I’ve created a custom Role for a group with this privileges:
apigee.deployments.get
apigee.deployments.list
apigee.entitlements.get
apigee.envgroupattachments.get
apigee.envgroupattachments.list
apigee.envgroups.get
apigee.envgroups.list
apigee.environments.get
apigee.environments.getStats
apigee.environments.list
apigee.operations.get
apigee.operations.list
apigee.projectorganizations.get
So I need users who belong to this group to ONLY see (and work with) some ENVIRONMENTS in the Apigee UI (and obviously only privileges in those environments).
I made this IAM conditions policies:
resource.name.startsWith(“organizations/{org}/apis/dti-”) ||
resource.name.startsWith(“organizations/{org}/sharedflows/dti-”) ||
resource.name.startsWith(“organizations/{org}/environments/dti-”) ||
(
resource.name.startsWith(“organizations/{org}/apis/dti-test/keyvaluemaps”) &&
resource.type == “apigee.googleapis.com/KeyValueMap”
) ||
(
resource.name.startsWith(“organizations/{org}/apiproducts/dti-”) &&
resource.type == “apigee.googleapis.com/ApiProduct”
) ||
resource.type == “cloudresourcemanager.googleapis.com/Project”
This works for API proxies and shared flows, but I can’t reproduce this same solution for environments.
Is there documentation for this specific area or maybe some examples to try?
Thanks.