Apply policies to user groups using access bindings

You can use access bindings to control which applications and resources your user groups can access. An access binding specifies how to apply access levels and session controls to a user group. You can apply the same access level and session control to all applications, or you can define specific behaviors for individual applications.

To ensure that you configured everything correctly, you can test your policies before enforcing them.

When working with access bindings, keep in mind the following behavior:

  • A user group can have only one access binding.
  • If a user belongs to multiple groups, the user is granted access if any policy allows it (OR not AND).
  • For session controls, only the most recently created access binding applies.

Use a single configuration for all applications

This method applies the same access level and session control to all of the applications accessed by a user group.

We recommend that you test your policy with a dry run or apply it to a small test group before implementing it in production.

gcloud

Create the access binding.

gcloud access-context-manager cloud-bindings create \
     --group-key GROUP_ID
     --organization ORG_ID
     --level DEFAULT_ACCESS_LEVEL
  [  --session-length=DEFAULT_SESSION_LENGTH                ]
  [  --session-reauth-method=DEFAULT_SESSION_REAUTH_METHOD  ]

Replace the following:

  • GROUP_ID: The group ID. If you don't have the group ID available, you can retrieve it by calling the get method on the group resource.
  • ORG_ID: Your organization ID.
  • DEFAULT_ACCESS_LEVEL: The optional access level name, which takes the form accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME. Replace POLICY_ID with the access policy ID, and ACCESS_LEVEL_NAME with the access level name.
  • DEFAULT_SESSION_LENGTH: The optional session duration using ISO 8601 duration format, such as 30m for 30 minutes, or 2h for two hours.
  • DEFAULT_SESSION_REAUTH_METHOD: The optional method to challenge users to re-verify their identity, which must be one of the following:
    • LOGIN: Apply the standard login, which can include MFA or other Workspace-defined factors.
    • PASSWORD: Only require a password, even if other factors are defined. If passwords are managed using an external IdP, users are redirected to the IdP. If the IdP session is live, users are implicitly re-authenticated. If the IdP is not live, users must sign in through the IdP.
    • SECURITY_KEY: Require a hardware security key.

API

  1. Create a JSON body:

    {
      "groupKey": "GROUP_ID",
      "accessLevels": [
        "DEFAULT_ACCESS_LEVEL"
      ],
      // optional:
      "sessionSettings": {
        "sessionLength": "DEFAULT_SESSION_LENGTH",
        "sessionReauthMethod": "DEFAULT_SESSION_REAUTH_METHOD"
      }
    }
    

    Replace the following:

    • GROUP_ID: The group ID. If you don't have the group ID available, you can retrieve it by calling the get method on the group resource.
    • DEFAULT_ACCESS_LEVEL: The optional access level name, which takes the form accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME. Replace POLICY_ID with the access policy ID, and ACCESS_LEVEL_NAME with the access level name.
    • DEFAULT_SESSION_LENGTH: The optional session duration using ISO 8601 duration format, such as 30m for 30 minutes, or 2h for two hours.
    • DEFAULT_SESSION_REAUTH_METHOD: The optional method to challenge users to re-verify their identity, which must be one of the following:
      • LOGIN: Apply the standard login, which can include MFA or other Workspace-defined factors.
      • PASSWORD: Only require a password, even if other factors are defined. If passwords are managed using an external IdP, users are redirected to the IdP. If the IdP session is live, users are implicitly re-authenticated. If the IdP is not live, users must sign in through the IdP.
      • SECURITY_KEY: Require a hardware security key.
  2. Send the POST request:

    POST https://accesscontextmanager.googleapis.com/v1/organizations/ORG_ID/gcpUserAccessBindings
    

    ORG_ID Is the ID for the organization that you used to create the Cloud Access Binding Admin role. If the access-context-manager/organization property hasn't been set, replace ORG_ID in the optional --organization flag with the ID for the organization that you used when you created the Cloud Access Binding Admin role.

If successful, you should receive a representation of the JSON object. If there is a problem, you receive an error message.

