Discover
Get started
Create buckets
Access and manage buckets
Upload and download objects
Access and manage objects
Get insights on your stored data
Cache objects
Control data lifecycles
Make requests
Secure data
Monitor data and usage
Protection, backup, and recovery
Mount buckets with Cloud Storage FUSE
Work across products, Clouds, and platforms
Troubleshoot
Stay organized with collections Save and categorize content based on your preferences.
This page describes how to set Identity and Access Management (IAM) policies on managed folders, so you can get fine-grained access control over specific groups of objects within a bucket.
If you're looking for other methods of access control, see the following resources:
To learn about how to control access to whole buckets and the objects within them, see Set and manage IAM policies on buckets.
For an alternative way to control access to individual objects in your buckets, see Access Control Lists.
For more information about controlling access to Cloud Storage resources, read Overview of Access Control.
To get the permissions that you need to set and manage IAM policies for managed folders, ask your administrator to grant you the Storage Folder Admin (roles/storage.folderAdmin
) IAM role for the bucket that contains the managed folders.
This role contain the following permissions, which are required to set and manage IAM policies for managed folders:
storage.managedFolders.getIamPolicy
storage.managedFolders.setIamPolicy
You can also get these permissions with custom roles.
For information about granting roles for buckets, see Set and manage IAM policies on buckets.
Set an IAM policy on a managed folder ConsoleIn the list of buckets, click the name of the bucket that contains the managed folder you want to set an IAM policy on.
In the Bucket details page, click the More options icon more_vert in the Folder browser pane next to the managed folder you want to set an IAM policy on.
If you want to control access within a folder or a simulated folder, follow the steps in Create a managed folder to enable management on the folder or simulated folder.
Click Edit access.
In the Permissions for MANAGED_FOLDER_NAME
pane, click Add principal person_add.
In the New principals field, enter the principal for which you want to grant access. For more information about principals you can include, see Principal identifiers.
In the Assign roles section, use the Select a role drop-down to specify the level of access you want to grant to the principal.
Click Save.
Create a JSON file that contains the following information:
{ "bindings":[ { "role": "IAM_ROLE", "members":[ "PRINCIPAL_IDENTIFIER" ] } ] }
Where:
IAM_ROLE
is the IAM role you are granting. For example, roles/storage.objectViewer
.
PRINCIPAL_IDENTIFIER
identifies who you are granting managed folder access to. For example, user:jeffersonloveshiking@gmail.com
. For a list of principal identifier formats, see Principal identifiers.
Use the gcloud storage managed-folders set-iam-policy
command:
gcloud storage managed-folders set-iam-policy gs://BUCKET_NAME/MANAGED_FOLDER_NAME POLICY_FILE
Where:
BUCKET_NAME
is the name of the bucket that contains the managed folder to which you want to apply the IAM policy. For example, my-bucket
.
MANAGED_FOLDER_NAME
is the name of the managed folder to which you want to apply the IAM policy. For example, my-managed-folder/
.
POLICY_FILE
is the path to the JSON file you created in step 1.
In the list of buckets, click the name of the bucket that contains the managed folder for which you want to view IAM policies.
In the Bucket details page, click the More options icon more_vert in the Folder browser pane next to the managed folder for which you want to view the IAM policy.
Click Edit access.
The Permissions for FOLDER_NAME
pane displays the permissions on the managed folder, including the principal, role, inherited roles, and IAM conditions.
Use the gcloud storage managed-folder get-iam-policy
command:
gcloud storage managed-folders get-iam-policy gs://BUCKET_NAME/MANAGED_FOLDER_NAME
Where:
BUCKET_NAME
is the name of the bucket that contains the managed folder whose IAM policy you want to view. For example, my-bucket
.
MANAGED_FOLDER_NAME
is the name of the managed folder whose IAM policy you want to view. For example, my-managed-folder/
.
roles/storage.objectUser
) role on the bucket containing the managed folder. In order to remove the principal, you must remove them from the bucket-level policy. Console
In the list of buckets, click the name of the bucket that contains the managed folder for which you want to view IAM policies.
In the Bucket details page, click the More options icon more_vert in the Folder browser pane next to the managed folder for which you want to remove a principal.
Click Edit access.
In the Permissions for FOLDER_NAME
pane, enter the name of the principal in the Filter field.
Click the Delete icon delete to delete the principal.
