Skip to main content
If you receive the IAM policy update failed error code while configuring Google Cloud, follow the steps below to resolve it by updating roles and organizational policies.

Add another role

  1. Make sure that you are logged in with your Organization Administrator account
  2. Open the IAM tab in the left menu:
IAM tab
  1. Open the dropdown menu in the top-left corner:
Dropdown menu
  1. Select the organization (the organization will have a building icon next to it):
Select organization
  • If the organization does not show up to be selected, then you must add it first:
    • Click Cancel
    • Open the Organizations tab OR the Identity & Organization tab (Google can display this step in either) from the left sidebar
    • Click Select next to the organization domain to add it to the project:
Add organization
  • Be sure the organization is now selected in the dropdown and that you are in the IAM tab located in the left menu
  1. Then, click the pencil icon next to the email account:
Pencil icon
  1. Click add another role:
Add another role
  • Search for the organization policy administrator role (you can search for it by typing it in. If you cannot find it, you are likely not logged in with the Organization’s Administrator account):
Organization policy administrator
  1. Click Save to keep and apply the changes:
Save changes

Update the organizational policy

  1. Open the Organization Policies tab from the left sidebar:
Organization Policies tab
  1. In the Organization Policies page, search for Domain Restricted Sharing from the list of constraints, then click Domain Restricted Sharing:
Domain Restricted Sharing
  1. Click Manage Policy:
Manage Policy
  1. Then, select the Override Parent’s Policy option:
Override Parent's Policy
  • Click the Replace option, then click on the rule below and change the dropdown to Allow All
  • Then, click Done:
Allow All
  1. Click Set Policy to save all changes:
Set Policy
  1. Now, return to the Organizational Policies tab to open the Organization Policies page.
  • Search Disable service account creation from the list of constraints
  • Click Disable service account creation:
    • You will want to follow these next steps for both links

Disable service account settings

  1. Search Disable service account key creation from the list of constraints
Disable service account key creation search Search results
  1. Click Disable service account key creation:
  • You will want to follow these next steps for both links
Disable service account key creation
  1. Click Manage Policy
Manage Policy for service account Manage Policy screen
  • Change the Policy Source to Override Parent’s Policy, then click on the Enforced rule
  • Change the Enforced rule to Off
  1. Then, click Done:
Done button Confirmation
  1. Click Set Policy to save the changes:
Set Policy final
  • Make sure to repeat these steps for the second Disable service account key creation link

Return to the project

After saving the new role, return to the project:
  1. Open the dropdown menu in the top-left corner:
Dropdown menu
  1. Switch back to the project you created (the app name):
Switch to project

Return to the previous article

Go back to Add Kajabi as an Admin to your Google Play Console and Project Owner on Google Cloud Console and complete Steps 3 and 4.