.

    Go to Buckets

  2. In the list of buckets, click the name of the bucket that contains the managed folder for which you want to view IAM policies.

  3. In the Bucket details page, click the More options icon in the Folder browser pane next to the managed folder for which you want to view the IAM policy.

  4. Click Edit access.

The Permissions for FOLDER_NAME pane displays the permissions on the managed folder, including the principal, role, inherited roles, and IAM conditions.

Command line

Use the gcloud storage managed-folder get-iam-policy command:

gcloud storage managed-folders get-iam-policy gs://BUCKET_NAME/MANAGED_FOLDER_NAME

Where:

  • BUCKET_NAME is the name of the bucket that contains the managed folder whose IAM policy you want to view. For example, my-bucket.

  • MANAGED_FOLDER_NAME is the name of the managed folder whose IAM policy you want to view. For example, my-managed-folder/.

REST APIs

JSON

  1. Have gcloud CLI installed and initialized, in order to generate an access token for the Authorization header.

    Alternatively, you can create an access token using the OAuth 2.0 Playground and include it in the Authorization header.

  2. Use cURL to call the JSON API with a GET getIamPolicy request:

    curl -X GET \
    -H "Authorization: Bearer $(gcloud auth print-access-token)" \
    "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAME/iam"

    Where:

    • BUCKET_NAME is the name of the bucket that contains the managed folder whose IAM policy you want to view. For example, my-bucket.

    • MANAGED_FOLDER_NAME is the name of the managed folder whose IAM policy you want to view. For example, my-managed-folder/.

Remove a principal from a managed folder policy

Console

  1. In the Google Cloud console, go to the Cloud Storage Buckets page.

    Go to Buckets

  2. In the list of buckets, click the name of the bucket that contains the managed folder for which you want to view IAM policies.

  3. In the Bucket details page, click the More options icon in the Folder browser pane next to the managed folder for which you want to remove a principal.

  4. Click Edit access.

  5. In the Permissions for FOLDER_NAME pane, enter the name of the principal in the Filter field.

  6. Click the Delete icon to delete the principal.

Cloud Storage deletes the principal from your managed folder.

Command line

Use the gcloud storage managed-folder remove-iam-policy-binding command:

gcloud storage managed-folders remove-iam-policy-binding  gs://BUCKET_NAME/MANAGED_FOLDER_NAME --member=PRINCIPAL_IDENTIFIER --role=IAM_ROLE

Where:

  • BUCKET_NAME is the name of the bucket that contains the managed folder you are revoking access to. For example, my-bucket.

  • MANAGED_FOLDER_NAME is the name of the managed folder whose IAM policy you want to remove. For example, my-managed-folder/.

  • PRINCIPAL_IDENTIFIER identifies who you are revoking access from. For example, user:jane@gmail.com. For a list of principal identifier formats, see Principal identifiers.

  • IAM_ROLE is the IAM role you are revoking. For example, roles/storage.objectViewer.

REST APIs

JSON

  1. Have gcloud CLI installed and initialized, in order to generate an access token for the Authorization header.

    Alternatively, you can create an access token using the OAuth 2.0 Playground and include it in the Authorization header.

  2. Get the existing policy applied to your managed folder. To do so, use cURL to call the JSON API with a GET getIamPolicy request:

    curl -X GET \
    -H "Authorization: Bearer $(gcloud auth print-access-token)" \
    "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAME/iam"

    Where:

    • BUCKET_NAME is the name of the bucket that contains the managed folder you are revoking access to. For example, my-bucket.

    • MANAGED_FOLDER_NAME is the name of the managed folder whose IAM policy you want to remove. For example, my-managed-folder/.

  3. Create a JSON file that contains the policy you retrieved in the previous step.

  4. Edit the JSON file to remove the principal from the policy.

  5. Use cURL to call the JSON API with a PUT setIamPolicy request:

    curl -X PUT --data-binary @JSON_FILE_NAME \
    -H "Authorization: Bearer $(gcloud auth print-access-token)" \
    -H "Content-Type: application/json" \
    "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAME/iam"

    Where:

    • JSON_FILE_NAME is the path for the file that you created in Step 3.

    • BUCKET_NAME is the name of the bucket that contains the managed folder you are revoking access to. For example, my-bucket.

    • MANAGED_FOLDER_NAME is the name of the managed folder whose IAM policy you want to remove. For example, my-managed-folder/.

Use IAM Conditions on managed folders

The following sections show you how to add and remove IAM Conditions on your managed folders. To view the IAM Conditions for your managed folders, see Viewing the IAM policy for a managed folder. For more information about using IAM Conditions with Cloud Storage, see Conditions.

You must enable uniform bucket-level access on the bucket before adding conditions to managed folders.

Set a new condition on a managed folder

Command line

  1. Create a JSON or YAML file that defines the condition, including the title of the condition, the attribute-based logic expression for the condition, and, optionally, a description for the condition.

    Note that Cloud Storage only supports the date/time, resource type, and resource name attributes in the expression.

  2. Use the gcloud storage managed-folders add-iam-policy-binding command with the --condition-from-file flag:

gcloud storage managed-folders add-iam-policy-binding  gs://BUCKET_NAME/MANAGED_FOLDER_NAME --member=PRINCIPAL_IDENTIFIER --role=IAM_ROLE --condition-from-file=CONDITION_FILE

Where:

  • BUCKET_NAME is the name of the bucket that contains the managed folder to which you are granting the principal access. For example, my-bucket.

