Weitere Gruppenrollen |
Berechtigungen |
Advisory Notifications Admin
(roles/advisorynotifications.admin )
Gewährt Schreibzugriff auf Einstellungen in Advisory Notifications
|
advisorynotifications.*
resourcemanager.organizations.get
resourcemanager.projects.get
|
Betrachter von Advisory Notifications
(roles/advisorynotifications.viewer )
Gewährt Lesezugriff in Advisory Notifications
|
advisorynotifications.notifications.*
advisorynotifications.settings.get
resourcemanager.organizations.get
resourcemanager.projects.get
|
Cloud API Hub-AdministratorBeta
(roles/apihub.admin )
Vollständiger Zugriff auf alle Ressourcen des API-Hubs.
|
apihub.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Cloud API-Hub-AttributenBeta
(roles/apihub.attributeAdmin )
Vollständiger Zugriff auf alle Attributressourcen des Cloud API-Hubs.
|
apihub.attributes.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud API-Hub-BearbeiterBeta
(roles/apihub.editor )
Bearbeitungszugriff auf die meisten Ressourcen des Cloud API-Hubs.
|
apihub.apiHubInstances.get
apihub.apiHubInstances.list
apihub.apiOperations.*
apihub.apis.*
apihub.attributes.get
apihub.attributes.list
apihub.definitions.*
apihub.dependencies.*
apihub.deployments.*
apihub.externalApis.*
apihub.hostProjectRegistrations.get
apihub.hostProjectRegistrations.list
apihub.llmEnablements.*
apihub.locations.searchResources
apihub.operations.get
apihub.operations.list
apihub.plugins.get
apihub.plugins.list
apihub.runTimeProjectAttachments.get
apihub.runTimeProjectAttachments.list
apihub.specs.*
apihub.styleGuides.get
apihub.versions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Cloud API-Hub-Plug-insBeta
(roles/apihub.pluginAdmin )
Vollständiger Zugriff auf alle Plug‑in-Ressourcen des Cloud API-Hubs.
|
apihub.plugins.*
apihub.specs.lint
apihub.styleGuides.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator für Cloud API-Hub-BereitstellungBeta
(roles/apihub.provisioningAdmin )
Vollständiger Zugriff auf Bereitstellungsressourcen des Cloud API-Hubs.
|
apihub.apiHubInstances.*
apihub.hostProjectRegistrations.*
apihub.operations.*
apihub.runTimeProjectAttachments.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud API-Hub-Betrachter
Beta
(roles/apihub.viewer )
Lesezugriff auf alle Ressourcen des Cloud API-Hubs.
|
apihub.apiHubInstances.get
apihub.apiHubInstances.list
apihub.apiOperations.get
apihub.apiOperations.list
apihub.apis.get
apihub.apis.list
apihub.attributes.get
apihub.attributes.list
apihub.definitions.get
apihub.definitions.list
apihub.dependencies.get
apihub.dependencies.list
apihub.deployments.get
apihub.deployments.list
apihub.externalApis.get
apihub.externalApis.list
apihub.hostProjectRegistrations.get
apihub.hostProjectRegistrations.list
apihub.llmEnablements.get
apihub.llmEnablements.list
apihub.locations.searchResources
apihub.operations.get
apihub.operations.list
apihub.plugins.get
apihub.plugins.list
apihub.runTimeProjectAttachments.get
apihub.runTimeProjectAttachments.list
apihub.specs.get
apihub.specs.list
apihub.styleGuides.get
apihub.versions.get
apihub.versions.list
resourcemanager.projects.get
resourcemanager.projects.list
|
API-Verwaltungsadministrator
Beta
(roles/apim.admin )
Vollständiger Zugriff auf API-Verwaltungsressourcen.
|
apim.*
resourcemanager.projects.get
resourcemanager.projects.list
|
API-VerwaltungsbetrachterBeta
(roles/apim.viewer )
Lesezugriff auf API-Verwaltungsressourcen.
|
apim.apiObservations.*
apim.apiOperations.*
apim.locations.*
apim.observationJobs.get
apim.observationJobs.list
apim.observationSources.get
apim.observationSources.list
apim.operations.get
apim.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von App Hub
(roles/apphub.admin )
Vollständiger Zugriff auf App Hub-Ressourcen.
|
apphub.*
resourcemanager.projects.get
resourcemanager.projects.list
|
App Hub Editor
(roles/apphub.editor )
Bearbeitungszugriff auf App Hub-Ressourcen.
|
apphub.applications.create
apphub.applications.delete
apphub.applications.get
apphub.applications.list
apphub.applications.update
apphub.discoveredServices.*
apphub.discoveredWorkloads.*
apphub.locations.*
apphub.operations.*
apphub.serviceProjectAttachments.lookup
apphub.services.*
apphub.workloads.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Viewer von App Hub
(roles/apphub.viewer )
Lesezugriff auf App Hub-Ressourcen.
|
apphub.applications.get
apphub.applications.list
apphub.discoveredServices.get
apphub.discoveredServices.list
apphub.discoveredWorkloads.get
apphub.discoveredWorkloads.list
apphub.locations.*
apphub.operations.get
apphub.operations.list
apphub.serviceProjectAttachments.lookup
apphub.services.get
apphub.services.list
apphub.workloads.get
apphub.workloads.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Appliance Troubleshooting Commands Approver
Beta
(roles/applianceactivation.approver )
Gewährt Zugriff zum Genehmigen von Befehlen, die auf Appliances ausgeführt werden sollen
|
applianceactivation.rttCommands.approve
applianceactivation.rttCommands.get
resourcemanager.projects.get
resourcemanager.projects.list
|
On-Appliance Troubleshooting Client
Beta
(roles/applianceactivation.client )
Gewährt Zugriff zum Lesen von Befehlen für eine Appliance und Senden des Ergebnisses.
|
applianceactivation.rttCommands.get
applianceactivation.rttCommands.sendResult
|
Appliance Troubleshooter
Beta
(roles/applianceactivation.troubleshooter )
Gewährt Zugriff zum Senden neuer Befehle, die auf Appliances ausgeführt werden sollen, und zum Aufrufen der Ausgaben
|
applianceactivation.rttCommands.create
applianceactivation.rttCommands.get
applianceactivation.rttCommands.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Assured OSS Admin
(roles/assuredoss.admin )
Zugriff zum Verwenden von Assured OSS und Verwalten der Konfiguration.
|
artifactregistry.dockerimages.*
artifactregistry.files.download
artifactregistry.files.get
artifactregistry.files.list
artifactregistry.locations.*
artifactregistry.mavenartifacts.*
artifactregistry.npmpackages.*
artifactregistry.packages.get
artifactregistry.packages.list
artifactregistry.projectsettings.get
artifactregistry.pythonpackages.*
artifactregistry.repositories.create
artifactregistry.repositories.downloadArtifacts
artifactregistry.repositories.get
artifactregistry.repositories.list
artifactregistry.repositories.listEffectiveTags
artifactregistry.repositories.listTagBindings
artifactregistry.repositories.readViaVirtualRepository
artifactregistry.tags.get
artifactregistry.tags.list
artifactregistry.versions.get
artifactregistry.versions.list
assuredoss.*
iam.serviceAccountKeys.create
iam.serviceAccounts.create
iam.serviceAccounts.get
pubsub.schemas.get
pubsub.schemas.list
pubsub.schemas.listRevisions
pubsub.schemas.validate
pubsub.snapshots.get
pubsub.snapshots.list
pubsub.subscriptions.create
pubsub.subscriptions.get
pubsub.subscriptions.list
pubsub.subscriptions.update
pubsub.topics.get
pubsub.topics.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.enable
serviceusage.services.get
serviceusage.services.list
|
Assured OSS-ProjektadministratorBeta
(roles/assuredoss.projectAdmin )
Zugriff zum Verwenden von Assured OSS und Verwalten der Konfiguration.
|
artifactregistry.dockerimages.*
artifactregistry.files.download
artifactregistry.files.get
artifactregistry.files.list
artifactregistry.locations.*
artifactregistry.mavenartifacts.*
artifactregistry.npmpackages.*
artifactregistry.packages.get
artifactregistry.packages.list
artifactregistry.projectsettings.get
artifactregistry.pythonpackages.*
artifactregistry.repositories.create
artifactregistry.repositories.downloadArtifacts
artifactregistry.repositories.get
artifactregistry.repositories.list
artifactregistry.repositories.listEffectiveTags
artifactregistry.repositories.listTagBindings
artifactregistry.repositories.readViaVirtualRepository
artifactregistry.tags.get
artifactregistry.tags.list
artifactregistry.versions.get
artifactregistry.versions.list
assuredoss.*
iam.serviceAccounts.create
iam.serviceAccounts.get
pubsub.schemas.get
pubsub.schemas.list
pubsub.schemas.listRevisions
pubsub.schemas.validate
pubsub.snapshots.get
pubsub.snapshots.list
pubsub.subscriptions.get
pubsub.subscriptions.list
pubsub.topics.get
pubsub.topics.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.enable
serviceusage.services.get
serviceusage.services.list
|
Assured OSS Reader
(roles/assuredoss.reader )
Zugriff zum Verwenden von Assured OSS und Ansehen der Assured OSS-Konfiguration.
|
artifactregistry.dockerimages.*
artifactregistry.files.download
artifactregistry.files.get
artifactregistry.files.list
artifactregistry.locations.*
artifactregistry.mavenartifacts.*
artifactregistry.npmpackages.*
artifactregistry.packages.get
artifactregistry.packages.list
artifactregistry.projectsettings.get
artifactregistry.pythonpackages.*
artifactregistry.repositories.downloadArtifacts
artifactregistry.repositories.get
artifactregistry.repositories.list
artifactregistry.repositories.listEffectiveTags
artifactregistry.repositories.listTagBindings
artifactregistry.repositories.readViaVirtualRepository
artifactregistry.tags.get
artifactregistry.tags.list
artifactregistry.versions.get
artifactregistry.versions.list
assuredoss.config.get
assuredoss.locations.*
assuredoss.metadata.*
assuredoss.operations.get
assuredoss.operations.list
pubsub.schemas.get
pubsub.schemas.list
pubsub.schemas.listRevisions
pubsub.schemas.validate
pubsub.snapshots.get
pubsub.snapshots.list
pubsub.subscriptions.get
pubsub.subscriptions.list
pubsub.topics.get
pubsub.topics.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
serviceusage.services.list
|
Assured OSS User
(roles/assuredoss.user )
Zugriff zum Verwenden von Assured OSS.
|
artifactregistry.dockerimages.*
artifactregistry.files.download
artifactregistry.files.get
artifactregistry.files.list
artifactregistry.locations.*
artifactregistry.mavenartifacts.*
artifactregistry.npmpackages.*
artifactregistry.packages.get
artifactregistry.packages.list
artifactregistry.projectsettings.get
artifactregistry.pythonpackages.*
artifactregistry.repositories.downloadArtifacts
artifactregistry.repositories.get
artifactregistry.repositories.list
artifactregistry.repositories.listEffectiveTags
artifactregistry.repositories.listTagBindings
artifactregistry.repositories.readViaVirtualRepository
artifactregistry.tags.get
artifactregistry.tags.list
artifactregistry.versions.get
artifactregistry.versions.list
assuredoss.locations.*
assuredoss.metadata.*
assuredoss.operations.get
assuredoss.operations.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Audit Manager-AdministratorBeta
(roles/auditmanager.admin )
Vollständiger Zugriff auf Audit Manager-Ressourcen.
|
auditmanager.*
cloudasset.assets.searchAllResources
resourcemanager.folders.get
resourcemanager.folders.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Audit Manager-Auditor
Beta
(roles/auditmanager.auditor )
Erlaubt das Erstellen und Ansehen eines Prüfberichts.
|
auditmanager.auditReports.generate
auditmanager.auditScopeReports.generate
auditmanager.locations.get
auditmanager.locations.list
auditmanager.operations.*
cloudasset.assets.searchAllResources
resourcemanager.folders.get
resourcemanager.folders.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Autor von Autoscaling-MesswertenBeta
(roles/autoscaling.metricsWriter )
Zugriff, um Messwerte für eine Autoscaling-Website zu schreiben
|
autoscaling.sites.writeMetrics
|
Leser von Autoscaling-EmpfehlungenBeta
(roles/autoscaling.recommendationsReader )
Kann Empfehlungen von der Autoscaling-Website lesen
|
autoscaling.sites.readRecommendations
|
Administrator von Autoscaling-WebsitesBeta
(roles/autoscaling.sitesAdmin )
Vollständiger Zugriff auf alle Autoscaling-Website-Features
|
autoscaling.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Autor des Autoscaling-Status
Beta
(roles/autoscaling.stateWriter )
Zugriff, um den Status für eine Autoscaling-Website zu schreiben
|
autoscaling.sites.writeState
|
Batch-Agent-Melder
Beta
(roles/batch.agentReporter )
Melder von Batch-Agent-Statuswerten.
|
batch.states.report
|
Batchjob-BearbeiterBeta
(roles/batch.jobsEditor )
Bearbeiter von Batchjobs
|
batch.jobs.*
batch.locations.*
batch.operations.*
batch.tasks.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Batch-Job-BetrachterBeta
(roles/batch.jobsViewer )
Betrachter von Batchjobs, Aufgabengruppen und Aufgaben
|
batch.jobs.get
batch.jobs.list
batch.locations.*
batch.operations.*
batch.tasks.*
resourcemanager.projects.get
resourcemanager.projects.list
|
BigLake-Administrator
(roles/biglake.admin )
Bietet vollständigen Zugriff auf alle BigLake-Ressourcen.
|
biglake.*
resourcemanager.projects.get
resourcemanager.projects.list
|
BigLake-Betrachter
(roles/biglake.viewer )
Bietet Lesezugriff auf alle BigLake-Ressourcen.
|
biglake.catalogs.get
biglake.catalogs.list
biglake.databases.get
biglake.databases.list
biglake.locks.list
biglake.tables.get
biglake.tables.list
resourcemanager.projects.get
resourcemanager.projects.list
|
MigrationWorkflow-Bearbeiter
(roles/bigquerymigration.editor )
Kann EDW-Migrations-Workflows bearbeiten.
|
bigquerymigration.locations.*
bigquerymigration.subtasks.get
bigquerymigration.subtasks.list
bigquerymigration.workflows.create
bigquerymigration.workflows.delete
bigquerymigration.workflows.get
bigquerymigration.workflows.list
bigquerymigration.workflows.update
|
Aufgaben-Orchestrator
(roles/bigquerymigration.orchestrator )
Kann EDW-Migrationsaufgaben orchestrieren.
|
bigquerymigration.subtasks.create
bigquerymigration.taskTypes.orchestrateTask
bigquerymigration.workflows.orchestrateTask
storage.objects.list
|
Nutzer von Übersetzungen für Migrationen
(roles/bigquerymigration.translationUser )
Nutzer des interaktiven SQL-Übersetzungsdienstes für EDW-Migrationen.
|
bigquerymigration.translation.translate
|
MigrationWorkflow-Betrachter
(roles/bigquerymigration.viewer )
Kann EDW-MigrationWorkflow betrachten.
|
bigquerymigration.locations.*
bigquerymigration.subtasks.get
bigquerymigration.subtasks.list
bigquerymigration.workflows.get
bigquerymigration.workflows.list
|
Aufgaben-Worker
(roles/bigquerymigration.worker )
Worker, der Unteraufgaben der EDW-Migration ausführt.
|
bigquerymigration.subtaskTypes.executeTask
bigquerymigration.subtasks.executeTask
storage.objects.create
storage.objects.get
storage.objects.list
|
Carbon Footprint-Betrachter
(roles/billing.carbonViewer )
|
billing.accounts.get
billing.accounts.getCarbonInformation
billing.accounts.list
|
Blockchain Node Engine-Administrator
(roles/blockchainnodeengine.admin )
Vollständiger Zugriff auf Blockchain Node Engine-Ressourcen.
|
blockchainnodeengine.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Blockchain Node Engine-Betrachter
(roles/blockchainnodeengine.viewer )
Lesezugriff auf Blockchain Node Engine-Ressourcen.
|
blockchainnodeengine.blockchainNodes.get
blockchainnodeengine.blockchainNodes.list
blockchainnodeengine.locations.*
blockchainnodeengine.operations.get
blockchainnodeengine.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter der Nutzung des KapazitätsplanersBeta
(roles/capacityplanner.viewer )
Lesezugriff auf Nutzungsressourcen des Kapazitätsplaners
|
capacityplanner.*
cloudquotas.quotas.get
monitoring.timeSeries.list
resourcemanager.folders.get
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
|
Betrachter von Care Studio-Patienten
(roles/carestudio.viewer )
Diese Rolle kann alle Attribute von Patienten ansehen.
|
carestudio.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Chronicle-Dienst
(roles/chroniclesm.admin )
Administratoren können Details zum Chronicle-Dienst ansehen und ändern.
|
chroniclesm.*
|
Betrachter von Chronicle-Dienst
(roles/chroniclesm.viewer )
Betrachter können Details zum Chronicle-Dienst ansehen, aber nicht ändern.
|
chroniclesm.gcpAssociations.get
chroniclesm.gcpSettings.get
|
Standortleser
Beta
(roles/cloud.locationReader )
Standorte lesen und auflisten, die zum Erstellen von Ressourcen verfügbar sind.
|
cloud.*
|
Cloud AI Companion-NutzerBeta
(roles/cloudaicompanion.user )
Ein Nutzer, der Unterstützung von Cloud AI Companion erhalten kann
|
cloudaicompanion.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud Controls Partner Admin
(roles/cloudcontrolspartner.admin )
Vollständiger Zugriff auf Cloud Controls Partner-Ressourcen.
|
cloudcontrolspartner.accessapprovalrequests.list
cloudcontrolspartner.customers.list
cloudcontrolspartner.ekmconnections.get
cloudcontrolspartner.inspectabilityevents.get
cloudcontrolspartner.partnerpermissions.get
cloudcontrolspartner.partners.get
cloudcontrolspartner.platformcontrols.get
cloudcontrolspartner.violations.list
cloudcontrolspartner.workloads.list
|
Cloud Controls Partner Editor
(roles/cloudcontrolspartner.editor )
Bearbeitungszugriff auf Cloud Controls Partner-Ressourcen.
|
cloudcontrolspartner.*
|
Cloud Controls Partner Inspectability Reader
(roles/cloudcontrolspartner.inspectabilityReader )
Lesezugriff auf Cloud Controls Partner-Überprüfbarkeitsressourcen.
|
cloudcontrolspartner.customers.*
cloudcontrolspartner.inspectabilityevents.get
cloudcontrolspartner.platformcontrols.get
|
Cloud Controls Partner Monitoring Reader
(roles/cloudcontrolspartner.monitoringReader )
Lesezugriff auf Cloud Controls Partner-Monitoringressourcen.
|
cloudcontrolspartner.customers.*
cloudcontrolspartner.violations.*
cloudcontrolspartner.workloads.*
|
Cloud Controls Partner Reader
(roles/cloudcontrolspartner.reader )
Lesezugriff auf Cloud Controls Partner-Ressourcen.
|
cloudcontrolspartner.*
|
Cloud Optimization AI-Administrator
(roles/cloudoptimization.admin )
Administrator von Cloud Optimization AI-Ressourcen
|
cloudoptimization.*
|
Cloud Optimization AI-Bearbeiter
(roles/cloudoptimization.editor )
Bearbeiter von Cloud Optimization AI-Ressourcen
|
cloudoptimization.*
|
Cloud Optimization AI-Betrachter
(roles/cloudoptimization.viewer )
Betrachter von Cloud Optimization AI-Ressourcen
|
cloudoptimization.operations.get
|
Cloud-Kontingente-AdministratorBeta
(roles/cloudquotas.admin )
Uneingeschränkter Zugriff auf Cloud-Kontingente-Ressourcen.
|
cloudquotas.*
monitoring.timeSeries.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Cloud-KontingentenBeta
(roles/cloudquotas.viewer )
Lesezugriff auf Cloud-Kontingente-Ressourcen.
|
cloudquotas.quotas.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Commerce Agreement Publishing-AdministratorBeta
(roles/commerceagreementpublishing.admin )
Administrator des Commerce Agreement Publishing-Dienstes
|
commerceagreementpublishing.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Commerce Agreement Publishing
Beta
(roles/commerceagreementpublishing.viewer )
Betrachter des Commerce Agreement Publishing-Dienstes
|
commerceagreementpublishing.agreements.get
commerceagreementpublishing.agreements.list
commerceagreementpublishing.documents.get
commerceagreementpublishing.documents.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Confidential Space Workload User
(roles/confidentialcomputing.workloadUser )
Erlaubt das Generieren eines Attestierungstokens und das Ausführen einer Arbeitslast in einer VM. Vorgesehen für Dienstkonten, die auf Confidential Space-VMs ausgeführt werden.
|
confidentialcomputing.*
logging.logEntries.create
|
(roles/contactcenteraiplatform.admin )
Vollständiger Zugriff auf Contact Center AI Platform-Ressourcen.
|
contactcenteraiplatform.*
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/contactcenteraiplatform.viewer )
Lesezugriff auf Contact Center AI Platform-Ressourcen.
|
contactcenteraiplatform.contactCenters.get
contactcenteraiplatform.contactCenters.list
contactcenteraiplatform.locations.*
contactcenteraiplatform.operations.get
contactcenteraiplatform.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/contactcenterinsights.editor )
Gewährt Lese- und Schreibzugriff auf alle Contact Center AI Insights-Ressourcen.
|
contactcenterinsights.*
|
(roles/contactcenterinsights.viewer )
Gewährt Lesezugriff auf alle Contact Center AI Insights-Ressourcen.
|
contactcenterinsights.analyses.get
contactcenterinsights.analyses.list
contactcenterinsights.conversations.get
contactcenterinsights.conversations.list
contactcenterinsights.faqEntries.get
contactcenterinsights.faqEntries.list
contactcenterinsights.faqModels.get
contactcenterinsights.faqModels.list
contactcenterinsights.feedbackLabels.get
contactcenterinsights.feedbackLabels.list
contactcenterinsights.issueModels.get
contactcenterinsights.issueModels.list
contactcenterinsights.issues.get
contactcenterinsights.issues.list
contactcenterinsights.operations.*
contactcenterinsights.phraseMatchers.get
contactcenterinsights.phraseMatchers.list
contactcenterinsights.qaQuestions.*
contactcenterinsights.qaScorecardRevisions.get
contactcenterinsights.qaScorecards.*
contactcenterinsights.settings.get
contactcenterinsights.views.get
contactcenterinsights.views.list
|
Betrachter des GKE-SicherheitsstatusBeta
(roles/containersecurity.viewer )
Lesezugriff auf Ressourcen für den GKE-Sicherheitsstatus.
