Resource: RoleAssignment
Defines an assignment of a role.
| JSON representation | 
|---|
|  { 
 "roleAssignmentId" 
 : 
 string 
 , 
 "roleId" 
 : 
 string 
 , 
 "kind" 
 : 
 string 
 , 
 "etag" 
 : 
 string 
 , 
 "assignedTo" 
 : 
 string 
 , 
 "assigneeType" 
 : 
 enum (  | 
roleAssignmentId 
 string ( int64 
format) 
ID of this roleAssignment.
roleId 
 string ( int64 
format) 
The ID of the role that is assigned.
kind 
 string 
The type of the API resource. This is always admin#directory#roleAssignment 
.
etag 
 string 
ETag of the resource.
assignedTo 
 string 
The unique ID of the entity this role is assigned to—either the userId 
of a user, the groupId 
of a group, or the uniqueId 
of a service account as defined in Identity and Access Management (IAM) 
.
assigneeType 
 enum (  
 AssigneeType 
 
)
Output only. The type of the assignee ( USER 
or GROUP 
).
scopeType 
 string 
The scope in which this role is assigned.
Acceptable values are:
-  CUSTOMER
-  ORG_UNIT
orgUnitId 
 string 
If the role is restricted to an organization unit, this contains the ID for the organization unit the exercise of this role is restricted to.
condition 
 string 
Optional. The condition associated with this role assignment.
Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers.
A RoleAssignment 
with the condition 
field set will only take effect when the resource being accessed meets the condition. If condition 
is empty, the role ( roleId 
) is applied to the actor ( assignedTo 
) at the scope ( scopeType 
) unconditionally.
Currently, the following conditions are supported:
-  To make the RoleAssignmentonly applicable to Security Groups :api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'
-  To make the RoleAssignmentnot applicable to Security Groups :!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) && resource.type == 'cloudidentity.googleapis.com/Group'
Currently, the condition strings have to be verbatim and they only work with the following pre-built administrator roles :
- Groups Editor
- Groups Reader
The condition follows Cloud IAM condition syntax .
- To make the RoleAssignmentnot applicable to Locked Groups :!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.locked']) && resource.type == 'cloudidentity.googleapis.com/Group'
This condition can also be used in conjunction with a Security-related condition.
AssigneeType
The type of identity to which a role is assigned.
| Enums | |
|---|---|
| USER | An individual user within the domain. | 
| GROUP | A group within the domain. | 
| Methods | |
|---|---|
|   | Deletes a role assignment. | 
|   | Retrieves a role assignment. | 
|   | Creates a role assignment. | 
|   | Retrieves a paginated list of all roleAssignments. | 

