File: //snap/google-cloud-cli/current/help/man/man1/gcloud_iam_policies_get.1
.TH "GCLOUD_IAM_POLICIES_GET" 1
.SH "NAME"
.HP
gcloud iam policies get \- get a policy on the given attachment point with the given name
.SH "SYNOPSIS"
.HP
\f5gcloud iam policies get\fR \fIPOLICY_ID\fR \fB\-\-attachment\-point\fR=\fIATTACHMENT_POINT\fR \fB\-\-kind\fR=\fIKIND\fR [\fIGCLOUD_WIDE_FLAG\ ...\fR]
.SH "DESCRIPTION"
Get a policy on the given attachment point with the given name.
.SH "EXAMPLES"
The following command gets the IAM policy defined at the resource project
\f5\fI123\fR\fR of kind \f5\fIdenypolicies\fR\fR and id
\f5\fImy\-deny\-policy\fR\fR:
.RS 2m
$ gcloud iam policies get my\-deny\-policy \e
\-\-attachment\-point=cloudresourcemanager.googleapis.com/\e
projects/123 \-\-kind=denypolicies
.RE
.SH "POSITIONAL ARGUMENTS"
.RS 2m
.TP 2m
\fIPOLICY_ID\fR
Policy ID that is unique for the resource to which the policy is attached.
.RE
.sp
.SH "REQUIRED FLAGS"
.RS 2m
.TP 2m
\fB\-\-attachment\-point\fR=\fIATTACHMENT_POINT\fR
Resource to which the policy is attached. For valid formats, see
https://cloud.google.com/iam/help/deny/attachment\-point.
.TP 2m
\fB\-\-kind\fR=\fIKIND\fR
Policy type. Use \f5denypolicies\fR for deny policies.
.RE
.sp
.SH "GCLOUD WIDE FLAGS"
These flags are available to all commands: \-\-access\-token\-file, \-\-account,
\-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten,
\-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http,
\-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled,
\-\-verbosity.
Run \fB$ gcloud help\fR for details.
.SH "NOTES"
These variants are also available:
.RS 2m
$ gcloud alpha iam policies get
.RE
.RS 2m
$ gcloud beta iam policies get
.RE