Weitere Gruppenrollen |
Berechtigungen |
Advisory Notifications Admin
(roles/advisorynotifications.admin )
Gewährt Schreibzugriff auf Einstellungen in Advisory Notifications
|
advisorynotifications.*
resourcemanager.organizations.get
resourcemanager.projects.get
|
Betrachter von Advisory Notifications
(roles/advisorynotifications.viewer )
Gewährt Lesezugriff in Advisory Notifications
|
advisorynotifications.notifications.*
advisorynotifications.settings.get
resourcemanager.organizations.get
resourcemanager.projects.get
|
Cloud API Hub-Administrator
Beta
(roles/apihub.admin )
Vollständiger Zugriff auf alle Ressourcen des API-Hubs.
|
apihub.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud API Hub Attributes Admin
Beta
(roles/apihub.attributeAdmin )
Vollständiger Zugriff auf alle Attributressourcen des Cloud API-Hubs.
|
apihub.attributes.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud API Hub-Bearbeiter
Beta
(roles/apihub.editor )
Bearbeitungszugriff auf die meisten Ressourcen des Cloud API-Hubs.
|
apihub.apiHubInstances.get
apihub.apiHubInstances.list
apihub.apiOperations.*
apihub.apis.*
apihub.attributes.get
apihub.attributes.list
apihub.definitions.*
apihub.dependencies.*
apihub.deployments.*
apihub.externalApis.*
apihub.hostProjectRegistrations.get
apihub.hostProjectRegistrations.list
apihub.llmEnablements.*
apihub.locations.searchResources
apihub.operations.get
apihub.operations.list
apihub.plugins.get
apihub.plugins.list
apihub.runTimeProjectAttachments.get
apihub.runTimeProjectAttachments.list
apihub.specs.*
apihub.styleGuides.get
apihub.versions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud API Hub Plugins Admin
Beta
(roles/apihub.pluginAdmin )
Vollständiger Zugriff auf alle Plug‑in-Ressourcen des Cloud API-Hubs.
|
apihub.plugins.*
apihub.specs.lint
apihub.styleGuides.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud API Hub-Berechtigungsverwaltungsadministrator
Beta
(roles/apihub.provisioningAdmin )
Vollständiger Zugriff auf Bereitstellungsressourcen des Cloud API-Hubs.
|
apihub.apiHubInstances.*
apihub.hostProjectRegistrations.*
apihub.operations.*
apihub.runTimeProjectAttachments.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud API Hub-Betrachter
Beta
(roles/apihub.viewer )
Lesezugriff auf alle Ressourcen des Cloud API-Hubs.
|
apihub.apiHubInstances.get
apihub.apiHubInstances.list
apihub.apiOperations.get
apihub.apiOperations.list
apihub.apis.get
apihub.apis.list
apihub.attributes.get
apihub.attributes.list
apihub.definitions.get
apihub.definitions.list
apihub.dependencies.get
apihub.dependencies.list
apihub.deployments.get
apihub.deployments.list
apihub.externalApis.get
apihub.externalApis.list
apihub.hostProjectRegistrations.get
apihub.hostProjectRegistrations.list
apihub.llmEnablements.get
apihub.llmEnablements.list
apihub.locations.searchResources
apihub.operations.get
apihub.operations.list
apihub.plugins.get
apihub.plugins.list
apihub.runTimeProjectAttachments.get
apihub.runTimeProjectAttachments.list
apihub.specs.get
apihub.specs.list
apihub.styleGuides.get
apihub.versions.get
apihub.versions.list
resourcemanager.projects.get
resourcemanager.projects.list
|
API-Verwaltung Admin
Beta
(roles/apim.admin )
Vollständiger Zugriff auf API-Verwaltungsressourcen.
|
apim.*
resourcemanager.projects.get
resourcemanager.projects.list
|
API Management-Betrachter
Beta
(roles/apim.viewer )
Lesezugriff auf API-Verwaltungsressourcen.
|
apim.apiObservations.get
apim.apiObservations.list
apim.apiOperations.*
apim.locations.*
apim.observationJobs.get
apim.observationJobs.list
apim.observationSources.get
apim.observationSources.list
apim.operations.get
apim.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von App Hub
(roles/apphub.admin )
Vollständiger Zugriff auf App Hub-Ressourcen.
|
apphub.*
resourcemanager.projects.get
resourcemanager.projects.list
|
App Hub Editor
(roles/apphub.editor )
Bearbeitungszugriff auf App Hub-Ressourcen.
|
apphub.applications.create
apphub.applications.delete
apphub.applications.get
apphub.applications.list
apphub.applications.update
apphub.discoveredServices.*
apphub.discoveredWorkloads.*
apphub.locations.*
apphub.operations.*
apphub.serviceProjectAttachments.lookup
apphub.services.*
apphub.workloads.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Viewer von App Hub
(roles/apphub.viewer )
Lesezugriff auf App Hub-Ressourcen.
|
apphub.applications.get
apphub.applications.list
apphub.discoveredServices.get
apphub.discoveredServices.list
apphub.discoveredWorkloads.get
apphub.discoveredWorkloads.list
apphub.locations.*
apphub.operations.get
apphub.operations.list
apphub.serviceProjectAttachments.lookup
apphub.services.get
apphub.services.list
apphub.workloads.get
apphub.workloads.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Appliance Troubleshooting Commands Approver
Beta
(roles/applianceactivation.approver )
Gewährt Zugriff zum Genehmigen von Befehlen, die auf Appliances ausgeführt werden sollen
|
applianceactivation.rttCommands.approve
applianceactivation.rttCommands.get
resourcemanager.projects.get
resourcemanager.projects.list
|
On-Appliance Troubleshooting Client
Beta
(roles/applianceactivation.client )
Gewährt Zugriff zum Lesen von Befehlen für eine Appliance und Senden des Ergebnisses.
|
applianceactivation.rttCommands.get
applianceactivation.rttCommands.sendResult
|
Appliance Troubleshooter
Beta
(roles/applianceactivation.troubleshooter )
Gewährt Zugriff zum Senden neuer Befehle, die auf Appliances ausgeführt werden sollen, und zum Aufrufen der Ausgaben
|
applianceactivation.rttCommands.create
applianceactivation.rttCommands.get
applianceactivation.rttCommands.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Assured OSS Admin
(roles/assuredoss.admin )
Zugriff zum Verwenden von Assured OSS und Verwalten der Konfiguration.
|
artifactregistry.attachments.get
artifactregistry.attachments.list
artifactregistry.dockerimages.*
artifactregistry.files.download
artifactregistry.files.get
artifactregistry.files.list
artifactregistry.locations.*
artifactregistry.mavenartifacts.*
artifactregistry.npmpackages.*
artifactregistry.packages.get
artifactregistry.packages.list
artifactregistry.projectsettings.get
artifactregistry.pythonpackages.*
artifactregistry.repositories.create
artifactregistry.repositories.downloadArtifacts
artifactregistry.repositories.get
artifactregistry.repositories.list
artifactregistry.repositories.listEffectiveTags
artifactregistry.repositories.listTagBindings
artifactregistry.repositories.readViaVirtualRepository
artifactregistry.rules.get
artifactregistry.rules.list
artifactregistry.tags.get
artifactregistry.tags.list
artifactregistry.versions.get
artifactregistry.versions.list
assuredoss.*
iam.serviceAccountKeys.create
iam.serviceAccounts.create
iam.serviceAccounts.get
pubsub.schemas.get
pubsub.schemas.list
pubsub.schemas.listRevisions
pubsub.schemas.validate
pubsub.snapshots.get
pubsub.snapshots.list
pubsub.subscriptions.create
pubsub.subscriptions.get
pubsub.subscriptions.list
pubsub.subscriptions.update
pubsub.topics.get
pubsub.topics.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.enable
serviceusage.services.get
serviceusage.services.list
|
Assured OSS-Projektadministrator
Beta
(roles/assuredoss.projectAdmin )
Zugriff zum Verwenden von Assured OSS und Verwalten der Konfiguration.
|
artifactregistry.attachments.get
artifactregistry.attachments.list
artifactregistry.dockerimages.*
artifactregistry.files.download
artifactregistry.files.get
artifactregistry.files.list
artifactregistry.locations.*
artifactregistry.mavenartifacts.*
artifactregistry.npmpackages.*
artifactregistry.packages.get
artifactregistry.packages.list
artifactregistry.projectsettings.get
artifactregistry.pythonpackages.*
artifactregistry.repositories.create
artifactregistry.repositories.downloadArtifacts
artifactregistry.repositories.get
artifactregistry.repositories.list
artifactregistry.repositories.listEffectiveTags
artifactregistry.repositories.listTagBindings
artifactregistry.repositories.readViaVirtualRepository
artifactregistry.rules.get
artifactregistry.rules.list
artifactregistry.tags.get
artifactregistry.tags.list
artifactregistry.versions.get
artifactregistry.versions.list
assuredoss.*
iam.serviceAccounts.create
iam.serviceAccounts.get
pubsub.schemas.get
pubsub.schemas.list
pubsub.schemas.listRevisions
pubsub.schemas.validate
pubsub.snapshots.get
pubsub.snapshots.list
pubsub.subscriptions.get
pubsub.subscriptions.list
pubsub.topics.get
pubsub.topics.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.enable
serviceusage.services.get
serviceusage.services.list
|
Assured OSS Reader
(roles/assuredoss.reader )
Zugriff zum Verwenden von Assured OSS und Ansehen der Assured OSS-Konfiguration.
|
artifactregistry.attachments.get
artifactregistry.attachments.list
artifactregistry.dockerimages.*
artifactregistry.files.download
artifactregistry.files.get
artifactregistry.files.list
artifactregistry.locations.*
artifactregistry.mavenartifacts.*
artifactregistry.npmpackages.*
artifactregistry.packages.get
artifactregistry.packages.list
artifactregistry.projectsettings.get
artifactregistry.pythonpackages.*
artifactregistry.repositories.downloadArtifacts
artifactregistry.repositories.get
artifactregistry.repositories.list
artifactregistry.repositories.listEffectiveTags
artifactregistry.repositories.listTagBindings
artifactregistry.repositories.readViaVirtualRepository
artifactregistry.rules.get
artifactregistry.rules.list
artifactregistry.tags.get
artifactregistry.tags.list
artifactregistry.versions.get
artifactregistry.versions.list
assuredoss.config.get
assuredoss.locations.*
assuredoss.metadata.*
assuredoss.operations.get
assuredoss.operations.list
pubsub.schemas.get
pubsub.schemas.list
pubsub.schemas.listRevisions
pubsub.schemas.validate
pubsub.snapshots.get
pubsub.snapshots.list
pubsub.subscriptions.get
pubsub.subscriptions.list
pubsub.topics.get
pubsub.topics.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
serviceusage.services.list
|
Assured OSS User
(roles/assuredoss.user )
Zugriff zum Verwenden von Assured OSS.
|
artifactregistry.attachments.get
artifactregistry.attachments.list
artifactregistry.dockerimages.*
artifactregistry.files.download
artifactregistry.files.get
artifactregistry.files.list
artifactregistry.locations.*
artifactregistry.mavenartifacts.*
artifactregistry.npmpackages.*
artifactregistry.packages.get
artifactregistry.packages.list
artifactregistry.projectsettings.get
artifactregistry.pythonpackages.*
artifactregistry.repositories.downloadArtifacts
artifactregistry.repositories.get
artifactregistry.repositories.list
artifactregistry.repositories.listEffectiveTags
artifactregistry.repositories.listTagBindings
artifactregistry.repositories.readViaVirtualRepository
artifactregistry.rules.get
artifactregistry.rules.list
artifactregistry.tags.get
artifactregistry.tags.list
artifactregistry.versions.get
artifactregistry.versions.list
assuredoss.locations.*
assuredoss.metadata.*
assuredoss.operations.get
assuredoss.operations.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Audit Manager Admin
Beta
(roles/auditmanager.admin )
Vollständiger Zugriff auf Audit Manager-Ressourcen.
|
auditmanager.*
cloudasset.assets.searchAllResources
resourcemanager.folders.get
resourcemanager.folders.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Audit Manager-Auditor
Beta
(roles/auditmanager.auditor )
Erlaubt das Erstellen und Ansehen eines Prüfberichts.
