简体   繁体   中英

Inhibit project creation outside Cloud Identity organization

I've a Cloud Identity Org mapped to a Google Cloud Platform Org.

The IAM policy on GCP Org is the following:

  • "Admins" can create project and make administrative ops
  • "Devs" can browse

In GCP Org is all ok, but I've seen that a "Devs" user can create a project outside the GCP Org. Is there a configuration to prevent this behaviour?

Thanks

如果您拥有该帐户,则可以限制该访问权限

The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM