GCP - Access is denied. Cloud Resource Manager API has not been enabled.

GCP - Access is denied. Cloud Resource Manager API has not been enabled.

This error occurs when the Cloud Resource Manager API has not been enabled or if it is disabled.

 

Troubleshooting:

  1. In the GCP console, go to APIs & Services and click on Library.
  2. Check if the Cloud Resource Manager API is enabled.
  3. ​If you have enabled this API recently, wait a few minutes for the action to propagate and retry.

                  New to ADSelfService Plus?

                    • Related Articles

                    • REST API Monitor Troubleshooting Guide

                      Whether you're adding a new REST API monitor or diagnosing issues in an existing one, the steps below will help resolve the most common problems. Troubleshooting 4xx Error Codes (e.g., 401, 403) 1. Check Request Configuration Ensure that the ...
                    • Cloud Monitoring API Usage

                      How Cloud Monitoring Works? Cloud Monitoring involves collecting, analyzing, and visualizing performance metrics and telemetry data from cloud infrastructure and applications via APIs. Cloud Monitoring data collection flow: API Authentication: ...
                    • Service Now Event Integration using Webhook / Rest API Action

                      Steps to perform in Service Now 1) Login to your ServiceNow Instance(dev*****133.service-now.com) 2) Search for the Rest API Explorer and open it 3) In the Rest API Explorer page choose the Namespace and API Name with the proper API version. For ...
                    • Troubleshooting Cloud API Accessibility Errors

                      Overview Applications Manager monitors cloud resources by making API calls to the respective cloud provider endpoints (e.g., Azure Management APIs, AWS APIs). When these API endpoints are unreachable or blocked from the Applications Manager installed ...
                    • Authentication Methods in Applications Manager

                      Authentication involves validating an incoming user to facilitate the access to a specific resource. There are various authentication methods that you can use - based on the requirements and usage. In recent times, numerous organizations are ...