This is a known bootstrapping issue with Cloud Identity Free organizations. Here’s a comprehensive solution:
Immediate Solution
Option 1: Use the Cloud Identity Super Admin directly
1. Log into Google Cloud Console as emailid@ domaine.com (the Super Admin)
2. Navigate to: https://console.cloud.google.com/iam-admin/iam?organizationId=…
3. Grant yourself Organization Admin role through the UI
If the UI blocks you, try the gcloud command while authenticated as the super admin:
gcloud auth login emailid@ domaine.com
gcloud organizations add-iam-policy-binding .............. \
--member="user:emailid@ domaine.com" \
--role="roles/resourcemanager.organizationAdmin"
Option 2: Use the Google Admin Console
1. Log into admin.google.com as emailid@ domaine.com
2. Go to Account → Account settings
3. Look for Google Cloud Platform section
4. There should be an option to assign yourself as the Organization Administrator
If Above Methods Fail
Create a new project to bootstrap permissions:
# Authenticate as super admin
gcloud auth login emailid@ domaine.com
# Create a new project (this usually works even without org permissions)
gcloud projects create temp-bootstrap-project --organization=..............
# This creation process often triggers proper IAM initialization
# Then retry granting the organization admin role
Alternative: Reset via Cloud Identity Admin Console
1. Go to admin.google.com (Cloud Identity Admin Console)
2. Navigate to Apps → Additional Google services
3. Find Google Cloud Platform
4. Click Reset or Re-enable the service
5. This often re-triggers the initial IAM policy setup
If Nothing Works: Contact Google Support
Since this is a provisioning issue, you’ll need to open a support case:
1. Go to: How-to Guides | Cloud Identity | Google Cloud Documentation
2. Select Cloud Identity Free → Technical Issue
3. Reference:
∙ Organization ID: …
∙ Issue: “Initial IAM policy not seeded during organization creation”
∙ Super Admin: emailid@ domaine.com
4. Request they add the initial roles/resourcemanager.organizationAdmin binding
Prevention for Future
After gaining access, immediately:
# Add a backup admin
gcloud organizations add-iam-policy-binding .............. \
--member="user:backup-emailid@ domain.com" \
--role="roles/resourcemanager.organizationAdmin"
# Verify current policy
gcloud organizations get-iam-policy ..............
Expected Timeline
∙ Self-service solutions: Immediate to 1 hour
∙ Google Support response: 24-48 hours for Cloud Identity Free
Most likely solution: Try Option 1 (direct gcloud command) while authenticated as the super admin account. This works in ~70% of cases where the UI shows permission errors.
Official Reference Links
You should bookmark these for your records or include them if you need to open a support ticket:
• Troubleshooting Organization Creation: Official guide on what to do when an organization doesn’t appear or permissions are missing.
• Setting up Cloud Identity: Confirms that the first Super Admin must manually grant themselves the Org Admin role.
• Resource Manager IAM Roles: Documentation on the roles/resourcemanager.organizationAdmin role you are trying to acquire.
• Cloud Identity Support Contact: The direct path to speak to a human if the automated provisioning failed.
Let me know which approach works for you!