|
container.clusters.list
containersecurity.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Content Warehouse-Administrator
(roles/contentwarehouse.admin )
Gewährt vollständigen Zugriff auf alle Ressourcen in Content Warehouse
|
contentwarehouse.corpora.*
contentwarehouse.dataExportJobs.*
contentwarehouse.documentSchemas.*
contentwarehouse.documents.*
contentwarehouse.locations.*
contentwarehouse.operations.get
contentwarehouse.rawDocuments.*
contentwarehouse.ruleSets.*
contentwarehouse.synonymSets.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Content Warehouse-Dokumenten
(roles/contentwarehouse.documentAdmin )
Gewährt vollständigen Zugriff auf die Dokumentressource in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documents.create
contentwarehouse.documents.delete
contentwarehouse.documents.get
contentwarehouse.documents.getIamPolicy
contentwarehouse.documents.setIamPolicy
contentwarehouse.documents.update
contentwarehouse.links.*
contentwarehouse.locations.getStatus
contentwarehouse.rawDocuments.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Ersteller von Content Warehouse-Dokumenten
(roles/contentwarehouse.documentCreator )
Gewährt Zugriff zum Erstellen von Dokumenten in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documentSchemas.list
contentwarehouse.documents.create
contentwarehouse.locations.getStatus
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Content Warehouse-Dokumenten
(roles/contentwarehouse.documentEditor )
Gewährt Zugriff zum Aktualisieren der Dokumentressource in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documents.get
contentwarehouse.documents.getIamPolicy
contentwarehouse.documents.update
contentwarehouse.links.*
contentwarehouse.locations.getStatus
contentwarehouse.rawDocuments.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Content Warehouse-Dokumentschemas
(roles/contentwarehouse.documentSchemaViewer )
Gewährt Zugriff zum Ansehen von Dokumentschemas in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documentSchemas.list
contentwarehouse.locations.getStatus
resourcemanager.projects.get
resourcemanager.projects.list
|
Content Warehouse-Betrachter
(roles/contentwarehouse.documentViewer )
Gewährt Zugriff zum Ansehen aller Ressourcen in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documents.get
contentwarehouse.documents.getIamPolicy
contentwarehouse.links.get
contentwarehouse.locations.getStatus
contentwarehouse.rawDocuments.download
resourcemanager.projects.get
resourcemanager.projects.list
|
Datenbankcenter-Betrachter
Beta
(roles/databasecenter.viewer )
Viewer-Rolle für Datenbankcenter-Ressourcendaten
|
cloudaicompanion.entitlements.get
databasecenter.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Events Service Viewer
Beta
(roles/databaseinsights.eventsViewer )
Viewer-Rolle für Ereignisdienstdaten
|
databaseinsights.aggregatedEvents.query
databaseinsights.clusterEvents.query
databaseinsights.instanceEvents.query
|
Database Insights Monitoring ViewerBeta
(roles/databaseinsights.monitoringViewer )
Viewer-Rolle für Monitoringdaten von Datenbankstatistiken
|
databaseinsights.activeQueries.fetch
databaseinsights.activitySummary.fetch
databaseinsights.aggregatedStats.query
databaseinsights.locations.*
databaseinsights.timeSeries.query
databaseinsights.workloadRecommendations.fetch
resourcemanager.projects.get
resourcemanager.projects.list
|
Database Insights, die Vorgänge ausführenBeta
(roles/databaseinsights.operationsAdmin )
Administratorrolle zum Ausführen von Datenbankstatistikvorgängen
|
databaseinsights.activeQuery.terminate
|
Database Insights Recommendation ViewerBeta
(roles/databaseinsights.recommendationViewer )
Viewer-Rolle für Empfehlungsdaten von Datenbankstatistiken
|
databaseinsights.locations.*
databaseinsights.recommendations.query
databaseinsights.resourceRecommendations.query
databaseinsights.workloadRecommendations.fetch
resourcemanager.projects.get
resourcemanager.projects.list
|
Database Insights ViewerBeta
(roles/databaseinsights.viewer )
Viewer-Rolle für Database Insights-Daten
|
databaseinsights.activeQueries.fetch
databaseinsights.activitySummary.fetch
databaseinsights.aggregatedStats.query
databaseinsights.locations.*
databaseinsights.recommendations.query
databaseinsights.resourceRecommendations.query
databaseinsights.timeSeries.query
databaseinsights.workloadRecommendations.fetch
resourcemanager.projects.get
resourcemanager.projects.list
|
Data Lineage-Administrator
(roles/datalineage.admin )
Gewährt vollständigen Zugriff auf alle Ressourcen in der Data Lineage API
|
datalineage.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Data Lineage-Bearbeiter
(roles/datalineage.editor )
Gewährt Bearbeitungszugriff auf alle Ressourcen in der Data Lineage API
|
datalineage.events.*
datalineage.locations.searchLinks
datalineage.operations.get
datalineage.processes.create
datalineage.processes.get
datalineage.processes.list
datalineage.processes.update
datalineage.runs.create
datalineage.runs.get
datalineage.runs.list
datalineage.runs.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Data Lineage-Ereignis-Ersteller
(roles/datalineage.producer )
Gewährt Zugriff zum Erstellen aller Ressourcen in der Data Lineage API
|
datalineage.events.create
datalineage.processes.create
datalineage.processes.get
datalineage.processes.update
datalineage.runs.create
datalineage.runs.get
datalineage.runs.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Data Lineage-Betrachter
(roles/datalineage.viewer )
Gewährt Lesezugriff auf alle Ressourcen in der Data Lineage API
|
datalineage.events.get
datalineage.events.list
datalineage.locations.searchLinks
datalineage.processes.get
datalineage.processes.list
datalineage.runs.get
datalineage.runs.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Ressourcen für Datenverarbeitungssteuerungen
(roles/dataprocessing.admin )
Administrator von Datenverarbeitungssteuerungen, der die Einstellungen dieser Steuerungen vollständig verwalten und alle Daten zu Datenquellen einsehen kann.
|
billing.accounts.get
billing.accounts.list
dataprocessing.*
|
Manager von Datenquellen für Datenverarbeitungssteuerungen
(roles/dataprocessing.dataSourceManager )
Manager von Datenquellen für Datenverarbeitungssteuerungen, der die zugrunde liegenden Daten abrufen, auflisten und aktualisieren kann.
|
dataprocessing.datasources.list
dataprocessing.datasources.update
|
Developer Connect-Administrator
Beta
(roles/developerconnect.admin )
Vollständiger Zugriff auf Developer Connect-Ressourcen.
|
developerconnect.connections.*
developerconnect.gitRepositoryLinks.create
developerconnect.gitRepositoryLinks.delete
developerconnect.gitRepositoryLinks.fetchGitRefs
developerconnect.gitRepositoryLinks.get
developerconnect.gitRepositoryLinks.list
developerconnect.locations.*
developerconnect.operations.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Accessor für Developer Connect-LesetokensBeta
(roles/developerconnect.readTokenAccessor )
Gewährt Zugriff auf Tokens mit Lesezugriff (sowohl PAT- als auch Kurzzeit-Tokens). Gewährt außerdem Zugriff zum Ansehen des Links zum Git-Repository.
|
developerconnect.connections.get
developerconnect.gitRepositoryLinks.fetchReadToken
developerconnect.gitRepositoryLinks.get
|
Accessor für Developer Connect-Token
Beta
(roles/developerconnect.tokenAccessor )
Gewährt Zugriff auf Tokens mit Lese-/Schreibzugriff und Tokens mit Lesezugriff (sowohl PAT- als auch Kurzzeit-Tokens). Gewährt außerdem Zugriff zum Ansehen des Links zum Git-Repository.
|
developerconnect.connections.get
developerconnect.gitRepositoryLinks.fetchReadToken
developerconnect.gitRepositoryLinks.fetchReadWriteToken
developerconnect.gitRepositoryLinks.get
|
Developer Connect-Nutzer
Beta
(roles/developerconnect.user )
Gewährt Zugriff zum Ansehen der Verbindung und auf die Funktionen, die mit dem eigentlichen Repository interagieren, beispielsweise zum Lesen von Inhalten aus dem Repository
|
developerconnect.connections.fetchGitHubInstallations
developerconnect.connections.fetchLinkableGitRepositories
developerconnect.connections.get
developerconnect.connections.list
developerconnect.gitRepositoryLinks.fetchGitRefs
developerconnect.gitRepositoryLinks.get
developerconnect.gitRepositoryLinks.list
developerconnect.locations.*
developerconnect.operations.get
developerconnect.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Developer Connect-Betrachter
Beta
(roles/developerconnect.viewer )
Lesezugriff auf Developer Connect-Ressourcen.
|
developerconnect.connections.get
developerconnect.connections.list
developerconnect.gitRepositoryLinks.get
developerconnect.gitRepositoryLinks.list
developerconnect.locations.*
developerconnect.operations.get
developerconnect.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Discovery Engine-Administrator
(roles/discoveryengine.admin )
Gewährt vollständigen Zugriff auf alle Discovery Engine-Ressourcen.
|
discoveryengine.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Discovery Engine-Bearbeiter
(roles/discoveryengine.editor )
Gewährt Lese- und Schreibzugriff auf alle Discovery Engine-Ressourcen.
|
discoveryengine.analytics.*
discoveryengine.branches.*
discoveryengine.cmekConfigs.get
discoveryengine.cmekConfigs.list
discoveryengine.collections.get
discoveryengine.collections.list
discoveryengine.completionConfigs.get
discoveryengine.controls.get
discoveryengine.controls.list
discoveryengine.conversations.*
discoveryengine.dataStores.completeQuery
discoveryengine.dataStores.get
discoveryengine.dataStores.list
discoveryengine.documentProcessingConfigs.get
discoveryengine.documents.create
discoveryengine.documents.delete
discoveryengine.documents.get
discoveryengine.documents.import
discoveryengine.documents.list
discoveryengine.documents.update
discoveryengine.engines.get
discoveryengine.engines.list
discoveryengine.engines.pause
discoveryengine.engines.resume
discoveryengine.engines.tune
discoveryengine.models.*
discoveryengine.operations.*
discoveryengine.projects.get
discoveryengine.schemas.get
discoveryengine.schemas.list
discoveryengine.schemas.preview
discoveryengine.schemas.validate
discoveryengine.servingConfigs.get
discoveryengine.servingConfigs.list
discoveryengine.servingConfigs.recommend
discoveryengine.servingConfigs.search
discoveryengine.siteSearchEngines.get
discoveryengine.targetSites.get
discoveryengine.targetSites.list
discoveryengine.userEvents.create
discoveryengine.userEvents.fetchStats
discoveryengine.userEvents.import
discoveryengine.widgetConfigs.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Discovery Engine-Betrachter
(roles/discoveryengine.viewer )
Gewährt Lesezugriff auf alle Discovery Engine-Ressourcen.
