Removing authorizations between services
Use IBM Cloud® Identity and Access Management (IAM) to remove an authorization that removes IBM Cloud Logs access to work with other services.
Removing an authorization in the console
You can remove any authorization between services in the account if you are assigned the Administrator
role on the target service. If you remove any access policies created by the source service for its dependent services, the source
service is unable to complete the workflow or access the target service.
- In the IBM Cloud console, click Manage > Access (IAM), and select Authorizations.
- Identify the row for the authorization that you want to remove from the account.
- Click the Actions icon > Remove.
- Select Remove.
If the source service is removed from the account, any policies that are created by that service for its dependent services are deleted automatically. Similarly, if the dependent service is removed from the account, any access policies that are delegated to that service are also deleted.
Removing an authorization by using the CLI
You can remove any authorization between services in the account if you are assigned the Administrator
role on the target service. If you remove any access policies created by the source service for its dependent services, the source
service is unable to complete the workflow or access the target service.
The following sample deletes an authorization policy:
ibmcloud iam authorization-policy-delete AUTHORIZATION_POLICY_ID
For more information about all of the parameters that are available for this command, see ibmcloud iam authorization-policy-delete.
If the source service is removed from the account, any policies that are created by that service for its dependent services are deleted automatically. Similarly, if the dependent service is removed from the account, any access policies that are delegated to that service are also deleted.
Removing an authorization by using the API
You can remove any authorization between services in the account if you are assigned the Administrator
role on the target service. If you remove any access policies created by the source service for its dependent services, the source
service is unable to complete the workflow or access the target service.
To delete an authorization policy, use the IAM Policy Management API as in the following sample request:
curl -X DELETE 'https://iam.cloud.ibm.com/v1/policies/$POLICY_ID' \
-H 'Authorization: Bearer $TOKEN' \
-H 'Content-Type: application/json'
DeletePolicyOptions options = new DeletePolicyOptions.Builder()
.policyId(examplePolicyId)
.build();
service.deletePolicy(options).execute();
const params = {
policyId: examplePolicyId,
};
iamPolicyManagementService.deletePolicy(params)
.then(res => {
console.log(JSON.stringify(res, null, 2));
})
.catch(err => {
console.warn(err)
});
response = iam_policy_management_service.delete_policy(
policy_id=example_policy_id
).get_result()
print(json.dumps(response, indent=2))
options := iamPolicyManagementService.NewDeletePolicyOptions(
examplePolicyID,
)
response, err := iamPolicyManagementService.DeletePolicy(options)
if err != nil {
panic(err)
}
If the source service is removed from the account, any policies that are created by that service for its dependent services are deleted automatically. Similarly, if the dependent service is removed from the account, any access policies that are delegated to that service are also deleted.
Removing an authorization by using Terraform
If you want to remove an authorization by using Terraform, you need to delete the ibm_iam_authorization_policy
resource from the main.tf
file. After you delete the resource, provision your file by using the following
steps:
-
Run
terraform plan
to generate a Terraform execution plan to preview the proposed actions.terraform plan
-
Run
terraform apply
to create the resources that are defined in the plan.terraform apply