|
auditmanager.auditReports.*
auditmanager.auditScopeReports.generate
auditmanager.controlReports.*
auditmanager.controls.list
auditmanager.findings.*
auditmanager.locations.get
auditmanager.locations.list
auditmanager.operations.*
auditmanager.resourceEnrollmentStatuses.*
cloudasset.assets.searchAllResources
resourcemanager.folders.get
resourcemanager.folders.list
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Autor von Autoscaling-Messwerten
Beta
(roles/autoscaling.metricsWriter )
Zugriff, um Messwerte für eine Autoscaling-Website zu schreiben
|
autoscaling.sites.writeMetrics
|
Leser von Autoscaling-Empfehlungen
Beta
(roles/autoscaling.recommendationsReader )
Kann Empfehlungen von der Autoscaling-Website lesen
|
autoscaling.sites.readRecommendations
|
Autoscaling-Site-Administrator
Beta
(roles/autoscaling.sitesAdmin )
Vollständiger Zugriff auf alle Autoscaling-Website-Features
|
autoscaling.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Autor des Autoscaling-Zustands
Beta
(roles/autoscaling.stateWriter )
Zugriff, um den Status für eine Autoscaling-Website zu schreiben
|
autoscaling.sites.writeState
|
Batch Administrator
(roles/batch.admin )
Administrator von Batchressourcen
|
batch.jobs.*
batch.locations.*
batch.operations.*
batch.resourceAllowances.*
batch.tasks.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Batch-Agent-Melder
(roles/batch.agentReporter )
Melder von Batch-Agent-Statuswerten.
|
batch.states.report
|
Bearbeiter von Batchjobs
(roles/batch.jobsEditor )
Bearbeiter von Batchjobs
|
batch.jobs.*
batch.locations.*
batch.operations.*
batch.tasks.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Batchjob-Betrachter
(roles/batch.jobsViewer )
Betrachter von Batchjobs, Aufgabengruppen und Aufgaben
|
batch.jobs.get
batch.jobs.list
batch.locations.*
batch.operations.*
batch.tasks.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Batch ResourceAllowance Editor
(roles/batch.resourceAllowancesEditor )
Bearbeiter von Batch-ResourceAllowances
|
batch.locations.*
batch.operations.*
batch.resourceAllowances.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Batch ResourceAllowance Viewer
(roles/batch.resourceAllowancesViewer )
Betrachter von Batch-ResourceAllowances
|
batch.locations.*
batch.operations.*
batch.resourceAllowances.get
batch.resourceAllowances.list
resourcemanager.projects.get
resourcemanager.projects.list
|
BigLake-Administrator
(roles/biglake.admin )
Bietet vollständigen Zugriff auf alle BigLake-Ressourcen.
|
biglake.*
resourcemanager.projects.get
resourcemanager.projects.list
|
BigLake-Betrachter
(roles/biglake.viewer )
Bietet Lesezugriff auf alle BigLake-Ressourcen.
|
biglake.catalogs.get
biglake.catalogs.list
biglake.databases.get
biglake.databases.list
biglake.locks.list
biglake.tables.get
biglake.tables.list
resourcemanager.projects.get
resourcemanager.projects.list
|
MigrationWorkflow-Bearbeiter
(roles/bigquerymigration.editor )
Kann EDW-Migrations-Workflows bearbeiten.
|
bigquerymigration.locations.*
bigquerymigration.subtasks.get
bigquerymigration.subtasks.list
bigquerymigration.workflows.create
bigquerymigration.workflows.delete
bigquerymigration.workflows.get
bigquerymigration.workflows.list
bigquerymigration.workflows.update
|
Aufgaben-Orchestrator
(roles/bigquerymigration.orchestrator )
Kann EDW-Migrationsaufgaben orchestrieren.
|
bigquerymigration.subtasks.create
bigquerymigration.taskTypes.*
bigquerymigration.workflows.orchestrateTask
storage.objects.list
|
Nutzer von Übersetzungen für Migrationen
(roles/bigquerymigration.translationUser )
Nutzer des interaktiven SQL-Übersetzungsdienstes für EDW-Migrationen.
|
bigquerymigration.translation.translate
|
MigrationWorkflow-Betrachter
(roles/bigquerymigration.viewer )
Kann EDW-MigrationWorkflow betrachten.
|
bigquerymigration.locations.*
bigquerymigration.subtasks.get
bigquerymigration.subtasks.list
bigquerymigration.workflows.get
bigquerymigration.workflows.list
|
Aufgaben-Worker
(roles/bigquerymigration.worker )
Worker, der Unteraufgaben der EDW-Migration ausführt.
|
bigquerymigration.subtaskTypes.executeTask
bigquerymigration.subtasks.executeTask
storage.objects.create
storage.objects.get
storage.objects.list
|
Carbon Footprint-Betrachter
(roles/billing.carbonViewer )
|
billing.accounts.get
billing.accounts.getCarbonInformation
billing.accounts.list
|
Blockchain Node Engine-Administrator
(roles/blockchainnodeengine.admin )
Vollständiger Zugriff auf Blockchain Node Engine-Ressourcen.
|
blockchainnodeengine.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Blockchain Node Engine-Betrachter
(roles/blockchainnodeengine.viewer )
Lesezugriff auf Blockchain Node Engine-Ressourcen.
|
blockchainnodeengine.blockchainNodes.get
blockchainnodeengine.blockchainNodes.list
blockchainnodeengine.locations.*
blockchainnodeengine.operations.get
blockchainnodeengine.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter der Nutzung des Kapazitätsplaners
Beta
(roles/capacityplanner.viewer )
Lesezugriff auf Nutzungsressourcen des Kapazitätsplaners
|
capacityplanner.*
cloudquotas.quotas.get
compute.futureReservations.get
compute.futureReservations.list
compute.reservations.get
compute.reservations.list
monitoring.timeSeries.list
resourcemanager.folders.get
resourcemanager.organizations.get
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
|
Betrachter von Care Studio-Patienten
(roles/carestudio.viewer )
Diese Rolle kann alle Attribute von Patienten ansehen.
|
carestudio.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Chronicle-Dienst
(roles/chroniclesm.admin )
Administratoren können Details zum Chronicle-Dienst ansehen und ändern.
|
chroniclesm.*
|
Betrachter von Chronicle-Dienst
(roles/chroniclesm.viewer )
Betrachter können Details zum Chronicle-Dienst ansehen, aber nicht ändern.
|
chroniclesm.gcpAssociations.get
chroniclesm.gcpLogFlowFilters.get
chroniclesm.gcpSettings.get
|
Standortleser
Beta
(roles/cloud.locationReader )
Standorte lesen und auflisten, die zum Erstellen von Ressourcen verfügbar sind.
|
cloud.*
|
Code Repository Indexes Admin
Beta
(roles/cloudaicompanion.codeRepositoryIndexesAdmin )
Gewährt vollständigen Zugriff auf Indexressourcen des Code-Repositorys.
|
cloudaicompanion.codeRepositoryIndexes.*
cloudaicompanion.operations.*
cloudaicompanion.repositoryGroups.create
cloudaicompanion.repositoryGroups.delete
cloudaicompanion.repositoryGroups.get
cloudaicompanion.repositoryGroups.getIamPolicy
cloudaicompanion.repositoryGroups.list
cloudaicompanion.repositoryGroups.setIamPolicy
cloudaicompanion.repositoryGroups.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Code Repository Indexes Viewer
Beta
(roles/cloudaicompanion.codeRepositoryIndexesViewer )
Gewährt Lesezugriff auf Indexressourcen des Code-Repositorys.
|
cloudaicompanion.codeRepositoryIndexes.get
cloudaicompanion.codeRepositoryIndexes.list
cloudaicompanion.operations.get
cloudaicompanion.operations.list
cloudaicompanion.repositoryGroups.get
cloudaicompanion.repositoryGroups.getIamPolicy
cloudaicompanion.repositoryGroups.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Repository-Gruppen-Nutzer
Beta
(roles/cloudaicompanion.repositoryGroupsUser )
Gewährt Lese-/Verwendungszugriff auf die Index-Repository-Gruppe des Code-Repositorys.
|
cloudaicompanion.codeRepositoryIndexes.get
cloudaicompanion.repositoryGroups.get
cloudaicompanion.repositoryGroups.getIamPolicy
cloudaicompanion.repositoryGroups.use
|
Gemini für Google Cloud-Nutzer
Beta
(roles/cloudaicompanion.user )
Ein Nutzer, der Gemini for Google Cloud verwenden kann
|
cloudaicompanion.companions.*
cloudaicompanion.entitlements.get
cloudaicompanion.instances.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud Controls Partner Admin
(roles/cloudcontrolspartner.admin )
Vollständiger Zugriff auf Cloud Controls Partner-Ressourcen.
|
cloudcontrolspartner.accessapprovalrequests.list
cloudcontrolspartner.customers.*
cloudcontrolspartner.ekmconnections.get
cloudcontrolspartner.inspectabilityevents.get
cloudcontrolspartner.partnerpermissions.get
cloudcontrolspartner.partners.get
cloudcontrolspartner.platformcontrols.get
cloudcontrolspartner.violations.list
cloudcontrolspartner.workloads.list
|
Cloud Controls Partner Editor
(roles/cloudcontrolspartner.editor )
Bearbeitungszugriff auf Cloud Controls Partner-Ressourcen.
|
cloudcontrolspartner.*
|
Cloud Controls Partner Inspectability Reader
(roles/cloudcontrolspartner.inspectabilityReader )
Lesezugriff auf Cloud Controls Partner-Überprüfbarkeitsressourcen.
|
cloudcontrolspartner.customers.*
cloudcontrolspartner.inspectabilityevents.get
cloudcontrolspartner.platformcontrols.get
|
Cloud Controls Partner Monitoring Reader
(roles/cloudcontrolspartner.monitoringReader )
Lesezugriff auf Cloud Controls Partner-Monitoringressourcen.
|
cloudcontrolspartner.customers.*
cloudcontrolspartner.violations.*
cloudcontrolspartner.workloads.*
|
Cloud Controls Partner Reader
(roles/cloudcontrolspartner.reader )
Lesezugriff auf Cloud Controls Partner-Ressourcen.
|
cloudcontrolspartner.*
|
Cloud Optimization AI-Administrator
(roles/cloudoptimization.admin )
Administrator von Cloud Optimization AI-Ressourcen
|
cloudoptimization.*
|
Cloud Optimization AI-Bearbeiter
(roles/cloudoptimization.editor )
Bearbeiter von Cloud Optimization AI-Ressourcen
|
cloudoptimization.*
|
Cloud Optimization AI-Betrachter
(roles/cloudoptimization.viewer )
Betrachter von Cloud Optimization AI-Ressourcen
|
cloudoptimization.operations.get
|
Cloud-Kontingente-Administrator
Beta
(roles/cloudquotas.admin )
Uneingeschränkter Zugriff auf Cloud-Kontingente-Ressourcen.
|
cloudquotas.*
monitoring.timeSeries.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Cloud-Kontingente-Betrachter
Beta
(roles/cloudquotas.viewer )
Lesezugriff auf Cloud-Kontingente-Ressourcen.
|
cloudquotas.quotas.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Commerce Agreement Publishing
Beta
(roles/commerceagreementpublishing.admin )
Administrator des Commerce Agreement Publishing-Dienstes
|
commerceagreementpublishing.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Commerce Agreement Publishing
Beta
(roles/commerceagreementpublishing.viewer )
Betrachter des Commerce Agreement Publishing-Dienstes
|
commerceagreementpublishing.agreements.get
commerceagreementpublishing.agreements.list
commerceagreementpublishing.documents.get
commerceagreementpublishing.documents.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Confidential Space Workload User
(roles/confidentialcomputing.workloadUser )
Erlaubt das Generieren eines Attestierungstokens und das Ausführen einer Arbeitslast in einer VM. Vorgesehen für Dienstkonten, die auf Confidential Space-VMs ausgeführt werden.
|
confidentialcomputing.*
logging.logEntries.create
|
ConfigDelivery Admin
Beta
(roles/configdelivery.configDeliveryAdmin )
Gewährt vollständigen Zugriff auf alle Config Delivery-Ressourcen. Ermöglicht Nutzern, Flottenpakete und Ressourcen-Bundles zu erstellen, zu entfernen und zu verwalten.
|
configdelivery.*
resourcemanager.projects.get
resourcemanager.projects.list
|
ConfigDelivery-Betrachter
Beta
(roles/configdelivery.configDeliveryViewer )
Gewährt Lesezugriff auf alle Config Delivery-Ressourcen. Ermöglicht Nutzern, vorhandene Flottenpakete und Ressourcen-Bundles anzusehen, lässt jedoch das Vornehmen von Änderungen nicht zu.
|
configdelivery.fleetPackages.get
configdelivery.fleetPackages.list
configdelivery.locations.*
configdelivery.operations.get
configdelivery.operations.list
configdelivery.releases.get
configdelivery.releases.list
configdelivery.resourceBundles.get
configdelivery.resourceBundles.list
configdelivery.rollouts.get
configdelivery.rollouts.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Config Delivery Resource Bundle Publisher
Beta
(roles/configdelivery.resourceBundlePublisher )
Gewährt Lese- und Schreibberechtigungen für Config Delivery-ResourceBundles und ‑Releases.
