Informationen zu den unterstützten Connectors für Application Integration.

Vordefinierte IAM-Rollen für Application Integration

Vordefinierte Rollen ermöglichen einen genau definierten Zugriff auf bestimmte Google Cloud-Ressourcen. Vordefinierte Rollen werden von Google erstellt und verwaltet. Google aktualisiert seine Berechtigungen automatisch nach Bedarf, z. B. wenn Google Cloud neue Funktionen oder Dienste hinzufügt.

In der folgenden Tabelle sind alle vordefinierten IAM-Rollen für Application Integration aufgeführt:

Berechtigungen

(roles/advisorynotifications.admin)

Gewährt Schreibzugriff auf Einstellungen in Advisory Notifications

advisorynotifications.*

resourcemanager.organizations.get

resourcemanager.projects.get

(roles/advisorynotifications.viewer)

Gewährt Lesezugriff in Advisory Notifications

advisorynotifications.notifications.*

advisorynotifications.settings.get

resourcemanager.organizations.get

resourcemanager.projects.get

(roles/apihub.admin)

Vollständiger Zugriff auf alle Ressourcen des API-Hubs.

apihub.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apihub.attributeAdmin)

Vollständiger Zugriff auf alle Attributressourcen des Cloud API-Hubs.

apihub.attributes.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apihub.editor)

Bearbeitungszugriff auf die meisten Ressourcen des Cloud API-Hubs.

apihub.apiHubInstances.get

apihub.apiHubInstances.list

apihub.apiOperations.*

apihub.apis.*

apihub.attributes.get

apihub.attributes.list

apihub.definitions.*

apihub.dependencies.*

apihub.deployments.*

apihub.externalApis.*

apihub.hostProjectRegistrations.get

apihub.hostProjectRegistrations.list

apihub.llmEnablements.*

apihub.locations.searchResources

apihub.operations.get

apihub.operations.list

apihub.plugins.get

apihub.plugins.list

apihub.runTimeProjectAttachments.get

apihub.runTimeProjectAttachments.list

apihub.specs.*

apihub.styleGuides.get

apihub.versions.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apihub.pluginAdmin)

Vollständiger Zugriff auf alle Plug‑in-Ressourcen des Cloud API-Hubs.

apihub.plugins.*

apihub.specs.lint

apihub.styleGuides.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apihub.provisioningAdmin)

Vollständiger Zugriff auf Bereitstellungsressourcen des Cloud API-Hubs.

apihub.apiHubInstances.*

apihub.hostProjectRegistrations.*

apihub.operations.*

apihub.runTimeProjectAttachments.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apihub.viewer)

Lesezugriff auf alle Ressourcen des Cloud API-Hubs.

apihub.apiHubInstances.get

apihub.apiHubInstances.list

apihub.apiOperations.get

apihub.apiOperations.list

apihub.apis.get

apihub.apis.list

apihub.attributes.get

apihub.attributes.list

apihub.definitions.get

apihub.definitions.list

apihub.dependencies.get

apihub.dependencies.list

apihub.deployments.get

apihub.deployments.list

apihub.externalApis.get

apihub.externalApis.list

apihub.hostProjectRegistrations.get

apihub.hostProjectRegistrations.list

apihub.llmEnablements.get

apihub.llmEnablements.list

apihub.locations.searchResources

apihub.operations.get

apihub.operations.list

apihub.plugins.get

apihub.plugins.list

apihub.runTimeProjectAttachments.get

apihub.runTimeProjectAttachments.list

apihub.specs.get

apihub.specs.list

apihub.styleGuides.get

apihub.versions.get

apihub.versions.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apim.admin)

Vollständiger Zugriff auf API-Verwaltungsressourcen.

apim.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apim.viewer)

Lesezugriff auf API-Verwaltungsressourcen.

apim.apiObservations.*

apim.apiOperations.*

apim.locations.*

apim.observationJobs.get

apim.observationJobs.list

apim.observationSources.get

apim.observationSources.list

apim.operations.get

apim.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apphub.admin)

Vollständiger Zugriff auf App Hub-Ressourcen.

apphub.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apphub.editor)

Bearbeitungszugriff auf App Hub-Ressourcen.

apphub.applications.create

apphub.applications.delete

apphub.applications.get

apphub.applications.list

apphub.applications.update

apphub.discoveredServices.*

apphub.discoveredWorkloads.*

apphub.locations.*

apphub.operations.*

apphub.serviceProjectAttachments.lookup

apphub.services.*

apphub.workloads.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/apphub.viewer)

Lesezugriff auf App Hub-Ressourcen.

apphub.applications.get

apphub.applications.list

apphub.discoveredServices.get

apphub.discoveredServices.list

apphub.discoveredWorkloads.get

apphub.discoveredWorkloads.list

apphub.locations.*

apphub.operations.get

apphub.operations.list

apphub.serviceProjectAttachments.lookup

apphub.services.get

apphub.services.list

apphub.workloads.get

apphub.workloads.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/applianceactivation.approver)

Gewährt Zugriff zum Genehmigen von Befehlen, die auf Appliances ausgeführt werden sollen

applianceactivation.rttCommands.approve

applianceactivation.rttCommands.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/applianceactivation.client)

Gewährt Zugriff zum Lesen von Befehlen für eine Appliance und Senden des Ergebnisses.

applianceactivation.rttCommands.get

applianceactivation.rttCommands.sendResult

(roles/applianceactivation.troubleshooter)

Gewährt Zugriff zum Senden neuer Befehle, die auf Appliances ausgeführt werden sollen, und zum Aufrufen der Ausgaben

applianceactivation.rttCommands.create

applianceactivation.rttCommands.get

applianceactivation.rttCommands.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/assuredoss.admin)

Zugriff zum Verwenden von Assured OSS und Verwalten der Konfiguration.

artifactregistry.dockerimages.*

artifactregistry.files.download

artifactregistry.files.get

artifactregistry.files.list

artifactregistry.locations.*

artifactregistry.mavenartifacts.*

artifactregistry.npmpackages.*

artifactregistry.packages.get

artifactregistry.packages.list

artifactregistry.projectsettings.get

artifactregistry.pythonpackages.*

artifactregistry.repositories.create

artifactregistry.repositories.downloadArtifacts

artifactregistry.repositories.get

artifactregistry.repositories.list

artifactregistry.repositories.listEffectiveTags

artifactregistry.repositories.listTagBindings

artifactregistry.repositories.readViaVirtualRepository

artifactregistry.tags.get

artifactregistry.tags.list

artifactregistry.versions.get

artifactregistry.versions.list

assuredoss.*

iam.serviceAccountKeys.create

iam.serviceAccounts.create

iam.serviceAccounts.get

pubsub.schemas.get

pubsub.schemas.list

pubsub.schemas.listRevisions

pubsub.schemas.validate

pubsub.snapshots.get

pubsub.snapshots.list

pubsub.subscriptions.create

pubsub.subscriptions.get

pubsub.subscriptions.list

pubsub.subscriptions.update

pubsub.topics.get

pubsub.topics.list

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

serviceusage.quotas.get

serviceusage.services.enable

serviceusage.services.get

serviceusage.services.list

(roles/assuredoss.projectAdmin)

Zugriff zum Verwenden von Assured OSS und Verwalten der Konfiguration.

artifactregistry.dockerimages.*

artifactregistry.files.download

artifactregistry.files.get

artifactregistry.files.list

artifactregistry.locations.*

artifactregistry.mavenartifacts.*

artifactregistry.npmpackages.*

artifactregistry.packages.get

artifactregistry.packages.list

artifactregistry.projectsettings.get

artifactregistry.pythonpackages.*

artifactregistry.repositories.create

artifactregistry.repositories.downloadArtifacts

artifactregistry.repositories.get

artifactregistry.repositories.list

artifactregistry.repositories.listEffectiveTags

artifactregistry.repositories.listTagBindings

artifactregistry.repositories.readViaVirtualRepository

artifactregistry.tags.get

artifactregistry.tags.list

artifactregistry.versions.get

artifactregistry.versions.list

assuredoss.*

iam.serviceAccounts.create

iam.serviceAccounts.get

pubsub.schemas.get

pubsub.schemas.list

pubsub.schemas.listRevisions

pubsub.schemas.validate

pubsub.snapshots.get

pubsub.snapshots.list

pubsub.subscriptions.get

pubsub.subscriptions.list

pubsub.topics.get

pubsub.topics.list

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

serviceusage.quotas.get

serviceusage.services.enable

serviceusage.services.get

serviceusage.services.list

(roles/assuredoss.reader)

Zugriff zum Verwenden von Assured OSS und Ansehen der Assured OSS-Konfiguration.

artifactregistry.dockerimages.*

artifactregistry.files.download

artifactregistry.files.get

artifactregistry.files.list

artifactregistry.locations.*

artifactregistry.mavenartifacts.*

artifactregistry.npmpackages.*

artifactregistry.packages.get

artifactregistry.packages.list

artifactregistry.projectsettings.get

artifactregistry.pythonpackages.*

artifactregistry.repositories.downloadArtifacts

artifactregistry.repositories.get

artifactregistry.repositories.list

artifactregistry.repositories.listEffectiveTags

artifactregistry.repositories.listTagBindings

artifactregistry.repositories.readViaVirtualRepository

artifactregistry.tags.get

artifactregistry.tags.list

artifactregistry.versions.get

artifactregistry.versions.list

assuredoss.config.get

assuredoss.locations.*

assuredoss.metadata.*

assuredoss.operations.get

assuredoss.operations.list

pubsub.schemas.get

pubsub.schemas.list

pubsub.schemas.listRevisions

pubsub.schemas.validate

pubsub.snapshots.get

pubsub.snapshots.list

pubsub.subscriptions.get

pubsub.subscriptions.list

pubsub.topics.get

pubsub.topics.list

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

serviceusage.quotas.get

serviceusage.services.get

serviceusage.services.list

(roles/assuredoss.user)

Zugriff zum Verwenden von Assured OSS.

artifactregistry.dockerimages.*

artifactregistry.files.download

artifactregistry.files.get

artifactregistry.files.list

artifactregistry.locations.*

artifactregistry.mavenartifacts.*

artifactregistry.npmpackages.*

artifactregistry.packages.get

artifactregistry.packages.list

artifactregistry.projectsettings.get

artifactregistry.pythonpackages.*

artifactregistry.repositories.downloadArtifacts

artifactregistry.repositories.get

artifactregistry.repositories.list

artifactregistry.repositories.listEffectiveTags

artifactregistry.repositories.listTagBindings

artifactregistry.repositories.readViaVirtualRepository

artifactregistry.tags.get

artifactregistry.tags.list

artifactregistry.versions.get

artifactregistry.versions.list

assuredoss.locations.*

assuredoss.metadata.*

assuredoss.operations.get

assuredoss.operations.list

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/auditmanager.admin)