Define configurations for specific applications

This method lets you apply different access levels and session controls to different applications. You can also set default rules for applications that don't have specific configurations. This method is useful when you want to do the following:

  • Apply policies to only certain applications.
  • Create a general policy, but exclude some applications from it.

gcloud

  1. Create a binding file in YAML format with a list of scope entries within the scopedAccessSettings list. For each application that you want to map to a specific access level, include a clientScope entry.

    scopedAccessSettings:
      - scope:
          clientScope:
            restrictedClientApplication:
              client_id: CLIENT_ID
        activeSettings:
          accessLevels:
            - ACCESS_LEVEL_A
            - ACCESS_LEVEL_B
          sessionSettings:
            - sessionLength: SESSION_LENGTH
              sessionReauthMethod: SESSION_REAUTH_METHOD
              sessionLengthEnabled: true
      - scope:
          clientScope:
            restrictedClientApplication:
              #
              # because this app is specified by `name`,
              # it won't work with sessionSettings.
              #
              # if you add sessionSettings, make sure to
              # replace the `name` key with `client_id`, 
              # and use the OAuth client ID as the value.
              #
              name: CLIENT_NAME
          activeSettings:
            accessLevels:
            - ACCESS_LEVEL_C
    

    Replace the following:

    • CLIENT_ID: The OAuth client ID. You must use client_id when an application contains sessionSettings.
    • ACCESS_LEVEL_A: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
    • ACCESS_LEVEL_B: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
    • SESSION_LENGTH: The session duration using ISO 8601 duration format, such as 30m for 30 minutes, or 2h for two hours.
    • SESSION_REAUTH_METHOD: The optional method to challenge users to re-verify their identity, which must be one of the following:

      • LOGIN: Apply the standard login, which can include MFA or other Workspace-defined factors.
      • PASSWORD: Only require a password, even if other factors are defined. If passwords are managed using an external IdP, users are redirected to the IdP. If the IdP session is live, users are implicitly re-authenticated. If the IdP is not live, users must sign in through the IdP.
      • SECURITY_KEY: Require a hardware security key.
    • CLIENT_NAME: The client name. If the application contains sessionSettings, you cannot use the client name. Instead, use the OAuth client ID.

    • ACCESS_LEVEL_C: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.

    To set a default access level for applications not defined in the YAML file, use the --level argument. The YAML file only supports application-specific settings (scopedAccessSettings).

  2. Create the access binding.

    gcloud access-context-manager cloud-bindings create
        --organization ORG_ID
        --group-key GROUP_ID
        --binding-file BINDING_FILE_PATH
      [  --level DEFAULT_ACCESS_LEVEL ]
      [  --session-length=DEFAULT_SESSION_LENGTH                ]
      [  --session-reauth-method=DEFAULT_SESSION_REAUTH_METHOD  ]
    

    Replace the following:

    • ORG_ID: Your organization ID.
    • GROUP_ID: The group ID. If you don't have the group ID available, you can retrieve it by calling the get method on the group resource.
    • BINDING_FILE_PATH: The path to the YAML file that contains the access binding scheme. The binding file supports only scopedAccessSettings.
    • DEFAULT_ACCESS_LEVEL: The optional access level name, which takes the form accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME. Replace POLICY_ID with the access policy ID, and ACCESS_LEVEL_NAME with the access level name.
    • DEFAULT_SESSION_LENGTH: The optional session duration using ISO 8601 duration format, such as 30m for 30 minutes, or 2h for two hours.
    • DEFAULT_SESSION_REAUTH_METHOD: The optional method to challenge users to re-verify their identity, which must be one of the following:
      • LOGIN: Apply the standard login, which can include MFA or other Workspace-defined factors.
      • PASSWORD: Only require a password, even if other factors are defined. If passwords are managed using an external IdP, users are redirected to the IdP. If the IdP session is live, users are implicitly re-authenticated. If the IdP is not live, users must sign in through the IdP.
      • SECURITY_KEY: Require a hardware security key.

How the --level and --binding-file arguments work together

  • If you only use --binding-file, only the applications in the file have the policies applied.
  • If you only use --level, the access level applies to all applications.
  • If you use both, the rules in the YAML file take priority. The --level value applies to any applications that are not listed in the file.

Working with session controls

  • To set default session controls for all applications, use --session-length and --session-reauth-method.
  • If you also define session controls in the YAML file, those session controls override the default settings for those specific applications.
  • You must use both --session-length and --session-reauth-method together.

