We have enabled Privileged Access Manager (PAM) at the organization level, including assigning the roles/privilegedaccessmanager.serviceAgent role to our PAM org service account. Based on the documentation ([see here]), my understanding is that enabling PAM at the organization level should automatically enable it for all projects under the organization.
However, this doesn't seem to be happening. Even after waiting several hours, PAM is not enabled on individual projects unless I manually visit the PAM page of a specific project, which then triggers the API to activate.
Has anyone encountered this issue before? Is there a way to force PAM to enable across all projects without manually visiting each one or explicitly having to enable the API in each project? Any suggestions on troubleshooting or potential workarounds would be greatly appreciated!
nit: can't seem to assign the Identity & Access Management (IAM) label
Hi @bgigs,
Welcome to Google Cloud Community!
I understand the difficulties you’re facing. In principle, activating Privileged Access Manager (PAM) at the organization level should affect all projects, but it seems that isn't occurring automatically. This may result from API propagation lags, IAM role assignments not cascading, or an organizational policy that mandates specific activation for each project.
Quick Fixes & Workarounds:
1. Check if PAM is enabled for a project:
gcloud services list --enabled --project PROJECT_ID
2. Manually enable it for all projects (if needed):
PROJECTS=$(gcloud projects list --format="value(projectId)")
for PROJECT in $PROJECTS; do
gcloud services enable privilegedaccessmanager.googleapis.com --project $PROJECT
done
3. Confirm IAM permissions for the PAM service account at both org and project levels.
4. Check org policies that might be blocking automatic enablement:
gcloud org-policies list --organization ORGANIZATION_ID
While PAM should be enable automatically across all projects, it seems like manual activation is currently required. Using the bulk API enablement script can help automate this process. If the issue persists, Google Cloud Support may provide further insights.
Was this helpful? If so, please accept this answer as “Solution”. If you need additional assistance, reply here within 2 business days and I’ll be happy to help.
Thanks for the reply @greb! Much appreciate it.
As far as I can tell, we don't have any org policies that are blocking automatic enablement.
Unfortunately, I lack the permissions to enable the API on all projects. Hence, we decided to contact Google Support and they are currently investigating the issue.