Vollständiger Zugriff auf Audit Manager-Ressourcen.

auditmanager.*

cloudasset.assets.searchAllResources

resourcemanager.folders.get

resourcemanager.folders.list

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/auditmanager.auditor)

Erlaubt das Erstellen und Ansehen eines Prüfberichts.

auditmanager.auditReports.generate

auditmanager.auditScopeReports.generate

auditmanager.locations.get

auditmanager.locations.list

auditmanager.operations.*

cloudasset.assets.searchAllResources

resourcemanager.folders.get

resourcemanager.folders.list

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/autoscaling.metricsWriter)

Zugriff, um Messwerte für eine Autoscaling-Website zu schreiben

autoscaling.sites.writeMetrics

(roles/autoscaling.recommendationsReader)

Kann Empfehlungen von der Autoscaling-Website lesen

autoscaling.sites.readRecommendations

(roles/autoscaling.sitesAdmin)

Vollständiger Zugriff auf alle Autoscaling-Website-Features

autoscaling.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/autoscaling.stateWriter)

Zugriff, um den Status für eine Autoscaling-Website zu schreiben

autoscaling.sites.writeState

(roles/batch.agentReporter)

Melder von Batch-Agent-Statuswerten.

batch.states.report

(roles/batch.jobsEditor)

Bearbeiter von Batchjobs

batch.jobs.*

batch.locations.*

batch.operations.*

batch.tasks.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/batch.jobsViewer)

Betrachter von Batchjobs, Aufgabengruppen und Aufgaben

batch.jobs.get

batch.jobs.list

batch.locations.*

batch.operations.*

batch.tasks.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/biglake.admin)

Bietet vollständigen Zugriff auf alle BigLake-Ressourcen.

biglake.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/biglake.viewer)

Bietet Lesezugriff auf alle BigLake-Ressourcen.

biglake.catalogs.get

biglake.catalogs.list

biglake.databases.get

biglake.databases.list

biglake.locks.list

biglake.tables.get

biglake.tables.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquerymigration.editor)

Kann EDW-Migrations-Workflows bearbeiten.

bigquerymigration.locations.*

bigquerymigration.subtasks.get

bigquerymigration.subtasks.list

bigquerymigration.workflows.create

bigquerymigration.workflows.delete

bigquerymigration.workflows.get

bigquerymigration.workflows.list

bigquerymigration.workflows.update

(roles/bigquerymigration.orchestrator)

Kann EDW-Migrationsaufgaben orchestrieren.

bigquerymigration.subtasks.create

bigquerymigration.taskTypes.orchestrateTask

bigquerymigration.workflows.orchestrateTask

storage.objects.list

(roles/bigquerymigration.translationUser)

Nutzer des interaktiven SQL-Übersetzungsdienstes für EDW-Migrationen.

bigquerymigration.translation.translate

(roles/bigquerymigration.viewer)

Kann EDW-MigrationWorkflow betrachten.

bigquerymigration.locations.*

bigquerymigration.subtasks.get

bigquerymigration.subtasks.list

bigquerymigration.workflows.get

bigquerymigration.workflows.list

(roles/bigquerymigration.worker)

Worker, der Unteraufgaben der EDW-Migration ausführt.

bigquerymigration.subtaskTypes.executeTask

bigquerymigration.subtasks.executeTask

storage.objects.create

storage.objects.get

storage.objects.list

(roles/billing.carbonViewer)

billing.accounts.get

billing.accounts.getCarbonInformation

billing.accounts.list

(roles/blockchainnodeengine.admin)

Vollständiger Zugriff auf Blockchain Node Engine-Ressourcen.

blockchainnodeengine.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/blockchainnodeengine.viewer)

Lesezugriff auf Blockchain Node Engine-Ressourcen.

blockchainnodeengine.blockchainNodes.get

blockchainnodeengine.blockchainNodes.list

blockchainnodeengine.locations.*

blockchainnodeengine.operations.get

blockchainnodeengine.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/capacityplanner.viewer)

Lesezugriff auf Nutzungsressourcen des Kapazitätsplaners

capacityplanner.*

cloudquotas.quotas.get

monitoring.timeSeries.list

resourcemanager.folders.get

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

serviceusage.quotas.get

serviceusage.services.get

(roles/carestudio.viewer)

Diese Rolle kann alle Attribute von Patienten ansehen.

carestudio.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/chroniclesm.admin)

Administratoren können Details zum Chronicle-Dienst ansehen und ändern.

chroniclesm.*

(roles/chroniclesm.viewer)

Betrachter können Details zum Chronicle-Dienst ansehen, aber nicht ändern.

chroniclesm.gcpAssociations.get

chroniclesm.gcpSettings.get

(roles/cloud.locationReader)

Standorte lesen und auflisten, die zum Erstellen von Ressourcen verfügbar sind.

cloud.*

(roles/cloudaicompanion.user)

Ein Nutzer, der Unterstützung von Cloud AI Companion erhalten kann

cloudaicompanion.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/cloudcontrolspartner.admin)

Vollständiger Zugriff auf Cloud Controls Partner-Ressourcen.

cloudcontrolspartner.accessapprovalrequests.list

cloudcontrolspartner.customers.list

cloudcontrolspartner.ekmconnections.get

cloudcontrolspartner.inspectabilityevents.get

cloudcontrolspartner.partnerpermissions.get

cloudcontrolspartner.partners.get

cloudcontrolspartner.platformcontrols.get

cloudcontrolspartner.violations.list

cloudcontrolspartner.workloads.list

(roles/cloudcontrolspartner.editor)

Bearbeitungszugriff auf Cloud Controls Partner-Ressourcen.

cloudcontrolspartner.*

(roles/cloudcontrolspartner.inspectabilityReader)

Lesezugriff auf Cloud Controls Partner-Überprüfbarkeitsressourcen.

cloudcontrolspartner.customers.*

cloudcontrolspartner.inspectabilityevents.get

cloudcontrolspartner.platformcontrols.get

(roles/cloudcontrolspartner.monitoringReader)

Lesezugriff auf Cloud Controls Partner-Monitoringressourcen.

cloudcontrolspartner.customers.*

cloudcontrolspartner.violations.*

cloudcontrolspartner.workloads.*

(roles/cloudcontrolspartner.reader)

Lesezugriff auf Cloud Controls Partner-Ressourcen.

cloudcontrolspartner.*

(roles/cloudoptimization.admin)

Administrator von Cloud Optimization AI-Ressourcen

cloudoptimization.*

(roles/cloudoptimization.editor)

Bearbeiter von Cloud Optimization AI-Ressourcen

cloudoptimization.*

(roles/cloudoptimization.viewer)

Betrachter von Cloud Optimization AI-Ressourcen

cloudoptimization.operations.get

(roles/cloudquotas.admin)

Uneingeschränkter Zugriff auf Cloud-Kontingente-Ressourcen.

cloudquotas.*

monitoring.timeSeries.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/cloudquotas.viewer)

Lesezugriff auf Cloud-Kontingente-Ressourcen.

cloudquotas.quotas.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/commerceagreementpublishing.admin)

Administrator des Commerce Agreement Publishing-Dienstes

commerceagreementpublishing.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/commerceagreementpublishing.viewer)

Betrachter des Commerce Agreement Publishing-Dienstes

commerceagreementpublishing.agreements.get

commerceagreementpublishing.agreements.list

commerceagreementpublishing.documents.get

commerceagreementpublishing.documents.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/confidentialcomputing.workloadUser)

Erlaubt das Generieren eines Attestierungstokens und das Ausführen einer Arbeitslast in einer VM. Vorgesehen für Dienstkonten, die auf Confidential Space-VMs ausgeführt werden.

confidentialcomputing.*

logging.logEntries.create

(roles/contactcenteraiplatform.admin)

Vollständiger Zugriff auf Contact Center AI Platform-Ressourcen.

contactcenteraiplatform.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/contactcenteraiplatform.viewer)

Lesezugriff auf Contact Center AI Platform-Ressourcen.

contactcenteraiplatform.contactCenters.get

contactcenteraiplatform.contactCenters.list

contactcenteraiplatform.locations.*

contactcenteraiplatform.operations.get

contactcenteraiplatform.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/contactcenterinsights.editor)

Gewährt Lese- und Schreibzugriff auf alle Contact Center AI Insights-Ressourcen.

contactcenterinsights.*

(roles/contactcenterinsights.viewer)

Gewährt Lesezugriff auf alle Contact Center AI Insights-Ressourcen.

contactcenterinsights.analyses.get

contactcenterinsights.analyses.list

contactcenterinsights.conversations.get

contactcenterinsights.conversations.list

contactcenterinsights.faqEntries.get

contactcenterinsights.faqEntries.list

contactcenterinsights.faqModels.get

contactcenterinsights.faqModels.list

contactcenterinsights.feedbackLabels.get

contactcenterinsights.feedbackLabels.list

contactcenterinsights.issueModels.get

contactcenterinsights.issueModels.list

contactcenterinsights.issues.get

contactcenterinsights.issues.list

contactcenterinsights.operations.*

contactcenterinsights.phraseMatchers.get

contactcenterinsights.phraseMatchers.list

contactcenterinsights.qaQuestions.*

contactcenterinsights.qaScorecardRevisions.get

contactcenterinsights.qaScorecards.*

contactcenterinsights.settings.get

contactcenterinsights.views.get

contactcenterinsights.views.list

(roles/containersecurity.viewer)

Lesezugriff auf Ressourcen für den GKE-Sicherheitsstatus.

container.clusters.list

containersecurity.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/contentwarehouse.admin)

Gewährt vollständigen Zugriff auf alle Ressourcen in Content Warehouse

contentwarehouse.corpora.*

contentwarehouse.dataExportJobs.*

contentwarehouse.documentSchemas.*

contentwarehouse.documents.*

contentwarehouse.locations.*

contentwarehouse.operations.get

contentwarehouse.rawDocuments.*

contentwarehouse.ruleSets.*

contentwarehouse.synonymSets.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/contentwarehouse.documentAdmin)

Gewährt vollständigen Zugriff auf die Dokumentressource in Content Warehouse

contentwarehouse.documentSchemas.get

contentwarehouse.documents.create

contentwarehouse.documents.delete

contentwarehouse.documents.get

contentwarehouse.documents.getIamPolicy

contentwarehouse.documents.setIamPolicy

contentwarehouse.documents.update

contentwarehouse.links.*

contentwarehouse.locations.getStatus

contentwarehouse.rawDocuments.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/contentwarehouse.documentCreator)