  • MANAGED_FOLDER_NAME is the name of managed folder to which you are granting the principal access. For example, my-managed-folder/.

  • PRINCIPAL_IDENTIFIER identifies who the condition applies to. For example, user:jane@gmail.com. For a list of principal identifier formats, see Principal identifiers.

  • IAM_ROLE is the IAM role you are granting to the principal. For example, roles/storage.objectViewer.

  • CONDITION_FILE is the file you created in the previous step.

Alternatively, you can include the condition directly in the command with the --condition flag instead of the --condition-from-file flag.

REST APIs

JSON

  1. Have gcloud CLI installed and initialized, in order to generate an access token for the Authorization header.

    Alternatively, you can create an access token using the OAuth 2.0 Playground and include it in the Authorization header.

  2. Use a GET getIamPolicy request to save the managed folder's IAM policy to a temporary JSON file:

    curl \
    'https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAMEiam' \
    --header 'Authorization: Bearer $(gcloud auth print-access-token)' > tmp-policy.json

    Where:

    • BUCKET_NAME is the name of the bucket that contains the managed folder you want to set an IAM Condition on.

    • MANAGED_FOLDER_NAME is the name of the managed folder you want to set an IAM Condition on.

  3. Edit the tmp-policy.json file in a text editor to add new conditions to the bindings in the IAM policy:

    {
        "version": VERSION,
        "bindings": [
          {
            "role": "IAM_ROLE",
            "members": [
              "PRINCIPAL_IDENTIFIER"
            ],
            "condition": {
              "title": "TITLE",
              "description": "DESCRIPTION",
              "expression": "EXPRESSION"
            }
          }
        ],
        "etag": "ETAG"
    }

    Where:

    • VERSION is the IAM policy version, which is required to be 3 for managed folders with IAM Conditions.

    • IAM_ROLE is the role to which the condition applies. For example, roles/storage.objectViewer.

    • PRINCIPAL_IDENTIFIER identifies who the condition applies to. For example, user:jane@gmail.com. For a list of principal identifier formats, see Principal identifiers.

    • TITLE is the title of the condition. For example, expires in 2019.

    • DESCRIPTION is an optional description of the condition. For example, Permission revoked on New Year's.

    • EXPRESSION is an attribute-based logic expression. For example, request.time < timestamp(\"2019-01-01T00:00:00Z\"). For more examples of expressions, see the Conditions attribute reference. Cloud Storage only supports the date/time, resource type, and resource name attributes.

    Don't modify ETAG.

  4. Use a PUT setIamPolicy request to set the modified IAM policy on the bucket:

    curl -X PUT --data-binary @tmp-policy.json \
    -H "Authorization: Bearer $(gcloud auth print-access-token)" \
    -H "Content-Type: application/json" \
    "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFoldersMANAGED_FOLDER_NAME/iam"

    Where:

    • BUCKET_NAME is the name of the bucket that contains the managed folder you want to set an IAM Condition on.

    • MANAGED_FOLDER_NAME is the name of the managed folder you want to set an IAM Condition on.

Remove a condition from a managed folder

Command line

  1. Use the gcloud storage managed-folders get-iam-policy command to save the managed folder's IAM policy to a temporary JSON file.

    gcloud storage managed-folders get-iam-policy gs://BUCKET_NAME/MANAGED_FOLDER_NAME > tmp-policy.json
  2. Edit the tmp-policy.json file in a text editor to remove conditions from the IAM policy.

  3. Use the gcloud storage managed-folders set-iam-policy command to set the modified IAM policy on the managed folder.

    gcloud storage managed-folders set-iam-policy gs://BUCKET_NAME/MANAGED_FOLDER_NAME tmp-policy.json

REST APIs

JSON

  1. Have gcloud CLI installed and initialized, in order to generate an access token for the Authorization header.

    Alternatively, you can create an access token using the OAuth 2.0 Playground and include it in the Authorization header.

  2. Use a GET getIamPolicy request to save the managed folder's IAM policy to a temporary JSON file:

    curl \
    'https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAMEiam' \
    --header 'Authorization: Bearer $(gcloud auth print-access-token)' > tmp-policy.json

    Where:

    • BUCKET_NAME is the name of the bucket that contains the managed folder you are changing access to. For example, my-bucket.

    • MANAGED_FOLDER_NAME is the name of the managed folder you are changing access to. For example, my-managed-folder/.

  3. Edit the tmp-policy.json file in a text editor to remove conditions from the IAM policy.

  4. Use a PUT setIamPolicy request to set the modified IAM policy on the managed folder:

    curl -X PUT --data-binary @tmp-policy.json \
    -H "Authorization: Bearer $(gcloud auth print-access-token)" \
    -H "Content-Type: application/json" \
    "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAMEiam"

    Where:

    • BUCKET_NAME is the name of the bucket that contains the managed folder you are changing access to. For example, my-bucket.

    • MANAGED_FOLDER_NAME is the name of the managed folder you are changing access to. For example, my-managed-folder/.

Use IAM with projects

See Manage access to projects, managed folders, and organizations for guides about granting and revoking IAM roles at the project level and above.

Best practices

You should set the minimum role possible that gives the principal the required access. For example, if a team member only needs to view the managed folders in a bucket, grant them the Storage Object Admin (roles/storage.objectAdmin) role instead of the Storage Folder Admin (roles/storage.folderAdmin) role. Similarly, if the team member needs full control of the managed folders in a bucket, grant them the Storage Folder Admin (roles/storage.folderAdmin) role instead of the Storage Admin (roles/storage.admin) role.

What's next