.TH "GCLOUD_AI\-PLATFORM_MODELS_ADD\-IAM\-POLICY\-BINDING" 1 .SH "NAME" .HP gcloud ai\-platform models add\-iam\-policy\-binding \- add IAM policy binding for a model .SH "SYNOPSIS" .HP \f5gcloud ai\-platform models add\-iam\-policy\-binding\fR \fIMODEL\fR \fB\-\-member\fR=\fIPRINCIPAL\fR \fB\-\-role\fR=\fIROLE\fR [\fB\-\-region\fR=\fIREGION\fR] [\fIGCLOUD_WIDE_FLAG\ ...\fR] .SH "DESCRIPTION" Add IAM policy binding to a model. .SH "EXAMPLES" To add an IAM policy binding for the role of \f5roles/ml.admin\fR for the user \f5test\-user@gmail.com\fR on a model with identifier \f5my_model\fR, run: .RS 2m $ gcloud ai\-platform models add\-iam\-policy\-binding my_model \e \-\-member='user:test\-user@gmail.com' \-\-role='roles/ml.admin' .RE To add an IAM policy binding for the role of \f5roles/ml.admin\fR to the service account \f5test\-proj1@example.domain.com\fR, run: .RS 2m $ gcloud ai\-platform models add\-iam\-policy\-binding my_model \e \-\-member='serviceAccount:test\-proj1@example.domain.com' \e \-\-role='roles/ml.admin' .RE To add an IAM policy binding for the role of \f5roles/ml.admin\fR for all authenticated users on a model with identifier \f5my_model\fR, run: .RS 2m $ gcloud ai\-platform models add\-iam\-policy\-binding my_model \e \-\-member='allAuthenticatedUsers' \-\-role='roles/ml.admin' .RE See https://cloud.google.com/iam/docs/managing\-policies for details of policy role and principal types. .SH "POSITIONAL ARGUMENTS" .RS 2m .TP 2m \fIMODEL\fR Name of the model. .RE .sp .SH "REQUIRED FLAGS" .RS 2m .TP 2m \fB\-\-member\fR=\fIPRINCIPAL\fR The principal to add the binding for. Should be of the form \f5user|group|serviceAccount:email\fR or \f5domain:domain\fR. Examples: \f5user:test\-user@gmail.com\fR, \f5group:admins@example.com\fR, \f5serviceAccount:test123@example.domain.com\fR, or \f5domain:example.domain.com\fR. Some resources also accept the following special values: .RS 2m .IP "\(em" 2m \f5allUsers\fR \- Special identifier that represents anyone who is on the internet, with or without a Google account. .IP "\(em" 2m \f5allAuthenticatedUsers\fR \- Special identifier that represents anyone who is authenticated with a Google account or a service account. .RE .sp .TP 2m \fB\-\-role\fR=\fIROLE\fR Role name to assign to the principal. The role name is the complete path of a predefined role, such as \f5roles/logging.viewer\fR, or the role ID for a custom role, such as \f5organizations/{ORGANIZATION_ID}/roles/logging.viewer\fR. .RE .sp .SH "OPTIONAL FLAGS" .RS 2m .TP 2m \fB\-\-region\fR=\fIREGION\fR Google Cloud region of the regional endpoint to use for this command. For the global endpoint, the region needs to be specified as \f5global\fR. Learn more about regional endpoints and see a list of available regions: https://cloud.google.com/ai\-platform/prediction/docs/regional\-endpoints \fIREGION\fR must be one of: \fBglobal\fR, \fBasia\-east1\fR, \fBasia\-northeast1\fR, \fBasia\-southeast1\fR, \fBaustralia\-southeast1\fR, \fBeurope\-west1\fR, \fBeurope\-west2\fR, \fBeurope\-west3\fR, \fBeurope\-west4\fR, \fBnorthamerica\-northeast1\fR, \fBus\-central1\fR, \fBus\-east1\fR, \fBus\-east4\fR, \fBus\-west1\fR. .RE .sp .SH "GCLOUD WIDE FLAGS" These flags are available to all commands: \-\-access\-token\-file, \-\-account, \-\-billing\-project, \-\-configuration, \-\-flags\-file, \-\-flatten, \-\-format, \-\-help, \-\-impersonate\-service\-account, \-\-log\-http, \-\-project, \-\-quiet, \-\-trace\-token, \-\-user\-output\-enabled, \-\-verbosity. Run \fB$ gcloud help\fR for details. .SH "NOTES" These variants are also available: .RS 2m $ gcloud alpha ai\-platform models add\-iam\-policy\-binding .RE .RS 2m $ gcloud beta ai\-platform models add\-iam\-policy\-binding .RE