|
configdelivery.locations.*
configdelivery.operations.get
configdelivery.operations.list
configdelivery.releases.create
configdelivery.releases.get
configdelivery.releases.list
configdelivery.releases.update
configdelivery.resourceBundles.create
configdelivery.resourceBundles.get
configdelivery.resourceBundles.list
configdelivery.resourceBundles.update
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/contactcenteraiplatform.admin )
Vollständiger Zugriff auf Contact Center AI Platform-Ressourcen.
|
contactcenteraiplatform.*
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/contactcenteraiplatform.viewer )
Lesezugriff auf Contact Center AI Platform-Ressourcen.
|
contactcenteraiplatform.contactCenters.get
contactcenteraiplatform.contactCenters.list
contactcenteraiplatform.locations.*
contactcenteraiplatform.operations.get
contactcenteraiplatform.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/contactcenterinsights.editor )
Gewährt Lese- und Schreibzugriff auf alle Contact Center AI Insights-Ressourcen.
|
contactcenterinsights.*
|
(roles/contactcenterinsights.viewer )
Gewährt Lesezugriff auf alle Contact Center AI Insights-Ressourcen.
|
contactcenterinsights.analyses.get
contactcenterinsights.analyses.list
contactcenterinsights.analysisRules.get
contactcenterinsights.analysisRules.list
contactcenterinsights.conversations.get
contactcenterinsights.conversations.list
contactcenterinsights.faqEntries.get
contactcenterinsights.faqEntries.list
contactcenterinsights.faqModels.get
contactcenterinsights.faqModels.list
contactcenterinsights.feedbackLabels.get
contactcenterinsights.feedbackLabels.list
contactcenterinsights.issueModels.get
contactcenterinsights.issueModels.list
contactcenterinsights.issues.get
contactcenterinsights.issues.list
contactcenterinsights.operations.get
contactcenterinsights.operations.list
contactcenterinsights.phraseMatchers.get
contactcenterinsights.phraseMatchers.list
contactcenterinsights.qaQuestions.get
contactcenterinsights.qaQuestions.list
contactcenterinsights.qaScorecardRevisions.get
contactcenterinsights.qaScorecardRevisions.list
contactcenterinsights.qaScorecards.get
contactcenterinsights.qaScorecards.list
contactcenterinsights.settings.get
contactcenterinsights.views.get
contactcenterinsights.views.list
|
Betrachter des GKE-Sicherheitsstatus
Beta
(roles/containersecurity.viewer )
Lesezugriff auf Ressourcen für den GKE-Sicherheitsstatus.
|
container.clusters.list
containersecurity.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Content Warehouse-Administrator
(roles/contentwarehouse.admin )
Gewährt vollständigen Zugriff auf alle Ressourcen in Content Warehouse
|
contentwarehouse.corpora.*
contentwarehouse.dataExportJobs.*
contentwarehouse.documentSchemas.*
contentwarehouse.documents.*
contentwarehouse.locations.*
contentwarehouse.operations.get
contentwarehouse.rawDocuments.*
contentwarehouse.ruleSets.*
contentwarehouse.synonymSets.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Content Warehouse-Dokumenten
(roles/contentwarehouse.documentAdmin )
Gewährt vollständigen Zugriff auf die Dokumentressource in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documents.create
contentwarehouse.documents.delete
contentwarehouse.documents.get
contentwarehouse.documents.getIamPolicy
contentwarehouse.documents.setIamPolicy
contentwarehouse.documents.update
contentwarehouse.links.*
contentwarehouse.locations.getStatus
contentwarehouse.rawDocuments.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Ersteller von Content Warehouse-Dokumenten
(roles/contentwarehouse.documentCreator )
Gewährt Zugriff zum Erstellen von Dokumenten in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documentSchemas.list
contentwarehouse.documents.create
contentwarehouse.locations.getStatus
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Content Warehouse-Dokumenten
(roles/contentwarehouse.documentEditor )
Gewährt Zugriff zum Aktualisieren der Dokumentressource in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documents.get
contentwarehouse.documents.getIamPolicy
contentwarehouse.documents.update
contentwarehouse.links.*
contentwarehouse.locations.getStatus
contentwarehouse.rawDocuments.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Content Warehouse-Dokumentschemas
(roles/contentwarehouse.documentSchemaViewer )
Gewährt Zugriff zum Ansehen von Dokumentschemas in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documentSchemas.list
contentwarehouse.locations.getStatus
resourcemanager.projects.get
resourcemanager.projects.list
|
Content Warehouse-Betrachter
(roles/contentwarehouse.documentViewer )
Gewährt Zugriff zum Ansehen aller Ressourcen in Content Warehouse
|
contentwarehouse.documentSchemas.get
contentwarehouse.documents.get
contentwarehouse.documents.getIamPolicy
contentwarehouse.links.get
contentwarehouse.locations.getStatus
contentwarehouse.rawDocuments.download
resourcemanager.projects.get
resourcemanager.projects.list
|
Database Center Viewer
Beta
(roles/databasecenter.viewer )
Viewer-Rolle für Datenbankcenter-Ressourcendaten
|
cloudaicompanion.entitlements.get
databasecenter.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter für den Ereignisdienst
Beta
(roles/databaseinsights.eventsViewer )
Viewer-Rolle für Ereignisdienstdaten
|
databaseinsights.aggregatedEvents.query
databaseinsights.clusterEvents.query
databaseinsights.instanceEvents.query
|
Database Insights Monitoring Viewer
Beta
(roles/databaseinsights.monitoringViewer )
Viewer-Rolle für Monitoringdaten von Datenbankstatistiken
|
databaseinsights.activeQueries.fetch
databaseinsights.activitySummary.fetch
databaseinsights.aggregatedStats.query
databaseinsights.locations.*
databaseinsights.timeSeries.query
databaseinsights.workloadRecommendations.fetch
resourcemanager.projects.get
resourcemanager.projects.list
|
Ausgeführte Vorgänge in Database Insights
Beta
(roles/databaseinsights.operationsAdmin )
Administratorrolle zum Ausführen von Datenbankstatistikvorgängen
|
databaseinsights.activeQuery.terminate
|
Database Insights Recommendation Viewer
Beta
(roles/databaseinsights.recommendationViewer )
Viewer-Rolle für Empfehlungsdaten von Datenbankstatistiken
|
databaseinsights.locations.*
databaseinsights.recommendations.query
databaseinsights.resourceRecommendations.query
databaseinsights.workloadRecommendations.fetch
resourcemanager.projects.get
resourcemanager.projects.list
|
Database Insights-Betrachter
Beta
(roles/databaseinsights.viewer )
Viewer-Rolle für Database Insights-Daten
|
databaseinsights.activeQueries.fetch
databaseinsights.activitySummary.fetch
databaseinsights.aggregatedStats.query
databaseinsights.locations.*
databaseinsights.recommendations.query
databaseinsights.resourceRecommendations.query
databaseinsights.timeSeries.query
databaseinsights.workloadRecommendations.fetch
resourcemanager.projects.get
resourcemanager.projects.list
|
Data Lineage-Administrator
(roles/datalineage.admin )
Gewährt vollständigen Zugriff auf alle Ressourcen in der Data Lineage API
|
datalineage.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Data Lineage-Bearbeiter
(roles/datalineage.editor )
Gewährt Bearbeitungszugriff auf alle Ressourcen in der Data Lineage API
|
datalineage.events.*
datalineage.locations.searchLinks
datalineage.operations.get
datalineage.processes.create
datalineage.processes.get
datalineage.processes.list
datalineage.processes.update
datalineage.runs.create
datalineage.runs.get
datalineage.runs.list
datalineage.runs.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Data Lineage-Ereignis-Ersteller
(roles/datalineage.producer )
Gewährt Zugriff zum Erstellen aller Ressourcen in der Data Lineage API
|
datalineage.events.create
datalineage.processes.create
datalineage.processes.get
datalineage.processes.update
datalineage.runs.create
datalineage.runs.get
datalineage.runs.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Data Lineage-Betrachter
(roles/datalineage.viewer )
Gewährt Lesezugriff auf alle Ressourcen in der Data Lineage API
|
datalineage.events.get
datalineage.events.list
datalineage.locations.searchLinks
datalineage.processes.get
datalineage.processes.list
datalineage.runs.get
datalineage.runs.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Ressourcen für Datenverarbeitungssteuerungen
(roles/dataprocessing.admin )
Administrator von Datenverarbeitungssteuerungen, der die Einstellungen dieser Steuerungen vollständig verwalten und alle Daten zu Datenquellen einsehen kann.
|
billing.accounts.get
billing.accounts.list
dataprocessing.*
|
Manager von Datenquellen für Datenverarbeitungssteuerungen
(roles/dataprocessing.dataSourceManager )
Manager von Datenquellen für Datenverarbeitungssteuerungen, der die zugrunde liegenden Daten abrufen, auflisten und aktualisieren kann.
|
dataprocessing.datasources.list
dataprocessing.datasources.update
|
Dataproc Resource Manager-Administrator
Beta
(roles/dataprocrm.admin )
Gewährt vollständigen Zugriff auf alle Dataproc Resource Manager-Ressourcen. Ist für Nutzer vorgesehen, die Dataproc Resource Manager-Ressourcen erstellen und löschen müssen.
|
dataprocrm.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Dataproc Resource Manager Viewer
Beta
(roles/dataprocrm.viewer )
Gewährt Lesezugriff auf alle Dataproc Resource Manager-Ressourcen. Ist für Nutzer vorgesehen, die Lesezugriff auf Dataproc Resource Manager-Ressourcen benötigen.
|
dataprocrm.locations.*
dataprocrm.nodePools.get
dataprocrm.nodePools.list
dataprocrm.nodes.get
dataprocrm.nodes.list
dataprocrm.nodes.mintOAuthToken
dataprocrm.operations.get
dataprocrm.operations.list
dataprocrm.workloads.get
dataprocrm.workloads.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Developer Connect Admin
Beta
(roles/developerconnect.admin )
Vollständiger Zugriff auf Developer Connect-Ressourcen.
|
developerconnect.connections.*
developerconnect.gitRepositoryLinks.create
developerconnect.gitRepositoryLinks.delete
developerconnect.gitRepositoryLinks.fetchGitRefs
developerconnect.gitRepositoryLinks.get
developerconnect.gitRepositoryLinks.list
developerconnect.locations.*
developerconnect.operations.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Developer Connect Read Token Accessor
Beta
(roles/developerconnect.readTokenAccessor )
Gewährt Zugriff auf Tokens mit Lesezugriff (sowohl PAT- als auch Kurzzeit-Tokens). Gewährt außerdem Zugriff zum Ansehen des Links zum Git-Repository.
|
developerconnect.connections.get
developerconnect.gitRepositoryLinks.fetchReadToken
developerconnect.gitRepositoryLinks.get
|
Auf Entwickler Connect-Token zugreifende Person
Beta
(roles/developerconnect.tokenAccessor )
Gewährt Zugriff auf Tokens mit Lese-/Schreibzugriff und Tokens mit Lesezugriff (sowohl PAT- als auch Kurzzeit-Tokens). Gewährt außerdem Zugriff zum Ansehen des Links zum Git-Repository.
|
developerconnect.connections.get
developerconnect.gitRepositoryLinks.fetchReadToken
developerconnect.gitRepositoryLinks.fetchReadWriteToken
developerconnect.gitRepositoryLinks.get
|
Developer Connect-Nutzer
Beta
(roles/developerconnect.user )
Gewährt Zugriff zum Ansehen der Verbindung und auf die Funktionen, die mit dem eigentlichen Repository interagieren, beispielsweise zum Lesen von Inhalten aus dem Repository
|
developerconnect.connections.fetchGitHubInstallations
developerconnect.connections.fetchLinkableGitRepositories
developerconnect.connections.get
developerconnect.connections.list
developerconnect.gitRepositoryLinks.fetchGitRefs
developerconnect.gitRepositoryLinks.get
developerconnect.gitRepositoryLinks.list
developerconnect.locations.*
developerconnect.operations.get
developerconnect.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Developer Connect Viewer
Beta
(roles/developerconnect.viewer )
Lesezugriff auf Developer Connect-Ressourcen.
|
developerconnect.connections.get
developerconnect.connections.list
developerconnect.gitRepositoryLinks.get
developerconnect.gitRepositoryLinks.list
developerconnect.locations.*
developerconnect.operations.get
developerconnect.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Discovery Engine-Administrator
(roles/discoveryengine.admin )
Gewährt vollständigen Zugriff auf alle Discovery Engine-Ressourcen.
