googleapis.com – cloudidentity
API for provisioning and managing identity resources.
- Homepage
- https://api.apis.guru/v2/specs/googleapis.com:cloudidentity/v1.json
- Provider
- googleapis.com:cloudidentity / cloudidentity
- OpenAPI version
- 3.0.0
- Spec (JSON)
- https://api.apis.guru/v2/specs/googleapis.com/cloudidentity/v1/openapi.json
- Spec (YAML)
- https://api.apis.guru/v2/specs/googleapis.com/cloudidentity/v1/openapi.yaml
Tools (37)
Extracted live via the executor SDK.
-
customers.cloudidentityCustomersUserinvitationsCancelCancels a UserInvitation that was already sent.
-
customers.cloudidentityCustomersUserinvitationsIsInvitableUserVerifies whether a user account is eligible to receive a UserInvitation (is an unmanaged account). Eligibility is based on the following criteria: * the email address is a consumer account and it's the primary email address of the account, and * the domain of the email address matches an existing verified Google Workspace or Cloud Identity domain If both conditions are met, the user is eligible. Note: This method is not supported for Workspace Essentials customers.
-
customers.cloudidentityCustomersUserinvitationsListRetrieves a list of UserInvitation resources. Note: New consumer accounts with the customer's verified domain created within the previous 48 hours will not appear in the result. This delay also applies to newly-verified domains.
-
customers.cloudidentityCustomersUserinvitationsSendSends a UserInvitation to email. If the
UserInvitationdoes not exist for this request and it is a valid request, the request creates aUserInvitation. Note: Thegetandlistmethods have a 48-hour delay where newly-created consumer accounts will not appear in the results. You can still send aUserInvitationto those accounts if you know the unmanaged email address and IsInvitableUser==True. -
devices.cloudidentityDevicesCreateCreates a device. Only company-owned device may be created. Note: This method is available only to customers who have one of the following SKUs: Enterprise Standard, Enterprise Plus, Enterprise for Education, and Cloud Identity Premium
-
devices.cloudidentityDevicesDeviceUsersApproveApproves device to access user data.
-
devices.cloudidentityDevicesDeviceUsersBlockBlocks device from accessing user data
-
devices.cloudidentityDevicesDeviceUsersCancelWipeCancels an unfinished user account wipe. This operation can be used to cancel device wipe in the gap between the wipe operation returning success and the device being wiped.
-
devices.cloudidentityDevicesDeviceUsersClientStatesListLists the client states for the given search query.
-
devices.cloudidentityDevicesDeviceUsersListLists/Searches DeviceUsers.
-
devices.cloudidentityDevicesDeviceUsersLookupLooks up resource names of the DeviceUsers associated with the caller's credentials, as well as the properties provided in the request. This method must be called with end-user credentials with the scope: If multiple properties are provided, only DeviceUsers having all of these properties are considered as matches - i.e. the query behaves like an AND. Different platforms require different amounts of information from the caller to ensure that the DeviceUser is uniquely identified. - iOS: No properties need to be passed, the caller's credentials are sufficient to identify the corresponding DeviceUser. - Android: Specifying the 'android_id' field is required. - Desktop: Specifying the 'raw_resource_id' field is required.
-
devices.cloudidentityDevicesDeviceUsersWipeWipes the user's account on a device. Other data on the device that is not associated with the user's work account is not affected. For example, if a Gmail app is installed on a device that is used for personal and work purposes, and the user is logged in to the Gmail app with their personal account as well as their work account, wiping the "deviceUser" by their work administrator will not affect their personal account within Gmail or other apps such as Photos.
-
devices.cloudidentityDevicesListLists/Searches devices.
-
groups.cloudidentityGroupsCreateCreates a Group.
-
groups.cloudidentityGroupsListLists the
Groupresources under a customer or namespace. -
groups.cloudidentityGroupsLookupLooks up the of a
Groupby itsEntityKey. -
groups.cloudidentityGroupsMembershipsCheckTransitiveMembershipCheck a potential member for membership in a group. Note: This feature is only available to Google Workspace Enterprise Standard, Enterprise Plus, and Enterprise for Education; and Cloud Identity Premium accounts. If the account of the member is not one of these, a 403 (PERMISSION_DENIED) HTTP status code will be returned. A member has membership to a group as long as there is a single viewable transitive membership between the group and the member. The actor must have view permissions to at least one transitive membership between the member and group.
