The map from roles to their included permissions that match the permission query (i.e., a query containingpolicy.role.permissions:). Example: if querypolicy.role.permissions:compute.disk.getmatches a policy binding that contains owner role, the matched_permissions will be{"roles/owner": ["compute.disk.get"]}. The roles can also be found in the returnedpolicybindings. Note that the map is populated only for requests with permission queries.
getMatchedPermissions
The map from roles to their included permissions that match the
permission query (i.e., a query containingpolicy.role.permissions:).
Example: if querypolicy.role.permissions:compute.disk.getmatches a policy binding that contains owner role, the
matched_permissions will be{"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returnedpolicybindings. Note that the
map is populated only for requests with permission queries.
The map from roles to their included permissions that match the
permission query (i.e., a query containingpolicy.role.permissions:).
Example: if querypolicy.role.permissions:compute.disk.getmatches a policy binding that contains owner role, the
matched_permissions will be{"roles/owner": ["compute.disk.get"]}. The
roles can also be found in the returnedpolicybindings. Note that the
map is populated only for requests with permission queries.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["# Google Cloud Asset V1 Client - Class Explanation (2.2.3)\n\nVersion latestkeyboard_arrow_down\n\n- [2.2.3 (latest)](/php/docs/reference/cloud-asset/latest/V1.IamPolicySearchResult.Explanation)\n- [2.2.2](/php/docs/reference/cloud-asset/2.2.2/V1.IamPolicySearchResult.Explanation)\n- [2.1.3](/php/docs/reference/cloud-asset/2.1.3/V1.IamPolicySearchResult.Explanation)\n- [2.0.1](/php/docs/reference/cloud-asset/2.0.1/V1.IamPolicySearchResult.Explanation)\n- [1.16.4](/php/docs/reference/cloud-asset/1.16.4/V1.IamPolicySearchResult.Explanation)\n- [1.14.1](/php/docs/reference/cloud-asset/1.14.1/V1.IamPolicySearchResult.Explanation)\n- [1.13.2](/php/docs/reference/cloud-asset/1.13.2/V1.IamPolicySearchResult.Explanation)\n- [1.12.2](/php/docs/reference/cloud-asset/1.12.2/V1.IamPolicySearchResult.Explanation)\n- [1.11.3](/php/docs/reference/cloud-asset/1.11.3/V1.IamPolicySearchResult.Explanation)\n- [1.10.2](/php/docs/reference/cloud-asset/1.10.2/V1.IamPolicySearchResult.Explanation)\n- [1.9.2](/php/docs/reference/cloud-asset/1.9.2/V1.IamPolicySearchResult.Explanation) \nReference documentation and code samples for the Google Cloud Asset V1 Client class Explanation.\n\nExplanation about the IAM policy search result.\n\nGenerated from protobuf message `google.cloud.asset.v1.IamPolicySearchResult.Explanation`\n\nNamespace\n---------\n\nGoogle \\\\ Cloud \\\\ Asset \\\\ V1 \\\\ IamPolicySearchResult\n\nMethods\n-------\n\n### __construct\n\nConstructor.\n\n### getMatchedPermissions\n\nThe map from roles to their included permissions that match the\npermission query (i.e., a query containing `policy.role.permissions:`).\n\nExample: if query `policy.role.permissions:compute.disk.get`\nmatches a policy binding that contains owner role, the\nmatched_permissions will be `{\"roles/owner\": [\"compute.disk.get\"]}`. The\nroles can also be found in the returned `policy` bindings. Note that the\nmap is populated only for requests with permission queries.\n\n### setMatchedPermissions\n\nThe map from roles to their included permissions that match the\npermission query (i.e., a query containing `policy.role.permissions:`).\n\nExample: if query `policy.role.permissions:compute.disk.get`\nmatches a policy binding that contains owner role, the\nmatched_permissions will be `{\"roles/owner\": [\"compute.disk.get\"]}`. The\nroles can also be found in the returned `policy` bindings. Note that the\nmap is populated only for requests with permission queries."]]