|
discoveryengine.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Discovery Engine-Bearbeiter
(roles/discoveryengine.editor )
Gewährt Lese- und Schreibzugriff auf alle Discovery Engine-Ressourcen.
|
discoveryengine.aclConfigs.get
discoveryengine.analytics.*
discoveryengine.answers.get
discoveryengine.branches.*
discoveryengine.cmekConfigs.get
discoveryengine.cmekConfigs.list
discoveryengine.collections.get
discoveryengine.collections.list
discoveryengine.completionConfigs.completeQuery
discoveryengine.completionConfigs.get
discoveryengine.controls.get
discoveryengine.controls.list
discoveryengine.conversations.*
discoveryengine.dataStores.completeQuery
discoveryengine.dataStores.get
discoveryengine.dataStores.list
discoveryengine.documentProcessingConfigs.get
discoveryengine.documents.batchGetDocumentsMetadata
discoveryengine.documents.create
discoveryengine.documents.delete
discoveryengine.documents.get
discoveryengine.documents.import
discoveryengine.documents.list
discoveryengine.documents.update
discoveryengine.engines.get
discoveryengine.engines.list
discoveryengine.engines.pause
discoveryengine.engines.resume
discoveryengine.engines.tune
discoveryengine.evaluations.get
discoveryengine.evaluations.list
discoveryengine.groundingConfigs.check
discoveryengine.models.*
discoveryengine.operations.*
discoveryengine.projects.get
discoveryengine.rankingConfigs.rank
discoveryengine.sampleQueries.*
discoveryengine.sampleQuerySets.*
discoveryengine.schemas.get
discoveryengine.schemas.list
discoveryengine.schemas.preview
discoveryengine.schemas.validate
discoveryengine.servingConfigs.answer
discoveryengine.servingConfigs.get
discoveryengine.servingConfigs.list
discoveryengine.servingConfigs.recommend
discoveryengine.servingConfigs.search
discoveryengine.sessions.*
discoveryengine.siteSearchEngines.get
discoveryengine.targetSites.get
discoveryengine.targetSites.list
discoveryengine.userEvents.create
discoveryengine.userEvents.fetchStats
discoveryengine.userEvents.import
discoveryengine.widgetConfigs.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Discovery Engine-Nutzer
Beta
(roles/discoveryengine.user )
Gewährt Zugriff auf Nutzerebene auf Discovery Engine-Ressourcen.
|
discoveryengine.answers.get
discoveryengine.servingConfigs.answer
discoveryengine.servingConfigs.search
discoveryengine.sessions.get
|
Discovery Engine-Betrachter
(roles/discoveryengine.viewer )
Gewährt Lesezugriff auf alle Discovery Engine-Ressourcen.
|
discoveryengine.aclConfigs.get
discoveryengine.analytics.*
discoveryengine.answers.get
discoveryengine.branches.*
discoveryengine.cmekConfigs.get
discoveryengine.cmekConfigs.list
discoveryengine.collections.get
discoveryengine.collections.list
discoveryengine.completionConfigs.completeQuery
discoveryengine.completionConfigs.get
discoveryengine.controls.get
discoveryengine.controls.list
discoveryengine.conversations.converse
discoveryengine.conversations.get
discoveryengine.conversations.list
discoveryengine.dataStores.completeQuery
discoveryengine.dataStores.get
discoveryengine.dataStores.list
discoveryengine.documentProcessingConfigs.get
discoveryengine.documents.batchGetDocumentsMetadata
discoveryengine.documents.get
discoveryengine.documents.list
discoveryengine.engines.get
discoveryengine.engines.list
discoveryengine.evaluations.get
discoveryengine.evaluations.list
discoveryengine.groundingConfigs.check
discoveryengine.models.get
discoveryengine.models.list
discoveryengine.operations.*
discoveryengine.projects.get
discoveryengine.rankingConfigs.rank
discoveryengine.sampleQueries.get
discoveryengine.sampleQueries.list
discoveryengine.sampleQuerySets.get
discoveryengine.sampleQuerySets.list
discoveryengine.schemas.get
discoveryengine.schemas.list
discoveryengine.schemas.preview
discoveryengine.schemas.validate
discoveryengine.servingConfigs.answer
discoveryengine.servingConfigs.get
discoveryengine.servingConfigs.list
discoveryengine.servingConfigs.recommend
discoveryengine.servingConfigs.search
discoveryengine.sessions.get
discoveryengine.sessions.list
discoveryengine.siteSearchEngines.get
discoveryengine.targetSites.get
discoveryengine.targetSites.list
discoveryengine.userEvents.fetchStats
discoveryengine.widgetConfigs.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Enterprise Purchasing Admin
Beta
(roles/enterprisepurchasing.admin )
Vollständiger Zugriff auf Enterprise Purchasing-Ressourcen.
|
enterprisepurchasing.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter für Enterprise-Käufe
Beta
(roles/enterprisepurchasing.editor )
Bearbeitungszugriff auf Enterprise Purchasing-Ressourcen.
|
enterprisepurchasing.gcveCuds.get
enterprisepurchasing.gcveCuds.list
enterprisepurchasing.gcveNodePricingInfo.list
enterprisepurchasing.locations.*
enterprisepurchasing.operations.get
enterprisepurchasing.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Enterprise Purchasing Viewer
Beta
(roles/enterprisepurchasing.viewer )
Lesezugriff auf Enterprise Purchasing-Ressourcen.
|
enterprisepurchasing.gcveCuds.get
enterprisepurchasing.gcveCuds.list
enterprisepurchasing.gcveNodePricingInfo.list
enterprisepurchasing.locations.*
enterprisepurchasing.operations.get
enterprisepurchasing.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/essentialcontacts.admin )
Vollständiger Zugriff auf alle wichtigen Kontakte
|
essentialcontacts.*
|
(roles/essentialcontacts.viewer )
Kann alle wichtigen Kontakte aufrufen
|
essentialcontacts.contacts.get
essentialcontacts.contacts.list
|
Firebase Cloud Messaging API-Administrator
Beta
(roles/firebasecloudmessaging.admin )
Vollständiger Lese-/Schreibzugriff auf Firebase Cloud Messaging API-Ressourcen.
|
cloudmessaging.messages.create
fcmdata.deliverydata.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Symbol-Uploader für Firebase Crash
(roles/firebasecrash.symbolMappingsAdmin )
Vollständiger Lese- und Schreibzugriff auf Symbol-Zuordnungsdateien für Firebase Crash Reporting.
|
firebase.clients.get
firebase.clients.list
resourcemanager.projects.get
|
Firebase Data Connect API-Administrator
Beta
(roles/firebasedataconnect.admin )
Vollzugriff auf Ressourcen der Firebase Data Connect API, einschließlich Daten.
|
firebasedataconnect.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Firebase Data Connect API Data Admin
Beta
(roles/firebasedataconnect.dataAdmin )
Vollzugriff auf Datenquellen.
|
firebasedataconnect.services.executeGraphql
firebasedataconnect.services.executeGraphqlRead
|
Firebase Data Connect API Data Viewer
Beta
(roles/firebasedataconnect.dataViewer )
Lesezugriff auf Datenquellen.
|
firebasedataconnect.services.executeGraphqlRead
|
Firebase Data Connect API Viewer
Beta
(roles/firebasedataconnect.viewer )
Lesezugriff auf Ressourcen der Firebase Data Connect API. Die Rolle gewährt keinen Zugriff auf Daten.
|
firebasedataconnect.connectorRevisions.get
firebasedataconnect.connectorRevisions.list
firebasedataconnect.connectors.get
firebasedataconnect.connectors.list
firebasedataconnect.locations.*
firebasedataconnect.operations.get
firebasedataconnect.operations.list
firebasedataconnect.schemaRevisions.get
firebasedataconnect.schemaRevisions.list
firebasedataconnect.schemas.get
firebasedataconnect.schemas.list
firebasedataconnect.services.get
firebasedataconnect.services.list
resourcemanager.projects.get
resourcemanager.projects.list
|
GDC Hardware Management-Administrator
Beta
(roles/gdchardwaremanagement.admin )
Vollständiger Zugriff auf GDC Hardware Management-Ressourcen.
|
gdchardwaremanagement.*
resourcemanager.projects.get
resourcemanager.projects.list
|
GDC Hardware Management Operator
Beta
(roles/gdchardwaremanagement.operator )
Zugriff zum Erstellen, Lesen und Aktualisieren von GDC Hardware Management-Ressourcen, die diese Vorgänge unterstützen. Gewährt außerdem Zugriff zum Löschen der HardwareGroup-Ressource.
|
gdchardwaremanagement.changeLogEntries.*
gdchardwaremanagement.comments.*
gdchardwaremanagement.hardware.*
gdchardwaremanagement.hardwareGroups.*
gdchardwaremanagement.locations.*
gdchardwaremanagement.operations.get
gdchardwaremanagement.operations.list
gdchardwaremanagement.orders.create
gdchardwaremanagement.orders.get
gdchardwaremanagement.orders.list
gdchardwaremanagement.orders.update
gdchardwaremanagement.sites.*
gdchardwaremanagement.skus.*
gdchardwaremanagement.zones.*
resourcemanager.projects.get
resourcemanager.projects.list
|
GDC Hardware Management Reader
Beta
(roles/gdchardwaremanagement.reader )
Lesezugriff auf GDC Hardware Management-Ressourcen.
|
gdchardwaremanagement.changeLogEntries.*
gdchardwaremanagement.comments.get
gdchardwaremanagement.comments.list
gdchardwaremanagement.hardware.get
gdchardwaremanagement.hardware.list
gdchardwaremanagement.hardwareGroups.get
gdchardwaremanagement.hardwareGroups.list
gdchardwaremanagement.locations.*
gdchardwaremanagement.operations.get
gdchardwaremanagement.operations.list
gdchardwaremanagement.orders.get
gdchardwaremanagement.orders.list
gdchardwaremanagement.sites.get
gdchardwaremanagement.sites.list
gdchardwaremanagement.skus.*
gdchardwaremanagement.zones.get
gdchardwaremanagement.zones.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/identityplatform.admin )
Vollständiger Zugriff auf Identity Platform-Ressourcen.
|
firebaseauth.*
identitytoolkit.*
|
(roles/identityplatform.viewer )
Lesezugriff auf Identity Platform-Ressourcen.
|
firebaseauth.configs.get
firebaseauth.users.get
identitytoolkit.tenants.get
identitytoolkit.tenants.getIamPolicy
identitytoolkit.tenants.list
|
(roles/identitytoolkit.admin )
Vollständiger Zugriff auf Identity Toolkit-Ressourcen.
|
firebaseauth.*
identitytoolkit.*
|
(roles/identitytoolkit.viewer )
Lesezugriff auf Identity Toolkit-Ressourcen.
|
firebaseauth.configs.get
firebaseauth.users.get
identitytoolkit.tenants.get
identitytoolkit.tenants.getIamPolicy
identitytoolkit.tenants.list
|
Administrator von Apigee-Integrationen
(roles/integrations.apigeeIntegrationAdminRole )
Ein Nutzer mit vollständigem Zugriff auf alle Apigee-Integrationen.
|
connectors.actions.*
connectors.connections.executeSqlQuery
connectors.entities.*
connectors.entityTypes.list
integrations.apigeeAuthConfigs.*
integrations.apigeeCertificates.*
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.*
integrations.apigeeIntegrations.*
integrations.apigeeSfdcChannels.*
integrations.apigeeSfdcInstances.*
integrations.apigeeSuspensions.*
integrations.authConfigs.*
integrations.certificates.*
integrations.executions.get
integrations.executions.list
integrations.integrationVersions.create
integrations.integrationVersions.delete
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrationVersions.update
integrations.integrations.*
integrations.sfdcChannels.*
integrations.sfdcInstances.*
integrations.suspensions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bereitsteller von Apigee-Integrationen
(roles/integrations.apigeeIntegrationDeployerRole )
Ein Entwickler, der Apigee-Integrationen in der Integrationslaufzeit bereitstellen oder deren Bereitstellung rückgängig machen kann.
|
integrations.apigeeIntegrationVers.deploy
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.list
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrations.deploy
integrations.integrations.get
integrations.integrations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Apigee-Integrationen
(roles/integrations.apigeeIntegrationEditorRole )
Ein Entwickler, der Apigee-Integrationen auflisten, erstellen und aktualisieren kann.