|
discoveryengine.analytics.*
discoveryengine.branches.*
discoveryengine.cmekConfigs.get
discoveryengine.cmekConfigs.list
discoveryengine.collections.get
discoveryengine.collections.list
discoveryengine.completionConfigs.get
discoveryengine.controls.get
discoveryengine.controls.list
discoveryengine.conversations.converse
discoveryengine.conversations.get
discoveryengine.conversations.list
discoveryengine.dataStores.completeQuery
discoveryengine.dataStores.get
discoveryengine.dataStores.list
discoveryengine.documentProcessingConfigs.get
discoveryengine.documents.get
discoveryengine.documents.list
discoveryengine.engines.get
discoveryengine.engines.list
discoveryengine.models.get
discoveryengine.models.list
discoveryengine.operations.*
discoveryengine.projects.get
discoveryengine.schemas.get
discoveryengine.schemas.list
discoveryengine.schemas.preview
discoveryengine.schemas.validate
discoveryengine.servingConfigs.get
discoveryengine.servingConfigs.list
discoveryengine.servingConfigs.recommend
discoveryengine.servingConfigs.search
discoveryengine.siteSearchEngines.get
discoveryengine.targetSites.get
discoveryengine.targetSites.list
discoveryengine.userEvents.fetchStats
discoveryengine.widgetConfigs.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator des Einkaufs in UnternehmenBeta
(roles/enterprisepurchasing.admin )
Vollständiger Zugriff auf Enterprise Purchasing-Ressourcen.
|
enterprisepurchasing.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter für Unternehmenskäufe
Beta
(roles/enterprisepurchasing.editor )
Bearbeitungszugriff auf Enterprise Purchasing-Ressourcen.
|
enterprisepurchasing.gcveCuds.get
enterprisepurchasing.gcveCuds.list
enterprisepurchasing.gcveNodePricingInfo.list
enterprisepurchasing.locations.*
enterprisepurchasing.operations.get
enterprisepurchasing.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Unternehmenskäufen
Beta
(roles/enterprisepurchasing.viewer )
Lesezugriff auf Enterprise Purchasing-Ressourcen.
|
enterprisepurchasing.gcveCuds.get
enterprisepurchasing.gcveCuds.list
enterprisepurchasing.gcveNodePricingInfo.list
enterprisepurchasing.locations.*
enterprisepurchasing.operations.get
enterprisepurchasing.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/essentialcontacts.admin )
Vollständiger Zugriff auf alle wichtigen Kontakte
|
essentialcontacts.*
|
(roles/essentialcontacts.viewer )
Kann alle wichtigen Kontakte aufrufen
|
essentialcontacts.contacts.get
essentialcontacts.contacts.list
|
Firebase Cloud Messaging API-AdministratorBeta
(roles/firebasecloudmessaging.admin )
Vollständiger Lese-/Schreibzugriff auf Firebase Cloud Messaging API-Ressourcen.
|
cloudmessaging.messages.create
fcmdata.deliverydata.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Symbol-Uploader für Firebase Crash
(roles/firebasecrash.symbolMappingsAdmin )
Vollständiger Lese- und Schreibzugriff auf Symbol-Zuordnungsdateien für Firebase Crash Reporting.
|
firebase.clients.get
firebase.clients.list
resourcemanager.projects.get
|
GDC Hardware Management-AdministratorBeta
(roles/gdchardwaremanagement.admin )
Vollständiger Zugriff auf GDC Hardware Management-Ressourcen.
|
gdchardwaremanagement.*
resourcemanager.projects.get
resourcemanager.projects.list
|
GDC Hardware Management Operator
Beta
(roles/gdchardwaremanagement.operator )
Zugriff zum Erstellen, Lesen und Aktualisieren von GDC Hardware Management-Ressourcen, die diese Vorgänge unterstützen. Gewährt außerdem Zugriff zum Löschen der HardwareGroup-Ressource.
|
gdchardwaremanagement.changeLogEntries.*
gdchardwaremanagement.comments.*
gdchardwaremanagement.hardware.*
gdchardwaremanagement.hardwareGroups.*
gdchardwaremanagement.locations.*
gdchardwaremanagement.operations.get
gdchardwaremanagement.operations.list
gdchardwaremanagement.orders.create
gdchardwaremanagement.orders.get
gdchardwaremanagement.orders.list
gdchardwaremanagement.orders.update
gdchardwaremanagement.sites.*
gdchardwaremanagement.skus.*
gdchardwaremanagement.zones.*
resourcemanager.projects.get
resourcemanager.projects.list
|
GDC Hardware Management-LeserBeta
(roles/gdchardwaremanagement.reader )
Lesezugriff auf GDC Hardware Management-Ressourcen.
|
gdchardwaremanagement.changeLogEntries.*
gdchardwaremanagement.comments.get
gdchardwaremanagement.comments.list
gdchardwaremanagement.hardware.get
gdchardwaremanagement.hardware.list
gdchardwaremanagement.hardwareGroups.get
gdchardwaremanagement.hardwareGroups.list
gdchardwaremanagement.locations.*
gdchardwaremanagement.operations.get
gdchardwaremanagement.operations.list
gdchardwaremanagement.orders.get
gdchardwaremanagement.orders.list
gdchardwaremanagement.sites.get
gdchardwaremanagement.sites.list
gdchardwaremanagement.skus.*
gdchardwaremanagement.zones.get
gdchardwaremanagement.zones.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/identityplatform.admin )
Vollständiger Zugriff auf Identity Platform-Ressourcen.
|
firebaseauth.*
identitytoolkit.*
|
(roles/identityplatform.viewer )
Lesezugriff auf Identity Platform-Ressourcen.
|
firebaseauth.configs.get
firebaseauth.users.get
identitytoolkit.tenants.get
identitytoolkit.tenants.getIamPolicy
identitytoolkit.tenants.list
|
(roles/identitytoolkit.admin )
Vollständiger Zugriff auf Identity Toolkit-Ressourcen.
|
firebaseauth.*
identitytoolkit.*
|
(roles/identitytoolkit.viewer )
Lesezugriff auf Identity Toolkit-Ressourcen.
|
firebaseauth.configs.get
firebaseauth.users.get
identitytoolkit.tenants.get
identitytoolkit.tenants.getIamPolicy
identitytoolkit.tenants.list
|
Administrator von Apigee-Integrationen
(roles/integrations.apigeeIntegrationAdminRole )
Ein Nutzer mit vollständigem Zugriff auf alle Apigee-Integrationen.
|
connectors.actions.*
connectors.connections.executeSqlQuery
connectors.entities.*
connectors.entityTypes.list
integrations.apigeeAuthConfigs.*
integrations.apigeeCertificates.*
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.*
integrations.apigeeIntegrations.*
integrations.apigeeSfdcChannels.*
integrations.apigeeSfdcInstances.*
integrations.apigeeSuspensions.*
integrations.authConfigs.*
integrations.certificates.*
integrations.executions.*
integrations.integrationVersions.create
integrations.integrationVersions.delete
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrationVersions.update
integrations.integrations.*
integrations.sfdcChannels.*
integrations.sfdcInstances.*
integrations.suspensions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Apigee-Integrationen-Bereitsteller
(roles/integrations.apigeeIntegrationDeployerRole )
Ein Entwickler, der Apigee-Integrationen in der Integrationslaufzeit bereitstellen oder deren Bereitstellung rückgängig machen kann.
|
integrations.apigeeIntegrationVers.deploy
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.list
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrations.deploy
integrations.integrations.get
integrations.integrations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Apigee-Integrationen
(roles/integrations.apigeeIntegrationEditorRole )
Ein Entwickler, der Apigee-Integrationen auflisten, erstellen und aktualisieren kann.
|
connectors.actions.*
connectors.connections.executeSqlQuery
connectors.entities.*
connectors.entityTypes.list
integrations.apigeeAuthConfigs.create
integrations.apigeeAuthConfigs.get
integrations.apigeeAuthConfigs.list
integrations.apigeeAuthConfigs.update
integrations.apigeeCertificates.create
integrations.apigeeCertificates.get
integrations.apigeeCertificates.list
integrations.apigeeCertificates.update
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.*
integrations.apigeeIntegrations.*
integrations.apigeeSfdcChannels.create
integrations.apigeeSfdcChannels.get
integrations.apigeeSfdcChannels.list
integrations.apigeeSfdcChannels.update
integrations.apigeeSfdcInstances.create
integrations.apigeeSfdcInstances.get
integrations.apigeeSfdcInstances.list
integrations.apigeeSfdcInstances.update
integrations.authConfigs.create
integrations.authConfigs.get
integrations.authConfigs.list
integrations.authConfigs.update
integrations.certificates.get
integrations.executions.*
integrations.integrationVersions.create
integrations.integrationVersions.delete
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrationVersions.update
integrations.integrations.create
integrations.integrations.get
integrations.integrations.invoke
integrations.integrations.list
integrations.integrations.update
integrations.sfdcChannels.*
integrations.sfdcInstances.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Aufrufer von Apigee-Integrationen
(roles/integrations.apigeeIntegrationInvokerRole )
Eine Rolle, die Apigee-Integrationen aufrufen kann.
|
connectors.actions.*
connectors.connections.executeSqlQuery
connectors.entities.*
connectors.entityTypes.list
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.*
integrations.executions.*
integrations.integrationVersions.get
integrations.integrationVersions.invoke
integrations.integrationVersions.list
integrations.integrations.get
integrations.integrations.invoke
integrations.integrations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Apigee-Integrationen
(roles/integrations.apigeeIntegrationsViewer )
Ein Entwickler, der Apigee-Integrationen auflisten und ansehen kann.
|
integrations.apigeeAuthConfigs.list
integrations.apigeeCertificates.list
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.list
integrations.apigeeSfdcChannels.list
integrations.apigeeSfdcInstances.list
integrations.authConfigs.get
integrations.authConfigs.list
integrations.certificates.get
integrations.certificates.list
integrations.executions.*
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrations.get
integrations.integrations.list
integrations.sfdcChannels.list
integrations.sfdcInstances.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Genehmiger von Apigee-Integrationen
(roles/integrations.apigeeSuspensionResolver )
Eine Rolle, die Apigee-Integrationen mit Sperr-/Warteaufgabe genehmigen oder ablehnen kann.
|
integrations.apigeeSuspensions.*
integrations.suspensions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Zertifikaten
(roles/integrations.certificateViewer )
Ein Entwickler, der Zertifikate auflisten und ansehen kann.
|
integrations.certificates.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Anwendungsintegrationen
(roles/integrations.integrationAdmin )
Ein Nutzer mit uneingeschränktem Zugriff (CRUD) auf alle Integrationen.
|
integrations.apigeeAuthConfigs.*
integrations.apigeeCertificates.*
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.*
integrations.apigeeIntegrations.*
integrations.apigeeSfdcChannels.*
integrations.apigeeSfdcInstances.*
integrations.apigeeSuspensions.*
integrations.authConfigs.*
integrations.certificates.*
integrations.executions.*
integrations.integrationVersions.create
integrations.integrationVersions.delete
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrationVersions.update
integrations.integrations.*
integrations.sfdcChannels.*
integrations.sfdcInstances.*
integrations.suspensions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bereitsteller von Anwendungsintegrationen
(roles/integrations.integrationDeployer )
Ein Entwickler, der Integrationen in der Integrationslaufzeit bereitstellen oder deren Bereitstellung rückgängig machen kann.
|
integrations.apigeeIntegrationVers.deploy
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.list
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrations.deploy
integrations.integrations.get
integrations.integrations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Anwendungsintegrationen
(roles/integrations.integrationEditor )
Ein Entwickler, der Integrationen auflisten, erstellen und aktualisieren kann.
