-
Notifications
You must be signed in to change notification settings - Fork 10
Document GCS policy resolution steps #615
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -331,6 +331,54 @@ Also, just to clarify — `BigQuery tables` and `GCS buckets` serve different pu | |
|
|
||
| - Click `Save`. | ||
|
|
||
|
|
||
| ## Resolution on the GCS Policy restriction: | ||
|
|
||
| A GCP Organization Admin needs to update the organisation policy that is blocking service account key creation. | ||
|
|
||
| ### Steps 1: | ||
|
|
||
| 1. Open **Google Cloud Console** | ||
| 2. Go to **IAM & Admin → Organization Policies** | ||
| 3. Search for: | ||
| `Disable service account key creation` | ||
| 4. Select the policy: | ||
| `constraints/iam.disableServiceAccountKeyCreation` | ||
| 5. Click **Edit** | ||
| 6. Set the policy to **Not enforced** (or override it at the project level if org-level change is not allowed) | ||
| 7. Save the changes | ||
|
|
||
| https://docs.cloud.google.com/organization-policy/restrict-service-accounts | ||
|
|
||
| ### Step 2: | ||
|
|
||
| 1.Go to **Google Cloud Console** | ||
| 2. Activate **Cloud Shell** | ||
| 3. Click **Continue** and complete the setup steps | ||
|
|
||
| <img width="700" height="284" alt="Image" src="https://github.com/user-attachments/assets/e254a542-6fe3-4577-8edb-716ef74b5480" /> | ||
|
|
||
| --- | ||
|
|
||
| ### Run the following commands in Cloud Shell | ||
|
|
||
| 1. Authenticate (if not already authenticated): | ||
| ```bash | ||
| gcloud auth login | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Backtick closing is missing |
||
|
|
||
| 2. List available organizations: | ||
|
|
||
| gcloud organizations list | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Please add this as a code block using backtick, like in the 1st step |
||
|
|
||
| 3. Grant Organization Policy Admin role to the required user: | ||
|
|
||
| gcloud organizations add-iam-policy-binding YOUR_ORG_ID \ | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Add this as a code block |
||
| --member="user:ADMIN_EMAIL@yourdomain.com" \ | ||
| --role="roles/orgpolicy.policyAdmin" | ||
|
Comment on lines
+366
to
+377
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Close and structure the command code fences correctly. The Suggested markdown fix 1. Authenticate (if not already authenticated):
```bash
gcloud auth login
+ ```
2. List available organizations:
-
-gcloud organizations list
+ ```bash
+ gcloud organizations list
+ ```
3. Grant Organization Policy Admin role to the required user:
-
-gcloud organizations add-iam-policy-binding YOUR_ORG_ID \
- --member="user:ADMIN_EMAIL@yourdomain.com" \
- --role="roles/orgpolicy.policyAdmin"
+ ```bash
+ gcloud organizations add-iam-policy-binding YOUR_ORG_ID \
+ --member="user:ADMIN_EMAIL@yourdomain.com" \
+ --role="roles/orgpolicy.policyAdmin"
+ ```🧰 Tools🪛 LanguageTool[uncategorized] ~369-~369: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) [uncategorized] ~371-~371: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) [uncategorized] ~373-~373: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) [uncategorized] ~375-~375: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) 🤖 Prompt for AI Agents |
||
|
|
||
| 4. After access is granted, update the organization policy to allow service account key creation (disable or override the constraint): | ||
|
Comment on lines
+337
to
+379
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Use one spelling variant consistently ( This section mixes variants; pick one (preferably 🧰 Tools🪛 LanguageTool[uncategorized] ~337-~337: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) [uncategorized] ~342-~342: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) [uncategorized] ~369-~369: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) [uncategorized] ~371-~371: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) [uncategorized] ~373-~373: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) [uncategorized] ~375-~375: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) [uncategorized] ~379-~379: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) 🪛 markdownlint-cli2 (0.22.1)[warning] 361-361: Horizontal rule style (MD035, hr-style) 🤖 Prompt for AI Agents |
||
| constraints/iam.disableServiceAccountKeyCreation | ||
|
Comment on lines
+379
to
+380
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 🧩 Analysis chain🌐 Web query:
💡 Result: To disable the enforcement of the boolean organization policy constraint Citations:
Add the executable gcloud commands for updating the organization policy. The step currently shows only the constraint name. Include the exact commands users need: For organization scope: For project scope (override): Note: The constraint name in the command omits the 🧰 Tools🪛 LanguageTool[uncategorized] ~379-~379: Do not mix variants of the same word (‘organization’ and ‘organisation’) within a single text. (EN_WORD_COHERENCY) 🤖 Prompt for AI Agents |
||
|
|
||
| ### Reference Articles | ||
|
|
||
| - [GCS Pricing Details](https://cloud.google.com/storage/pricing) | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Match the existing horizontal-rule style in this file.
Use
___instead of---to satisfy the configured markdown lint rule.🧰 Tools
🪛 markdownlint-cli2 (0.22.1)
[warning] 361-361: Horizontal rule style
Expected: ___; Actual: ---
(MD035, hr-style)
🤖 Prompt for AI Agents