.TH "GCLOUD_ACCESS\-CONTEXT\-MANAGER_AUTHORIZED\-ORGS_CREATE" 1 .SH "NAME" .HP gcloud access\-context\-manager authorized\-orgs create \- create a new authorized organizations description .SH "SYNOPSIS" .HP \f5gcloud access\-context\-manager authorized\-orgs create\fR (\fIAUTHORIZED_ORGS_DESC\fR\ :\ \fB\-\-policy\fR=\fIPOLICY\fR) \fB\-\-asset_type\fR=\fIASSET_TYPE\fR \fB\-\-authorization_direction\fR=\fIAUTHORIZATION_DIRECTION\fR \fB\-\-authorization_type\fR=\fIAUTHORIZATION_TYPE\fR [\fB\-\-async\fR] [\fB\-\-orgs\fR=[\fIORGS\fR,...]] [\fIGCLOUD_WIDE_FLAG\ ...\fR] .SH "DESCRIPTION" Create a new authorized organizations description in a given access policy. .SH "EXAMPLES" To create a new authorized organizations description: .RS 2m $ gcloud access\-context\-manager authorized\-orgs create \e \-\-orgs=organizations/12345 \-\-policy=9876543 .RE .SH "POSITIONAL ARGUMENTS" .RS 2m .TP 2m Authorized orgs desc resource \- The authorized organizations description to create. The arguments in this group can be used to specify the attributes of this resource. This must be specified. .RS 2m .TP 2m \fIAUTHORIZED_ORGS_DESC\fR ID of the authorized\-orgs\-desc or fully qualified identifier for the authorized\-orgs\-desc. To set the \f5authorized_orgs_desc\fR attribute: .RS 2m .IP "\(bu" 2m provide the argument \f5authorized_orgs_desc\fR on the command line. .RE .sp This positional argument must be specified if any of the other arguments in this group are specified. .TP 2m \fB\-\-policy\fR=\fIPOLICY\fR The ID of the access policy. To set the \f5policy\fR attribute: .RS 2m .IP "\(bu" 2m provide the argument \f5authorized_orgs_desc\fR on the command line with a fully specified name; .IP "\(bu" 2m provide the argument \f5\-\-policy\fR on the command line; .IP "\(bu" 2m set the property \f5access_context_manager/policy\fR; .IP "\(bu" 2m automatically, if the current account belongs to an organization with exactly one access policy.. .RE .sp .RE .RE .sp .SH "REQUIRED FLAGS" .RS 2m .TP 2m \fB\-\-asset_type\fR=\fIASSET_TYPE\fR The asset type of this authorized organizations description. For example, device, or credential strength. \fIASSET_TYPE\fR must be one of: \fBasset\-type\-credential\-strength\fR, \fBasset\-type\-device\fR, \fBasset\-type\-unspecified\fR. .TP 2m \fB\-\-authorization_direction\fR=\fIAUTHORIZATION_DIRECTION\fR Authorization direction of this authorization relationship. Specifies whether to allow specified organizations to evaluate this organization's traffic, or allow specified organizations traffic to be evaluated by this org. \fIAUTHORIZATION_DIRECTION\fR must be one of: \fBauthorization\-direction\-from\fR, \fBauthorization\-direction\-to\fR, \fBauthorization\-direction\-unspecified\fR. .TP 2m \fB\-\-authorization_type\fR=\fIAUTHORIZATION_TYPE\fR The authorization type of the authorized organizations description. For example, trust, troubleshooting or logging. \fIAUTHORIZATION_TYPE\fR must be one of: \fBauthorization\-type\-trust\fR, \fBauthorization\-type\-unspecified\fR. .RE .sp .SH "OPTIONAL FLAGS" .RS 2m .TP 2m \fB\-\-async\fR Return immediately, without waiting for the operation in progress to complete. .TP 2m \fB\-\-orgs\fR=[\fIORGS\fR,...] Comma\-separated list of organizations (in the following format: \f5organizations/\fR). .RE .sp .SH "GCLOUD WIDE FLAGS" These flags are available to all commands: \-\-access\-token\-file, \-\-account, \-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten, \-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http, \-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled, \-\-verbosity. Run \fB$ gcloud help\fR for details. .SH "API REFERENCE" This command uses the \fBaccesscontextmanager/v1\fR API. The full documentation for this API can be found at: https://cloud.google.com/access\-context\-manager/docs/reference/rest/ .SH "NOTES" This variant is also available: .RS 2m $ gcloud alpha access\-context\-manager authorized\-orgs create .RE