Gewährt Zugriff zum Erstellen von Dokumenten in Content Warehouse

contentwarehouse.documentSchemas.get

contentwarehouse.documentSchemas.list

contentwarehouse.documents.create

contentwarehouse.locations.getStatus

resourcemanager.projects.get

resourcemanager.projects.list

(roles/contentwarehouse.documentEditor)

Gewährt Zugriff zum Aktualisieren der Dokumentressource in Content Warehouse

contentwarehouse.documentSchemas.get

contentwarehouse.documents.get

contentwarehouse.documents.getIamPolicy

contentwarehouse.documents.update

contentwarehouse.links.*

contentwarehouse.locations.getStatus

contentwarehouse.rawDocuments.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/contentwarehouse.documentSchemaViewer)

Gewährt Zugriff zum Ansehen von Dokumentschemas in Content Warehouse

contentwarehouse.documentSchemas.get

contentwarehouse.documentSchemas.list

contentwarehouse.locations.getStatus

resourcemanager.projects.get

resourcemanager.projects.list

(roles/contentwarehouse.documentViewer)

Gewährt Zugriff zum Ansehen aller Ressourcen in Content Warehouse

contentwarehouse.documentSchemas.get

contentwarehouse.documents.get

contentwarehouse.documents.getIamPolicy

contentwarehouse.links.get

contentwarehouse.locations.getStatus

contentwarehouse.rawDocuments.download

resourcemanager.projects.get

resourcemanager.projects.list

(roles/databasecenter.viewer)

Viewer-Rolle für Datenbankcenter-Ressourcendaten

cloudaicompanion.entitlements.get

databasecenter.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/databaseinsights.eventsViewer)

Viewer-Rolle für Ereignisdienstdaten

databaseinsights.aggregatedEvents.query

databaseinsights.clusterEvents.query

databaseinsights.instanceEvents.query

(roles/databaseinsights.monitoringViewer)

Viewer-Rolle für Monitoringdaten von Datenbankstatistiken

databaseinsights.activeQueries.fetch

databaseinsights.activitySummary.fetch

databaseinsights.aggregatedStats.query

databaseinsights.locations.*

databaseinsights.timeSeries.query

databaseinsights.workloadRecommendations.fetch

resourcemanager.projects.get

resourcemanager.projects.list

(roles/databaseinsights.operationsAdmin)

Administratorrolle zum Ausführen von Datenbankstatistikvorgängen

databaseinsights.activeQuery.terminate

(roles/databaseinsights.recommendationViewer)

Viewer-Rolle für Empfehlungsdaten von Datenbankstatistiken

databaseinsights.locations.*

databaseinsights.recommendations.query

databaseinsights.resourceRecommendations.query

databaseinsights.workloadRecommendations.fetch

resourcemanager.projects.get

resourcemanager.projects.list

(roles/databaseinsights.viewer)

Viewer-Rolle für Database Insights-Daten

databaseinsights.activeQueries.fetch

databaseinsights.activitySummary.fetch

databaseinsights.aggregatedStats.query

databaseinsights.locations.*

databaseinsights.recommendations.query

databaseinsights.resourceRecommendations.query

databaseinsights.timeSeries.query

databaseinsights.workloadRecommendations.fetch

resourcemanager.projects.get

resourcemanager.projects.list

(roles/datalineage.admin)

Gewährt vollständigen Zugriff auf alle Ressourcen in der Data Lineage API

datalineage.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/datalineage.editor)

Gewährt Bearbeitungszugriff auf alle Ressourcen in der Data Lineage API

datalineage.events.*

datalineage.locations.searchLinks

datalineage.operations.get

datalineage.processes.create

datalineage.processes.get

datalineage.processes.list

datalineage.processes.update

datalineage.runs.create

datalineage.runs.get

datalineage.runs.list

datalineage.runs.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/datalineage.producer)

Gewährt Zugriff zum Erstellen aller Ressourcen in der Data Lineage API

datalineage.events.create

datalineage.processes.create

datalineage.processes.get

datalineage.processes.update

datalineage.runs.create

datalineage.runs.get

datalineage.runs.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/datalineage.viewer)

Gewährt Lesezugriff auf alle Ressourcen in der Data Lineage API

datalineage.events.get

datalineage.events.list

datalineage.locations.searchLinks

datalineage.processes.get

datalineage.processes.list

datalineage.runs.get

datalineage.runs.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/dataprocessing.admin)

Administrator von Datenverarbeitungssteuerungen, der die Einstellungen dieser Steuerungen vollständig verwalten und alle Daten zu Datenquellen einsehen kann.

billing.accounts.get

billing.accounts.list

dataprocessing.*

(roles/dataprocessing.dataSourceManager)

Manager von Datenquellen für Datenverarbeitungssteuerungen, der die zugrunde liegenden Daten abrufen, auflisten und aktualisieren kann.

dataprocessing.datasources.list

dataprocessing.datasources.update

(roles/developerconnect.admin)

Vollständiger Zugriff auf Developer Connect-Ressourcen.

developerconnect.connections.*

developerconnect.gitRepositoryLinks.create

developerconnect.gitRepositoryLinks.delete

developerconnect.gitRepositoryLinks.fetchGitRefs

developerconnect.gitRepositoryLinks.get

developerconnect.gitRepositoryLinks.list

developerconnect.locations.*

developerconnect.operations.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/developerconnect.readTokenAccessor)

Gewährt Zugriff auf Tokens mit Lesezugriff (sowohl PAT- als auch Kurzzeit-Tokens). Gewährt außerdem Zugriff zum Ansehen des Links zum Git-Repository.

developerconnect.connections.get

developerconnect.gitRepositoryLinks.fetchReadToken

developerconnect.gitRepositoryLinks.get

(roles/developerconnect.tokenAccessor)

Gewährt Zugriff auf Tokens mit Lese-/Schreibzugriff und Tokens mit Lesezugriff (sowohl PAT- als auch Kurzzeit-Tokens). Gewährt außerdem Zugriff zum Ansehen des Links zum Git-Repository.

developerconnect.connections.get

developerconnect.gitRepositoryLinks.fetchReadToken

developerconnect.gitRepositoryLinks.fetchReadWriteToken

developerconnect.gitRepositoryLinks.get

(roles/developerconnect.user)

Gewährt Zugriff zum Ansehen der Verbindung und auf die Funktionen, die mit dem eigentlichen Repository interagieren, beispielsweise zum Lesen von Inhalten aus dem Repository

developerconnect.connections.fetchGitHubInstallations

developerconnect.connections.fetchLinkableGitRepositories

developerconnect.connections.get

developerconnect.connections.list

developerconnect.gitRepositoryLinks.fetchGitRefs

developerconnect.gitRepositoryLinks.get

developerconnect.gitRepositoryLinks.list

developerconnect.locations.*

developerconnect.operations.get

developerconnect.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/developerconnect.viewer)

Lesezugriff auf Developer Connect-Ressourcen.

developerconnect.connections.get

developerconnect.connections.list

developerconnect.gitRepositoryLinks.get

developerconnect.gitRepositoryLinks.list

developerconnect.locations.*

developerconnect.operations.get

developerconnect.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/discoveryengine.admin)

Gewährt vollständigen Zugriff auf alle Discovery Engine-Ressourcen.

discoveryengine.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/discoveryengine.editor)

Gewährt Lese- und Schreibzugriff auf alle Discovery Engine-Ressourcen.

discoveryengine.analytics.*

discoveryengine.branches.*

discoveryengine.cmekConfigs.get

discoveryengine.cmekConfigs.list

discoveryengine.collections.get

discoveryengine.collections.list

discoveryengine.completionConfigs.get

discoveryengine.controls.get

discoveryengine.controls.list

discoveryengine.conversations.*

discoveryengine.dataStores.completeQuery

discoveryengine.dataStores.get

discoveryengine.dataStores.list

discoveryengine.documentProcessingConfigs.get

discoveryengine.documents.create

discoveryengine.documents.delete

discoveryengine.documents.get

discoveryengine.documents.import

discoveryengine.documents.list

discoveryengine.documents.update

discoveryengine.engines.get

discoveryengine.engines.list

discoveryengine.engines.pause

discoveryengine.engines.resume

discoveryengine.engines.tune

discoveryengine.models.*

discoveryengine.operations.*

discoveryengine.projects.get

discoveryengine.schemas.get

discoveryengine.schemas.list

discoveryengine.schemas.preview

discoveryengine.schemas.validate

discoveryengine.servingConfigs.get

discoveryengine.servingConfigs.list

discoveryengine.servingConfigs.recommend

discoveryengine.servingConfigs.search

discoveryengine.siteSearchEngines.get

discoveryengine.targetSites.get

discoveryengine.targetSites.list

discoveryengine.userEvents.create

discoveryengine.userEvents.fetchStats

discoveryengine.userEvents.import

discoveryengine.widgetConfigs.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/discoveryengine.viewer)

Gewährt Lesezugriff auf alle Discovery Engine-Ressourcen.

discoveryengine.analytics.*

discoveryengine.branches.*

discoveryengine.cmekConfigs.get

discoveryengine.cmekConfigs.list

discoveryengine.collections.get

discoveryengine.collections.list

discoveryengine.completionConfigs.get

discoveryengine.controls.get

discoveryengine.controls.list

discoveryengine.conversations.converse

discoveryengine.conversations.get

discoveryengine.conversations.list

discoveryengine.dataStores.completeQuery

discoveryengine.dataStores.get

discoveryengine.dataStores.list

discoveryengine.documentProcessingConfigs.get

discoveryengine.documents.get

discoveryengine.documents.list

discoveryengine.engines.get

discoveryengine.engines.list

discoveryengine.models.get

discoveryengine.models.list

discoveryengine.operations.*

discoveryengine.projects.get

discoveryengine.schemas.get

discoveryengine.schemas.list

discoveryengine.schemas.preview

discoveryengine.schemas.validate

discoveryengine.servingConfigs.get

discoveryengine.servingConfigs.list

discoveryengine.servingConfigs.recommend

discoveryengine.servingConfigs.search

discoveryengine.siteSearchEngines.get

discoveryengine.targetSites.get

discoveryengine.targetSites.list

discoveryengine.userEvents.fetchStats

discoveryengine.widgetConfigs.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/enterprisepurchasing.admin)