Cloud Storage deletes the principal from your managed folder.
Command lineUse the gcloud storage managed-folder remove-iam-policy-binding
command:
gcloud storage managed-folders remove-iam-policy-binding gs://BUCKET_NAME/MANAGED_FOLDER_NAME --member=PRINCIPAL_IDENTIFIER --role=IAM_ROLE
Where:
BUCKET_NAME
is the name of the bucket that contains the managed folder you are revoking access to. For example, my-bucket
.
MANAGED_FOLDER_NAME
is the name of the managed folder whose IAM policy you want to remove. For example, my-managed-folder/
.
PRINCIPAL_IDENTIFIER
identifies who you are revoking access from. For example, user:jeffersonloveshiking@gmail.com
. For a list of principal identifier formats, see Principal identifiers.
IAM_ROLE
is the IAM role you are revoking. For example, roles/storage.objectViewer
.
Have gcloud CLI installed and initialized, which lets you generate an access token for the Authorization
header.
Get the existing policy applied to your managed folder. To do so, use cURL
to call the JSON API with a GET getIamPolicy
request:
curl -X GET \ -H "Authorization: Bearer $(gcloud auth print-access-token)" \ "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAME/iam"
Where:
BUCKET_NAME
is the name of the bucket that contains the managed folder you are revoking access to. For example, my-bucket
.
MANAGED_FOLDER_NAME
is the name of the managed folder whose IAM policy you want to remove. For example, my-managed-folder/
.
Create a JSON file that contains the policy you retrieved in the previous step.
Edit the JSON file to remove the principal from the policy.
Use cURL
to call the JSON API with a PUT setIamPolicy
request:
curl -X PUT --data-binary @JSON_FILE_NAME \ -H "Authorization: Bearer $(gcloud auth print-access-token)" \ -H "Content-Type: application/json" \ "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAME/iam"
Where:
JSON_FILE_NAME
is the path for the file that you created in Step 3.
BUCKET_NAME
is the name of the bucket that contains the managed folder you are revoking access to. For example, my-bucket
.
MANAGED_FOLDER_NAME
is the name of the managed folder whose IAM policy you want to remove. For example, my-managed-folder/
.
The following sections show you how to add and remove IAM Conditions on your managed folders. To view the IAM Conditions for your managed folders, see Viewing the IAM policy for a managed folder. For more information about using IAM Conditions with Cloud Storage, see Conditions.
You must enable uniform bucket-level access on the bucket before adding conditions to managed folders.
Set a new condition on a managed folder Command lineCreate a JSON or YAML file that defines the condition, including the title
of the condition, the attribute-based logic expression
for the condition, and, optionally, a description
for the condition.
Note that Cloud Storage only supports the date/time, resource type, and resource name attributes in the expression
.
Use the gcloud storage managed-folders add-iam-policy-binding
command with the --condition-from-file
flag:
gcloud storage managed-folders add-iam-policy-binding gs://BUCKET_NAME/MANAGED_FOLDER_NAME --member=PRINCIPAL_IDENTIFIER --role=IAM_ROLE --condition-from-file=CONDITION_FILE
Where:
BUCKET_NAME
is the name of the bucket that contains the managed folder to which you are granting the principal access. For example, my-bucket
.
MANAGED_FOLDER_NAME
is the name of managed folder to which you are granting the principal access. For example, my-managed-folder/
.
PRINCIPAL_IDENTIFIER
identifies who the condition applies to. For example, user:jeffersonloveshiking@gmail.com
. For a list of principal identifier formats, see Principal identifiers.
IAM_ROLE
is the IAM role you are granting to the principal. For example, roles/storage.objectViewer
.
CONDITION_FILE
is the file you created in the previous step.
Alternatively, you can include the condition directly in the command with the --condition
flag instead of the --condition-from-file
flag.
Have gcloud CLI installed and initialized, which lets you generate an access token for the Authorization
header.
Use a GET getIamPolicy
request to save the managed folder's IAM policy to a temporary JSON file:
curl \ 'https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAMEiam' \ --header 'Authorization: Bearer $(gcloud auth print-access-token)' > tmp-policy.json
Where:
BUCKET_NAME
is the name of the bucket that contains the managed folder you want to set an IAM Condition on.
MANAGED_FOLDER_NAME
is the name of the managed folder you want to set an IAM Condition on.
