File: //snap/google-cloud-cli/396/lib/surface/organizations/remove_iam_policy_binding.yaml
release_tracks: [ALPHA, BETA, GA]
help_text:
brief: Remove IAM policy binding for an organization
description: |
Removes a policy binding from the IAM policy of an organization, given an organization ID and
the binding. One binding consists of a member, a role, and an optional condition.
examples: |
To remove an IAM policy binding for the role of 'roles/editor' for the user
'test-user@gmail.com' on organization with identifier 'example-organization-id-1', run:
$ {command} example-organization-id-1 --member='user:test-user@gmail.com' --role='roles/editor'
To remove an IAM policy binding for the role of 'roles/editor' from all authenticated users on
organization 'example-organization-id-1', run:
$ {command} example-organization-id-1 --member='allAuthenticatedUsers' --role='roles/editor'
To remove an IAM policy binding with a condition of
expression='request.time < timestamp("2019-01-01T00:00:00Z")', title='expires_end_of_2018',
and description='Expires at midnight on 2018-12-31' for the role of 'roles/browser' for the
user 'test-user@gmail.com' on organization with identifier 'example-organization-id-1', run:
$ {command} example-organization-id-1 --member='user:test-user@gmail.com' --role='roles/browser' --condition='expression=request.time < timestamp("2019-01-01T00:00:00Z"),title=expires_end_of_2018,description=Expires at midnight on 2018-12-31'
To remove all IAM policy bindings regardless of the condition for the role of 'roles/browser'
and for the user 'test-user@gmail.com' on organization with identifier
'example-organization-id-1', run:
$ {command} example-organization-id-1 --member='user:test-user@gmail.com' --role='roles/browser' --all
See https://cloud.google.com/iam/docs/managing-policies for details of
policy role and member types.
request:
collection: cloudresourcemanager.organizations
arguments:
resource:
help_text: The organization to remove the IAM policy binding.
spec: !REF googlecloudsdk.command_lib.organizations.resources:organization
iam:
enable_condition: true
policy_version: 3
get_iam_policy_version_path: getIamPolicyRequest.options.requestedPolicyVersion