Vollständiger Zugriff auf Enterprise Purchasing-Ressourcen.

enterprisepurchasing.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/enterprisepurchasing.editor)

Bearbeitungszugriff auf Enterprise Purchasing-Ressourcen.

enterprisepurchasing.gcveCuds.get

enterprisepurchasing.gcveCuds.list

enterprisepurchasing.gcveNodePricingInfo.list

enterprisepurchasing.locations.*

enterprisepurchasing.operations.get

enterprisepurchasing.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/enterprisepurchasing.viewer)

Lesezugriff auf Enterprise Purchasing-Ressourcen.

enterprisepurchasing.gcveCuds.get

enterprisepurchasing.gcveCuds.list

enterprisepurchasing.gcveNodePricingInfo.list

enterprisepurchasing.locations.*

enterprisepurchasing.operations.get

enterprisepurchasing.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/essentialcontacts.admin)

Vollständiger Zugriff auf alle wichtigen Kontakte

essentialcontacts.*

(roles/essentialcontacts.viewer)

Kann alle wichtigen Kontakte aufrufen

essentialcontacts.contacts.get

essentialcontacts.contacts.list

(roles/firebasecloudmessaging.admin)

Vollständiger Lese-/Schreibzugriff auf Firebase Cloud Messaging API-Ressourcen.

cloudmessaging.messages.create

fcmdata.deliverydata.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/firebasecrash.symbolMappingsAdmin)

Vollständiger Lese- und Schreibzugriff auf Symbol-Zuordnungsdateien für Firebase Crash Reporting.

firebase.clients.get

firebase.clients.list

resourcemanager.projects.get

(roles/gdchardwaremanagement.admin)

Vollständiger Zugriff auf GDC Hardware Management-Ressourcen.

gdchardwaremanagement.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/gdchardwaremanagement.operator)

Zugriff zum Erstellen, Lesen und Aktualisieren von GDC Hardware Management-Ressourcen, die diese Vorgänge unterstützen. Gewährt außerdem Zugriff zum Löschen der HardwareGroup-Ressource.

gdchardwaremanagement.changeLogEntries.*

gdchardwaremanagement.comments.*

gdchardwaremanagement.hardware.*

gdchardwaremanagement.hardwareGroups.*

gdchardwaremanagement.locations.*

gdchardwaremanagement.operations.get

gdchardwaremanagement.operations.list

gdchardwaremanagement.orders.create

gdchardwaremanagement.orders.get

gdchardwaremanagement.orders.list

gdchardwaremanagement.orders.update

gdchardwaremanagement.sites.*

gdchardwaremanagement.skus.*

gdchardwaremanagement.zones.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/gdchardwaremanagement.reader)

Lesezugriff auf GDC Hardware Management-Ressourcen.

gdchardwaremanagement.changeLogEntries.*

gdchardwaremanagement.comments.get

gdchardwaremanagement.comments.list

gdchardwaremanagement.hardware.get

gdchardwaremanagement.hardware.list

gdchardwaremanagement.hardwareGroups.get

gdchardwaremanagement.hardwareGroups.list

gdchardwaremanagement.locations.*

gdchardwaremanagement.operations.get

gdchardwaremanagement.operations.list

gdchardwaremanagement.orders.get

gdchardwaremanagement.orders.list

gdchardwaremanagement.sites.get

gdchardwaremanagement.sites.list

gdchardwaremanagement.skus.*

gdchardwaremanagement.zones.get

gdchardwaremanagement.zones.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/identityplatform.admin)

Vollständiger Zugriff auf Identity Platform-Ressourcen.

firebaseauth.*

identitytoolkit.*

(roles/identityplatform.viewer)

Lesezugriff auf Identity Platform-Ressourcen.

firebaseauth.configs.get

firebaseauth.users.get

identitytoolkit.tenants.get

identitytoolkit.tenants.getIamPolicy

identitytoolkit.tenants.list

(roles/identitytoolkit.admin)

Vollständiger Zugriff auf Identity Toolkit-Ressourcen.

firebaseauth.*

identitytoolkit.*

(roles/identitytoolkit.viewer)

Lesezugriff auf Identity Toolkit-Ressourcen.

firebaseauth.configs.get

firebaseauth.users.get

identitytoolkit.tenants.get

identitytoolkit.tenants.getIamPolicy

identitytoolkit.tenants.list

(roles/integrations.apigeeIntegrationAdminRole)

Ein Nutzer mit vollständigem Zugriff auf alle Apigee-Integrationen.

connectors.actions.*

connectors.connections.executeSqlQuery

connectors.entities.*

connectors.entityTypes.list

integrations.apigeeAuthConfigs.*

integrations.apigeeCertificates.*

integrations.apigeeExecutions.list

integrations.apigeeIntegrationVers.*

integrations.apigeeIntegrations.*

integrations.apigeeSfdcChannels.*

integrations.apigeeSfdcInstances.*

integrations.apigeeSuspensions.*

integrations.authConfigs.*

integrations.certificates.*

integrations.executions.*

integrations.integrationVersions.create

integrations.integrationVersions.delete

integrations.integrationVersions.deploy

integrations.integrationVersions.get

integrations.integrationVersions.list

integrations.integrationVersions.update

integrations.integrations.*

integrations.sfdcChannels.*

integrations.sfdcInstances.*

integrations.suspensions.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.apigeeIntegrationDeployerRole)

Ein Entwickler, der Apigee-Integrationen in der Integrationslaufzeit bereitstellen oder deren Bereitstellung rückgängig machen kann.

integrations.apigeeIntegrationVers.deploy

integrations.apigeeIntegrationVers.get

integrations.apigeeIntegrationVers.list

integrations.apigeeIntegrations.list

integrations.integrationVersions.deploy

integrations.integrationVersions.get

integrations.integrationVersions.list

integrations.integrations.deploy

integrations.integrations.get

integrations.integrations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.apigeeIntegrationEditorRole)

Ein Entwickler, der Apigee-Integrationen auflisten, erstellen und aktualisieren kann.

connectors.actions.*

connectors.connections.executeSqlQuery

connectors.entities.*

connectors.entityTypes.list

integrations.apigeeAuthConfigs.create

integrations.apigeeAuthConfigs.get

integrations.apigeeAuthConfigs.list

integrations.apigeeAuthConfigs.update

integrations.apigeeCertificates.create

integrations.apigeeCertificates.get

integrations.apigeeCertificates.list

integrations.apigeeCertificates.update

integrations.apigeeExecutions.list

integrations.apigeeIntegrationVers.*

integrations.apigeeIntegrations.*

integrations.apigeeSfdcChannels.create

integrations.apigeeSfdcChannels.get

integrations.apigeeSfdcChannels.list

integrations.apigeeSfdcChannels.update

integrations.apigeeSfdcInstances.create

integrations.apigeeSfdcInstances.get

integrations.apigeeSfdcInstances.list

integrations.apigeeSfdcInstances.update

integrations.authConfigs.create

integrations.authConfigs.get

integrations.authConfigs.list

integrations.authConfigs.update

integrations.certificates.get

integrations.executions.*

integrations.integrationVersions.create

integrations.integrationVersions.delete

integrations.integrationVersions.deploy

integrations.integrationVersions.get

integrations.integrationVersions.list

integrations.integrationVersions.update

integrations.integrations.create

integrations.integrations.get

integrations.integrations.invoke

integrations.integrations.list

integrations.integrations.update

integrations.sfdcChannels.*

integrations.sfdcInstances.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.apigeeIntegrationInvokerRole)

Eine Rolle, die Apigee-Integrationen aufrufen kann.

connectors.actions.*

connectors.connections.executeSqlQuery

connectors.entities.*

connectors.entityTypes.list

integrations.apigeeExecutions.list

integrations.apigeeIntegrationVers.get

integrations.apigeeIntegrationVers.list

integrations.apigeeIntegrations.*

integrations.executions.*

integrations.integrationVersions.get

integrations.integrationVersions.invoke

integrations.integrationVersions.list

integrations.integrations.get

integrations.integrations.invoke

integrations.integrations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.apigeeIntegrationsViewer)

Ein Entwickler, der Apigee-Integrationen auflisten und ansehen kann.

integrations.apigeeAuthConfigs.list

integrations.apigeeCertificates.list

integrations.apigeeIntegrationVers.get

integrations.apigeeIntegrationVers.list

integrations.apigeeIntegrations.list

integrations.apigeeSfdcChannels.list

integrations.apigeeSfdcInstances.list

integrations.authConfigs.get

integrations.authConfigs.list

integrations.certificates.get

integrations.certificates.list

integrations.executions.*

integrations.integrationVersions.get

integrations.integrationVersions.list

integrations.integrations.get

integrations.integrations.list

integrations.sfdcChannels.list

integrations.sfdcInstances.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.apigeeSuspensionResolver)

Eine Rolle, die Apigee-Integrationen mit Sperr-/Warteaufgabe genehmigen oder ablehnen kann.

integrations.apigeeSuspensions.*

integrations.suspensions.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.certificateViewer)

Ein Entwickler, der Zertifikate auflisten und ansehen kann.

integrations.certificates.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.integrationAdmin)

Ein Nutzer mit uneingeschränktem Zugriff (CRUD) auf alle Integrationen.

integrations.apigeeAuthConfigs.*

integrations.apigeeCertificates.*

integrations.apigeeExecutions.list

integrations.apigeeIntegrationVers.*

integrations.apigeeIntegrations.*

integrations.apigeeSfdcChannels.*

integrations.apigeeSfdcInstances.*

integrations.apigeeSuspensions.*

integrations.authConfigs.*

integrations.certificates.*

integrations.executions.*

integrations.integrationVersions.create

integrations.integrationVersions.delete

integrations.integrationVersions.deploy

integrations.integrationVersions.get

integrations.integrationVersions.list

integrations.integrationVersions.update

integrations.integrations.*

integrations.sfdcChannels.*

integrations.sfdcInstances.*

integrations.suspensions.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.integrationDeployer)

Ein Entwickler, der Integrationen in der Integrationslaufzeit bereitstellen oder deren Bereitstellung rückgängig machen kann.

integrations.apigeeIntegrationVers.deploy

integrations.apigeeIntegrationVers.get

integrations.apigeeIntegrationVers.list

integrations.apigeeIntegrations.list

integrations.integrationVersions.deploy

integrations.integrationVersions.get

integrations.integrationVersions.list

integrations.integrations.deploy

integrations.integrations.get

integrations.integrations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.integrationEditor)

Ein Entwickler, der Integrationen auflisten, erstellen und aktualisieren kann.

