GAM/wiki/Users-Drive-Permissions.md
2025-11-19 18:14:37 -08:00

31 KiB

Users - Drive - Permissions

API documentation

Definitions

<DomainName> ::= <String>(.<String>)+
<EmailAddress> ::= <String>@<DomainName>
<JSONData> ::= (json [charset <Charset>] <String>) | (json file <FileName> [charset <Charset>]) |
<UniqueID> ::= id:<String>
<UserItem> ::= <EmailAddress>|<UniqueID>|<String>

<DriveFileOrderByFieldName> ::=
        createddate|createdtime|
        folder|
        lastviewedbyme|lastviewedbymedate|lastviewedbymetime|lastviewedbyuser|
        modifiedbyme|modifiedbymedate|modifiedbymetime|modifiedbyuser|
        modifieddate|modifiedtime|
        name|
        name_natural|
        quotabytesused|quotaused|
        recency|
        sharedwithmedate|sharedwithmetime|
        starred|
        title|
        title_natural|
        viewedbymedate|viewedbymetime

<DrivePermissionsFieldName> ::=
        additionalroles|
        allowfilediscovery|
        basicpermissions|
        deleted|
        displayname|
        domain|
        emailaddress|
        expirationdate|
        expirationtime|
        id|
        name|
        pendingowner|
        permissiondetails|
        photolink|
        role|
        type|
        view|
        withlink
<DrivePermissionsFieldNameList> ::= "<DrivePermissionsFieldName>(,<DrivePermissionsFieldName>)*"

basicpermissions is equivalent to:

permissions.allowFileDiscovery,
permissions.deleted,
permissions.domain,
permissions.emailAddress,
permissions.expirationTime,
permissions.id,
permissions.role,
permissions.type

In particular, this omits these fields:

permissions.displayName,
permissions.permissionDetails,
permissions.photoLink,
permissions.teamDrivePermissionDetails

This allows you to select the essential permission fields without enumerating them. Of course, you can specify permissions to get all of the fields, enumerate the specific fields you want or specify basicpermissions and additional permission fields, e.g., permissions.displayName.

<DriveOrderByFieldName> ::=
        createddate|createdtime|
        folder|
        modifiedbyme|modifiedbymedate|modifiedbymetime|modifiedbyuser|
        modifieddate|modifiedtime|
        name|
        name_natural|
        quotabytesused|quotaused|
        recency|
        sharedwithmedate|sharedwithmetime|
        starred|
        title|
        title_natural|
        viewedbymedate|viewedbymetime
<DriveFileACLRole> ::=
        manager|organizer|owner|
        contentmanager|fileorganizer|
        contributor|writer|editor|
        commenter|
        viewer|reader
<DriveFileACLRoleList> ::= "<DriveFileACLRole>(,<DriveFileACLRole>)*"
<DriveFileACLType> ::= anyone|domain|group|user
<DriveFileACLTypeList> ::= "<DriveFileACLType>(,<DriveFileACLType>)*"
<DriveFilePermissionID> ::=
        anyone|anyonewithlink|id:<String>
<DriveFilePermissionIDorEmail> ::=
        <DriveFilePermissionID>|<EmailAddress>
<DriveFilePermissionIDList> ::=
        "<DriveFilePermissionID>(,<DriveFilePermissionID>)*"
<DriveFilePermissionIDEntity> ::=
         <DriveFilePermissionIDList> |
         (json [charset <Charset>] <JSONData>)|(json file <FileName> [charset <Charset>]) |
         <FileSelector> | <CSVFileSelector> | <CSVkmdSelector> | <CSVDataSelector>
        See: https://github.com/GAM-team/GAM/wiki/Collections-of-Items
	<DriveFilePermission> ::=
        anyone;<DriveFileACLRole> | 
        anyonewithlink;<DriveFileACLRole> |
        domain:<DomainName>;<DriveFileACLRole> |
        domainwithlink:<DomainName>;<DriveFileACLRole> |
        group:<EmailAddress>;<DriveFileACLRole> |
        user:<EmailAddress>;<DriveFileACLRole>
<DriveFilePermissionList> ::=
        "<DriveFilePermission>(,<DriveFilePermission)*"
<DriveFilePermissionEntity> ::=
         <DriveFilePermissionList> |
         (json [charset <Charset>] <JSONData>)|(json file <FileName> [charset <Charset>]) |
         <FileSelector> | <CSVFileSelector> | <CSVkmdSelector> | <CSVDataSelector>
        See: https://github.com/GAM-team/GAM/wiki/Collections-of-Items