|
connectors.actions.*
connectors.connections.executeSqlQuery
connectors.entities.*
connectors.entityTypes.list
integrations.apigeeAuthConfigs.create
integrations.apigeeAuthConfigs.get
integrations.apigeeAuthConfigs.list
integrations.apigeeAuthConfigs.update
integrations.apigeeCertificates.create
integrations.apigeeCertificates.get
integrations.apigeeCertificates.list
integrations.apigeeCertificates.update
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.*
integrations.apigeeIntegrations.*
integrations.apigeeSfdcChannels.create
integrations.apigeeSfdcChannels.get
integrations.apigeeSfdcChannels.list
integrations.apigeeSfdcChannels.update
integrations.apigeeSfdcInstances.create
integrations.apigeeSfdcInstances.get
integrations.apigeeSfdcInstances.list
integrations.apigeeSfdcInstances.update
integrations.authConfigs.create
integrations.authConfigs.get
integrations.authConfigs.list
integrations.authConfigs.update
integrations.certificates.get
integrations.executions.get
integrations.executions.list
integrations.integrationVersions.create
integrations.integrationVersions.delete
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrationVersions.update
integrations.integrations.create
integrations.integrations.get
integrations.integrations.invoke
integrations.integrations.list
integrations.integrations.update
integrations.sfdcChannels.*
integrations.sfdcInstances.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Aufrufer von Apigee-Integrationen
(roles/integrations.apigeeIntegrationInvokerRole )
Eine Rolle, die Apigee-Integrationen aufrufen kann.
|
connectors.actions.*
connectors.connections.executeSqlQuery
connectors.entities.*
connectors.entityTypes.list
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.*
integrations.executions.get
integrations.executions.list
integrations.integrationVersions.get
integrations.integrationVersions.invoke
integrations.integrationVersions.list
integrations.integrations.get
integrations.integrations.invoke
integrations.integrations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Apigee-Integrationen
(roles/integrations.apigeeIntegrationsViewer )
Ein Entwickler, der Apigee-Integrationen auflisten und ansehen kann.
|
integrations.apigeeAuthConfigs.list
integrations.apigeeCertificates.list
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.list
integrations.apigeeSfdcChannels.list
integrations.apigeeSfdcInstances.list
integrations.authConfigs.get
integrations.authConfigs.list
integrations.certificates.get
integrations.certificates.list
integrations.executions.get
integrations.executions.list
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrations.get
integrations.integrations.list
integrations.sfdcChannels.list
integrations.sfdcInstances.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Genehmiger von Apigee-Integrationen
(roles/integrations.apigeeSuspensionResolver )
Eine Rolle, die Apigee-Integrationen mit Sperr-/Warteaufgabe genehmigen oder ablehnen kann.
|
integrations.apigeeSuspensions.*
integrations.suspensions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Zertifikaten
(roles/integrations.certificateViewer )
Ein Entwickler, der Zertifikate auflisten und ansehen kann.
|
integrations.certificates.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Anwendungsintegrationen
(roles/integrations.integrationAdmin )
Ein Nutzer mit uneingeschränktem Zugriff (CRUD) auf alle Integrationen.
|
integrations.apigeeAuthConfigs.*
integrations.apigeeCertificates.*
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.*
integrations.apigeeIntegrations.*
integrations.apigeeSfdcChannels.*
integrations.apigeeSfdcInstances.*
integrations.apigeeSuspensions.*
integrations.authConfigs.*
integrations.certificates.*
integrations.executions.*
integrations.integrationVersions.create
integrations.integrationVersions.delete
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrationVersions.update
integrations.integrations.*
integrations.sfdcChannels.*
integrations.sfdcInstances.*
integrations.suspensions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bereitsteller von Anwendungsintegrationen
(roles/integrations.integrationDeployer )
Ein Entwickler, der Integrationen in der Integrationslaufzeit bereitstellen oder deren Bereitstellung rückgängig machen kann.
|
integrations.apigeeIntegrationVers.deploy
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.list
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrations.deploy
integrations.integrations.get
integrations.integrations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Anwendungsintegrationen
(roles/integrations.integrationEditor )
Ein Entwickler, der Integrationen auflisten, erstellen und aktualisieren kann.
|
integrations.apigeeAuthConfigs.create
integrations.apigeeAuthConfigs.get
integrations.apigeeAuthConfigs.list
integrations.apigeeAuthConfigs.update
integrations.apigeeCertificates.create
integrations.apigeeCertificates.get
integrations.apigeeCertificates.list
integrations.apigeeCertificates.update
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.*
integrations.apigeeIntegrations.*
integrations.apigeeSfdcChannels.create
integrations.apigeeSfdcChannels.get
integrations.apigeeSfdcChannels.list
integrations.apigeeSfdcChannels.update
integrations.apigeeSfdcInstances.create
integrations.apigeeSfdcInstances.get
integrations.apigeeSfdcInstances.list
integrations.apigeeSfdcInstances.update
integrations.authConfigs.create
integrations.authConfigs.get
integrations.authConfigs.list
integrations.authConfigs.update
integrations.certificates.get
integrations.executions.*
integrations.integrationVersions.create
integrations.integrationVersions.delete
integrations.integrationVersions.deploy
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrationVersions.update
integrations.integrations.create
integrations.integrations.get
integrations.integrations.invoke
integrations.integrations.list
integrations.integrations.update
integrations.sfdcChannels.*
integrations.sfdcInstances.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Aufrufer von Anwendungsintegrationen
(roles/integrations.integrationInvoker )
Eine Rolle, die Integrationen aufrufen kann.
|
integrations.apigeeExecutions.list
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.*
integrations.executions.*
integrations.integrationVersions.get
integrations.integrationVersions.invoke
integrations.integrationVersions.list
integrations.integrations.get
integrations.integrations.invoke
integrations.integrations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Anwendungsintegrationen
(roles/integrations.integrationViewer )
Ein Entwickler, der Integrationen auflisten und ansehen kann.
|
integrations.apigeeAuthConfigs.list
integrations.apigeeCertificates.list
integrations.apigeeIntegrationVers.get
integrations.apigeeIntegrationVers.list
integrations.apigeeIntegrations.list
integrations.apigeeSfdcChannels.list
integrations.apigeeSfdcInstances.list
integrations.authConfigs.get
integrations.authConfigs.list
integrations.certificates.get
integrations.certificates.list
integrations.executions.get
integrations.executions.list
integrations.integrationVersions.get
integrations.integrationVersions.list
integrations.integrations.get
integrations.integrations.list
integrations.sfdcChannels.list
integrations.sfdcInstances.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Sicherheitsintegrationen
Beta
(roles/integrations.securityIntegrationAdmin )
Ein Nutzer mit vollständigem Zugriff auf alle Sicherheitsintegrationen.
|
integrations.securityAuthConfigs.*
integrations.securityExecutions.*
integrations.securityIntegTempVers.*
integrations.securityIntegrationVers.*
integrations.securityIntegrations.*
|
Administrator von SFDC-Instanzen für Anwendungsintegrationen
(roles/integrations.sfdcInstanceAdmin )
Ein Nutzer mit vollständigem Zugriff (CRUD) auf alle SFDC-Instanzen.
|
integrations.sfdcChannels.*
integrations.sfdcInstances.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von SFDC-Instanzen für Anwendungsintegrationen
(roles/integrations.sfdcInstanceEditor )
Ein Entwickler, der Integrationen auflisten, erstellen und aktualisieren kann.
|
integrations.sfdcChannels.create
integrations.sfdcChannels.get
integrations.sfdcChannels.list
integrations.sfdcChannels.update
integrations.sfdcInstances.create
integrations.sfdcInstances.get
integrations.sfdcInstances.list
integrations.sfdcInstances.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von SFDC-Instanzen für Anwendungsintegrationen
(roles/integrations.sfdcInstanceViewer )
Ein Entwickler, der SFDC-Instanzen auflisten und ansehen kann.
|
integrations.sfdcChannels.get
integrations.sfdcChannels.list
integrations.sfdcInstances.get
integrations.sfdcInstances.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Genehmiger von Anwendungsintegrationen
(roles/integrations.suspensionResolver )
Eine Rolle, die gesperrte Integrationen entsperren kann.
|
integrations.apigeeSuspensions.*
integrations.suspensions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Issuerswitch Account Manager Admin
Beta
(roles/issuerswitch.accountManagerAdmin )
Diese Rolle kann alle Vorgänge eines Account Managers ausführen
|
issuerswitch.accountManagerTransactions.*
issuerswitch.managedAccounts.*
issuerswitch.operations.get
issuerswitch.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Kontomanager-Transaktionen für den Ausstellerwechsel
Beta
(roles/issuerswitch.accountManagerTransactionsAdmin )
Diese Rolle kann alle Vorgänge im Zusammenhang mit Account-Manager-Transaktionen ausführen
|
issuerswitch.accountManagerTransactions.*
issuerswitch.operations.get
issuerswitch.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Transaktionen vom Ausstellerwechsel für Account Manager
Beta
(roles/issuerswitch.accountManagerTransactionsViewer )
Diese Rolle kann alle Transaktionen des Account Managers ansehen
|
issuerswitch.accountManagerTransactions.list
issuerswitch.operations.get
issuerswitch.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Ausstellerwechseln
Beta
(roles/issuerswitch.admin )
Zugriff auf alle Rollen zum Ausstellerwechsel
|
issuerswitch.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Teilnehmern am Ausstellerwechsel
Beta
(roles/issuerswitch.issuerParticipantsAdmin )
Vollständiger Zugriff auf Beteiligte am Ausstellerwechsel
|
issuerswitch.issuerParticipants.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Ausstellerwechselauflösungen
Beta
(roles/issuerswitch.resolutionsAdmin )
Vollständiger Zugriff auf Lösungen von Issuer Switch
|
issuerswitch.complaintTransactions.list
issuerswitch.complaints.*
issuerswitch.disputes.*
issuerswitch.operations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator Ausstellerwechselregeln
Beta
(roles/issuerswitch.rulesAdmin )
Vollständiger Zugriff auf Regeln zum Ausstellerwechsel
|
issuerswitch.ruleMetadata.list
issuerswitch.ruleMetadataValues.*
issuerswitch.rules.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Ausstellerwechselregeln
Beta
(roles/issuerswitch.rulesViewer )
Diese Rolle kann Regeln und zugehörige Metadaten ansehen.
|
issuerswitch.ruleMetadata.list
issuerswitch.ruleMetadataValues.list
issuerswitch.rules.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Ausstellerwechseltransaktionen
Beta
(roles/issuerswitch.transactionsViewer )
Diese Rolle kann alle Transaktionen ansehen
|
issuerswitch.complaintTransactions.list
issuerswitch.financialTransactions.list
issuerswitch.mandateTransactions.list
issuerswitch.metadataTransactions.list
issuerswitch.operations.get
issuerswitch.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/kubernetesmetadata.publisher )
Publisher der Metadaten von Kubernetes-Clustern
|
kubernetesmetadata.*
|
Managed Flink Admin
Beta
(roles/managedflink.admin )
Vollständiger Zugriff auf Managed Flink-Ressourcen.
|
managedflink.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Verwalteter Flink-Entwickler
Beta
(roles/managedflink.developer )
Vollständiger Zugriff auf Managed Flink-Jobs und ‑Sitzungen sowie Lesezugriff auf Bereitstellungen.
|
managedflink.deployments.get
managedflink.deployments.list
managedflink.jobs.*
managedflink.locations.*
managedflink.operations.get
managedflink.operations.list
managedflink.sessions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Managed Flink-Betrachter
Beta
(roles/managedflink.viewer )
Lesezugriff auf Managed Flink-Ressourcen.
|
managedflink.deployments.get
managedflink.deployments.list
managedflink.jobs.get
managedflink.jobs.list
managedflink.locations.*
managedflink.operations.get
managedflink.operations.list
managedflink.sessions.get
managedflink.sessions.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Verwalteter Kafka-Administrator
Beta
(roles/managedkafka.admin )
Vollständiger Zugriff auf verwaltete Kafka-Ressourcen.
|
managedkafka.*
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
serviceusage.services.list
|
Verwalteter Kafka-Client
Beta
(roles/managedkafka.client )
Bietet Zugriff zum Herstellen einer Verbindung zu den Kafka-Servern in einem Cluster, d. h. Zugriff auf die Kafka-Datenebene. Unter anderem vorgesehen für Ersteller und Nutzer.
|
managedkafka.clusters.connect
managedkafka.clusters.get
managedkafka.clusters.list
managedkafka.consumerGroups.*
managedkafka.locations.*
managedkafka.operations.get
managedkafka.operations.list
managedkafka.topics.*
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
serviceusage.services.list
|
Bearbeiter verwalteter Kafka-Cluster
Beta
(roles/managedkafka.clusterEditor )
Gewährt Lese‑ und Schreibzugriff auf Kafka-Cluster, z. B. für IT-Abteilungen, die Kafka-Cluster bereitstellen, aber Themen und Nutzergruppen nicht lesen oder ändern können müssen.