-
groups.cloudidentityGroupsMembershipsCreateCreates a
Membership. -
groups.cloudidentityGroupsMembershipsGetMembershipGraphGet a membership graph of just a member or both a member and a group. Note: This feature is only available to Google Workspace Enterprise Standard, Enterprise Plus, and Enterprise for Education; and Cloud Identity Premium accounts. If the account of the member is not one of these, a 403 (PERMISSION_DENIED) HTTP status code will be returned. Given a member, the response will contain all membership paths from the member. Given both a group and a member, the response will contain all membership paths between the group and the member.
-
groups.cloudidentityGroupsMembershipsListLists the
Memberships within aGroup. -
groups.cloudidentityGroupsMembershipsLookupLooks up the of a
Membershipby itsEntityKey. -
groups.cloudidentityGroupsMembershipsModifyMembershipRolesModifies the
MembershipRoles of aMembership. -
groups.cloudidentityGroupsMembershipsSearchDirectGroupsSearches direct groups of a member.
-
groups.cloudidentityGroupsMembershipsSearchTransitiveGroupsSearch transitive groups of a member. Note: This feature is only available to Google Workspace Enterprise Standard, Enterprise Plus, and Enterprise for Education; and Cloud Identity Premium accounts. If the account of the member is not one of these, a 403 (PERMISSION_DENIED) HTTP status code will be returned. A transitive group is any group that has a direct or indirect membership to the member. Actor must have view permissions all transitive groups.
-
groups.cloudidentityGroupsMembershipsSearchTransitiveMembershipsSearch transitive memberships of a group. Note: This feature is only available to Google Workspace Enterprise Standard, Enterprise Plus, and Enterprise for Education; and Cloud Identity Premium accounts. If the account of the group is not one of these, a 403 (PERMISSION_DENIED) HTTP status code will be returned. A transitive membership is any direct or indirect membership of a group. Actor must have view permissions to all transitive memberships.
-
groups.cloudidentityGroupsSearchSearches for
Groupresources matching a specified query. -
inboundSamlSsoProfiles.cloudidentityInboundSamlSsoProfilesCreateCreates an InboundSamlSsoProfile for a customer.
-
inboundSamlSsoProfiles.cloudidentityInboundSamlSsoProfilesIdpCredentialsAddAdds an IdpCredential. Up to 2 credentials are allowed.
-
inboundSamlSsoProfiles.cloudidentityInboundSamlSsoProfilesIdpCredentialsListReturns a list of IdpCredentials in an InboundSamlSsoProfile.
-
inboundSamlSsoProfiles.cloudidentityInboundSamlSsoProfilesListLists InboundSamlSsoProfiles for a customer.
-
inboundSsoAssignments.cloudidentityInboundSsoAssignmentsCreateCreates an InboundSsoAssignment for users and devices in a
Customerunder a givenGrouporOrgUnit. -
inboundSsoAssignments.cloudidentityInboundSsoAssignmentsDeleteDeletes an InboundSsoAssignment. To disable SSO, Create (or Update) an assignment that has
sso_mode==SSO_OFF. -
inboundSsoAssignments.cloudidentityInboundSsoAssignmentsGetGets an InboundSsoAssignment.
-
inboundSsoAssignments.cloudidentityInboundSsoAssignmentsListLists the InboundSsoAssignments for a
Customer. -
inboundSsoAssignments.cloudidentityInboundSsoAssignmentsPatchUpdates an InboundSsoAssignment. The body of this request is the
inbound_sso_assignmentfield and theupdate_maskis relative to that. For example: a PATCH to/v1/inboundSsoAssignments/0abcdefg1234567&update_mask=rankwith a body of{ "rank": 1 }moves that (presumably group-targeted) SSO assignment to the highest priority and shifts any other group-targeted assignments down in priority. -
openapi.previewSpecPreview an OpenAPI document before adding it as a source
-
openapi.addSourceAdd an OpenAPI source and register its operations as tools