GUI API permission name mapping

GUI setting API setting
Manager organizer
Content manager fileOrganizer
Contributor writer
Commenter commenter
Viewer reader

Manage file permissions/sharing

Process single ACLs.

Create

gam <UserTypeEntity> create|add drivefileacl <DriveFileEntity>
        anyone|(user <UserItem>)|(group <GroupItem>)|(domain <DomainName>) (role <DriveFileACLRole>)
        [withlink|(allowfilediscovery|discoverable [<Boolean>])] [expiration <Time>]
        (mappermissionsdomain <DomainName> <DomainName>)*
        [movetonewownersroot [<Boolean>]]
        [sendemail] [emailmessage <String>]
        [updatesheetprotectedranges [<Boolean>]]
        [showtitles] [nodetails|(csv [todrive <ToDriveAttribute>*] [formatjson [quotechar <Character>]])]

The option mappermissionsdomain <DomainName1> <DomainName2> maps <DomainName1> to <DomainName2> in the user <UserItem>)|(group <GroupItem>)|(domain <DomainName>) options; <UserItem> and <GroupItem> must specify email addresses for the mapping to succeed. The option can be specified multiple times to provide different mappings. This option will be most useful when reading a CSV file containing ACLs referencing <DomainName1> and you want a new ACL with the same options but in <DomainName2>.

From the Google Drive API documentation.

  • movetonewownersroot - This parameter only takes effect if the item is not in a shared drive and the request is attempting to transfer the ownership of the item.
    • false - Parents are not changed. The file is an orphan for the new owner. This is the default.
    • true - The item is moved to the new owner's My Drive root folder and all prior parents removed. The file is in Shared with me for the old owner.

To transfer ownership of a file/folder and place it in a specific folder on the new owner's My Drive, do:

gam <UserTypeEntity> transfer ownership <DriveFileEntity> <UserItem> 
        [<DriveFileParentAttribute>] norecursion

See: https://github.com/GAM-team/GAM/wiki/Users-Drive-Ownership#transfer-ownership-of-files-that-a-source-user-owns-to-a-target-user

If you specify role owner, Google requires that a notification message be sent to the new owner. Google sends a preformatted message, use emailmessage <String> to include additional information in the message.

If you get the following error message from Google:

You are trying to invite user@domain.com. Since there is no Google account associated with this email address, you must check the "Notify people" box to invite this recipient."

Use the sendemail option and emailmessage <String> (if desired) to check the "Notify people" box.

The options withlink|allowfilediscovery|discoverable are only valid for ACLs to anyone or domain.

The option expiration <Time> is only valid for role commenter|contributor|viewer for files and commenter|viewer for folders. <Time> can not be more that one year in the future.

The option updatesheetprotectedranges only applies to items in <DriveFileEntity> that are Google Sheets.

  • updatesheetprotectedranges false or option omitted
    • Sheet Protected Ranges are not updated
  • updatesheetprotectedranges or updatesheetprotectedranges true
    • Sheet Protected Ranges are updated to reflect the new ACL; additional API calls are required.
      • ACLs with role reader or commenter will not be added to protected ranges
      • ACLs with role writer or higher will be added to existing protected ranges

By default, the file ID is displayed in the output; to see the file name, use the showtitles option; this requires an additional API call per file.

By default, when an ACL is created, GAM outputs details of the ACL as indented keywords and values.

  • nodetails - Suppress the details output.
  • csv [todrive <ToDriveAttribute>*] [formatjson [quotechar <Character>]] - Output the details in CSV format.