|
integrations.apigeeAuthConfigs.create
integrations.apigeeAuthConfigs.get
integrations.apigeeAuthConfigs.list
integrations.apigeeAuthConfigs.update
integrations.apigeeCertificates.create
integrations.apigeeCertificates.get
integrations.apigeeCertificates.list
integrations.apigeeCertificates.update
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.*
integrations.apigeeIntegrations.*
integrations.apigeeSfdcChannels.create
integrations.apigeeSfdcChannels.get
integrations.apigeeSfdcChannels.list
integrations.apigeeSfdcChannels.update
integrations.apigeeSfdcInstances.create
integrations.apigeeSfdcInstances.get
integrations.apigeeSfdcInstances.list
integrations.apigeeSfdcInstances.update
integrations.authConfigs.create
integrations.authConfigs.get
integrations.authConfigs.list
integrations.authConfigs.update
integrations.certificates.get
integrations.executions.*
integrations.integrationVersions.create
integrations.integrationVersions.delete
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrationVersions.update
integrations.integrations.create
integrations.integrations.get
integrations.integrations.invoke
integrations.integrations.list
integrations.integrations.update
integrations.sfdcChannels.*
integrations.sfdcInstances.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Aufrufer von Anwendungsintegrationen
(roles/integrations.integrationInvoker )
Eine Rolle, die Integrationen aufrufen kann.
|
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.*
integrations.executions.*
integrations.integrationVersions.get
integrations.integrationVersions.invoke
integrations.integrationVersions.list
integrations.integrations.get
integrations.integrations.invoke
integrations.integrations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Anwendungsintegrationen
(roles/integrations.integrationViewer )
Ein Entwickler, der Integrationen auflisten und ansehen kann.
|
integrations.apigeeAuthConfigs.list
integrations.apigeeCertificates.list
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.list
integrations.apigeeSfdcChannels.list
integrations.apigeeSfdcInstances.list
integrations.authConfigs.get
integrations.authConfigs.list
integrations.certificates.get
integrations.certificates.list
integrations.executions.*
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrations.get
integrations.integrations.list
integrations.sfdcChannels.list
integrations.sfdcInstances.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von SicherheitsintegrationenBeta
(roles/integrations.securityIntegrationAdmin )
Ein Nutzer mit vollständigem Zugriff auf alle Sicherheitsintegrationen.
|
integrations.securityAuthConfigs.*
integrations.securityExecutions.*
integrations.securityIntegTempVers.*
integrations.securityIntegrationVers.*
integrations.securityIntegrations.*
|
Administrator von SFDC-Instanzen für Anwendungsintegrationen
(roles/integrations.sfdcInstanceAdmin )
Ein Nutzer mit vollständigem Zugriff (CRUD) auf alle SFDC-Instanzen.
|
integrations.sfdcChannels.*
integrations.sfdcInstances.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von SFDC-Instanzen für Anwendungsintegrationen
(roles/integrations.sfdcInstanceEditor )
Ein Entwickler, der Integrationen auflisten, erstellen und aktualisieren kann.
|
integrations.sfdcChannels.create
integrations.sfdcChannels.get
integrations.sfdcChannels.list
integrations.sfdcChannels.update
integrations.sfdcInstances.create
integrations.sfdcInstances.get
integrations.sfdcInstances.list
integrations.sfdcInstances.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von SFDC-Instanzen für Anwendungsintegrationen
(roles/integrations.sfdcInstanceViewer )
Ein Entwickler, der SFDC-Instanzen auflisten und ansehen kann.
|
integrations.sfdcChannels.get
integrations.sfdcChannels.list
integrations.sfdcInstances.get
integrations.sfdcInstances.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Genehmiger von Anwendungsintegrationen
(roles/integrations.suspensionResolver )
Eine Rolle, die gesperrte Integrationen entsperren kann.
|
integrations.apigeeSuspensions.*
integrations.suspensions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Account Manager-Administrator für AusstellerwechselBeta
(roles/issuerswitch.accountManagerAdmin )
Diese Rolle kann alle Vorgänge eines Account Managers ausführen
|
issuerswitch.accountManagerTransactions.*
issuerswitch.managedAccounts.*
issuerswitch.operations.get
issuerswitch.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Account Manager Transactions-Administrator für AusstellerwechselBeta
(roles/issuerswitch.accountManagerTransactionsAdmin )
Diese Rolle kann alle Vorgänge im Zusammenhang mit Account-Manager-Transaktionen ausführen
|
issuerswitch.accountManagerTransactions.*
issuerswitch.operations.get
issuerswitch.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Transaktionen für den Ausstellerwechsel-Account ManagerBeta
(roles/issuerswitch.accountManagerTransactionsViewer )
Diese Rolle kann alle Transaktionen des Account Managers ansehen
|
issuerswitch.accountManagerTransactions.list
issuerswitch.operations.get
issuerswitch.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von AusstellerwechselBeta
(roles/issuerswitch.admin )
Zugriff auf alle Rollen zum Ausstellerwechsel
|
issuerswitch.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Ausstellerwechsel-TeilnehmernBeta
(roles/issuerswitch.issuerParticipantsAdmin )
Vollständiger Zugriff auf Beteiligte am Ausstellerwechsel
|
issuerswitch.issuerParticipants.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Ausstellerwechsel-AuflösungenBeta
(roles/issuerswitch.resolutionsAdmin )
Vollständiger Zugriff auf Lösungen von Issuer Switch
|
issuerswitch.complaintTransactions.list
issuerswitch.complaints.*
issuerswitch.disputes.*
issuerswitch.operations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Regeln zum AusstellerwechselBeta
(roles/issuerswitch.rulesAdmin )
Vollständiger Zugriff auf Regeln zum Ausstellerwechsel
|
issuerswitch.ruleMetadata.list
issuerswitch.ruleMetadataValues.*
issuerswitch.rules.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Regeln zum AusstellerwechselBeta
(roles/issuerswitch.rulesViewer )
Diese Rolle kann Regeln und zugehörige Metadaten ansehen.
|
issuerswitch.ruleMetadata.list
issuerswitch.ruleMetadataValues.list
issuerswitch.rules.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Transaktionen für AusstellerwechselBeta
(roles/issuerswitch.transactionsViewer )
Diese Rolle kann alle Transaktionen ansehen
|
issuerswitch.complaintTransactions.list
issuerswitch.financialTransactions.list
issuerswitch.mandateTransactions.list
issuerswitch.metadataTransactions.list
issuerswitch.operations.get
issuerswitch.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/kubernetesmetadata.publisher )
Publisher der Metadaten von Kubernetes-Clustern
|
kubernetesmetadata.*
|
Editor von Mandiant Attack Surface ManagementBeta
(roles/mandiant.attackSurfaceManagementEditor )
Schreibzugriff auf Attack Surface Management
|
mandiant.genericAttackSurfaceManagements.create
mandiant.genericAttackSurfaceManagements.delete
mandiant.genericAttackSurfaceManagements.update
mandiant.genericPlatforms.create
mandiant.genericPlatforms.delete
mandiant.genericPlatforms.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Mandiant Attack Surface ManagementBeta
(roles/mandiant.attackSurfaceManagementViewer )
Lesezugriff auf Attack Surface Management
|
mandiant.genericAttackSurfaceManagements.get
mandiant.genericPlatforms.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Editor für Mandiant Digital Threat MonitoringBeta
(roles/mandiant.digitalThreatMonitoringEditor )
Schreibzugriff auf Digital Threat Monitoring
|
mandiant.genericDigitalThreatMonitorings.create
mandiant.genericDigitalThreatMonitorings.update
mandiant.genericPlatforms.create
mandiant.genericPlatforms.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Mandiant Digital Threat MonitoringBeta
(roles/mandiant.digitalThreatMonitoringViewer )
Lesezugriff auf Digital Threat Monitoring
|
mandiant.genericDigitalThreatMonitorings.get
mandiant.genericPlatforms.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Expertise On-Demand-EditorBeta
(roles/mandiant.expertiseOnDemandEditor )
Schreibzugriff auf Expertise On Demand
|
mandiant.genericExpertiseOnDemands.create
mandiant.genericExpertiseOnDemands.delete
mandiant.genericExpertiseOnDemands.update
mandiant.genericPlatforms.create
mandiant.genericPlatforms.delete
mandiant.genericPlatforms.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Mandiant Expertise On Demand
Beta
(roles/mandiant.expertiseOnDemandViewer )
Lesezugriff auf Expertise On Demand
|
mandiant.genericExpertiseOnDemands.get
mandiant.genericPlatforms.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Threat Intel-EditorBeta
(roles/mandiant.threatIntelEditor )
Schreibzugriff auf Threat Intelligence
|
mandiant.genericPlatforms.create
mandiant.genericPlatforms.delete
mandiant.genericPlatforms.update
mandiant.genericThreatIntels.create
mandiant.genericThreatIntels.delete
mandiant.genericThreatIntels.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Threat Intel Viewer
Beta
(roles/mandiant.threatIntelViewer )
Lesezugriff auf Threat Intelligence
|
mandiant.genericPlatforms.get
mandiant.genericThreatIntels.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant-Validierungseditor
Beta
(roles/mandiant.validationEditor )
Schreibzugriff auf Validation
|
mandiant.genericPlatforms.create
mandiant.genericPlatforms.delete
mandiant.genericPlatforms.update
mandiant.genericValidations.create
mandiant.genericValidations.delete
mandiant.genericValidations.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Validation-Betrachter
Beta
(roles/mandiant.validationViewer )
Lesezugriff auf Validation
|
mandiant.genericPlatforms.get
mandiant.genericValidations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Maps Analytics-Betrachter
Beta
(roles/mapsanalytics.viewer )
Gewährt Lesezugriff auf alle Maps-Analyseressourcen.
|
mapsanalytics.*
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.services.list
|
(roles/mapsplatformdatasets.admin )
Gewährt Lese- und Schreibzugriff auf alle Ressourcen der Maps Platform Datasets API
|
mapsadmin.clientStyles.*
mapsplatformdatasets.*
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/mapsplatformdatasets.viewer )
Gewährt Lesezugriff auf alle Ressourcen der Maps Platform Datasets API
|
mapsadmin.clientStyles.get
mapsadmin.clientStyles.list
mapsplatformdatasets.datasets.export
mapsplatformdatasets.datasets.get
mapsplatformdatasets.datasets.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Marketplace-LösungenBeta
(roles/marketplacesolutions.admin )
Vollständiger Zugriff auf Ressourcen von Marketplace-Lösungen.
|
marketplacesolutions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Marketplace-LösungenBeta
(roles/marketplacesolutions.editor )
Bearbeitungszugriff auf Ressourcen von Marketplace-Lösungen.
|
marketplacesolutions.locations.*
marketplacesolutions.operations.get
marketplacesolutions.operations.list
marketplacesolutions.powerImages.*
marketplacesolutions.powerInstances.get
marketplacesolutions.powerInstances.list
marketplacesolutions.powerInstances.update
marketplacesolutions.powerNetworks.*
marketplacesolutions.powerSshKeys.*
marketplacesolutions.powerVolumes.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Marketplace-Lösungen
Beta
(roles/marketplacesolutions.viewer )
Lesezugriff auf Ressourcen von Marketplace-Lösungen.
|
marketplacesolutions.locations.*
marketplacesolutions.operations.get
marketplacesolutions.operations.list
marketplacesolutions.powerImages.*
marketplacesolutions.powerInstances.get
marketplacesolutions.powerInstances.list
marketplacesolutions.powerNetworks.*
marketplacesolutions.powerSshKeys.*
marketplacesolutions.powerVolumes.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator der Google Home Developer Console
(roles/nestconsole.homeDeveloperAdmin )
Administratorzugriff auf Ressourcen der Google Home Developer Console
|
nestconsole.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter der Google Home Developer Console
(roles/nestconsole.homeDeveloperEditor )
Lese-/Schreibzugriff auf Ressourcen der Google Home Developer Console
|
nestconsole.smarthomePreviews.update
nestconsole.smarthomeProjects.get
nestconsole.smarthomeProjects.update
nestconsole.smarthomeVersions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Leser der Google Home Developer Console
(roles/nestconsole.homeDeveloperViewer )
Lesezugriff auf Ressourcen der Google Home Developer Console
|
nestconsole.smarthomeProjects.get
nestconsole.smarthomeVersions.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Google Cloud NetApp Volumes-AdministratorBeta
(roles/netapp.admin )
Vollständiger Zugriff auf Ressourcen von Google Cloud NetApp Volumes.