integrations.apigeeAuthConfigs.create

integrations.apigeeAuthConfigs.get

integrations.apigeeAuthConfigs.list

integrations.apigeeAuthConfigs.update

integrations.apigeeCertificates.create

integrations.apigeeCertificates.get

integrations.apigeeCertificates.list

integrations.apigeeCertificates.update

integrations.apigeeExecutions.list

integrations.apigeeIntegrationVers.*

integrations.apigeeIntegrations.*

integrations.apigeeSfdcChannels.create

integrations.apigeeSfdcChannels.get

integrations.apigeeSfdcChannels.list

integrations.apigeeSfdcChannels.update

integrations.apigeeSfdcInstances.create

integrations.apigeeSfdcInstances.get

integrations.apigeeSfdcInstances.list

integrations.apigeeSfdcInstances.update

integrations.authConfigs.create

integrations.authConfigs.get

integrations.authConfigs.list

integrations.authConfigs.update

integrations.certificates.get

integrations.executions.*

integrations.integrationVersions.create

integrations.integrationVersions.delete

integrations.integrationVersions.deploy

integrations.integrationVersions.get

integrations.integrationVersions.list

integrations.integrationVersions.update

integrations.integrations.create

integrations.integrations.get

integrations.integrations.invoke

integrations.integrations.list

integrations.integrations.update

integrations.sfdcChannels.*

integrations.sfdcInstances.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.integrationInvoker)

Eine Rolle, die Integrationen aufrufen kann.

integrations.apigeeExecutions.list

integrations.apigeeIntegrationVers.get

integrations.apigeeIntegrationVers.list

integrations.apigeeIntegrations.*

integrations.executions.*

integrations.integrationVersions.get

integrations.integrationVersions.invoke

integrations.integrationVersions.list

integrations.integrations.get

integrations.integrations.invoke

integrations.integrations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.integrationViewer)

Ein Entwickler, der Integrationen auflisten und ansehen kann.

integrations.apigeeAuthConfigs.list

integrations.apigeeCertificates.list

integrations.apigeeIntegrationVers.get

integrations.apigeeIntegrationVers.list

integrations.apigeeIntegrations.list

integrations.apigeeSfdcChannels.list

integrations.apigeeSfdcInstances.list

integrations.authConfigs.get

integrations.authConfigs.list

integrations.certificates.get

integrations.certificates.list

integrations.executions.*

integrations.integrationVersions.get

integrations.integrationVersions.list

integrations.integrations.get

integrations.integrations.list

integrations.sfdcChannels.list

integrations.sfdcInstances.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.securityIntegrationAdmin)

Ein Nutzer mit vollständigem Zugriff auf alle Sicherheitsintegrationen.

integrations.securityAuthConfigs.*

integrations.securityExecutions.*

integrations.securityIntegTempVers.*

integrations.securityIntegrationVers.*

integrations.securityIntegrations.*

(roles/integrations.sfdcInstanceAdmin)

Ein Nutzer mit vollständigem Zugriff (CRUD) auf alle SFDC-Instanzen.

integrations.sfdcChannels.*

integrations.sfdcInstances.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.sfdcInstanceEditor)

Ein Entwickler, der Integrationen auflisten, erstellen und aktualisieren kann.

integrations.sfdcChannels.create

integrations.sfdcChannels.get

integrations.sfdcChannels.list

integrations.sfdcChannels.update

integrations.sfdcInstances.create

integrations.sfdcInstances.get

integrations.sfdcInstances.list

integrations.sfdcInstances.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.sfdcInstanceViewer)

Ein Entwickler, der SFDC-Instanzen auflisten und ansehen kann.

integrations.sfdcChannels.get

integrations.sfdcChannels.list

integrations.sfdcInstances.get

integrations.sfdcInstances.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/integrations.suspensionResolver)

Eine Rolle, die gesperrte Integrationen entsperren kann.

integrations.apigeeSuspensions.*

integrations.suspensions.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/issuerswitch.accountManagerAdmin)

Diese Rolle kann alle Vorgänge eines Account Managers ausführen

issuerswitch.accountManagerTransactions.*

issuerswitch.managedAccounts.*

issuerswitch.operations.get

issuerswitch.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/issuerswitch.accountManagerTransactionsAdmin)

Diese Rolle kann alle Vorgänge im Zusammenhang mit Account-Manager-Transaktionen ausführen

issuerswitch.accountManagerTransactions.*

issuerswitch.operations.get

issuerswitch.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/issuerswitch.accountManagerTransactionsViewer)

Diese Rolle kann alle Transaktionen des Account Managers ansehen

issuerswitch.accountManagerTransactions.list

issuerswitch.operations.get

issuerswitch.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/issuerswitch.admin)

Zugriff auf alle Rollen zum Ausstellerwechsel

issuerswitch.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/issuerswitch.issuerParticipantsAdmin)

Vollständiger Zugriff auf Beteiligte am Ausstellerwechsel

issuerswitch.issuerParticipants.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/issuerswitch.resolutionsAdmin)

Vollständiger Zugriff auf Lösungen von Issuer Switch

issuerswitch.complaintTransactions.list

issuerswitch.complaints.*

issuerswitch.disputes.*

issuerswitch.operations.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/issuerswitch.rulesAdmin)

Vollständiger Zugriff auf Regeln zum Ausstellerwechsel

issuerswitch.ruleMetadata.list

issuerswitch.ruleMetadataValues.*

issuerswitch.rules.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/issuerswitch.rulesViewer)

Diese Rolle kann Regeln und zugehörige Metadaten ansehen.

issuerswitch.ruleMetadata.list

issuerswitch.ruleMetadataValues.list

issuerswitch.rules.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/issuerswitch.transactionsViewer)

Diese Rolle kann alle Transaktionen ansehen

issuerswitch.complaintTransactions.list

issuerswitch.financialTransactions.list

issuerswitch.mandateTransactions.list

issuerswitch.metadataTransactions.list

issuerswitch.operations.get

issuerswitch.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/kubernetesmetadata.publisher)

Publisher der Metadaten von Kubernetes-Clustern

kubernetesmetadata.*

(roles/mandiant.attackSurfaceManagementEditor)

Schreibzugriff auf Attack Surface Management

mandiant.genericAttackSurfaceManagements.create

mandiant.genericAttackSurfaceManagements.delete

mandiant.genericAttackSurfaceManagements.update

mandiant.genericPlatforms.create

mandiant.genericPlatforms.delete

mandiant.genericPlatforms.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mandiant.attackSurfaceManagementViewer)

Lesezugriff auf Attack Surface Management

mandiant.genericAttackSurfaceManagements.get

mandiant.genericPlatforms.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mandiant.digitalThreatMonitoringEditor)

Schreibzugriff auf Digital Threat Monitoring

mandiant.genericDigitalThreatMonitorings.create

mandiant.genericDigitalThreatMonitorings.update

mandiant.genericPlatforms.create

mandiant.genericPlatforms.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mandiant.digitalThreatMonitoringViewer)

Lesezugriff auf Digital Threat Monitoring

mandiant.genericDigitalThreatMonitorings.get

mandiant.genericPlatforms.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mandiant.expertiseOnDemandEditor)

Schreibzugriff auf Expertise On Demand

mandiant.genericExpertiseOnDemands.create

mandiant.genericExpertiseOnDemands.delete

mandiant.genericExpertiseOnDemands.update

mandiant.genericPlatforms.create

mandiant.genericPlatforms.delete

mandiant.genericPlatforms.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mandiant.expertiseOnDemandViewer)

Lesezugriff auf Expertise On Demand

mandiant.genericExpertiseOnDemands.get

mandiant.genericPlatforms.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mandiant.threatIntelEditor)

Schreibzugriff auf Threat Intelligence

mandiant.genericPlatforms.create

mandiant.genericPlatforms.delete

mandiant.genericPlatforms.update

mandiant.genericThreatIntels.create

mandiant.genericThreatIntels.delete

mandiant.genericThreatIntels.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mandiant.threatIntelViewer)

Lesezugriff auf Threat Intelligence

mandiant.genericPlatforms.get

mandiant.genericThreatIntels.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mandiant.validationEditor)

Schreibzugriff auf Validation

mandiant.genericPlatforms.create

mandiant.genericPlatforms.delete

mandiant.genericPlatforms.update

mandiant.genericValidations.create

mandiant.genericValidations.delete

mandiant.genericValidations.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mandiant.validationViewer)

Lesezugriff auf Validation

mandiant.genericPlatforms.get

mandiant.genericValidations.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mapsanalytics.viewer)

Gewährt Lesezugriff auf alle Maps-Analyseressourcen.

mapsanalytics.*

resourcemanager.projects.get

resourcemanager.projects.list

serviceusage.services.list

(roles/mapsplatformdatasets.admin)

Gewährt Lese- und Schreibzugriff auf alle Ressourcen der Maps Platform Datasets API

mapsadmin.clientStyles.*

mapsplatformdatasets.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/mapsplatformdatasets.viewer)

Gewährt Lesezugriff auf alle Ressourcen der Maps Platform Datasets API

mapsadmin.clientStyles.get

mapsadmin.clientStyles.list

mapsplatformdatasets.datasets.export

mapsplatformdatasets.datasets.get

mapsplatformdatasets.datasets.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/marketplacesolutions.admin)

Vollständiger Zugriff auf Ressourcen von Marketplace-Lösungen.

marketplacesolutions.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/marketplacesolutions.editor)

Bearbeitungszugriff auf Ressourcen von Marketplace-Lösungen.

marketplacesolutions.locations.*

marketplacesolutions.operations.get

marketplacesolutions.operations.list

marketplacesolutions.powerImages.*

marketplacesolutions.powerInstances.get

marketplacesolutions.powerInstances.list

marketplacesolutions.powerInstances.update

marketplacesolutions.powerNetworks.*

marketplacesolutions.powerSshKeys.*

marketplacesolutions.powerVolumes.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/marketplacesolutions.viewer)

Lesezugriff auf Ressourcen von Marketplace-Lösungen.

marketplacesolutions.locations.*

marketplacesolutions.operations.get

marketplacesolutions.operations.list

marketplacesolutions.powerImages.*

marketplacesolutions.powerInstances.get

marketplacesolutions.powerInstances.list

marketplacesolutions.powerNetworks.*

marketplacesolutions.powerSshKeys.*

marketplacesolutions.powerVolumes.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/nestconsole.homeDeveloperAdmin)

Administratorzugriff auf Ressourcen der Google Home Developer Console

nestconsole.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/nestconsole.homeDeveloperEditor)