|
managedkafka.clusters.create
managedkafka.clusters.delete
managedkafka.clusters.get
managedkafka.clusters.list
managedkafka.clusters.update
managedkafka.consumerGroups.get
managedkafka.consumerGroups.list
managedkafka.locations.*
managedkafka.operations.get
managedkafka.operations.list
managedkafka.topics.get
managedkafka.topics.list
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
serviceusage.services.list
|
Managed Kafka Consumer Group Editor
Beta
(roles/managedkafka.consumerGroupEditor )
Bietet Lese‑ und Schreibzugriff auf Nutzergruppenmetadaten, z. B. für Entwickler, die Nutzergruppen konfigurieren.
|
managedkafka.clusters.get
managedkafka.clusters.list
managedkafka.consumerGroups.*
managedkafka.locations.*
managedkafka.operations.get
managedkafka.operations.list
managedkafka.topics.get
managedkafka.topics.list
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
serviceusage.services.list
|
Managed Kafka Topic Editor
Beta
(roles/managedkafka.topicEditor )
Bietet Lese‑ und Schreibzugriff auf Themenmetadaten, z. B. für Entwickler, die Themen konfigurieren.
|
managedkafka.clusters.get
managedkafka.clusters.list
managedkafka.consumerGroups.get
managedkafka.consumerGroups.list
managedkafka.locations.*
managedkafka.operations.get
managedkafka.operations.list
managedkafka.topics.*
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
serviceusage.services.list
|
Managed Kafka Viewer
Beta
(roles/managedkafka.viewer )
Lesezugriff auf verwaltete Kafka-Ressourcen.
|
managedkafka.clusters.get
managedkafka.clusters.list
managedkafka.consumerGroups.get
managedkafka.consumerGroups.list
managedkafka.locations.*
managedkafka.operations.get
managedkafka.operations.list
managedkafka.topics.get
managedkafka.topics.list
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.quotas.get
serviceusage.services.get
serviceusage.services.list
|
Bearbeiter von Mandiant Attack Surface Management
Beta
(roles/mandiant.attackSurfaceManagementEditor )
Schreibzugriff auf Attack Surface Management
|
mandiant.genericAttackSurfaceManagements.create
mandiant.genericAttackSurfaceManagements.delete
mandiant.genericAttackSurfaceManagements.update
mandiant.genericPlatforms.create
mandiant.genericPlatforms.delete
mandiant.genericPlatforms.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Attack Surface Management Viewer
Beta
(roles/mandiant.attackSurfaceManagementViewer )
Lesezugriff auf Attack Surface Management
|
mandiant.genericAttackSurfaceManagements.get
mandiant.genericPlatforms.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Digital Threat Monitoring-Bearbeiter
Beta
(roles/mandiant.digitalThreatMonitoringEditor )
Schreibzugriff auf Digital Threat Monitoring
|
mandiant.genericDigitalThreatMonitorings.create
mandiant.genericDigitalThreatMonitorings.update
mandiant.genericPlatforms.create
mandiant.genericPlatforms.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Digital Threat Monitoring-Betrachter
Beta
(roles/mandiant.digitalThreatMonitoringViewer )
Lesezugriff auf Digital Threat Monitoring
|
mandiant.genericDigitalThreatMonitorings.get
mandiant.genericPlatforms.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Redakteur von Mandiant Expertise On Demand
Beta
(roles/mandiant.expertiseOnDemandEditor )
Schreibzugriff auf Expertise On Demand
|
mandiant.genericExpertiseOnDemands.create
mandiant.genericExpertiseOnDemands.delete
mandiant.genericExpertiseOnDemands.update
mandiant.genericPlatforms.create
mandiant.genericPlatforms.delete
mandiant.genericPlatforms.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Expertise On Demand Viewer
Beta
(roles/mandiant.expertiseOnDemandViewer )
Lesezugriff auf Expertise On Demand
|
mandiant.genericExpertiseOnDemands.get
mandiant.genericPlatforms.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Threat Intel Editor
Beta
(roles/mandiant.threatIntelEditor )
Schreibzugriff auf Threat Intelligence
|
mandiant.genericPlatforms.create
mandiant.genericPlatforms.delete
mandiant.genericPlatforms.update
mandiant.genericThreatIntels.create
mandiant.genericThreatIntels.delete
mandiant.genericThreatIntels.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Viewer von Mandiant Threat Intelligence
Beta
(roles/mandiant.threatIntelViewer )
Lesezugriff auf Threat Intelligence
|
mandiant.genericPlatforms.get
mandiant.genericThreatIntels.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Validation Editor
Beta
(roles/mandiant.validationEditor )
Schreibzugriff auf Validation
|
mandiant.genericPlatforms.create
mandiant.genericPlatforms.delete
mandiant.genericPlatforms.update
mandiant.genericValidations.create
mandiant.genericValidations.delete
mandiant.genericValidations.update
resourcemanager.projects.get
resourcemanager.projects.list
|
Mandiant Validation Viewer
Beta
(roles/mandiant.validationViewer )
Lesezugriff auf Validation
|
mandiant.genericPlatforms.get
mandiant.genericValidations.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Mobility Solutions Overages Viewer
Beta
(roles/mapsanalytics.mobilitySolutionsOverageViewer )
Gewährt Lesezugriff auf Messwertdaten zu Überschreitungen der Mobilitätslösungen.
|
mapsanalytics.metricData.queryMobilitySolutionsOverageData
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.services.list
|
Maps Analytics-Betrachter
Beta
(roles/mapsanalytics.viewer )
Gewährt Lesezugriff auf alle Maps-Analyseressourcen.
|
mapsanalytics.metricData.query
mapsanalytics.metricMetadata.list
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.services.list
|
(roles/mapsplatformdatasets.admin )
Gewährt Lese- und Schreibzugriff auf alle Ressourcen der Maps Platform Datasets API
|
mapsadmin.clientStyles.*
mapsplatformdatasets.*
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/mapsplatformdatasets.viewer )
Gewährt Lesezugriff auf alle Ressourcen der Maps Platform Datasets API
|
mapsadmin.clientStyles.get
mapsadmin.clientStyles.list
mapsplatformdatasets.datasets.export
mapsplatformdatasets.datasets.get
mapsplatformdatasets.datasets.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Marketplace Solutions Admin
Beta
(roles/marketplacesolutions.admin )
Vollständiger Zugriff auf Ressourcen von Marketplace-Lösungen.
|
marketplacesolutions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Marketplace-Lösungen
Beta
(roles/marketplacesolutions.editor )
Bearbeitungszugriff auf Ressourcen von Marketplace-Lösungen.
|
marketplacesolutions.locations.*
marketplacesolutions.operations.get
marketplacesolutions.operations.list
marketplacesolutions.powerImages.*
marketplacesolutions.powerInstances.get
marketplacesolutions.powerInstances.list
marketplacesolutions.powerInstances.update
marketplacesolutions.powerNetworks.*
marketplacesolutions.powerSshKeys.*
marketplacesolutions.powerVolumes.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Marketplace-Lösungen
Beta
(roles/marketplacesolutions.viewer )
Lesezugriff auf Ressourcen von Marketplace-Lösungen.
|
marketplacesolutions.locations.*
marketplacesolutions.operations.get
marketplacesolutions.operations.list
marketplacesolutions.powerImages.*
marketplacesolutions.powerInstances.get
marketplacesolutions.powerInstances.list
marketplacesolutions.powerNetworks.*
marketplacesolutions.powerSshKeys.*
marketplacesolutions.powerVolumes.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Memorystore Admin
Beta
(roles/memorystore.admin )
Vollständiger Zugriff auf Memorystore-Ressourcen.
|
memorystore.instances.create
memorystore.instances.delete
memorystore.instances.get
memorystore.instances.list
memorystore.instances.update
memorystore.locations.*
memorystore.operations.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Memorystore DB Connector User
Beta
(roles/memorystore.dbConnectionUser )
Zugriff zum Herstellen von Verbindungen zur Memorystore-Serverdatenbank.
|
memorystore.instances.connect
|
Memorystore-Betrachter
Beta
(roles/memorystore.viewer )
Lesezugriff auf Memorystore-Ressourcen.
|
memorystore.instances.get
memorystore.instances.list
memorystore.locations.*
memorystore.operations.get
memorystore.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator der Google Home Developer Console
(roles/nestconsole.homeDeveloperAdmin )
Administratorzugriff auf Ressourcen der Google Home Developer Console
|
nestconsole.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter der Google Home Developer Console
(roles/nestconsole.homeDeveloperEditor )
Lese-/Schreibzugriff auf Ressourcen der Google Home Developer Console
|
nestconsole.smarthomePreviews.update
nestconsole.smarthomeProjects.get
nestconsole.smarthomeProjects.update
nestconsole.smarthomeVersions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Leser der Google Home Developer Console
(roles/nestconsole.homeDeveloperViewer )
Lesezugriff auf Ressourcen der Google Home Developer Console
|
nestconsole.smarthomeProjects.get
nestconsole.smarthomeVersions.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Google Cloud NetApp Volumes
Beta
(roles/netapp.admin )
Vollständiger Zugriff auf Ressourcen von Google Cloud NetApp Volumes.
|
netapp.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Google Cloud NetApp Volumes Viewer
Beta
(roles/netapp.viewer )
Lesezugriff auf Ressourcen von Google Cloud NetApp Volumes.
|
netapp.activeDirectories.get
netapp.activeDirectories.list
netapp.backupPolicies.get
netapp.backupPolicies.list
netapp.backupVaults.get
netapp.backupVaults.list
netapp.backups.get
netapp.backups.list
netapp.kmsConfigs.get
netapp.kmsConfigs.list
netapp.locations.*
netapp.operations.get
netapp.operations.list
netapp.replications.get
netapp.replications.list
netapp.snapshots.get
netapp.snapshots.list
netapp.storagePools.get
netapp.storagePools.list
netapp.volumes.get
netapp.volumes.list
resourcemanager.projects.get
resourcemanager.projects.list
|
OAuth-Konfigurationsbearbeiter
Beta
(roles/oauthconfig.editor )
Lese-/Schreibzugriff auf OAuth-Konfigurationsressourcen
|
clientauthconfig.*
oauthconfig.*
|
OAuth-Config-Betrachter
Beta
(roles/oauthconfig.viewer )
Lesezugriff auf OAuth-Konfigurationsressourcen
|
clientauthconfig.brands.get
clientauthconfig.brands.list
clientauthconfig.clients.get
clientauthconfig.clients.list
oauthconfig.clientpolicy.get
oauthconfig.testusers.get
oauthconfig.verification.get
|
Observability-Administrator
Beta
(roles/observability.admin )
Vollzugriff auf Beobachtbarkeitsressourcen.
|
observability.*
|
Beobachtbarkeitsbearbeiter
Beta
(roles/observability.editor )
Bearbeitungszugriff auf Beobachtbarkeitsressourcen.
|
observability.*
|
Beobachtbarkeitsbetrachter
Beta
(roles/observability.viewer )
Lesezugriff auf Beobachtbarkeitsressourcen.
|
observability.scopes.get
|
Oracle Database@Google Cloud Admin
(roles/oracledatabase.admin )
Gewährt vollständigen Zugriff zum Verwalten aller Oracle Database-Ressourcen.
|
oracledatabase.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Oracle Database@Google Cloud Autonomous Database Admin
(roles/oracledatabase.autonomousDatabaseAdmin )
Gewährt vollständigen Zugriff zum Verwalten aller Autonomous Database-Ressourcen.
|
oracledatabase.autonomousDatabaseBackups.*
oracledatabase.autonomousDatabaseCharacterSets.list
oracledatabase.autonomousDatabases.*
oracledatabase.autonomousDbVersions.list
oracledatabase.entitlements.list
oracledatabase.locations.*
oracledatabase.operations.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Oracle Database@Google Cloud Autonomous Database Viewer
(roles/oracledatabase.autonomousDatabaseViewer )
Gewährt Lesezugriff zum Ansehen aller Autonomous Database-Ressourcen.
|
oracledatabase.autonomousDatabaseBackups.get
oracledatabase.autonomousDatabaseBackups.list
oracledatabase.autonomousDatabaseCharacterSets.list
oracledatabase.autonomousDatabases.generateWallet
oracledatabase.autonomousDatabases.get
oracledatabase.autonomousDatabases.list
oracledatabase.autonomousDbVersions.list
oracledatabase.entitlements.list
oracledatabase.locations.*
oracledatabase.operations.get
oracledatabase.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Oracle Database@Google Cloud Exadata Infrastructure Admin
(roles/oracledatabase.cloudExadataInfrastructureAdmin )
Gewährt uneingeschränkten Zugriff zum Verwalten aller Exadata-Infrastrukturressourcen.