|
netapp.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Google Cloud NetApp Volumes-BetrachterBeta
(roles/netapp.viewer )
Lesezugriff auf Ressourcen von Google Cloud NetApp Volumes.
|
netapp.activeDirectories.get
netapp.activeDirectories.list
netapp.backupPolicies.get
netapp.backupPolicies.list
netapp.backupVaults.get
netapp.backupVaults.list
netapp.backups.get
netapp.backups.list
netapp.kmsConfigs.get
netapp.kmsConfigs.list
netapp.replications.get
netapp.replications.list
netapp.snapshots.get
netapp.snapshots.list
netapp.storagePools.get
netapp.storagePools.list
netapp.volumes.get
netapp.volumes.list
resourcemanager.projects.get
resourcemanager.projects.list
|
OAuth-KonfigurationsbearbeiterBeta
(roles/oauthconfig.editor )
Lese-/Schreibzugriff auf OAuth-Konfigurationsressourcen
|
clientauthconfig.*
oauthconfig.*
|
OAuth-KonfigurationsbetrachterBeta
(roles/oauthconfig.viewer )
Lesezugriff auf OAuth-Konfigurationsressourcen
|
clientauthconfig.brands.get
clientauthconfig.brands.list
clientauthconfig.clients.get
clientauthconfig.clients.list
oauthconfig.clientpolicy.get
oauthconfig.testusers.get
oauthconfig.verification.get
|
Payments-Reseller-AdministratorBeta
(roles/paymentsresellersubscription.partnerAdmin )
Vollständiger Zugriff auf alle Payments-Reseller-Ressourcen, einschließlich Abos, Produkte und Promotions
|
paymentsresellersubscription.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Payments-Reseller-Betrachter
Beta
(roles/paymentsresellersubscription.partnerViewer )
Lesezugriff auf alle Payments-Reseller-Ressourcen, einschließlich Abos, Produkte und Promotions
|
paymentsresellersubscription.products.list
paymentsresellersubscription.promotions.list
paymentsresellersubscription.subscriptions.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Payments-Reseller-Produkten
Beta
(roles/paymentsresellersubscription.productViewer )
Lesezugriff auf die Payments Reseller-Produktressource
|
paymentsresellersubscription.products.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/paymentsresellersubscription.promotionViewer )
Lesezugriff auf die Payments Reseller-Promotion-Ressource
|
paymentsresellersubscription.promotions.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Payments Reseller-Abos
Beta
(roles/paymentsresellersubscription.subscriptionEditor )
Schreibzugriff auf die Payments Reseller-Abo-Ressource
|
paymentsresellersubscription.subscriptions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Payments Reseller-Abos
Beta
(roles/paymentsresellersubscription.subscriptionViewer )
Lesezugriff auf die Payments Reseller-Abo-Ressource
|
paymentsresellersubscription.subscriptions.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Aktivitätsanalysen
Beta
(roles/policyanalyzer.activityAnalysisViewer )
Nutzer mit der Berechtigung „Betrachter“, der alle Aktivitätsanalysen lesen kann.
|
policyanalyzer.*
|
(roles/policyremediatormanager.policyRemediatorAdmin )
Gewährt die Berechtigung, die Nutzung von Policy Remediator für die Organisation zu aktivieren und zu deaktivieren
|
policyremediatormanager.*
|
(roles/policyremediatormanager.policyRemediatorReader )
Gewährt die Berechtigung, den Status von Policy Remediator für die Organisation zu lesen bzw. anzusehen
|
policyremediatormanager.locations.*
policyremediatormanager.operations.get
policyremediatormanager.operations.list
policyremediatormanager.remediatorServices.get
|
Simulator-AdministratorBeta
(roles/policysimulator.admin )
Administrator, der Wiedergaben ausführen und aufrufen kann.
|
policysimulator.replayResults.list
policysimulator.replays.*
|
Administrator des OrgPolicy-SimulatorsBeta
(roles/policysimulator.orgPolicyAdmin )
OrgPolicy-Administrator, der Simulationen ausführen und darauf zugreifen kann.
|
cloudasset.assets.analyzeOrgPolicy
cloudasset.assets.exportResource
cloudasset.assets.listResource
cloudasset.assets.searchAllResources
orgpolicy.customConstraints.get
orgpolicy.customConstraints.list
orgpolicy.policies.list
orgpolicy.policy.get
policysimulator.orgPolicyViolations.list
policysimulator.orgPolicyViolationsPreviews.*
resourcemanager.organizations.get
|
Ersteller externer KontoschlüsselBeta
(roles/publicca.externalAccountKeyCreator )
Mit dieser Rolle kann eine neue externalAccountKey-Ressource erstellt werden.
|
publicca.externalAccountKeys.create
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Aboverknüpfungen
(roles/readerrevenuesubscriptionlinking.admin )
Vollständiger Zugriff auf Ressourcen des Lesers von Veröffentlichungen
|
readerrevenuesubscriptionlinking.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Berechtigungen für Aboverknüpfungen
(roles/readerrevenuesubscriptionlinking.entitlementsViewer )
Diese Rolle kann alle Berechtigungen des Lesers von Veröffentlichungen ansehen
|
readerrevenuesubscriptionlinking.readerEntitlements.get
|
Betrachter von Aboverknüpfungen
(roles/readerrevenuesubscriptionlinking.viewer )
Diese Rolle kann alle Ressourcen des Lesers von Veröffentlichungen ansehen
|
readerrevenuesubscriptionlinking.readerEntitlements.get
readerrevenuesubscriptionlinking.readers.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Empfehlungsexporteur
(roles/recommender.exporter )
Exporteur von Empfehlungen
|
recommender.resources.export
|
Remote Build Execution Action Cache-AutorBeta
(roles/remotebuildexecution.actionCacheWriter )
Remote Build Execution Action Cache-Autor
|
remotebuildexecution.actions.set
remotebuildexecution.blobs.create
|
Remote Build Execution Artifact-AdministratorBeta
(roles/remotebuildexecution.artifactAdmin )
Remote Build Execution Artifact-Administrator
|
remotebuildexecution.actions.create
remotebuildexecution.actions.delete
remotebuildexecution.actions.get
remotebuildexecution.blobs.*
remotebuildexecution.logstreams.*
|
Remote Build Execution Artifact-ErstellerBeta
(roles/remotebuildexecution.artifactCreator )
Remote Build Execution Artifact-Ersteller
|
remotebuildexecution.actions.create
remotebuildexecution.actions.get
remotebuildexecution.blobs.*
remotebuildexecution.logstreams.*
|
Remote Build Execution Artifact-BetrachterBeta
(roles/remotebuildexecution.artifactViewer )
Remote Build Execution Artifact-Betrachter
|
remotebuildexecution.actions.get
remotebuildexecution.blobs.get
remotebuildexecution.logstreams.get
|
Remote-Build Execution Configuration-AdministratorBeta
(roles/remotebuildexecution.configurationAdmin )
Remote Build Execution Configuration-Administrator
|
remotebuildexecution.instances.*
remotebuildexecution.workerpools.*
|
Remote Build Execution Configuration-BetrachterBeta
(roles/remotebuildexecution.configurationViewer )
Remote Build Execution Configuration-Betrachter
|
remotebuildexecution.instances.get
remotebuildexecution.instances.list
remotebuildexecution.workerpools.get
remotebuildexecution.workerpools.list
|
Remote Build Execution Logstream-AutorBeta
(roles/remotebuildexecution.logstreamWriter )
Remote Build Execution Logstream-Autor
|
remotebuildexecution.logstreams.create
remotebuildexecution.logstreams.update
|
Remote Build Execution Reservation-AdministratorBeta
(roles/remotebuildexecution.reservationAdmin )
Remote Build Execution Reservation-Administrator
|
remotebuildexecution.actions.create
remotebuildexecution.actions.delete
remotebuildexecution.actions.get
|
Remote Build Execution-WorkerBeta
(roles/remotebuildexecution.worker )
Remote Build Execution-Worker
|
remotebuildexecution.actions.update
remotebuildexecution.blobs.*
remotebuildexecution.botsessions.*
remotebuildexecution.logstreams.create
remotebuildexecution.logstreams.update
|
Retail-Administrator
(roles/retail.admin )
Gewährt vollständigen Zugriff auf Ressourcen der Retail API.
|
automlrecommendations.apiKeys.create
automlrecommendations.apiKeys.delete
automlrecommendations.catalogItems.*
automlrecommendations.catalogs.*
automlrecommendations.eventStores.getStats
automlrecommendations.events.create
automlrecommendations.events.list
automlrecommendations.events.purge
automlrecommendations.events.rejoin
automlrecommendations.placements.*
automlrecommendations.recommendations.*
retail.*
|
Retail-Bearbeiter
(roles/retail.editor )
Vollständiger Zugriff auf Retail API-Ressourcen mit Ausnahme des dauerhaften Löschens, der erneuten Aufnahme und des Festlegens des Produktsponsorings.
|
automlrecommendations.apiKeys.create
automlrecommendations.apiKeys.delete
automlrecommendations.catalogItems.*
automlrecommendations.catalogs.*
automlrecommendations.eventStores.getStats
automlrecommendations.events.create
automlrecommendations.events.list
automlrecommendations.placements.*
automlrecommendations.recommendations.*
retail.attributesConfigs.addCatalogAttribute
retail.attributesConfigs.exportCatalogAttributes
retail.attributesConfigs.get
retail.attributesConfigs.importCatalogAttributes
retail.attributesConfigs.replaceCatalogAttribute
retail.attributesConfigs.update
retail.catalogs.*
retail.controls.*
retail.experiments.*
retail.models.*
retail.operations.*
retail.placements.*
retail.products.create
retail.products.delete
retail.products.export
retail.products.get
retail.products.import
retail.products.list
retail.products.update
retail.retailProjects.get
retail.servingConfigs.*
retail.userEvents.create
retail.userEvents.import
|
Retail-Betrachter
(roles/retail.viewer )
Gewährt Lesezugriff auf alle Ressourcen in Retail.
|
automlrecommendations.catalogItems.get
automlrecommendations.catalogItems.list
automlrecommendations.catalogs.getStats
automlrecommendations.catalogs.list
automlrecommendations.eventStores.getStats
automlrecommendations.events.list
automlrecommendations.placements.getStats
automlrecommendations.placements.list
automlrecommendations.recommendations.list
retail.attributesConfigs.exportCatalogAttributes
retail.attributesConfigs.get
retail.catalogs.completeQuery
retail.catalogs.exportAnalyticsMetrics
retail.catalogs.list
retail.controls.export
retail.controls.get
retail.controls.list
retail.experiments.get
retail.experiments.list
retail.experiments.loadExperimentLookerDashboard
retail.experiments.queryTrafficMetrics
retail.models.get
retail.models.list
retail.operations.*
retail.placements.*
retail.products.export
retail.products.get
retail.products.list
retail.retailProjects.get
retail.servingConfigs.get
retail.servingConfigs.list
retail.servingConfigs.predict
retail.servingConfigs.search
|
RISC-Konfigurationsadministrator
Beta
(roles/riscconfigs.admin )
Lese-/Schreibzugriff auf RISC-Konfigurationsressourcen.