Lese-/Schreibzugriff auf Ressourcen der Google Home Developer Console

nestconsole.smarthomePreviews.update

nestconsole.smarthomeProjects.get

nestconsole.smarthomeProjects.update

nestconsole.smarthomeVersions.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/nestconsole.homeDeveloperViewer)

Lesezugriff auf Ressourcen der Google Home Developer Console

nestconsole.smarthomeProjects.get

nestconsole.smarthomeVersions.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/netapp.admin)

Vollständiger Zugriff auf Ressourcen von Google Cloud NetApp Volumes.

netapp.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/netapp.viewer)

Lesezugriff auf Ressourcen von Google Cloud NetApp Volumes.

netapp.activeDirectories.get

netapp.activeDirectories.list

netapp.backupPolicies.get

netapp.backupPolicies.list

netapp.backupVaults.get

netapp.backupVaults.list

netapp.backups.get

netapp.backups.list

netapp.kmsConfigs.get

netapp.kmsConfigs.list

netapp.replications.get

netapp.replications.list

netapp.snapshots.get

netapp.snapshots.list

netapp.storagePools.get

netapp.storagePools.list

netapp.volumes.get

netapp.volumes.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/oauthconfig.editor)

Lese-/Schreibzugriff auf OAuth-Konfigurationsressourcen

clientauthconfig.*

oauthconfig.*

(roles/oauthconfig.viewer)

Lesezugriff auf OAuth-Konfigurationsressourcen

clientauthconfig.brands.get

clientauthconfig.brands.list

clientauthconfig.clients.get

clientauthconfig.clients.list

oauthconfig.clientpolicy.get

oauthconfig.testusers.get

oauthconfig.verification.get

(roles/paymentsresellersubscription.partnerAdmin)

Vollständiger Zugriff auf alle Payments-Reseller-Ressourcen, einschließlich Abos, Produkte und Promotions

paymentsresellersubscription.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/paymentsresellersubscription.partnerViewer)

Lesezugriff auf alle Payments-Reseller-Ressourcen, einschließlich Abos, Produkte und Promotions

paymentsresellersubscription.products.list

paymentsresellersubscription.promotions.list

paymentsresellersubscription.subscriptions.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/paymentsresellersubscription.productViewer)

Lesezugriff auf die Payments Reseller-Produktressource

paymentsresellersubscription.products.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/paymentsresellersubscription.promotionViewer)

Lesezugriff auf die Payments Reseller-Promotion-Ressource

paymentsresellersubscription.promotions.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/paymentsresellersubscription.subscriptionEditor)

Schreibzugriff auf die Payments Reseller-Abo-Ressource

paymentsresellersubscription.subscriptions.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/paymentsresellersubscription.subscriptionViewer)

Lesezugriff auf die Payments Reseller-Abo-Ressource

paymentsresellersubscription.subscriptions.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/policyanalyzer.activityAnalysisViewer)

Nutzer mit der Berechtigung „Betrachter“, der alle Aktivitätsanalysen lesen kann.

policyanalyzer.*

(roles/policyremediatormanager.policyRemediatorAdmin)

Gewährt die Berechtigung, die Nutzung von Policy Remediator für die Organisation zu aktivieren und zu deaktivieren

policyremediatormanager.*

(roles/policyremediatormanager.policyRemediatorReader)

Gewährt die Berechtigung, den Status von Policy Remediator für die Organisation zu lesen bzw. anzusehen

policyremediatormanager.locations.*

policyremediatormanager.operations.get

policyremediatormanager.operations.list

policyremediatormanager.remediatorServices.get

(roles/policysimulator.admin)

Administrator, der Wiedergaben ausführen und aufrufen kann.

policysimulator.replayResults.list

policysimulator.replays.*

(roles/policysimulator.orgPolicyAdmin)

OrgPolicy-Administrator, der Simulationen ausführen und darauf zugreifen kann.

cloudasset.assets.analyzeOrgPolicy

cloudasset.assets.exportResource

cloudasset.assets.listResource

cloudasset.assets.searchAllResources

orgpolicy.customConstraints.get

orgpolicy.customConstraints.list

orgpolicy.policies.list

orgpolicy.policy.get

policysimulator.orgPolicyViolations.list

policysimulator.orgPolicyViolationsPreviews.*

resourcemanager.organizations.get

(roles/publicca.externalAccountKeyCreator)

Mit dieser Rolle kann eine neue externalAccountKey-Ressource erstellt werden.

publicca.externalAccountKeys.create

resourcemanager.projects.get

resourcemanager.projects.list

(roles/readerrevenuesubscriptionlinking.admin)

Vollständiger Zugriff auf Ressourcen des Lesers von Veröffentlichungen

readerrevenuesubscriptionlinking.*

resourcemanager.projects.get

resourcemanager.projects.list

(roles/readerrevenuesubscriptionlinking.entitlementsViewer)

Diese Rolle kann alle Berechtigungen des Lesers von Veröffentlichungen ansehen

readerrevenuesubscriptionlinking.readerEntitlements.get

(roles/readerrevenuesubscriptionlinking.viewer)

Diese Rolle kann alle Ressourcen des Lesers von Veröffentlichungen ansehen

readerrevenuesubscriptionlinking.readerEntitlements.get

readerrevenuesubscriptionlinking.readers.get

resourcemanager.projects.get

resourcemanager.projects.list

(roles/recommender.exporter)

Exporteur von Empfehlungen

recommender.resources.export

(roles/remotebuildexecution.actionCacheWriter)

Remote Build Execution Action Cache-Autor

remotebuildexecution.actions.set

remotebuildexecution.blobs.create

(roles/remotebuildexecution.artifactAdmin)

Remote Build Execution Artifact-Administrator

remotebuildexecution.actions.create

remotebuildexecution.actions.delete

remotebuildexecution.actions.get

remotebuildexecution.blobs.*

remotebuildexecution.logstreams.*

(roles/remotebuildexecution.artifactCreator)

Remote Build Execution Artifact-Ersteller

remotebuildexecution.actions.create

remotebuildexecution.actions.get

remotebuildexecution.blobs.*

remotebuildexecution.logstreams.*

(roles/remotebuildexecution.artifactViewer)

Remote Build Execution Artifact-Betrachter

remotebuildexecution.actions.get

remotebuildexecution.blobs.get

remotebuildexecution.logstreams.get

(roles/remotebuildexecution.configurationAdmin)

Remote Build Execution Configuration-Administrator

remotebuildexecution.instances.*

remotebuildexecution.workerpools.*

(roles/remotebuildexecution.configurationViewer)

Remote Build Execution Configuration-Betrachter

remotebuildexecution.instances.get

remotebuildexecution.instances.list

remotebuildexecution.workerpools.get

remotebuildexecution.workerpools.list

(roles/remotebuildexecution.logstreamWriter)

Remote Build Execution Logstream-Autor

remotebuildexecution.logstreams.create

remotebuildexecution.logstreams.update

(roles/remotebuildexecution.reservationAdmin)

Remote Build Execution Reservation-Administrator

remotebuildexecution.actions.create

remotebuildexecution.actions.delete

remotebuildexecution.actions.get

(roles/remotebuildexecution.worker)

Remote Build Execution-Worker

remotebuildexecution.actions.update

remotebuildexecution.blobs.*

remotebuildexecution.botsessions.*

remotebuildexecution.logstreams.create

remotebuildexecution.logstreams.update

(roles/retail.admin)

Gewährt vollständigen Zugriff auf Ressourcen der Retail API.

automlrecommendations.apiKeys.create

automlrecommendations.apiKeys.delete

automlrecommendations.catalogItems.*

automlrecommendations.catalogs.*

automlrecommendations.eventStores.getStats

automlrecommendations.events.create

automlrecommendations.events.list

automlrecommendations.events.purge

automlrecommendations.events.rejoin

automlrecommendations.placements.*

automlrecommendations.recommendations.*

retail.*

(roles/retail.editor)

Vollständiger Zugriff auf Retail API-Ressourcen mit Ausnahme des dauerhaften Löschens, der erneuten Aufnahme und des Festlegens des Produktsponsorings.

automlrecommendations.apiKeys.create

automlrecommendations.apiKeys.delete

automlrecommendations.catalogItems.*

automlrecommendations.catalogs.*

automlrecommendations.eventStores.getStats

automlrecommendations.events.create

automlrecommendations.events.list

automlrecommendations.placements.*

automlrecommendations.recommendations.*

retail.attributesConfigs.addCatalogAttribute

retail.attributesConfigs.exportCatalogAttributes

retail.attributesConfigs.get

retail.attributesConfigs.importCatalogAttributes

retail.attributesConfigs.replaceCatalogAttribute

retail.attributesConfigs.update

retail.catalogs.*

retail.controls.*

retail.experiments.*

retail.models.*

retail.operations.*

retail.placements.*

retail.products.create

retail.products.delete

retail.products.export

retail.products.get

retail.products.import

retail.products.list

retail.products.update

retail.retailProjects.get

retail.servingConfigs.*

retail.userEvents.create

retail.userEvents.import

(roles/retail.viewer)

Gewährt Lesezugriff auf alle Ressourcen in Retail.

automlrecommendations.catalogItems.get

automlrecommendations.catalogItems.list

automlrecommendations.catalogs.getStats

automlrecommendations.catalogs.list

automlrecommendations.eventStores.getStats

automlrecommendations.events.list

automlrecommendations.placements.getStats

automlrecommendations.placements.list

automlrecommendations.recommendations.list

retail.attributesConfigs.exportCatalogAttributes

retail.attributesConfigs.get

retail.catalogs.completeQuery

retail.catalogs.exportAnalyticsMetrics

retail.catalogs.list

retail.controls.export

retail.controls.get

retail.controls.list

retail.experiments.get

retail.experiments.list

retail.experiments.loadExperimentLookerDashboard

retail.experiments.queryTrafficMetrics

retail.models.get

retail.models.list

retail.operations.*

retail.placements.*

retail.products.export

retail.products.get

retail.products.list

retail.retailProjects.get

retail.servingConfigs.get

retail.servingConfigs.list

retail.servingConfigs.predict

retail.servingConfigs.search

(roles/riscconfigs.admin)

Lese-/Schreibzugriff auf RISC-Konfigurationsressourcen.

clientauthconfig.clients.list

riscconfigurationservice.*

(roles/riscconfigs.viewer)

Lesezugriff auf RISC-Konfigurationsressourcen.

clientauthconfig.clients.list

riscconfigurationservice.riscconfigs.get

(roles/runapps.developer)

Zugriff zum Erstellen von serverlosen Integrationen und ihrer Konfiguration.

