I've a Cloud Identity Org mapped to a Google Cloud Platform Org.
The IAM policy on GCP Org is the following:
- "Admins" can create project and make administrative ops
- "Devs" can browse
In GCP Org is all ok, but I've seen that a "Devs" user can create a project outside the GCP Org. Is there a configuration to prevent this behaviour?
Thanks