|
clientauthconfig.clients.list
riscconfigurationservice.*
|
RISC-Konfigurationsbetrachter
Beta
(roles/riscconfigs.viewer )
Lesezugriff auf RISC-Konfigurationsressourcen.
|
clientauthconfig.clients.list
riscconfigurationservice.riscconfigs.get
|
Entwickler von serverlosen Integrationen
Beta
(roles/runapps.developer )
Zugriff zum Erstellen von serverlosen Integrationen und ihrer Konfiguration.
|
resourcemanager.projects.get
resourcemanager.projects.list
runapps.applications.*
runapps.deployments.get
runapps.deployments.list
runapps.locations.*
runapps.operations.*
|
Operator von serverlosen Integrationen
Beta
(roles/runapps.operator )
Zugriff zum Bereitstellen serverloser Integrationen.
|
resourcemanager.projects.get
resourcemanager.projects.list
runapps.applications.get
runapps.applications.getStatus
runapps.applications.list
runapps.deployments.*
runapps.locations.*
runapps.operations.*
|
Betrachter von serverlosen Integrationen
Beta
(roles/runapps.viewer )
Lesezugriff auf serverlose Integrationsressourcen.
|
resourcemanager.projects.get
resourcemanager.projects.list
runapps.applications.get
runapps.applications.getStatus
runapps.applications.list
runapps.deployments.get
runapps.deployments.list
runapps.locations.*
runapps.operations.get
runapps.operations.list
|
Administrator für Cloud Runtime Configuration
(roles/runtimeconfig.admin )
Vollständiger Zugriff auf RuntimeConfig-Ressourcen.
|
runtimeconfig.*
|
(roles/securedlandingzone.bqdwOrgRemediator )
Zugriff zum Ändern (Korrigieren) von Ressourcen im SLZ-BQDW-Blueprint auf Organisationsebene.
|
accesscontextmanager.servicePerimeters.get
accesscontextmanager.servicePerimeters.list
accesscontextmanager.servicePerimeters.update
|
(roles/securedlandingzone.bqdwProjectRemediator )
Zugriff zum Ändern (Korrigieren) von Ressourcen im SLZ-BQDW-Blueprint auf Projektebene.
|
bigquery.datasets.get
bigquery.datasets.getIamPolicy
bigquery.datasets.setIamPolicy
bigquery.datasets.update
cloudkms.cryptoKeys.get
cloudkms.cryptoKeys.getIamPolicy
cloudkms.cryptoKeys.list
cloudkms.cryptoKeys.setIamPolicy
cloudkms.cryptoKeys.update
cloudkms.keyRings.getIamPolicy
cloudkms.keyRings.setIamPolicy
pubsub.topics.get
pubsub.topics.getIamPolicy
pubsub.topics.list
pubsub.topics.setIamPolicy
pubsub.topics.update
resourcemanager.projects.update
serviceusage.services.use
storage.buckets.get
storage.buckets.getIamPolicy
storage.buckets.list
storage.buckets.setIamPolicy
storage.buckets.update
|
Overwatch-AktivatorBeta
(roles/securedlandingzone.overwatchActivator )
Diese Rolle kann Overwatches aktivieren oder sperren
|
resourcemanager.projects.get
resourcemanager.projects.list
securedlandingzone.overwatches.activate
securedlandingzone.overwatches.suspend
|
Overwatch-AdministratorBeta
(roles/securedlandingzone.overwatchAdmin )
Vollständiger Zugriff auf Overwatches
|
resourcemanager.projects.get
resourcemanager.projects.list
securedlandingzone.*
|
Overwatch-Betrachter
Beta
(roles/securedlandingzone.overwatchViewer )
Diese Rolle kann alle Attribute von Overwatches ansehen
|
resourcemanager.projects.get
resourcemanager.projects.list
securedlandingzone.operations.get
securedlandingzone.overwatches.get
securedlandingzone.overwatches.list
|
Security Center Management Admin
(roles/securitycentermanagement.admin )
Vollständiger Zugriff zum Verwalten der Konfiguration von Diensten und benutzerdefinierten Modulen von Cloud Security Command Center.
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycenter.organizationsettings.*
securitycenter.securitycentersettings.*
securitycentermanagement.*
|
Security Center Management Custom Modules Editor
(roles/securitycentermanagement.customModulesEditor )
Vollständiger Zugriff zur Verwaltung benutzerdefinierter Module in Cloud Security Command Center.
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycentermanagement.effectiveEventThreatDetectionCustomModules.*
securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*
securitycentermanagement.eventThreatDetectionCustomModules.*
securitycentermanagement.locations.*
securitycentermanagement.securityHealthAnalyticsCustomModules.*
|
Security Center Management Custom Modules Viewer
(roles/securitycentermanagement.customModulesViewer )
Lesezugriff auf benutzerdefinierte Cloud Security Command Center-Module.
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycentermanagement.effectiveEventThreatDetectionCustomModules.*
securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*
securitycentermanagement.eventThreatDetectionCustomModules.get
securitycentermanagement.eventThreatDetectionCustomModules.list
securitycentermanagement.eventThreatDetectionCustomModules.validate
securitycentermanagement.locations.*
securitycentermanagement.securityHealthAnalyticsCustomModules.get
securitycentermanagement.securityHealthAnalyticsCustomModules.list
securitycentermanagement.securityHealthAnalyticsCustomModules.simulate
securitycentermanagement.securityHealthAnalyticsCustomModules.test
|
Security Center Management Custom ETD Modules Editor
(roles/securitycentermanagement.etdCustomModulesEditor )
Vollständiger Zugriff zum Verwalten benutzerdefinierter ETD-Module von Cloud Security Command Center.
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycentermanagement.effectiveEventThreatDetectionCustomModules.*
securitycentermanagement.eventThreatDetectionCustomModules.*
securitycentermanagement.locations.*
|
Security Center Management ETD Custom Modules Viewer
(roles/securitycentermanagement.etdCustomModulesViewer )
Lesezugriff auf benutzerdefinierte ETD-Module in Cloud Security Command Center.
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycentermanagement.effectiveEventThreatDetectionCustomModules.*
securitycentermanagement.eventThreatDetectionCustomModules.get
securitycentermanagement.eventThreatDetectionCustomModules.list
securitycentermanagement.eventThreatDetectionCustomModules.validate
securitycentermanagement.locations.*
|
Security Center Management Settings Editor
(roles/securitycentermanagement.settingsEditor )
Vollständiger Zugriff zum Verwalten von Cloud Security Command Center-Einstellungen
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycenter.organizationsettings.*
securitycenter.securitycentersettings.*
securitycentermanagement.*
|
Security Center Management Settings Viewer
(roles/securitycentermanagement.settingsViewer )
Lesezugriff auf Cloud Security Command Center-Einstellungen
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycenter.organizationsettings.get
securitycenter.securitycentersettings.get
securitycentermanagement.effectiveEventThreatDetectionCustomModules.*
securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*
securitycentermanagement.eventThreatDetectionCustomModules.get
securitycentermanagement.eventThreatDetectionCustomModules.list
securitycentermanagement.eventThreatDetectionCustomModules.validate
securitycentermanagement.locations.*
securitycentermanagement.securityCommandCenter.get
securitycentermanagement.securityHealthAnalyticsCustomModules.get
securitycentermanagement.securityHealthAnalyticsCustomModules.list
securitycentermanagement.securityHealthAnalyticsCustomModules.simulate
securitycentermanagement.securityHealthAnalyticsCustomModules.test
|
Security Center Management SHA Custom Modules Editor
(roles/securitycentermanagement.shaCustomModulesEditor )
Vollständiger Zugriff zum Verwalten benutzerdefinierter SHA-Module von Cloud Security Command Center.
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*
securitycentermanagement.locations.*
securitycentermanagement.securityHealthAnalyticsCustomModules.*
|
Security Center Management SHA Custom Modules Viewer
(roles/securitycentermanagement.shaCustomModulesViewer )
Lesezugriff auf benutzerdefinierte Cloud Security Command Center-SHA-Module.
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*
securitycentermanagement.locations.*
securitycentermanagement.securityHealthAnalyticsCustomModules.get
securitycentermanagement.securityHealthAnalyticsCustomModules.list
securitycentermanagement.securityHealthAnalyticsCustomModules.simulate
securitycentermanagement.securityHealthAnalyticsCustomModules.test
|
Security Center Management Viewer
(roles/securitycentermanagement.viewer )
Lesezugriff auf die Konfiguration von Diensten und benutzerdefinierten Modulen von Cloud Security Command Center.
|
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
securitycenter.organizationsettings.get
securitycenter.securitycentersettings.get
securitycentermanagement.effectiveEventThreatDetectionCustomModules.*
securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*
securitycentermanagement.eventThreatDetectionCustomModules.get
securitycentermanagement.eventThreatDetectionCustomModules.list
securitycentermanagement.eventThreatDetectionCustomModules.validate
securitycentermanagement.locations.*
securitycentermanagement.securityCommandCenter.get
securitycentermanagement.securityHealthAnalyticsCustomModules.get
securitycentermanagement.securityHealthAnalyticsCustomModules.list
securitycentermanagement.securityHealthAnalyticsCustomModules.simulate
securitycentermanagement.securityHealthAnalyticsCustomModules.test
|
Security Posture Admin
(roles/securityposture.admin )
Vollständiger Zugriff auf Security Posture-Dienst-APIs.
|
orgpolicy.*
resourcemanager.organizations.get
securitycenter.securityhealthanalyticssettings.*
securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*
securitycentermanagement.securityHealthAnalyticsCustomModules.create
securitycentermanagement.securityHealthAnalyticsCustomModules.delete
securitycentermanagement.securityHealthAnalyticsCustomModules.get
securitycentermanagement.securityHealthAnalyticsCustomModules.list
securitycentermanagement.securityHealthAnalyticsCustomModules.update
securityposture.*
|
Security Posture Deployer
(roles/securityposture.postureDeployer )
Änderungs- und Leseberechtigungen für die Posture-Bereitstellungsressource.
|
orgpolicy.*
resourcemanager.organizations.get
securitycenter.securityhealthanalyticssettings.*
securitycentermanagement.securityHealthAnalyticsCustomModules.create
securitycentermanagement.securityHealthAnalyticsCustomModules.delete
securitycentermanagement.securityHealthAnalyticsCustomModules.update
securityposture.operations.get
securityposture.postureDeployments.*
|
Security Posture Deployments Viewer
(roles/securityposture.postureDeploymentsViewer )
Lesezugriff auf die Posture-Bereitstellungsressource.
|
resourcemanager.organizations.get
securityposture.operations.get
securityposture.postureDeployments.get
securityposture.postureDeployments.list
|
Security Posture Resource Editor
(roles/securityposture.postureEditor )
Änderungs- und Leseberechtigungen für die Posture-Ressource.
|
securityposture.operations.get
securityposture.postures.*
|
Security Posture Resource Viewer
(roles/securityposture.postureViewer )
Lesezugriff auf die Posture-Ressource.
|
resourcemanager.organizations.get
securityposture.operations.get
securityposture.postures.get
securityposture.postures.list
|
Security Posture Shift-Left Validator
(roles/securityposture.reportCreator )
Erstellungszugriff auf Berichte, z. B. IaC-Validierungsbericht.
|
securityposture.operations.get
securityposture.reports.*
|
Security Posture Viewer
(roles/securityposture.viewer )
Lesezugriff auf alle Security Posture-Dienstressourcen.