Update

gam <UserTypeEntity> update drivefileacl <DriveFileEntity> <DriveFilePermissionIDorEmail>
        (role <DriveFileACLRole>) [expiration <Time>] [removeexpiration [<Boolean>]]
        [updatesheetprotectedranges [<Boolean>]] [enforceexpansiveaccess [<Boolean>]]
        [showtitles] [nodetails|(csv [todrive <ToDriveAttribute>*] [formatjson [quotechar <Character>]])]

There is no change of parents when a new user is updated to be a file's owner.

The option expiration <Time> is only valid for role commenter|contributor|viewer for files and commenter|viewer for folders. <Time> can not be more that one year in the future.

The option updatesheetprotectedranges only applies to items in <DriveFileEntity> that are Google Sheets.

  • updatesheetprotectedranges false or option omitted
    • Sheet Protected Ranges are not updated
  • updatesheetprotectedranges or updatesheetprotectedranges true
    • Sheet Protected Ranges are updated to reflect the updated ACL; additional API calls are required.
      • ACLs with role reader or commenter will be removed from existing protected ranges
      • ACLs with role writer or higher will be added to existing protected ranges

enforceexpansiveaccess defaults to the value of gam.cfg/enforce_expansive_access that controls the ability to update inherited ACLs.

  • False - Inherited ACLs can be updated
  • True = Inherited ACLs can not be updated

By default, the file ID is displayed in the output; to see the file name, use the showtitles option; this requires an additional API call per file.

By default, when an ACL is updated, GAM outputs details of the ACL as indented keywords and values.

  • nodetails - Suppress the details output.
  • csv [todrive <ToDriveAttribute>*] [formatjson [quotechar <Character>]] - Output the details in CSV format.

Delete

gam <UserTypeEntity> delete|del drivefileacl <DriveFileEntity> <DriveFilePermissionIDorEmail>
        [updatesheetprotectedranges [<Boolean>]] [enforceexpansiveaccess [<Boolean>]]
        [showtitles]

The option updatesheetprotectedranges only applies to items in <DriveFileEntity> that are Google Sheets.

  • updatesheetprotectedranges false or option omitted
    • Sheet Protected Ranges are not updated
  • updatesheetprotectedranges or updatesheetprotectedranges true
    • Sheet Protected Ranges are updated to reflect the deleted ACL; additional API calls are required.
      • ACLs with any role will be removed from existing protected ranges

enforceexpansiveaccess defaults to the value of gam.cfg/enforce_expansive_access that controls the ability to delete inherited ACLs.

  • False - Inherited ACLs can be deleted
  • True = Inherited ACLs can not be deleted

By default, the file ID is displayed in the output; to see the file name, use the showtitles option; this requires an additional API call per file.

Process multiple ACLs.

Create

gam <UserTypeEntity> create|add permissions <DriveFileEntity> <DriveFilePermissionEntity>
        [expiration <Time>] [sendemail] [emailmessage <String>]
        [movetonewownersroot [<Boolean>]]
        <PermissionMatch>* [<PermissionMatchAction>]

The option expiration <Time> is only valid for role commenter|reader|viewer.

From the Google Drive API documentation.

  • movetonewownersroot - This parameter only takes effect if the item is not in a shared drive and the request is attempting to transfer the ownership of the item.
    • false - Parents are not changed. The file is an orphan for the new owner. This is the default.
    • true - The item is moved to the new owner's My Drive root folder and all prior parents removed. The file is an orphan for the old owner.

If you specify a pernission with role owner, Google requires that a notification message be sent to the new owner. Google sends a preformatted message, use emailmessage <String> to include additional information in the message.

If you get the following error message from Google:

You are trying to invite user@domain.com. Since there is no Google account associated with this email address, you must check the "Notify people" box to invite this recipient."

Use the sendemail option and emailmessage <String> (if desired) to check the "Notify people" box.

Permission matching only applies when the (json [charset <Charset>] <JSONData>)|(json file <FileName> [charset <Charset>]) variant of <DriveFilePermissionEntity> and <DriveFilePermissionIDEntity> is used.

When adding permissions from JSON data, there is a default match: pm not role owner em that disables ownership changes. If you want to process all permissions, enter pm em to clear the default match.

