public sealed class ServicePerimeterConfig.Types.IngressSource : IMessage<ServicePerimeterConfig.Types.IngressSource>, IEquatable<ServicePerimeterConfig.Types.IngressSource>, IDeepCloneable<ServicePerimeterConfig.Types.IngressSource>, IBufferMessage, IMessageReference documentation and code samples for the Identity Access Context Manager v1 API class ServicePerimeterConfig.Types.IngressSource.
The source that [IngressPolicy] [google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy] authorizes access from.
Implements
IMessageServicePerimeterConfigTypesIngressSource, IEquatableServicePerimeterConfigTypesIngressSource, IDeepCloneableServicePerimeterConfigTypesIngressSource, IBufferMessage, IMessageNamespace
Google.Identity.AccessContextManager.V1Assembly
Google.Identity.AccessContextManager.V1.dll
Constructors
IngressSource()
public IngressSource()IngressSource(IngressSource)
public IngressSource(ServicePerimeterConfig.Types.IngressSource other)| Parameter | |
|---|---|
| Name | Description |
other |
ServicePerimeterConfigTypesIngressSource |
Properties
AccessLevel
public string AccessLevel { get; set; }An [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] resource
name that allow resources within the [ServicePerimeters]
[google.identity.accesscontextmanager.v1.ServicePerimeter] to be
accessed from the internet. [AccessLevels]
[google.identity.accesscontextmanager.v1.AccessLevel] listed must
be in the same policy as this [ServicePerimeter]
[google.identity.accesscontextmanager.v1.ServicePerimeter].
Referencing a nonexistent [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] will cause
an error. If no [AccessLevel]
[google.identity.accesscontextmanager.v1.AccessLevel] names are
listed, resources within the perimeter can only be accessed via Google
Cloud calls with request origins within the perimeter. Example:
accessPolicies/MY_POLICY/accessLevels/MY_LEVEL. If a single * is
specified for access_level, then all [IngressSources]
[google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource]
will be allowed.
| Property Value | |
|---|---|
| Type | Description |
string |
|
HasAccessLevel
public bool HasAccessLevel { get; }Gets whether the "access_level" field is set
| Property Value | |
|---|---|
| Type | Description |
bool |
|
HasResource
public bool HasResource { get; }Gets whether the "resource" field is set
| Property Value | |
|---|---|
| Type | Description |
bool |
|
Resource
public string Resource { get; set; }A Google Cloud resource that is allowed to ingress the perimeter.
Requests from these resources will be allowed to access perimeter data.
Currently only projects are allowed.
Format: projects/{project_number}
The project may be in any Google Cloud organization, not just the
organization that the perimeter is defined in. * is not allowed, the
case of allowing all Google Cloud resources only is not supported.
| Property Value | |
|---|---|
| Type | Description |
string |
|
SourceCase
public ServicePerimeterConfig.Types.IngressSource.SourceOneofCase SourceCase { get; }| Property Value | |
|---|---|
| Type | Description |
ServicePerimeterConfigTypesIngressSourceSourceOneofCase |
|