Method: backendServices.setSecurityPolicy

Sets the Trusted Cloud Armor security policy for the specified backend service. For more information, see Trusted Cloud Cloud Armor Overview

HTTP request

POST https://compute.s3nsapis.fr/compute/v1/projects/{project}/global/backendServices/{backendService}/setSecurityPolicy

The URL uses gRPC Transcoding syntax. To know more about valid error responses that can be thrown by this HTTP request, please refer to the service error catalog

Path parameters

Parameters
project

string

Project ID for this request.

backendService

string

Name of the BackendService resource to which the security policy should be set. The name should conform to RFC1035.

Query parameters

Parameters
requestId

string

An optional request ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed.

For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments.

The request ID must be a valid UUID with the exception that zero UUID is not supported (

00000000-0000-0000-0000-000000000000

).

Request body

The request body contains an instance of SecurityPolicyReference.

Response body

If successful, the response body contains an instance of Operation.

Authorization scopes

Requires one of the following OAuth scopes:

  • https://www.googleapis.com/auth/compute
  • https://www.googleapis.com/auth/cloud-platform

For more information, see the Authentication Overview.

IAM Permissions

In addition to any permissions specified on the fields above, authorization requires one or more of the following IAM permissions:

  • compute.backendServices.setSecurityPolicy

To find predefined roles that contain those permissions, see Compute Engine IAM Roles.