|
oracledatabase.cloudExadataInfrastructures.create
oracledatabase.cloudExadataInfrastructures.delete
oracledatabase.cloudExadataInfrastructures.get
oracledatabase.cloudExadataInfrastructures.list
oracledatabase.cloudExadataInfrastructures.update
oracledatabase.dbServers.list
oracledatabase.dbSystemShapes.list
oracledatabase.entitlements.list
oracledatabase.giVersions.list
oracledatabase.locations.*
oracledatabase.operations.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Oracle Database@Google Cloud Exadata Infrastructure Viewer
(roles/oracledatabase.cloudExadataInfrastructureViewer )
Gewährt Lesezugriff zum Ansehen aller Exadata-Infrastrukturressourcen.
|
oracledatabase.cloudExadataInfrastructures.get
oracledatabase.cloudExadataInfrastructures.list
oracledatabase.dbServers.list
oracledatabase.dbSystemShapes.list
oracledatabase.entitlements.list
oracledatabase.giVersions.list
oracledatabase.locations.*
oracledatabase.operations.get
oracledatabase.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Oracle Database@Google Cloud VM Cluster Admin
(roles/oracledatabase.cloudVmClusterAdmin )
Gewährt uneingeschränkten Zugriff zum Verwalten aller VM-Clusterressourcen.
|
oracledatabase.cloudExadataInfrastructures.use
oracledatabase.cloudVmClusters.*
oracledatabase.dbNodes.list
oracledatabase.entitlements.list
oracledatabase.locations.*
oracledatabase.operations.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Oracle Database@Google Cloud VM Cluster Viewer
(roles/oracledatabase.cloudVmClusterViewer )
Gewährt Lesezugriff zum Ansehen aller VM-Cluster-Ressourcen.
|
oracledatabase.cloudVmClusters.get
oracledatabase.cloudVmClusters.list
oracledatabase.dbNodes.list
oracledatabase.entitlements.list
oracledatabase.locations.*
oracledatabase.operations.get
oracledatabase.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Oracle Database@Google Cloud Viewer
(roles/oracledatabase.viewer )
Gewährt Lesezugriff auf alle Oracle-Datenbankressourcen.
|
oracledatabase.autonomousDatabaseBackups.get
oracledatabase.autonomousDatabaseBackups.list
oracledatabase.autonomousDatabaseCharacterSets.list
oracledatabase.autonomousDatabases.generateWallet
oracledatabase.autonomousDatabases.get
oracledatabase.autonomousDatabases.list
oracledatabase.autonomousDbVersions.list
oracledatabase.cloudExadataInfrastructures.get
oracledatabase.cloudExadataInfrastructures.list
oracledatabase.cloudVmClusters.get
oracledatabase.cloudVmClusters.list
oracledatabase.dbNodes.list
oracledatabase.dbServers.list
oracledatabase.dbSystemShapes.list
oracledatabase.entitlements.list
oracledatabase.giVersions.list
oracledatabase.locations.*
oracledatabase.operations.get
oracledatabase.operations.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Payments-Reseller-Ressourcen
Beta
(roles/paymentsresellersubscription.partnerAdmin )
Vollständiger Zugriff auf alle Payments-Reseller-Ressourcen, einschließlich Abos, Produkte und Promotions
|
paymentsresellersubscription.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Payments-Reseller-Ressourcen
Beta
(roles/paymentsresellersubscription.partnerViewer )
Lesezugriff auf alle Payments-Reseller-Ressourcen, einschließlich Abos, Produkte und Promotions
|
paymentsresellersubscription.products.list
paymentsresellersubscription.promotions.list
paymentsresellersubscription.subscriptions.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Payments-Reseller-Produkten
Beta
(roles/paymentsresellersubscription.productViewer )
Lesezugriff auf die Payments Reseller-Produktressource
|
paymentsresellersubscription.products.list
resourcemanager.projects.get
resourcemanager.projects.list
|
(roles/paymentsresellersubscription.promotionViewer )
Lesezugriff auf die Payments Reseller-Promotion-Ressource
|
paymentsresellersubscription.promotions.list
resourcemanager.projects.get
resourcemanager.projects.list
|
Bearbeiter von Payments-Reseller-Abos
Beta
(roles/paymentsresellersubscription.subscriptionEditor )
Schreibzugriff auf die Payments Reseller-Abo-Ressource
|
paymentsresellersubscription.subscriptions.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Payments-Reseller-Abos
Beta
(roles/paymentsresellersubscription.subscriptionViewer )
Lesezugriff auf die Payments Reseller-Abo-Ressource
|
paymentsresellersubscription.subscriptions.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Aktivitätsanalysen
Beta
(roles/policyanalyzer.activityAnalysisViewer )
Nutzer mit der Berechtigung „Betrachter“, der alle Aktivitätsanalysen lesen kann.
|
policyanalyzer.*
|
(roles/policyremediatormanager.policyRemediatorAdmin )
Gewährt die Berechtigung, die Nutzung von Policy Remediator für die Organisation zu aktivieren und zu deaktivieren
|
policyremediatormanager.*
|
(roles/policyremediatormanager.policyRemediatorReader )
Gewährt die Berechtigung, den Status von Policy Remediator für die Organisation zu lesen bzw. anzusehen
|
policyremediatormanager.locations.*
policyremediatormanager.operations.get
policyremediatormanager.operations.list
policyremediatormanager.remediatorServices.get
|
Simulator-Administrator
Beta
(roles/policysimulator.admin )
Administrator, der Wiedergaben ausführen und aufrufen kann.
|
policysimulator.replayResults.list
policysimulator.replays.*
|
OrgPolicy Simulator-Administrator
Beta
(roles/policysimulator.orgPolicyAdmin )
OrgPolicy-Administrator, der Simulationen ausführen und darauf zugreifen kann.
|
cloudasset.assets.analyzeOrgPolicy
cloudasset.assets.exportResource
cloudasset.assets.listResource
cloudasset.assets.searchAllResources
orgpolicy.customConstraints.get
orgpolicy.customConstraints.list
orgpolicy.policies.list
orgpolicy.policy.get
policysimulator.orgPolicyViolations.list
policysimulator.orgPolicyViolationsPreviews.*
resourcemanager.organizations.get
|
Externer Kontoschlüssel-Ersteller
Beta
(roles/publicca.externalAccountKeyCreator )
Mit dieser Rolle kann eine neue externalAccountKey-Ressource erstellt werden.
|
publicca.externalAccountKeys.create
resourcemanager.projects.get
resourcemanager.projects.list
|
Administrator von Aboverknüpfungen
(roles/readerrevenuesubscriptionlinking.admin )
Vollständiger Zugriff auf Ressourcen des Lesers von Veröffentlichungen
|
readerrevenuesubscriptionlinking.*
resourcemanager.projects.get
resourcemanager.projects.list
|
Betrachter von Berechtigungen für Aboverknüpfungen
(roles/readerrevenuesubscriptionlinking.entitlementsViewer )
Diese Rolle kann alle Berechtigungen des Lesers von Veröffentlichungen ansehen
|
readerrevenuesubscriptionlinking.readerEntitlements.get
|
Betrachter von Aboverknüpfungen
(roles/readerrevenuesubscriptionlinking.viewer )
Diese Rolle kann alle Ressourcen des Lesers von Veröffentlichungen ansehen
|
readerrevenuesubscriptionlinking.readerEntitlements.get
readerrevenuesubscriptionlinking.readers.get
resourcemanager.projects.get
resourcemanager.projects.list
|
Empfehlungsexporteur
(roles/recommender.exporter )
Exporteur von Empfehlungen
|
recommender.resources.export
|
Remote Build Execution Action Cache-AutorBeta
(roles/remotebuildexecution.actionCacheWriter )
Remote Build Execution Action Cache-Autor
|
remotebuildexecution.actions.set
remotebuildexecution.blobs.create
|
Remote Build Execution Artifact-AdministratorBeta
(roles/remotebuildexecution.artifactAdmin )
Remote Build Execution Artifact-Administrator
|
remotebuildexecution.actions.create
remotebuildexecution.actions.delete
remotebuildexecution.actions.get
remotebuildexecution.blobs.*
remotebuildexecution.logstreams.*
|
Remote Build Execution Artifact-ErstellerBeta
(roles/remotebuildexecution.artifactCreator )
Remote Build Execution Artifact-Ersteller
|
remotebuildexecution.actions.create
remotebuildexecution.actions.get
remotebuildexecution.blobs.*
remotebuildexecution.logstreams.*
|
Remote Build Execution Artifact-BetrachterBeta
(roles/remotebuildexecution.artifactViewer )
Remote Build Execution Artifact-Betrachter
|
remotebuildexecution.actions.get
remotebuildexecution.blobs.get
remotebuildexecution.logstreams.get
|
Remote-Build Execution Configuration-AdministratorBeta
(roles/remotebuildexecution.configurationAdmin )
Remote Build Execution Configuration-Administrator
|
remotebuildexecution.instances.*
remotebuildexecution.workerpools.*
|
Remote Build Execution Configuration-BetrachterBeta
(roles/remotebuildexecution.configurationViewer )
Remote Build Execution Configuration-Betrachter
|
remotebuildexecution.instances.get
remotebuildexecution.instances.list
remotebuildexecution.workerpools.get
remotebuildexecution.workerpools.list
|
Remote Build Execution Logstream-AutorBeta
(roles/remotebuildexecution.logstreamWriter )
Remote Build Execution Logstream-Autor
|
remotebuildexecution.logstreams.create
remotebuildexecution.logstreams.update
|
Remote Build Execution Reservation-Administrator
Beta
(roles/remotebuildexecution.reservationAdmin )
Remote Build Execution Reservation-Administrator
|
remotebuildexecution.actions.create
remotebuildexecution.actions.delete
remotebuildexecution.actions.get
|
Remote Build Execution-WorkerBeta
(roles/remotebuildexecution.worker )
Remote Build Execution-Worker
|
remotebuildexecution.actions.update
remotebuildexecution.blobs.*
remotebuildexecution.botsessions.*
remotebuildexecution.logstreams.create
remotebuildexecution.logstreams.update
|
Retail-Administrator
(roles/retail.admin )
Gewährt vollständigen Zugriff auf Ressourcen der Retail API.
|
automlrecommendations.apiKeys.create
automlrecommendations.apiKeys.delete
automlrecommendations.catalogItems.*
automlrecommendations.catalogs.*
automlrecommendations.eventStores.getStats
automlrecommendations.events.create
automlrecommendations.events.list
automlrecommendations.events.purge
automlrecommendations.events.rejoin
automlrecommendations.placements.*
automlrecommendations.recommendations.*
retail.*
|
Retail-Bearbeiter
(roles/retail.editor )
Vollständiger Zugriff auf Retail API-Ressourcen mit Ausnahme des dauerhaften Löschens, der erneuten Aufnahme und des Festlegens des Produktsponsorings.
|
automlrecommendations.apiKeys.create
automlrecommendations.apiKeys.delete
automlrecommendations.catalogItems.*
automlrecommendations.catalogs.*
automlrecommendations.eventStores.getStats
automlrecommendations.events.create
automlrecommendations.events.list
automlrecommendations.placements.*
automlrecommendations.recommendations.*
retail.alertConfigs.*
retail.attributesConfigs.addCatalogAttribute
retail.attributesConfigs.exportCatalogAttributes
retail.attributesConfigs.get
retail.attributesConfigs.importCatalogAttributes
retail.attributesConfigs.replaceCatalogAttribute
retail.attributesConfigs.update
retail.branches.*
retail.catalogs.*
retail.controls.*
retail.experiments.*
retail.models.*
retail.operations.*
retail.placements.*
retail.products.create
retail.products.delete
retail.products.export
retail.products.get
retail.products.import
retail.products.list
retail.products.update
retail.retailProjects.get
retail.servingConfigs.*
retail.userEvents.create
retail.userEvents.import
|
Retail-Betrachter
(roles/retail.viewer )
Gewährt Lesezugriff auf alle Ressourcen in Retail.
