---
title: Getting Started with Datadog
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: Docs > Infrastructure > Datadog Resource Catalog
---

# gcp_accessapproval_access_approval_settings{% #gcp_accessapproval_access_approval_settings %}

## `active_key_version`{% #active_key_version %}

**Type**: `STRING`**Provider name**: `activeKeyVersion`**Description**: The asymmetric crypto key version to use for signing approval requests. Empty active_key_version indicates that a Google-managed key should be used for signing. This property will be ignored if set by an ancestor of this resource, and new non-empty values may not be set.

## `ancestor_has_active_key_version`{% #ancestor_has_active_key_version %}

**Type**: `BOOLEAN`**Provider name**: `ancestorHasActiveKeyVersion`**Description**: Output only. This field is read only (not settable via UpdateAccessApprovalSettings method). If the field is true, that indicates that an ancestor of this Project or Folder has set active_key_version (this field will always be unset for the organization since organizations do not have ancestors).

## `ancestors`{% #ancestors %}

**Type**: `UNORDERED_LIST_STRING`

## `approval_policy`{% #approval_policy %}

**Type**: `STRUCT`**Provider name**: `approvalPolicy`**Description**: Optional. Policy for approval. This contains all policies.

- `justification_based_approval_policy`**Type**: `STRING`**Provider name**: `justificationBasedApprovalPolicy`**Description**: Optional. Policy for approval based on the justification given.**Possible values**:
  - `JUSTIFICATION_BASED_APPROVAL_POLICY_UNSPECIFIED` - Default value for proto.
  - `JUSTIFICATION_BASED_APPROVAL_ENABLED_ALL` - Instant approval is enabled for all accesses.
  - `JUSTIFICATION_BASED_APPROVAL_ENABLED_EXTERNAL_JUSTIFICATIONS` - Instant approval is enabled for external justifications.
  - `JUSTIFICATION_BASED_APPROVAL_NOT_ENABLED` - Instant approval is not enabled for any accesses.
  - `JUSTIFICATION_BASED_APPROVAL_INHERITED` - Instant approval is inherited from the parent.

## `effective_approval_policy`{% #effective_approval_policy %}

**Type**: `STRUCT`**Provider name**: `effectiveApprovalPolicy`**Description**: Output only. Policy for approval included inherited settings to understand the exact policy applied to this resource. This is a read-only field.

- `justification_based_approval_policy`**Type**: `STRING`**Provider name**: `justificationBasedApprovalPolicy`**Description**: Optional. Policy for approval based on the justification given.**Possible values**:
  - `JUSTIFICATION_BASED_APPROVAL_POLICY_UNSPECIFIED` - Default value for proto.
  - `JUSTIFICATION_BASED_APPROVAL_ENABLED_ALL` - Instant approval is enabled for all accesses.
  - `JUSTIFICATION_BASED_APPROVAL_ENABLED_EXTERNAL_JUSTIFICATIONS` - Instant approval is enabled for external justifications.
  - `JUSTIFICATION_BASED_APPROVAL_NOT_ENABLED` - Instant approval is not enabled for any accesses.
  - `JUSTIFICATION_BASED_APPROVAL_INHERITED` - Instant approval is inherited from the parent.

## `enrolled_ancestor`{% #enrolled_ancestor %}

**Type**: `BOOLEAN`**Provider name**: `enrolledAncestor`**Description**: Output only. This field is read only (not settable via UpdateAccessApprovalSettings method). If the field is true, that indicates that at least one service is enrolled for Access Approval in one or more ancestors of the Project or Folder (this field will always be unset for the organization since organizations do not have ancestors).

## `enrolled_services`{% #enrolled_services %}

**Type**: `UNORDERED_LIST_STRUCT`**Provider name**: `enrolledServices`**Description**: A list of Google Cloud Services for which the given resource has Access Approval enrolled. Access requests for the resource given by name against any of these services contained here will be required to have explicit approval. If name refers to an organization, enrollment can be done for individual services. If name refers to a folder or project, enrollment can only be done on an all or nothing basis. If a cloud_product is repeated in this list, the first entry will be honored and all following entries will be discarded. A maximum of 10 enrolled services will be enforced, to be expanded as the set of supported services is expanded.