API

Create a JSON body:

{
  "groupKey": "GROUP_ID",
   //
   // Optional; if specified, all applications that aren't defined in
   // scopedAccessSettings have these access levels applied.
   //
   // If more than one access level is specified, the user is
   // granted access if any one resolves to TRUE (OR logic, not AND).
   //
   // If you omit this key entirely, then no policy enforcement is
   // applied by default.
   //
  "accessLevels": [
    "DEFAULT_ACCESS_LEVEL"
  ],
  "scopedAccessSettings": [
    {
      "scope": {
        "clientScope": {
          "restrictedClientApplication": {
            "client_id": "CLIENT_ID"
          }
        }
      },
      "activeSettings": {
        "accessLevels": [
          "ACCESS_LEVEL_A",
          "ACCESS_LEVEL_B"
        ],
        "sessionSettings": [
          {
            "sessionLength": "SESSION_LENGTH",
            "sessionReauthMethod": "SESSION_REAUTH_METHOD",
            "sessionLengthEnabled": true
          }
        ]
      }
    },
    {
      "scope": {
        "clientScope": {
          "restrictedClientApplication": {
            "name": "CLIENT_NAME"
          }
        },
        "activeSettings": {
          "accessLevels": [
            "ACCESS_LEVEL_C"
          ]
        }
      }
    }
  ]
}

Replace the following:

  • GROUP_ID: The group ID. If you don't have the group ID available, you can retrieve it by calling the get method on the group resource.
  • DEFAULT_ACCESS_LEVEL: The optional access level name, which takes the form accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME. Replace POLICY_ID with the access policy ID, and ACCESS_LEVEL_NAME with the access level name.
  • CLIENT_ID: The OAuth client ID. You must use client_id when an application contains sessionSettings.
  • ACCESS_LEVEL_A: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
  • ACCESS_LEVEL_B: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
  • SESSION_LENGTH: The session duration using ISO 8601 duration format, such as 30m for 30 minutes, or 2h for two hours.
  • SESSION_REAUTH_METHOD: The optional method to challenge users to re-verify their identity, which must be one of the following:

    • LOGIN: Apply the standard login, which can include MFA or other Workspace-defined factors.
    • PASSWORD: Only require a password, even if other factors are defined. If passwords are managed using an external IdP, users are redirected to the IdP. If the IdP session is live, users are implicitly re-authenticated. If the IdP is not live, users must sign in through the IdP.
    • SECURITY_KEY: Require a hardware security key.
  • CLIENT_NAME: The client name. If the application contains sessionSettings, you cannot use the client name. Instead, use the OAuth client ID.

  • ACCESS_LEVEL_C: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.

Send the POST request:

POST https://accesscontextmanager.googleapis.com/v1/organizations/ORG_ID/gcpUserAccessBindings

ORG_ID is the ID for the organization that you used to create the Cloud Access Binding Admin role. If the access-context-manager/organization property hasn't been set, replace ORG_ID in the optional --organization flag with the ID for the organization that you used when you created the Cloud Access Binding Admin role.

If successful, you should receive a representation of the JSON object, or an error message if there was a problem.

Use dry run access levels to simulate enforcement

Dry run access levels let you test your access policies without actually enforcing them. This helps you understand the impact of a policy before it goes live. You can view the dry run logs to see what would have happened if the policy were active.

Only access levels can be used in dry run mode. Session controls are not available in dry run mode.

Create a dry run binding

You can define dry run access levels alongside regular access levels in the same binding, or you can use separate bindings for dry runs.

gcloud

  1. Configure the access settings.

    scopedAccessSettings:
      - scope:
          clientScope:
            restrictedClientApplication:
              name: CLIENT_NAME
        activeSettings:
          accessLevels:
            - ACCESS_LEVEL_A
        dryRunSettings:
          accessLevels:
            - DRY_RUN_ACCESS_LEVEL_1
      - scope:
          clientScope:
            restrictedClientApplication:
              client_id: CLIENT_ID
          dryRunSettings:
            accessLevels:
              - DRY_RUN_ACCESS_LEVEL_2
    

    Replace the following:

    • CLIENT_NAME: The client name. If the application contains sessionSettings, you cannot use the client name. Instead, use the OAuth client ID.
    • ACCESS_LEVEL_A: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
    • DRY_RUN_ACCESS_LEVEL_1: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
    • CLIENT_ID: The OAuth client ID. You must use client_id when an application contains sessionSettings.
    • DRY_RUN_ACCESS_LEVEL_2: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
  2. Create the access binding.

    gcloud access-context-manager cloud-bindings create
      --organization ORG_ID
      --group-key GROUP_ID
      --binding-file BINDING_FILE_PATH
      --dry-run-level DEFAULT_DRY_RUN_ACCESS_LEVEL
    

    Replace the following:

    • ORG_ID: Your organization ID.
    • GROUP_ID: The group ID. If you don't have the group ID available, you can retrieve it by calling the get method on the group resource.
    • BINDING_FILE_PATH: The path to the YAML file that contains the access binding scheme. The binding file supports only scopedAccessSettings.
    • DEFAULT_DRY_RUN_ACCESS_LEVEL_2: An optional access level name in the form accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.