resourcemanager.projects.get

resourcemanager.projects.list

runapps.applications.*

runapps.deployments.get

runapps.deployments.list

runapps.locations.*

runapps.operations.*

(roles/runapps.operator)

Zugriff zum Bereitstellen serverloser Integrationen.

resourcemanager.projects.get

resourcemanager.projects.list

runapps.applications.get

runapps.applications.getStatus

runapps.applications.list

runapps.deployments.*

runapps.locations.*

runapps.operations.*

(roles/runapps.viewer)

Lesezugriff auf serverlose Integrationsressourcen.

resourcemanager.projects.get

resourcemanager.projects.list

runapps.applications.get

runapps.applications.getStatus

runapps.applications.list

runapps.deployments.get

runapps.deployments.list

runapps.locations.*

runapps.operations.get

runapps.operations.list

(roles/runtimeconfig.admin)

Vollständiger Zugriff auf RuntimeConfig-Ressourcen.

runtimeconfig.*

(roles/securedlandingzone.bqdwOrgRemediator)

Zugriff zum Ändern (Korrigieren) von Ressourcen im SLZ-BQDW-Blueprint auf Organisationsebene.

accesscontextmanager.servicePerimeters.get

accesscontextmanager.servicePerimeters.list

accesscontextmanager.servicePerimeters.update

(roles/securedlandingzone.bqdwProjectRemediator)

Zugriff zum Ändern (Korrigieren) von Ressourcen im SLZ-BQDW-Blueprint auf Projektebene.

bigquery.datasets.get

bigquery.datasets.getIamPolicy

bigquery.datasets.setIamPolicy

bigquery.datasets.update

cloudkms.cryptoKeys.get

cloudkms.cryptoKeys.getIamPolicy

cloudkms.cryptoKeys.list

cloudkms.cryptoKeys.setIamPolicy

cloudkms.cryptoKeys.update

cloudkms.keyRings.getIamPolicy

cloudkms.keyRings.setIamPolicy

pubsub.topics.get

pubsub.topics.getIamPolicy

pubsub.topics.list

pubsub.topics.setIamPolicy

pubsub.topics.update

resourcemanager.projects.update

serviceusage.services.use

storage.buckets.get

storage.buckets.getIamPolicy

storage.buckets.list

storage.buckets.setIamPolicy

storage.buckets.update

(roles/securedlandingzone.overwatchActivator)

Diese Rolle kann Overwatches aktivieren oder sperren

resourcemanager.projects.get

resourcemanager.projects.list

securedlandingzone.overwatches.activate

securedlandingzone.overwatches.suspend

(roles/securedlandingzone.overwatchAdmin)

Vollständiger Zugriff auf Overwatches

resourcemanager.projects.get

resourcemanager.projects.list

securedlandingzone.*

(roles/securedlandingzone.overwatchViewer)

Diese Rolle kann alle Attribute von Overwatches ansehen

resourcemanager.projects.get

resourcemanager.projects.list

securedlandingzone.operations.get

securedlandingzone.overwatches.get

securedlandingzone.overwatches.list

(roles/securitycentermanagement.admin)

Vollständiger Zugriff zum Verwalten der Konfiguration von Diensten und benutzerdefinierten Modulen von Cloud Security Command Center.

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycenter.organizationsettings.*

securitycenter.securitycentersettings.*

securitycentermanagement.*

(roles/securitycentermanagement.customModulesEditor)

Vollständiger Zugriff zur Verwaltung benutzerdefinierter Module in Cloud Security Command Center.

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycentermanagement.effectiveEventThreatDetectionCustomModules.*

securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*

securitycentermanagement.eventThreatDetectionCustomModules.*

securitycentermanagement.locations.*

securitycentermanagement.securityHealthAnalyticsCustomModules.*

(roles/securitycentermanagement.customModulesViewer)

Lesezugriff auf benutzerdefinierte Cloud Security Command Center-Module.

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycentermanagement.effectiveEventThreatDetectionCustomModules.*

securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*

securitycentermanagement.eventThreatDetectionCustomModules.get

securitycentermanagement.eventThreatDetectionCustomModules.list

securitycentermanagement.eventThreatDetectionCustomModules.validate

securitycentermanagement.locations.*

securitycentermanagement.securityHealthAnalyticsCustomModules.get

securitycentermanagement.securityHealthAnalyticsCustomModules.list

securitycentermanagement.securityHealthAnalyticsCustomModules.simulate

securitycentermanagement.securityHealthAnalyticsCustomModules.test

(roles/securitycentermanagement.etdCustomModulesEditor)

Vollständiger Zugriff zum Verwalten benutzerdefinierter ETD-Module von Cloud Security Command Center.

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycentermanagement.effectiveEventThreatDetectionCustomModules.*

securitycentermanagement.eventThreatDetectionCustomModules.*

securitycentermanagement.locations.*

(roles/securitycentermanagement.etdCustomModulesViewer)

Lesezugriff auf benutzerdefinierte ETD-Module in Cloud Security Command Center.

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycentermanagement.effectiveEventThreatDetectionCustomModules.*

securitycentermanagement.eventThreatDetectionCustomModules.get

securitycentermanagement.eventThreatDetectionCustomModules.list

securitycentermanagement.eventThreatDetectionCustomModules.validate

securitycentermanagement.locations.*

(roles/securitycentermanagement.settingsEditor)

Vollständiger Zugriff zum Verwalten von Cloud Security Command Center-Einstellungen

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycenter.organizationsettings.*

securitycenter.securitycentersettings.*

securitycentermanagement.*

(roles/securitycentermanagement.settingsViewer)

Lesezugriff auf Cloud Security Command Center-Einstellungen

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycenter.organizationsettings.get

securitycenter.securitycentersettings.get

securitycentermanagement.effectiveEventThreatDetectionCustomModules.*

securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*

securitycentermanagement.eventThreatDetectionCustomModules.get

securitycentermanagement.eventThreatDetectionCustomModules.list

securitycentermanagement.eventThreatDetectionCustomModules.validate

securitycentermanagement.locations.*

securitycentermanagement.securityCommandCenter.get

securitycentermanagement.securityHealthAnalyticsCustomModules.get

securitycentermanagement.securityHealthAnalyticsCustomModules.list

securitycentermanagement.securityHealthAnalyticsCustomModules.simulate

securitycentermanagement.securityHealthAnalyticsCustomModules.test

(roles/securitycentermanagement.shaCustomModulesEditor)

Vollständiger Zugriff zum Verwalten benutzerdefinierter SHA-Module von Cloud Security Command Center.

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*

securitycentermanagement.locations.*

securitycentermanagement.securityHealthAnalyticsCustomModules.*

(roles/securitycentermanagement.shaCustomModulesViewer)

Lesezugriff auf benutzerdefinierte Cloud Security Command Center-SHA-Module.

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*

securitycentermanagement.locations.*

securitycentermanagement.securityHealthAnalyticsCustomModules.get

securitycentermanagement.securityHealthAnalyticsCustomModules.list

securitycentermanagement.securityHealthAnalyticsCustomModules.simulate

securitycentermanagement.securityHealthAnalyticsCustomModules.test

(roles/securitycentermanagement.viewer)

Lesezugriff auf die Konfiguration von Diensten und benutzerdefinierten Modulen von Cloud Security Command Center.

resourcemanager.organizations.get

resourcemanager.projects.get

resourcemanager.projects.list

securitycenter.organizationsettings.get

securitycenter.securitycentersettings.get

securitycentermanagement.effectiveEventThreatDetectionCustomModules.*

securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*

securitycentermanagement.eventThreatDetectionCustomModules.get

securitycentermanagement.eventThreatDetectionCustomModules.list

securitycentermanagement.eventThreatDetectionCustomModules.validate

securitycentermanagement.locations.*

securitycentermanagement.securityCommandCenter.get

securitycentermanagement.securityHealthAnalyticsCustomModules.get

securitycentermanagement.securityHealthAnalyticsCustomModules.list

securitycentermanagement.securityHealthAnalyticsCustomModules.simulate

securitycentermanagement.securityHealthAnalyticsCustomModules.test

(roles/securityposture.admin)

Vollständiger Zugriff auf Security Posture-Dienst-APIs.

orgpolicy.*

resourcemanager.organizations.get

securitycenter.securityhealthanalyticssettings.*

securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*

securitycentermanagement.securityHealthAnalyticsCustomModules.create

securitycentermanagement.securityHealthAnalyticsCustomModules.delete

securitycentermanagement.securityHealthAnalyticsCustomModules.get

securitycentermanagement.securityHealthAnalyticsCustomModules.list

securitycentermanagement.securityHealthAnalyticsCustomModules.update

securityposture.*

(roles/securityposture.postureDeployer)

Änderungs- und Leseberechtigungen für die Posture-Bereitstellungsressource.

orgpolicy.*

resourcemanager.organizations.get

securitycenter.securityhealthanalyticssettings.*

securitycentermanagement.securityHealthAnalyticsCustomModules.create

securitycentermanagement.securityHealthAnalyticsCustomModules.delete

securitycentermanagement.securityHealthAnalyticsCustomModules.update

securityposture.operations.get

securityposture.postureDeployments.*

(roles/securityposture.postureDeploymentsViewer)

Lesezugriff auf die Posture-Bereitstellungsressource.

resourcemanager.organizations.get

securityposture.operations.get

securityposture.postureDeployments.get

securityposture.postureDeployments.list

(roles/securityposture.postureEditor)

Änderungs- und Leseberechtigungen für die Posture-Ressource.

securityposture.operations.get

securityposture.postures.*

(roles/securityposture.postureViewer)

Lesezugriff auf die Posture-Ressource.

resourcemanager.organizations.get

securityposture.operations.get

securityposture.postures.get

securityposture.postures.list

(roles/securityposture.reportCreator)

Erstellungszugriff auf Berichte, z. B. IaC-Validierungsbericht.

securityposture.operations.get

securityposture.reports.*

(roles/securityposture.viewer)

Lesezugriff auf alle Security Posture-Dienstressourcen.

resourcemanager.organizations.get

securityposture.operations.get

securityposture.postureDeployments.get

securityposture.postureDeployments.list

securityposture.postureTemplates.*

securityposture.postures.get

securityposture.postures.list

(roles/servicehealth.viewer)

Lesezugriff auf Personalized Service Health-Ressourcen.

resourcemanager.projects.get

resourcemanager.projects.list

servicehealth.*

(roles/servicesecurityinsights.securityInsightsViewer)

Lesezugriff auf Security Insights-Ressourcen

servicesecurityinsights.*

(roles/speakerid.admin)