When adding permissions from JSON data, permissions with deleted true are never processed.

Delete

gam <UserTypeEntity> delete permissions <DriveFileEntity> <DriveFilePermissionIDEntity>
        <PermissionMatch>* [<PermissionMatchAction>]
        [enforceexpansiveaccess [<Boolean>]]

enforceexpansiveaccess defaults to the value of gam.cfg/enforce_expansive_access that controls the ability to delete inherited ACLs.

  • False - Inherited ACLs can be deleted
  • True = Inherited ACLs can not be deleted

When deleting permissions from JSON data, permissions with role owner true are never processed.

Display file permissions/sharing

gam <UserTypeEntity> info drivefileacl <DriveFileEntity> <DriveFilePermissionIDorEmail>
        [showtitles] [formatjson]
gam <UserTypeEntity> show drivefileacls <DriveFileEntity>
        (role|roles <DriveFileACLRoleList>)*
        <PermissionMatch>* [<PermissionMatchAction>] [pmselect]
        [includepermissionsforview published]
        [oneitemperrow] [<DrivePermissionsFieldName>*|(fields <DrivePermissionsFieldNameList>)]
        [showtitles|(addtitle <String>)]]
        (orderby <DriveFileOrderByFieldName> [ascending|descending])*
        [formatjson]
gam <UserTypeEntity> print drivefileacls <DriveFileEntity> [todrive <ToDriveAttributes>*]
        (role|roles <DriveFileACLRoleList>)*
        <PermissionMatch>* [<PermissionMatchAction>] [pmselect]
        [includepermissionsforview published]
        [oneitemperrow] [<DrivePermissionsFieldName>*|(fields <DrivePermissionsFieldNameList>)]
        [showtitles|(addtitle <String>)]]
        (orderby <DriveFileOrderByFieldName> [ascending|descending])*
        [formatjson [quotechar <Character>]]

By default, the file ID is displayed in the output; to see the file name, use the showtitles option; this requires an additional API call per file. If you are reading the file IDs from a CSV file that also includes the file name, you can use the addtitle option to supply the file name.

By default, all files specified are displayed; use the following option to select a subset of those files.

  • <PermissionMatch>* [<PermissionMatchAction>] pmselect - Use permission matching to select files

By default, all ACLS are displayed; use the following option to select a subset of the ACLS to display.

  • role|roles <DriveFileACLRoleList> - Display ACLs for the specified roles only.
  • <PermissionMatch>* [<PermissionMatchAction>] - Use permission matching to display a subset of the ACLs for each file; this only applies when pmselect is not specified

With print drivefileacls or show drivefileacls formatjson, the ACLs selected for display are all output on one row/line as a repeating item with the matching file id. When oneitemperrow is specified, each ACL is output on a separate row/line with the matching file id. This simplifies processing the CSV file with subsequent Gam commands.

By default, when writing CSV files, Gam uses a quote character of double quote ". The quote character is used to enclose columns that contain the quote character itself, the column delimiter (comma by default) and new-line characters. Any quote characters within the column are doubled. When using the formatjson option, double quotes are used extensively in the data resulting in hard to read/process output. The quotechar <Character> option allows you to choose an alternate quote character, single quote for instance, that makes for readable/processable output. quotechar defaults to gam.cfg/csv_output_quote_char. When uploading CSV files to Google, double quote " should be used.

For example, to get the ACLs for your Team Drives with the Team Drive name included in the output:

gam redirect csv ./TeamDrives.csv print teamdrives
gam redirect csv ./TeamDriveACLs.csv multiprocess csv ./TeamDrives.csv gam print drivefileacls teamdriveid "~id" addtitle "~name" fields id,domain,emailaddress,role,type,deleted

Delete all ACLs except owner from a file

Get the current ACLs.

gam redirect csv ./Permissions.csv user user@domain.com print drivefileacls <DriveFileID> oneitemperrow

Inspect Permissions.csv, verify that you want to proceed.

gam config csv_input_row_drop_filter "permission.role:regex:(owner)|(organizer)" csv ./Permissions.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"

Delete all ACLs except owner from a user's My Drive

Get the current ACLs.