|
resourcemanager.organizations.get
securityposture.operations.get
securityposture.postureDeployments.get
securityposture.postureDeployments.list
securityposture.postureTemplates.*
securityposture.postures.get
securityposture.postures.list
|
Personalized Service Health-Betrachter
Beta
(roles/servicehealth.viewer )
Lesezugriff auf Personalized Service Health-Ressourcen.
|
resourcemanager.projects.get
resourcemanager.projects.list
servicehealth.*
|
Security Insights-BetrachterBeta
(roles/servicesecurityinsights.securityInsightsViewer )
Lesezugriff auf Security Insights-Ressourcen
|
servicesecurityinsights.*
|
Speaker ID-Administrator
(roles/speakerid.admin )
Gewährt vollständigen Zugriff auf alle Speaker ID-Ressourcen, einschließlich Projekteinstellungen.
|
speakerid.*
|
Speaker ID-Bearbeiter
(roles/speakerid.editor )
Gewährt Lese- und Schreibzugriff auf alle Speaker ID-Ressourcen.
|
speakerid.phrases.*
speakerid.speakers.*
|
Speaker ID-Verifizierer
(roles/speakerid.verifier )
Gewährt Lesezugriff auf alle Speaker ID-Ressourcen und erlaubt Verifizierung.
|
speakerid.phrases.get
speakerid.phrases.list
speakerid.speakers.get
speakerid.speakers.list
speakerid.speakers.verify
|
Speaker ID-Betrachter
(roles/speakerid.viewer )
Gewährt Lesezugriff auf alle Speaker ID-Ressourcen.
|
speakerid.phrases.get
speakerid.phrases.list
speakerid.speakers.get
speakerid.speakers.list
|
Cloud Speech-Administrator
(roles/speech.admin )
Gewährt uneingeschränkten Zugriff auf alle Ressourcen in Speech-to-Text
|
speech.*
|
Cloud Speech-Client
(roles/speech.client )
Gewährt Zugriff auf APIs für die Erkennung.
|
speech.adaptations.execute
speech.customClasses.get
speech.customClasses.list
speech.locations.*
speech.operations.get
speech.operations.list
speech.operations.wait
speech.phraseSets.get
speech.phraseSets.list
speech.recognizers.get
speech.recognizers.list
speech.recognizers.recognize
|
Cloud Speech-Bearbeiter
(roles/speech.editor )
Gewährt Zugriff zum Bearbeiten von Ressourcen in Speech-to-Text
|
speech.adaptations.execute
speech.customClasses.*
speech.locations.*
speech.operations.*
speech.phraseSets.*
speech.recognizers.*
|
Administrator von Storage Insights
(roles/storageinsights.admin )
Vollständiger Zugriff auf Storage Insights-Ressourcen.
|
resourcemanager.projects.get
resourcemanager.projects.list
storageinsights.*
|
Storage Insights Analyst
(roles/storageinsights.analyst )
Datenzugriff auf Storage Insights.
|
resourcemanager.projects.get
resourcemanager.projects.list
storageinsights.datasetConfigs.get
storageinsights.datasetConfigs.linkDataset
storageinsights.datasetConfigs.list
storageinsights.datasetConfigs.unlinkDataset
storageinsights.locations.*
storageinsights.operations.get
storageinsights.operations.list
storageinsights.reportConfigs.get
storageinsights.reportConfigs.list
storageinsights.reportDetails.*
|
Betrachter von Storage Insights
(roles/storageinsights.viewer )
Lesezugriff auf Storage Insights-Ressourcen.
|
resourcemanager.projects.get
resourcemanager.projects.list
storageinsights.datasetConfigs.get
storageinsights.datasetConfigs.list
storageinsights.locations.*
storageinsights.operations.get
storageinsights.operations.list
storageinsights.reportConfigs.get
storageinsights.reportConfigs.list
storageinsights.reportDetails.*
|
Abonnieren mit Google-EntwicklerBeta
(roles/subscribewithgoogledeveloper.developer )
Zugriff auf DevTools für "Abonnieren mit Google"
|
resourcemanager.projects.get
resourcemanager.projects.list
subscribewithgoogledeveloper.tools.get
|
Telco Automation-AdministratorBeta
(roles/telcoautomation.admin )
Vollständiger Zugriff auf Telco Automation-Ressourcen.
|
logging.buckets.get
logging.buckets.list
logging.exclusions.get
logging.exclusions.list
logging.links.get
logging.links.list
logging.locations.*
logging.logEntries.list
logging.logMetrics.get
logging.logMetrics.list
logging.logServiceIndexes.list
logging.logServices.list
logging.logs.list
logging.operations.get
logging.operations.list
logging.queries.create
logging.queries.delete
logging.queries.get
logging.queries.list
logging.queries.listShared
logging.queries.update
logging.sinks.get
logging.sinks.list
logging.usage.get
logging.views.get
logging.views.list
monitoring.timeSeries.list
resourcemanager.projects.get
serviceusage.quotas.*
serviceusage.services.*
source.repos.get
source.repos.list
telcoautomation.*
|
Blueprint-Designer von Telco AutomationBeta
(roles/telcoautomation.blueprintDesigner )
Kann Blueprints verwalten
|
telcoautomation.blueprints.create
telcoautomation.blueprints.delete
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.blueprints.propose
telcoautomation.blueprints.update
telcoautomation.deployments.computeStatus
telcoautomation.deployments.get
telcoautomation.deployments.list
telcoautomation.hydratedDeployments.get
telcoautomation.hydratedDeployments.list
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
telcoautomation.publicBlueprints.*
|
Telco Automation-Bereitstellungsadministrator
Beta
(roles/telcoautomation.deploymentAdmin )
Kann Bereitstellungen verwalten
|
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.deployments.*
telcoautomation.hydratedDeployments.*
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
|
Telco Automation Tier 1 Operations Admin
Beta
(roles/telcoautomation.opsAdminTier1 )
Kann Status von Bereitstellungen abrufen
|
logging.buckets.get
logging.buckets.list
logging.exclusions.get
logging.exclusions.list
logging.links.get
logging.links.list
logging.locations.*
logging.logEntries.list
logging.logMetrics.get
logging.logMetrics.list
logging.logServiceIndexes.list
logging.logServices.list
logging.logs.list
logging.operations.get
logging.operations.list
logging.queries.create
logging.queries.delete
logging.queries.get
logging.queries.list
logging.queries.listShared
logging.queries.update
logging.sinks.get
logging.sinks.list
logging.usage.get
logging.views.get
logging.views.list
resourcemanager.projects.get
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.deployments.computeStatus
telcoautomation.deployments.get
telcoautomation.deployments.list
telcoautomation.hydratedDeployments.get
telcoautomation.hydratedDeployments.list
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
|
Telco Automation Tier 4 Operations Admin
Beta
(roles/telcoautomation.opsAdminTier4 )
Kann Bereitstellungen und deren Status verwalten
|
logging.buckets.get
logging.buckets.list
logging.exclusions.get
logging.exclusions.list
logging.links.get
logging.links.list
logging.locations.*
logging.logEntries.list
logging.logMetrics.get
logging.logMetrics.list
logging.logServiceIndexes.list
logging.logServices.list
logging.logs.list
logging.operations.get
logging.operations.list
logging.queries.create
logging.queries.delete
logging.queries.get
logging.queries.list
logging.queries.listShared
logging.queries.update
logging.sinks.get
logging.sinks.list
logging.usage.get
logging.views.get
logging.views.list
resourcemanager.projects.get
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.deployments.*
telcoautomation.hydratedDeployments.*
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
|
Telco Automation Service Orchestrator
Beta
(roles/telcoautomation.serviceOrchestrator )
Kann Bereitstellungen verwalten
|
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.deployments.*
telcoautomation.hydratedDeployments.*
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
|
Bearbeiter von Insights-Datasets von ZeitreihenBeta
(roles/timeseriesinsights.datasetsEditor )
Bearbeitungszugriff auf Datasets.
|
timeseriesinsights.*
|
Inhaber von Insights-Datasets von ZeitreihenBeta
(roles/timeseriesinsights.datasetsOwner )
Vollständiger Zugriff auf Datasets.
|
timeseriesinsights.*
|
Betrachter von Insights-Datasets von ZeitreihenBeta
(roles/timeseriesinsights.datasetsViewer )
Lesezugriff (Auflisten und Abfrage) auf Datasets.
|
timeseriesinsights.datasets.evaluate
timeseriesinsights.datasets.list
timeseriesinsights.datasets.query
timeseriesinsights.locations.*
|
Traffic Director-ClientBeta
(roles/trafficdirector.client )
Dienstkonfigurationen und Berichtsmesswerte abrufen
|
trafficdirector.*
|
Translation Hub-AdministratorBeta
(roles/translationhub.admin )
Administrator von Translation Hub
|
automl.models.get
automl.models.list
automl.models.predict
cloudtranslate.customModels.get
cloudtranslate.customModels.list
cloudtranslate.customModels.predict
cloudtranslate.glossaries.create
cloudtranslate.glossaries.delete
cloudtranslate.glossaries.get
cloudtranslate.glossaries.list
cloudtranslate.glossaries.predict
resourcemanager.projects.get
resourcemanager.projects.list
translationhub.*
|
Nutzer des Translation Hub-PortalsBeta
(roles/translationhub.portalUser )
Portalnutzer von Translation Hub
|
automl.models.get
automl.models.list
automl.models.predict
cloudtranslate.customModels.get
cloudtranslate.customModels.list
cloudtranslate.customModels.predict
cloudtranslate.glossaries.get
cloudtranslate.glossaries.list
cloudtranslate.glossaries.predict
resourcemanager.projects.get
resourcemanager.projects.list
translationhub.portals.get
translationhub.portals.list
|
Visual Inspection AI-Lösungsbearbeiter
(roles/visualinspection.editor )
Lese- und Schreibzugriff auf alle Visual Inspection AI-Ressourcen mit Ausnahme von „visualinspection.locations.reportUsageMetrics“
|
visualinspection.annotationSets.*
visualinspection.annotationSpecs.*
visualinspection.annotations.*
visualinspection.datasets.*
visualinspection.images.*
visualinspection.locations.get
visualinspection.locations.list
visualinspection.modelEvaluations.*
visualinspection.models.*
visualinspection.modules.*
visualinspection.operations.*
visualinspection.solutionArtifacts.*
visualinspection.solutions.*
|
Reporter für Visual Inspection AI-Nutzungsmesswerte
(roles/visualinspection.usageMetricsReporter )
ReportUsageMetric-Zugriff auf Visual Inspection AI-Dienst
|
visualinspection.locations.reportUsageMetrics
|
Visual Inspection AI-Betrachter
(roles/visualinspection.viewer )
Lesezugriff auf Visual Inspection AI-Ressourcen
|
visualinspection.annotationSets.get
visualinspection.annotationSets.list
visualinspection.annotationSpecs.get
visualinspection.annotationSpecs.list
visualinspection.annotations.get
visualinspection.annotations.list
visualinspection.datasets.export
visualinspection.datasets.get
visualinspection.datasets.list
visualinspection.images.get
visualinspection.images.list
visualinspection.locations.get
visualinspection.locations.list
visualinspection.modelEvaluations.*
visualinspection.models.get
visualinspection.models.list
visualinspection.modules.get
visualinspection.modules.list
visualinspection.operations.*
visualinspection.solutionArtifacts.get
visualinspection.solutionArtifacts.list
visualinspection.solutionArtifacts.predict
visualinspection.solutions.get
visualinspection.solutions.list
|