- `cloud_product`**Type**: `STRING`**Provider name**: `cloudProduct`**Description**: The product for which Access Approval will be enrolled. Allowed values are listed below (case-sensitive): * all * GA * App Engine * Artifact Registry * BigQuery * Certificate Authority Service * Cloud Bigtable * Cloud Key Management Service * Compute Engine * Cloud Composer * Cloud Dataflow * Cloud Dataproc * Cloud DLP * Cloud EKM * Cloud Firestore * Cloud HSM * Cloud Identity and Access Management * Cloud Logging * Cloud NAT * Cloud Pub/Sub * Cloud Spanner * Cloud SQL * Cloud Storage * Eventarc * Google Kubernetes Engine * Organization Policy Serivice * Persistent Disk * Resource Manager * Secret Manager * Speaker ID Note: These values are supported as input for legacy purposes, but will not be returned from the API. * all * ga-only * appengine.googleapis.com * artifactregistry.googleapis.com * bigquery.googleapis.com * bigtable.googleapis.com * container.googleapis.com * cloudkms.googleapis.com * cloudresourcemanager.googleapis.com * cloudsql.googleapis.com * compute.googleapis.com * dataflow.googleapis.com * dataproc.googleapis.com * dlp.googleapis.com * iam.googleapis.com * logging.googleapis.com * orgpolicy.googleapis.com * pubsub.googleapis.com * spanner.googleapis.com * secretmanager.googleapis.com * speakerid.googleapis.com * storage.googleapis.com Calls to UpdateAccessApprovalSettings using 'all' or any of the XXX.googleapis.com will be translated to the associated product name ('all', 'App Engine', etc.). Note: 'all' will enroll the resource in all products supported at both 'GA' and 'Preview' levels. More information about levels of support is available at [https://cloud.google.com/access-approval/docs/supported-services](https://cloud.google.com/access-approval/docs/supported-services)
- `enrollment_level`**Type**: `STRING`**Provider name**: `enrollmentLevel`**Description**: The enrollment level of the service.**Possible values**:
  - `ENROLLMENT_LEVEL_UNSPECIFIED` - Default value for proto, shouldn't be used.
  - `BLOCK_ALL` - Service is enrolled in Access Approval for all requests

## `invalid_key_version`{% #invalid_key_version %}

**Type**: `BOOLEAN`**Provider name**: `invalidKeyVersion`**Description**: Output only. This field is read only (not settable via UpdateAccessApprovalSettings method). If the field is true, that indicates that there is some configuration issue with the active_key_version configured at this level in the resource hierarchy (e.g. it doesn't exist or the Access Approval service account doesn't have the correct permissions on it, etc.) This key version is not necessarily the effective key version at this level, as key versions are inherited top-down.

## `labels`{% #labels %}

**Type**: `UNORDERED_LIST_STRING`

## `name`{% #name %}

**Type**: `STRING`**Provider name**: `name`**Description**: The resource name of the settings. Format is one of: * "projects/{project}/accessApprovalSettings" * "folders/{folder}/accessApprovalSettings" * "organizations/{organization}/accessApprovalSettings"

## `notification_emails`{% #notification_emails %}

**Type**: `UNORDERED_LIST_STRING`**Provider name**: `notificationEmails`**Description**: A list of email addresses to which notifications relating to approval requests should be sent. Notifications relating to a resource will be sent to all emails in the settings of ancestor resources of that resource. A maximum of 50 email addresses are allowed.

## `notification_pubsub_topic`{% #notification_pubsub_topic %}

**Type**: `STRING`**Provider name**: `notificationPubsubTopic`**Description**: Optional. A pubsub topic to which notifications relating to approval requests should be sent.

## `organization_id`{% #organization_id %}

**Type**: `STRING`

## `parent`{% #parent %}

**Type**: `STRING`

## `prefer_no_broad_approval_requests`{% #prefer_no_broad_approval_requests %}

**Type**: `BOOLEAN`**Provider name**: `preferNoBroadApprovalRequests`**Description**: This preference is communicated to Google personnel when sending an approval request but can be overridden if necessary.

## `preferred_request_expiration_days`{% #preferred_request_expiration_days %}

**Type**: `INT32`**Provider name**: `preferredRequestExpirationDays`**Description**: This preference is shared with Google personnel, but can be overridden if said personnel deems necessary. The approver ultimately can set the expiration at approval time.

## `project_id`{% #project_id %}

**Type**: `STRING`

## `project_number`{% #project_number %}

**Type**: `STRING`

## `region_id`{% #region_id %}

**Type**: `STRING`

## `request_scope_max_width_preference`{% #request_scope_max_width_preference %}

**Type**: `STRING`**Provider name**: `requestScopeMaxWidthPreference`**Description**: Optional. A setting to indicate the maximum width of an Access Approval request.**Possible values**:

- `REQUEST_SCOPE_MAX_WIDTH_PREFERENCE_UNSPECIFIED` - Default value for proto, shouldn't be used.
- `ORGANIZATION` - This is the widest scope possible. It means the customer has no scope restriction when it comes to Access Approval requests.
- `FOLDER` - Customer allows the scope of Access Approval requests as broad as the Folder level.
- `PROJECT` - Customer allows the scope of Access Approval requests as broad as the Project level.

## `require_customer_visible_justification`{% #require_customer_visible_justification %}

**Type**: `BOOLEAN`**Provider name**: `requireCustomerVisibleJustification`**Description**: Optional. A setting to require approval request justifications to be customer visible.

## `resource_name`{% #resource_name %}

**Type**: `STRING`

## `tags`{% #tags %}

**Type**: `UNORDERED_LIST_STRING`

## `zone_id`{% #zone_id %}

**Type**: `STRING`