Edit the tmp-policy.json
file in a text editor to add new conditions to the bindings in the IAM policy:
{ "version": VERSION, "bindings": [ { "role": "IAM_ROLE", "members": [ "PRINCIPAL_IDENTIFIER" ], "condition": { "title": "TITLE", "description": "DESCRIPTION", "expression": "EXPRESSION" } } ], "etag": "ETAG" }
Where:
VERSION
is the IAM policy version, which is required to be 3 for managed folders with IAM Conditions.
IAM_ROLE
is the role to which the condition applies. For example, roles/storage.objectViewer
.
PRINCIPAL_IDENTIFIER
identifies who the condition applies to. For example, user:jeffersonloveshiking@gmail.com
. For a list of principal identifier formats, see Principal identifiers.
TITLE
is the title of the condition. For example, expires in 2019
.
DESCRIPTION
is an optional description of the condition. For example, Permission revoked on New Year's
.
EXPRESSION
is an attribute-based logic expression. For example, request.time < timestamp(\"2019-01-01T00:00:00Z\")
. For more examples of expressions, see the Conditions attribute reference. Cloud Storage only supports the date/time, resource type, and resource name attributes.
Don't modify ETAG
.
Use a PUT setIamPolicy
request to set the modified IAM policy on the bucket:
curl -X PUT --data-binary @tmp-policy.json \ -H "Authorization: Bearer $(gcloud auth print-access-token)" \ -H "Content-Type: application/json" \ "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFoldersMANAGED_FOLDER_NAME/iam"
Where:
BUCKET_NAME
is the name of the bucket that contains the managed folder you want to set an IAM Condition on.
MANAGED_FOLDER_NAME
is the name of the managed folder you want to set an IAM Condition on.
Use the gcloud storage managed-folders get-iam-policy
command to save the managed folder's IAM policy to a temporary JSON file.
gcloud storage managed-folders get-iam-policy gs://BUCKET_NAME/MANAGED_FOLDER_NAME > tmp-policy.json
Edit the tmp-policy.json
file in a text editor to remove conditions from the IAM policy.
Use the gcloud storage managed-folders set-iam-policy
command to set the modified IAM policy on the managed folder.
gcloud storage managed-folders set-iam-policy gs://BUCKET_NAME/MANAGED_FOLDER_NAME tmp-policy.json
Have gcloud CLI installed and initialized, which lets you generate an access token for the Authorization
header.
Use a GET getIamPolicy
request to save the managed folder's IAM policy to a temporary JSON file:
curl \ 'https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAMEiam' \ --header 'Authorization: Bearer $(gcloud auth print-access-token)' > tmp-policy.json
Where:
BUCKET_NAME
is the name of the bucket that contains the managed folder you are changing access to. For example, my-bucket
.
MANAGED_FOLDER_NAME
is the name of the managed folder you are changing access to. For example, my-managed-folder/
.
Edit the tmp-policy.json
file in a text editor to remove conditions from the IAM policy.
Use a PUT setIamPolicy
request to set the modified IAM policy on the managed folder:
curl -X PUT --data-binary @tmp-policy.json \ -H "Authorization: Bearer $(gcloud auth print-access-token)" \ -H "Content-Type: application/json" \ "https://storage.googleapis.com/storage/v1/b/BUCKET_NAME/managedFolders/MANAGED_FOLDER_NAMEiam"
Where:
BUCKET_NAME
is the name of the bucket that contains the managed folder you are changing access to. For example, my-bucket
.
MANAGED_FOLDER_NAME
is the name of the managed folder you are changing access to. For example, my-managed-folder/
.
See Manage access to projects, managed folders, and organizations for guides about granting and revoking IAM roles at the project level and above.
Best practicesYou should set the minimum role possible that gives the principal the required access. For example, if a team member only needs to view the managed folders in a bucket, grant them the Storage Object Admin (roles/storage.objectAdmin
) role instead of the Storage Folder Admin (roles/storage.folderAdmin
) role. Similarly, if the team member needs full control of the managed folders in a bucket, grant them the Storage Folder Admin (roles/storage.folderAdmin
) role instead of the Storage Admin (roles/storage.admin
) role.
Learn how to publicly share your data.
See specific Sharing and collaboration examples.
Learn about best practices when using IAM.
To troubleshoot failed operations related to IAM roles and permissions, see Troubleshooting.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-10-02 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-02 UTC."],[],[]]
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.5