Remediate access issues

The Google Cloud console, Google Cloud CLI, and REST API all display error messages when a user tries to access a resource that they don't have permission to access. When a user encounters a permission error, they can request access to the resource. This generates an email that's sent to your organization's technical Essential Contact.

When the administrator clicks the link in the generated email, they're directed to the policy remediation summary. Administrators can also access the policy remediation summary by clicking View troubleshooting details on a permission error message and then clicking Policy Troubleshooter. This page describes the request details, including the requesting principal, resource, and the permissions that the principal is requesting.

The policy remediation summary page showing request details.

The Current access state section summarizes the results for each policy type (specifically, allow policies, deny policies, and principal access boundary policies) and states the overall outcome. The outcome indicates whether the principal can access the resource, according to the relevant policies.

You can get more information about the policies that are blocking the user's access by clicking Advanced troubleshooting.

Click Remediate to view options for remediating that user's access issues. To learn the different ways that you can resolve permission errors caused by each of the different policy types using the Google Cloud console, see the following:

Remediate allow policy

The Remediate allow policy page shows the permissions that the user is missing. To resolve access blocked by an allow policy, you can either grant that user access or create a Privileged Access Manager entitlement for the user. After you create the entitlement, the user can request it to access the resource.

The policy remediation summary page showing allow policy details.

To grant the user access, do the following:

  1. Select Grant role.
  2. Click Continue.
  3. Select an applicable role to view details about that role.
  4. Click Grant access.

To create a new Privileged Access Manager entitlement, do the following:

  1. Select Grant temporary access.
  2. Click the applicable role to grant to view details about that role.
  3. Click Create entitlement.

    In the Create a new entitlement pane, enter the details for the entitlement:

    1. Enter a name for the new entitlement.
    2. Select the maximum duration of the grant.
    3. Click Next.
    4. Optionally add more requesters for this entitlement.
    5. Click Next.
    6. Add at least one principal to approve entitlement requests or select Activate access without approvals.
    7. Click Next.
    8. Optionally enter the email addresses of any administrators that you want to notify.
    9. Click Done, and then click Create entitlement.

For more information about Privileged Access Manager, see Create entitlements in Privileged Access Manager.

If there isn't one role that contains all of the permissions required by the user, no roles or entitlements are suggested.

For alternative methods of remediating the user's access, see Resolve allow policy permission errors.

Remediate deny policy

Deny policies are attached to a Google Cloud organization, folder, or project. A deny policy contains deny rules, which identify principals and list the permissions that the principals can't use.

The Remediate deny policy page shows the deny policy that prevents the user from using the permission and suggests several methods for remediating the user's access.

The policy remediation summary page showing deny policy details.

The suggested methods for remediating access requests related to deny policies include the following:

Remediate principal access boundary

By default, principals are eligible to access any Google Cloud resource. However, if they're subject to any principal access boundary policy, then they're only eligible to access the resources listed in the principal access boundary policies that they're subject to. In these cases, a principal access boundary policy might prevent a principal from accessing a resource.

The Remediate principal access boundary page shows the principal access boundary policy that prevents the user from accessing the resource and suggests several methods for remediating the user's access.

The policy remediation summary page showing principal access boundary details.

The suggested methods for remediating access requests related to principal access boundary policies include the following:

What's next