gam redirect csv ./Permissions.csv user user@domain.com print filelist fields id,name,mimetype,basicpermissions pm not role owner em pmfilter oneitemperrow

Inspect Permissions.csv, verify that you want to proceed.

gam redirect stdout ./DeletePermissions.txt multiprocess redirect stderr stdout csv Permissions.csv.csv gam user "~Owner" delete drivefileacls "~id" "id:~~permission.id~~"

Change shares to User1 to shares to User2

# Get files shared to User1
gam redirect csv ./FilesSharedWithU1.csv user user1@domain.com print filelist choose sharedwithme fields id,name,mimetype,owners.emailaddress
# For each of these files, get the sharing settings for U1
gam redirect csv ./FilesSharedWithU1Settings.csv multiprocess csv FilesSharedWithU1.csv gam user "~owners.0.emailAddress" print drivefileacls "~id" pm emailaddress "~Owner" em
# For each of these files, delete the share to User1
gam redirect stdout ./DeleteU1Sharing.txt multiprocess redirect stderr stdout csv FilesSharedWithU1Settings.csv gam user "~Owner" delete drivefileacl "~id" "~permissions.0.emailAddress"
# For each of these files, add the share to User2 with the same role that User1 had
gam redirect stdout ./AddUser2Sharing.txt multiprocess redirect stderr stdout csv FilesSharedWithU1Settings.csv gam user "~Owner" create drivefileacl "~id" user user2@domain.com role "~permissions.0.role"

Map All ACLs from an old domain to a new domain

  • Get ACLs
gam redirect csv ./allUsersFiles.csv multiprocess all users print filelist fields name,id,basicpermissions oneitemperrow pmfilter pm domain olddomain.com em
  • Delete ACLs with olddomain.com
gam redirect stdout ./DeleteOldDomainACLs.txt multiprocess redirect stderr stdout csv ./allUsersFiles.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"
  • Add user/group ACLs replacing olddomain.com with newdomain.com
gam config csv_input_row_filter "permission.type:regex:user|group" redirect stdout ./AddNewDomainACLsUserGroupShares.txt multiprocess redirect stderr stdout csv ./allUsersFiles.csv gam user "~Owner" create drivefileacl "~id" "~permission.type" "~permission.emailAddress" role "~permission.role" mappermissionsdomain olddomain.com newdomain.com
  • Add domain ACLs replacing olddomain.com with newdomain.com
gam config csv_input_row_filter "permission.type:regex:domain" redirect stdout ./AddNewDomainACLsDomainShares.txt multiprocess redirect stderr stdout csv ./allUsersFiles.csv gam user "~Owner" create drivefileacl "~id" "~permission.type" "~permission.domain" role "~permission.role" allowfilediscovery "~permission.allowFileDiscovery" mappermissionsdomain olddomain.com newdomain.com

Remove ACLs for a specific user or group email address

My Drives

Get My Drive ACLs sharing to that email address:

  • Replace <Type> with user or group
  • Replace email@domain.com with actual email address
gam config auto_batch_min 1 num_threads 20 redirect csv ./MyDriveShares.csv multiprocess redirect stderr - multiprocess all users print filelist fields id,name,mimetype,basicpermissions query "'email@domain.com' in readers or 'email@domain.com' in writers" pm notrole owner type <Type> emailaddress email@domain.com em pmfilter oneitemperrow

Delete those My Drive ACLs.

gam config num_threads 20 redirect stdout ./DeleteMyDriveShares.txt multiprocess redirect stderr stdout csv MyDriveShares.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"

Add My Drive ACLs with a different email address and the same role.

gam config num_threads 20 redirect stdout ./AddMyDriveShares.txt multiprocess redirect stderr stdout csv MyDriveShares.csv gam user "~Owner" add drivefileacl "~id" "~permission.type" newemail@domain.rom role "~permission.role"

Shared Drives

Get an organizer for each Shared Drive

gam redirect csv ./SharedDriveOrganizers.csv print shareddriveorganizers

Get Shared Drive ACLs explicitly sharing to that email address:

  • Replace <Type> with user or group
  • Replace email@domain.com with actual email address
gam config num_threads 20 csv_input_row_filter "organizers:regex:^.+$" redirect csv ./SharedDriveShares.csv multiprocess redirect stderr - multiprocess csv SharedDriveOrganizers.csv gam user "~organizers"  print filelist select shareddriveid "~id" fields id,name,mimetype,basicpermissions,driveid showdrivename query "'email@domain.com' in readers or 'email@domain.com' in writers" pm type <Type> emailaddress email@domain.com inherited false em pmfilter oneitemperrow

Delete those Shared Drive ACLs.

gam config num_threads 20 redirect stdout ./DeleteSharedDriveShares.txt multiprocess redirect stderr stdout csv SharedDriveShares.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"

Add Shared Drive ACLs with a different email address and the same role.

gam config num_threads 20 redirect stdout ./ReplaceSharedDriveShares.txt multiprocess redirect stderr stdout csv SharedDriveShares.csv gam user "~Owner" add drivefileacl "~id" "~permission.type" newemail@domain.rom role "~permission.role"

Remove ACLs for all users-groups in external domains

My Drives

Get My Drive ACLs sharing to external domain users/groups.

Replace <Types> as required:

  • type user - External domain users
  • type group - External domain groups
  • typelist user,group - External domain users and groups

Replace <Domains> with specification of external domain(s)

  • domain domain.com - A single external domain
  • domainlist domain1.com,domain2.com,domain3.com... - A list of external domains

If you want domains other than your internal domain(s)

  • notdomain domain.com - A single internal domain
  • notdomainlist domain1.com,domain2.com,domain3.com... - A list of internal domains
gam config auto_batch_min 1 num_threads 20 redirect csv ./MyDriveShares.csv multiprocess redirect stderr - multiprocess all users print filelist fields id,name,mimetype,basicpermissions pm notrole owner <Types> <Domains> em pmfilter oneitemperrow

Delete those My Drive ACLs.

gam config num_threads 20 redirect stdout ./DeleteMyDriveShares.txt multiprocess redirect stderr stdout csv MyDriveShares.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"

Add My Drive ACLs with a different email address and the same role.

gam config num_threads 20 redirect stdout ./AddMyDriveShares.txt multiprocess redirect stderr stdout csv MyDriveShares.csv gam user "~Owner" add drivefileacl "~id" "~permission.type" newemail@domain.rom role "~permission.role"

Shared Drives

Get an organizer for each Shared Drive

gam redirect csv ./SharedDriveOrganizers.csv print shareddriveorganizers

Get Shared Drive ACLs sharing to external domain users/groups.

Replace <Types> as required:

  • type user - External domain users
  • type group - External domain groups
  • typelist user,group - External domain users and groups

Replace <Domains> with specification of external domain(s)

  • domain domain.com - A single external domain
  • domainlist domain1.com,domain2.com,domain3.com... - A list of external domains

If you want domains other than your internal domain(s)

  • notdomain domain.com - A single internal domain
  • notdomainlist domain1.com,domain2.com,domain3.com... - A list of internal domains
gam config num_threads 20 csv_input_row_filter "organizers:regex:^.+$" redirect csv ./SharedDriveShares.csv multiprocess redirect stderr - multiprocess csv SharedDriveOrganizers.csv gam user "~organizers"  print filelist select shareddriveid "~id" fields id,name,mimetype,basicpermissions,driveid showdrivename pm <Types> <Domains> inherited false em pmfilter oneitemperrow

Delete those Shared Drive ACLs.

gam config num_threads 20 redirect stdout ./DeleteSharedDriveShares.txt multiprocess redirect stderr stdout csv SharedDriveShares.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"

Add Shared Drive ACLs with a different email address and the same role.

gam config num_threads 20 redirect stdout ./ReplaceSharedDriveShares.txt multiprocess redirect stderr stdout csv SharedDriveShares.csv gam user "~Owner" add drivefileacl "~id" "~permission.type" newemail@domain.rom role "~permission.role"

Replace <Query> below with one of these; they only apply to your internal domain:

  • domainCanFind - query "visibility='domainCanFind'"
  • domainWithLink - query "visibility='domainWithLink'"
  • both - query "(visibility='domainCanFind' or visibility='domainWithLink')"

My Drives

Get My Drive domainCanFind/domainWithLink ACLs for internal domain

gam config auto_batch_min 1 num_threads 20 redirect csv ./MyDriveShares.csv multiprocess redirect stderr - multiprocess all users print filelist fields id,name,mimetype,basicpermissions <Query> pm type domain em pmfilter oneitemperrow

Delete those My Drive ACLs.

gam config num_threads 20 redirect stdout ./DeleteMyDriveShares.txt multiprocess redirect stderr stdout csv MyDriveShares.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"

Shared Drives

Get an organizer for each Shared Drive

gam redirect csv ./SharedDriveOrganizers.csv print shareddriveorganizers

Get Shared Drive ACLs domainCanFind/domainWithLink ACLs for internal domain

  • Replace <Domain> with actual domain name
gam config num_threads 20 csv_input_row_filter "organizers:regex:^.+$" redirect csv ./SharedDriveShares.csv multiprocess redirect stderr - multiprocess csv SharedDriveOrganizers.csv gam user "~organizers"  print filelist select shareddriveid "~id" fields id,name,mimetype,basicpermissions,driveid showdrivename <Query> pm type domain inherited false em pmfilter oneitemperrow

Delete those Shared Drive ACLs.

gam config num_threads 20 redirect stdout ./DeleteSharedDriveShares.txt multiprocess redirect stderr stdout csv SharedDriveShares.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"

Remove My Drive ACLs for external domains

My Drives

Get My Drive ACLs sharing to external domain(s)

Replace <Domains> with specification of external domain(s)

  • domain domain.com - A single external domain
  • domainlist domain1.com,domain2.com,domain3.com... - A list of external domains

If you want domains other than your internal domain(s)

  • notdomain domain.com - A single internal domain
  • notdomainlist domain1.com,domain2.com,domain3.com... - A list of internal domains
gam config auto_batch_min 1 num_threads 20 redirect csv ./MyDriveShares.csv multiprocess redirect stderr - multiprocess all users print filelist fields id,name,mimetype,basicpermissions pm type domain <Domains> em pmfilter oneitemperrow

Delete those My Drive ACLs.

gam config num_threads 20 redirect stdout ./DeleteMyDriveShares.txt multiprocess redirect stderr stdout csv MyDriveShares.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"

Replace <Query> below with one of these:

  • anyoneCanFind - query "visibility='anyoneCanFind'"
  • anyoneWithLink - query "visibility='anyoneWithLink'"
  • both - query "(visibility='anyoneCanFind' or visibility='anyoneWithLink')"

My Drives

Get My Drive anyoneCanFind/anyoneWithLink ACLs

gam config auto_batch_min 1 num_threads 20 redirect csv ./MyDriveShares.csv multiprocess redirect stderr - multiprocess all users print filelist fields id,name,mimetype,basicpermissions <Query> pm type anyone em pmfilter oneitemperrow

Delete those My Drive ACLs.

gam config num_threads 20 redirect stdout ./DeleteMyDriveShares.txt multiprocess redirect stderr stdout csv MyDriveShares.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"

Shared Drives

Get an organizer for each Shared Drive

gam redirect csv ./SharedDriveOrganizers.csv print shareddriveorganizers

Get Shared Drive anyoneCanFind/anyoneWithLink ACLs

gam config num_threads 20 csv_input_row_filter "organizers:regex:^.+$" redirect csv ./SharedDriveShares.csv multiprocess redirect stderr - multiprocess csv SharedDriveOrganizers.csv gam user "~organizers"  print filelist select shareddriveid "~id" fields id,name,mimetype,basicpermissions,driveid showdrivename <Query> pm type anyone inherited false em pmfilter oneitemperrow

Delete those Shared Drive ACLs.

gam config num_threads 20 redirect stdout ./DeleteSharedDriveShares.txt multiprocess redirect stderr stdout csv SharedDriveShares.csv gam user "~Owner" delete drivefileacl "~id" "id:~~permission.id~~"