Gewährt vollständigen Zugriff auf alle Speaker ID-Ressourcen, einschließlich Projekteinstellungen.

speakerid.*

(roles/speakerid.editor)

Gewährt Lese- und Schreibzugriff auf alle Speaker ID-Ressourcen.

speakerid.phrases.*

speakerid.speakers.*

(roles/speakerid.verifier)

Gewährt Lesezugriff auf alle Speaker ID-Ressourcen und erlaubt Verifizierung.

speakerid.phrases.get

speakerid.phrases.list

speakerid.speakers.get

speakerid.speakers.list

speakerid.speakers.verify

(roles/speakerid.viewer)

Gewährt Lesezugriff auf alle Speaker ID-Ressourcen.

speakerid.phrases.get

speakerid.phrases.list

speakerid.speakers.get

speakerid.speakers.list

(roles/speech.admin)

Gewährt uneingeschränkten Zugriff auf alle Ressourcen in Speech-to-Text

speech.*

(roles/speech.client)

Gewährt Zugriff auf APIs für die Erkennung.

speech.adaptations.execute

speech.customClasses.get

speech.customClasses.list

speech.locations.*

speech.operations.get

speech.operations.list

speech.operations.wait

speech.phraseSets.get

speech.phraseSets.list

speech.recognizers.get

speech.recognizers.list

speech.recognizers.recognize

(roles/speech.editor)

Gewährt Zugriff zum Bearbeiten von Ressourcen in Speech-to-Text

speech.adaptations.execute

speech.customClasses.*

speech.locations.*

speech.operations.*

speech.phraseSets.*

speech.recognizers.*

(roles/storageinsights.admin)

Vollständiger Zugriff auf Storage Insights-Ressourcen.

resourcemanager.projects.get

resourcemanager.projects.list

storageinsights.*

(roles/storageinsights.analyst)

Datenzugriff auf Storage Insights.

resourcemanager.projects.get

resourcemanager.projects.list

storageinsights.datasetConfigs.get

storageinsights.datasetConfigs.linkDataset

storageinsights.datasetConfigs.list

storageinsights.datasetConfigs.unlinkDataset

storageinsights.locations.*

storageinsights.operations.get

storageinsights.operations.list

storageinsights.reportConfigs.get

storageinsights.reportConfigs.list

storageinsights.reportDetails.*

(roles/storageinsights.viewer)

Lesezugriff auf Storage Insights-Ressourcen.

resourcemanager.projects.get

resourcemanager.projects.list

storageinsights.datasetConfigs.get

storageinsights.datasetConfigs.list

storageinsights.locations.*

storageinsights.operations.get

storageinsights.operations.list

storageinsights.reportConfigs.get

storageinsights.reportConfigs.list

storageinsights.reportDetails.*

(roles/subscribewithgoogledeveloper.developer)

Zugriff auf DevTools für "Abonnieren mit Google"

resourcemanager.projects.get

resourcemanager.projects.list

subscribewithgoogledeveloper.tools.get

(roles/telcoautomation.admin)

Vollständiger Zugriff auf Telco Automation-Ressourcen.

logging.buckets.get

logging.buckets.list

logging.exclusions.get

logging.exclusions.list

logging.links.get

logging.links.list

logging.locations.*

logging.logEntries.list

logging.logMetrics.get

logging.logMetrics.list

logging.logServiceIndexes.list

logging.logServices.list

logging.logs.list

logging.operations.get

logging.operations.list

logging.queries.create

logging.queries.delete

logging.queries.get

logging.queries.list

logging.queries.listShared

logging.queries.update

logging.sinks.get

logging.sinks.list

logging.usage.get

logging.views.get

logging.views.list

monitoring.timeSeries.list

resourcemanager.projects.get

serviceusage.quotas.*

serviceusage.services.*

source.repos.get

source.repos.list

telcoautomation.*

(roles/telcoautomation.blueprintDesigner)

Kann Blueprints verwalten

telcoautomation.blueprints.create

telcoautomation.blueprints.delete

telcoautomation.blueprints.get

telcoautomation.blueprints.list

telcoautomation.blueprints.propose

telcoautomation.blueprints.update

telcoautomation.deployments.computeStatus

telcoautomation.deployments.get

telcoautomation.deployments.list

telcoautomation.hydratedDeployments.get

telcoautomation.hydratedDeployments.list

telcoautomation.orchestrationClusters.get

telcoautomation.orchestrationClusters.list

telcoautomation.publicBlueprints.*

(roles/telcoautomation.deploymentAdmin)

Kann Bereitstellungen verwalten

telcoautomation.blueprints.get

telcoautomation.blueprints.list

telcoautomation.deployments.*

telcoautomation.hydratedDeployments.*

telcoautomation.orchestrationClusters.get

telcoautomation.orchestrationClusters.list

(roles/telcoautomation.opsAdminTier1)

Kann Status von Bereitstellungen abrufen

logging.buckets.get

logging.buckets.list

logging.exclusions.get

logging.exclusions.list

logging.links.get

logging.links.list

logging.locations.*

logging.logEntries.list

logging.logMetrics.get

logging.logMetrics.list

logging.logServiceIndexes.list

logging.logServices.list

logging.logs.list

logging.operations.get

logging.operations.list

logging.queries.create

logging.queries.delete

logging.queries.get

logging.queries.list

logging.queries.listShared

logging.queries.update

logging.sinks.get

logging.sinks.list

logging.usage.get

logging.views.get

logging.views.list

resourcemanager.projects.get

telcoautomation.blueprints.get

telcoautomation.blueprints.list

telcoautomation.deployments.computeStatus

telcoautomation.deployments.get

telcoautomation.deployments.list

telcoautomation.hydratedDeployments.get

telcoautomation.hydratedDeployments.list

telcoautomation.orchestrationClusters.get

telcoautomation.orchestrationClusters.list

(roles/telcoautomation.opsAdminTier4)

Kann Bereitstellungen und deren Status verwalten

logging.buckets.get

logging.buckets.list

logging.exclusions.get

logging.exclusions.list

logging.links.get

logging.links.list

logging.locations.*

logging.logEntries.list

logging.logMetrics.get

logging.logMetrics.list

logging.logServiceIndexes.list

logging.logServices.list

logging.logs.list

logging.operations.get

logging.operations.list

logging.queries.create

logging.queries.delete

logging.queries.get

logging.queries.list

logging.queries.listShared

logging.queries.update

logging.sinks.get

logging.sinks.list

logging.usage.get

logging.views.get

logging.views.list

resourcemanager.projects.get

telcoautomation.blueprints.get

telcoautomation.blueprints.list

telcoautomation.deployments.*

telcoautomation.hydratedDeployments.*

telcoautomation.orchestrationClusters.get

telcoautomation.orchestrationClusters.list

(roles/telcoautomation.serviceOrchestrator)

Kann Bereitstellungen verwalten

telcoautomation.blueprints.get

telcoautomation.blueprints.list

telcoautomation.deployments.*

telcoautomation.hydratedDeployments.*

telcoautomation.orchestrationClusters.get

telcoautomation.orchestrationClusters.list

(roles/timeseriesinsights.datasetsEditor)

Bearbeitungszugriff auf Datasets.

timeseriesinsights.*

(roles/timeseriesinsights.datasetsOwner)

Vollständiger Zugriff auf Datasets.

timeseriesinsights.*

(roles/timeseriesinsights.datasetsViewer)

Lesezugriff (Auflisten und Abfrage) auf Datasets.

timeseriesinsights.datasets.evaluate

timeseriesinsights.datasets.list

timeseriesinsights.datasets.query

timeseriesinsights.locations.*

(roles/trafficdirector.client)

Dienstkonfigurationen und Berichtsmesswerte abrufen

trafficdirector.*

(roles/translationhub.admin)

Administrator von Translation Hub

automl.models.get

automl.models.list

automl.models.predict

cloudtranslate.customModels.get

cloudtranslate.customModels.list

cloudtranslate.customModels.predict

cloudtranslate.glossaries.create

cloudtranslate.glossaries.delete

cloudtranslate.glossaries.get

cloudtranslate.glossaries.list

cloudtranslate.glossaries.predict

resourcemanager.projects.get

resourcemanager.projects.list

translationhub.*

(roles/translationhub.portalUser)

Portalnutzer von Translation Hub

automl.models.get

automl.models.list

automl.models.predict

cloudtranslate.customModels.get

cloudtranslate.customModels.list

cloudtranslate.customModels.predict

cloudtranslate.glossaries.get

cloudtranslate.glossaries.list

cloudtranslate.glossaries.predict

resourcemanager.projects.get

resourcemanager.projects.list

translationhub.portals.get

translationhub.portals.list

(roles/visualinspection.editor)

Lese- und Schreibzugriff auf alle Visual Inspection AI-Ressourcen mit Ausnahme von „visualinspection.locations.reportUsageMetrics“

visualinspection.annotationSets.*

visualinspection.annotationSpecs.*

visualinspection.annotations.*

visualinspection.datasets.*

visualinspection.images.*

visualinspection.locations.get

visualinspection.locations.list

visualinspection.modelEvaluations.*

visualinspection.models.*

visualinspection.modules.*

visualinspection.operations.*

visualinspection.solutionArtifacts.*

visualinspection.solutions.*

(roles/visualinspection.usageMetricsReporter)

ReportUsageMetric-Zugriff auf Visual Inspection AI-Dienst

visualinspection.locations.reportUsageMetrics

(roles/visualinspection.viewer)

Lesezugriff auf Visual Inspection AI-Ressourcen

visualinspection.annotationSets.get

visualinspection.annotationSets.list

visualinspection.annotationSpecs.get

visualinspection.annotationSpecs.list

visualinspection.annotations.get

visualinspection.annotations.list

visualinspection.datasets.export

visualinspection.datasets.get

visualinspection.datasets.list

visualinspection.images.get

visualinspection.images.list

visualinspection.locations.get

visualinspection.locations.list

visualinspection.modelEvaluations.*

visualinspection.models.get

visualinspection.models.list

visualinspection.modules.get

visualinspection.modules.list

visualinspection.operations.*

visualinspection.solutionArtifacts.get

visualinspection.solutionArtifacts.list

visualinspection.solutionArtifacts.predict

visualinspection.solutions.get

visualinspection.solutions.list

Weitere Informationen zu vordefinierten Rollen finden Sie unter Rollen und Berechtigungen. Hilfe bei der Auswahl der am besten geeigneten vordefinierten Rollen finden Sie unter Vordefinierte Rollen auswählen.