    Include this flag to apply the specified dry run access level to all applications by default if they aren't specified in the YAML.

API

  1. Create a JSON body:

    {
      "group_key": "GROUP_ID",
       //
       // Optional; if specified, all applications that aren't defined in
       // scopedAccessSettings have these access levels applied.
       //
       // If more than one access level is specified, the user is
       // granted access if any one resolves to TRUE (OR logic, not AND).
       //
       // If you omit this key entirely, then no policy enforcement is
       // be applied by default.
       //
      "access_levels": [
        "DEFAULT_ACCESS_LEVEL"
      ],
       //
       // Optional; if specified, all applications that aren't defined in
       // scopedAccessSettings will have these dry run access levels applied.
       //
      "dry_run_access_levels": [
        "DEFAULT_DRY_RUN_ACCESS_LEVEL"
      ],
      "scoped_access_settings": [
        {
          "scope": {
            "client_scope": {
              "restricted_client_application": {
                "name": "CLIENT_NAME"
              }
            }
          },
          "active_settings": {
            "access_levels": [
              "ACCESS_LEVEL_A"
            ]
          },
          "dry_run_settings": {
            "access_levels": [
              "DRY_RUN_ACCESS_LEVEL_1"
            ]
          }
        },
        {
          "scope": {
            "client_scope": {
              "restricted_client_application": {
                "client_id": "CLIENT_ID"
              }
            }
          },
          "active_settings": {
            "access_levels": [
              "DRY_RUN_ACCESS_LEVEL_2"
            ]
          }
        }
      ]
    }
    

    Replace the following:

    • GROUP_ID: The group ID. If you don't have the group ID available, you can retrieve it by calling the get method on the group resource.
    • DEFAULT_ACCESS_LEVEL: The optional access level name, which takes the form accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME. Replace POLICY_ID with the access policy ID, and ACCESS_LEVEL_NAME with the access level name.
    • DEFAULT_DRY_RUN_ACCESS_LEVEL: An optional access level name in the form accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
    • CLIENT_NAME: The client name. If the application contains sessionSettings, you cannot use the client name. Instead, use the OAuth client ID.
    • ACCESS_LEVEL_A: An access level name in the format accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
    • DRY_RUN_ACCESS_LEVEL_1: An access level name in the form accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
    • CLIENT_ID: The OAuth client ID. You must use client_id when an application contains sessionSettings.
    • DRY_RUN_ACCESS_LEVEL_2: An access level name in the form accessPolicies/POLICY_ID/accessLevels/ACCESS_LEVEL_NAME.
  2. Send the POST request:

    https://accesscontextmanager.googleapis.com/v1/organizations/ORG_ID/gcpUserAccessBindings
    

    ORG_ID Is the ID for the organization that you used to create the Cloud Access Binding Admin role. If the access-context-manager/organization property hasn't been set, replace ORG_ID in the optional --organization flag with the ID for the organization that you used when you created the Cloud Access Binding Admin role.

    If successful, you should receive a representation of the JSON object. If there is a problem, you receive an error message.

View the dry run logs

After you set up a dry run, you can check the logs to see which access attempts would have been denied.

The following table lists the log fields that you can use to create and run the query to get the logs:

Field name Description
protoPayload.authenticationInfo.principalEmail Email ID of the principal for which the access is denied.
protoPayload.metadata.deniedApplications Name of the application for which the access is denied.
protoPayload.metadata.evaluationResult The evaluation result of the active access policy. Possible values: GRANTED or DENIED.
protoPayload.metadata.appliedAccessLevels The applied access levels required by the active access policy.
protoPayload.metadata.appliedDryRunAccessLevels The applied access levels required by the dry run access policy.
protoPayload.metadata.dryRunEvaluationResult The evaluation result of the dry run access policy, which indicates the intended action when the access policy is enforced. Possible values: GRANTED or DENIED.

For details about how to create a query for logs, see Logging query language.