|
automlrecommendations.catalogItems.get
automlrecommendations.catalogItems.list
automlrecommendations.catalogs.getStats
automlrecommendations.catalogs.list
automlrecommendations.eventStores.getStats
automlrecommendations.events.list
automlrecommendations.placements.getStats
automlrecommendations.placements.list
automlrecommendations.recommendations.list
retail.alertConfigs.get
retail.attributesConfigs.exportCatalogAttributes
retail.attributesConfigs.get
retail.branches.*
retail.catalogs.completeQuery
retail.catalogs.exportAnalyticsMetrics
retail.catalogs.list
retail.controls.export
retail.controls.get
retail.controls.list
retail.experiments.get
retail.experiments.list
retail.experiments.loadExperimentLookerDashboard
retail.experiments.queryTrafficMetrics
retail.models.get
retail.models.list
retail.operations.*
retail.placements.*
retail.products.export
retail.products.get
retail.products.list
retail.retailProjects.get
retail.servingConfigs.get
retail.servingConfigs.list
retail.servingConfigs.predict
retail.servingConfigs.search
|
RISC-Konfigurationsadministrator
Beta
(roles/riscconfigs.admin )
Lese-/Schreibzugriff auf RISC-Konfigurationsressourcen.
|
clientauthconfig.clients.list
riscconfigurationservice.*
|
RISC-Konfigurationsbetrachter
Beta
(roles/riscconfigs.viewer )
Lesezugriff auf RISC-Konfigurationsressourcen.
|
clientauthconfig.clients.list
riscconfigurationservice.riscconfigs.get
|
Route Optimization Editor
(roles/routeoptimization.editor )
Diese Rolle kann Vorgänge mit langer Ausführungszeit über BatchOptimizeTours erstellen.
|
resourcemanager.projects.get
resourcemanager.projects.list
routeoptimization.*
|
Route Optimization Viewer
(roles/routeoptimization.viewer )
Diese Rolle kann alle Vorgänge mit langer Ausführungszeit ansehen.
|
resourcemanager.projects.get
resourcemanager.projects.list
routeoptimization.operations.get
|
Entwickler von serverlosen Integrationen
Beta
(roles/runapps.developer )
Zugriff zum Erstellen von serverlosen Integrationen und ihrer Konfiguration.
|
resourcemanager.projects.get
resourcemanager.projects.list
runapps.applications.*
runapps.deployments.get
runapps.deployments.list
runapps.locations.*
runapps.operations.*
|
Operator von serverlosen Integrationen
Beta
(roles/runapps.operator )
Zugriff zum Bereitstellen serverloser Integrationen.
|
resourcemanager.projects.get
resourcemanager.projects.list
runapps.applications.get
runapps.applications.getStatus
runapps.applications.list
runapps.deployments.*
runapps.locations.*
runapps.operations.*
|
Betrachter von serverlosen Integrationen
Beta
(roles/runapps.viewer )
Lesezugriff auf serverlose Integrationsressourcen.
|
resourcemanager.projects.get
resourcemanager.projects.list
runapps.applications.get
runapps.applications.getStatus
runapps.applications.list
runapps.deployments.get
runapps.deployments.list
runapps.locations.*
runapps.operations.get
runapps.operations.list
|
Administrator für Cloud Runtime Configuration
(roles/runtimeconfig.admin )
Voller Zugriff auf RuntimeConfig-Ressourcen
|
runtimeconfig.*
|
(roles/securedlandingzone.bqdwOrgRemediator )
Zugriff zum Ändern (Korrigieren) von Ressourcen im SLZ-BQDW-Blueprint auf Organisationsebene.
|
accesscontextmanager.servicePerimeters.get
accesscontextmanager.servicePerimeters.list
accesscontextmanager.servicePerimeters.update
|
(roles/securedlandingzone.bqdwProjectRemediator )
Zugriff zum Ändern (Korrigieren) von Ressourcen im SLZ-BQDW-Blueprint auf Projektebene.
|
bigquery.datasets.get
bigquery.datasets.getIamPolicy
bigquery.datasets.setIamPolicy
bigquery.datasets.update
cloudkms.cryptoKeys.get
cloudkms.cryptoKeys.getIamPolicy
cloudkms.cryptoKeys.list
cloudkms.cryptoKeys.setIamPolicy
cloudkms.cryptoKeys.update
cloudkms.keyRings.getIamPolicy
cloudkms.keyRings.setIamPolicy
pubsub.topics.get
pubsub.topics.getIamPolicy
pubsub.topics.list
pubsub.topics.setIamPolicy
pubsub.topics.update
resourcemanager.projects.update
serviceusage.services.use
storage.buckets.get
storage.buckets.getIamPolicy
storage.buckets.list
storage.buckets.setIamPolicy
storage.buckets.update
|
Overwatch-Aktivator
Beta
(roles/securedlandingzone.overwatchActivator )
Diese Rolle kann Overwatches aktivieren oder sperren
|
resourcemanager.projects.get
resourcemanager.projects.list
securedlandingzone.overwatches.activate
securedlandingzone.overwatches.suspend
|
Overwatch-Administrator
Beta
(roles/securedlandingzone.overwatchAdmin )
Vollständiger Zugriff auf Overwatches
|
resourcemanager.projects.get
resourcemanager.projects.list
securedlandingzone.*
|
Overwatch-Betrachter
Beta
(roles/securedlandingzone.overwatchViewer )
Diese Rolle kann alle Attribute von Overwatches ansehen
|
resourcemanager.projects.get
resourcemanager.projects.list
securedlandingzone.operations.get
securedlandingzone.overwatches.get
securedlandingzone.overwatches.list
|
Security Posture Admin
(roles/securityposture.admin )
Vollständiger Zugriff auf Security Posture-Dienst-APIs.
|
orgpolicy.*
resourcemanager.organizations.get
securitycenter.securityhealthanalyticssettings.*
securitycentermanagement.effectiveSecurityHealthAnalyticsCustomModules.*
securitycentermanagement.securityHealthAnalyticsCustomModules.create
securitycentermanagement.securityHealthAnalyticsCustomModules.delete
securitycentermanagement.securityHealthAnalyticsCustomModules.get
securitycentermanagement.securityHealthAnalyticsCustomModules.list
securitycentermanagement.securityHealthAnalyticsCustomModules.update
securityposture.*
|
Security Posture Deployer
(roles/securityposture.postureDeployer )
Änderungs- und Leseberechtigungen für die Posture-Bereitstellungsressource.
|
orgpolicy.*
resourcemanager.organizations.get
securitycenter.securityhealthanalyticssettings.*
securitycentermanagement.securityHealthAnalyticsCustomModules.create
securitycentermanagement.securityHealthAnalyticsCustomModules.delete
securitycentermanagement.securityHealthAnalyticsCustomModules.update
securityposture.operations.get
securityposture.postureDeployments.*
|
Security Posture Deployments Viewer
(roles/securityposture.postureDeploymentsViewer )
Lesezugriff auf die Posture-Bereitstellungsressource.
|
resourcemanager.organizations.get
securityposture.operations.get
securityposture.postureDeployments.get
securityposture.postureDeployments.list
|
Security Posture Resource Editor
(roles/securityposture.postureEditor )
Änderungs- und Leseberechtigungen für die Posture-Ressource.
|
securityposture.operations.get
securityposture.postures.*
|
Security Posture Resource Viewer
(roles/securityposture.postureViewer )
Lesezugriff auf die Posture-Ressource.
|
resourcemanager.organizations.get
securityposture.operations.get
securityposture.postures.get
securityposture.postures.list
|
Security Posture Shift-Left Validator
(roles/securityposture.reportCreator )
Erstellungszugriff auf Berichte, z. B. IaC-Validierungsbericht.
|
securityposture.operations.get
securityposture.reports.*
|
Security Posture Viewer
(roles/securityposture.viewer )
Lesezugriff auf alle Security Posture-Dienstressourcen.
|
resourcemanager.organizations.get
securityposture.operations.get
securityposture.postureDeployments.get
securityposture.postureDeployments.list
securityposture.postureTemplates.*
securityposture.postures.get
securityposture.postures.list
|
Betrachter von Personalized Service Health
(roles/servicehealth.viewer )
Lesezugriff auf Personalized Service Health-Ressourcen.
|
resourcemanager.projects.get
resourcemanager.projects.list
servicehealth.*
|
Security Insights-Betrachter
Beta
(roles/servicesecurityinsights.securityInsightsViewer )
Lesezugriff auf Security Insights-Ressourcen
|
servicesecurityinsights.*
|
Speaker ID-Administrator
(roles/speakerid.admin )
Gewährt vollständigen Zugriff auf alle Speaker ID-Ressourcen, einschließlich Projekteinstellungen.
|
speakerid.*
|
Speaker ID-Bearbeiter
(roles/speakerid.editor )
Gewährt Lese- und Schreibzugriff auf alle Speaker ID-Ressourcen.
|
speakerid.phrases.*
speakerid.speakers.*
|
Speaker ID-Verifizierer
(roles/speakerid.verifier )
Gewährt Lesezugriff auf alle Speaker ID-Ressourcen und erlaubt Verifizierung.
|
speakerid.phrases.get
speakerid.phrases.list
speakerid.speakers.get
speakerid.speakers.list
speakerid.speakers.verify
|
Speaker ID-Betrachter
(roles/speakerid.viewer )
Gewährt Lesezugriff auf alle Speaker ID-Ressourcen.
|
speakerid.phrases.get
speakerid.phrases.list
speakerid.speakers.get
speakerid.speakers.list
|
Cloud Speech-Administrator
(roles/speech.admin )
Gewährt uneingeschränkten Zugriff auf alle Ressourcen in Speech-to-Text
|
speech.*
|
Cloud Speech-Client
(roles/speech.client )
Gewährt Zugriff auf APIs für die Erkennung.
|
speech.adaptations.execute
speech.customClasses.get
speech.customClasses.list
speech.locations.*
speech.operations.get
speech.operations.list
speech.operations.wait
speech.phraseSets.get
speech.phraseSets.list
speech.recognizers.get
speech.recognizers.list
speech.recognizers.recognize
|
Cloud Speech-Bearbeiter
(roles/speech.editor )
Gewährt Zugriff zum Bearbeiten von Ressourcen in Speech-to-Text
|
speech.adaptations.execute
speech.customClasses.*
speech.locations.*
speech.operations.*
speech.phraseSets.*
speech.recognizers.*
|
Administrator von Storage Insights
(roles/storageinsights.admin )
Vollständiger Zugriff auf Storage Insights-Ressourcen.
|
resourcemanager.projects.get
resourcemanager.projects.list
storageinsights.*
|
Storage Insights Analyst
(roles/storageinsights.analyst )
Datenzugriff auf Storage Insights.
|
resourcemanager.projects.get
resourcemanager.projects.list
storageinsights.datasetConfigs.get
storageinsights.datasetConfigs.linkDataset
storageinsights.datasetConfigs.list
storageinsights.datasetConfigs.unlinkDataset
storageinsights.locations.*
storageinsights.operations.get
storageinsights.operations.list
storageinsights.reportConfigs.get
storageinsights.reportConfigs.list
storageinsights.reportDetails.*
|
Betrachter von Storage Insights
(roles/storageinsights.viewer )
Lesezugriff auf Storage Insights-Ressourcen.
|
resourcemanager.projects.get
resourcemanager.projects.list
storageinsights.datasetConfigs.get
storageinsights.datasetConfigs.list
storageinsights.locations.*
storageinsights.operations.get
storageinsights.operations.list
storageinsights.reportConfigs.get
storageinsights.reportConfigs.list
storageinsights.reportDetails.*
|
Abonnieren mit Google-EntwicklerBeta
(roles/subscribewithgoogledeveloper.developer )
Zugriff auf DevTools für "Abonnieren mit Google"
|
resourcemanager.projects.get
resourcemanager.projects.list
subscribewithgoogledeveloper.tools.get
|
Telco Automation Admin
Beta
(roles/telcoautomation.admin )
Vollständiger Zugriff auf Telco Automation-Ressourcen.
|
logging.buckets.get
logging.buckets.list
logging.exclusions.get
logging.exclusions.list
logging.links.get
logging.links.list
logging.locations.*
logging.logEntries.list
logging.logMetrics.get
logging.logMetrics.list
logging.logServiceIndexes.list
logging.logServices.list
logging.logs.list
logging.operations.get
logging.operations.list
logging.queries.getShared
logging.queries.listShared
logging.queries.usePrivate
logging.sinks.get
logging.sinks.list
logging.usage.get
logging.views.get
logging.views.list
monitoring.timeSeries.list
observability.scopes.get
resourcemanager.projects.get
serviceusage.quotas.*
serviceusage.services.*
source.repos.get
source.repos.list
telcoautomation.*
|
Telekommunikations-Blueprint-Designer
Beta
(roles/telcoautomation.blueprintDesigner )
Kann Blueprints verwalten
|
telcoautomation.blueprints.create
telcoautomation.blueprints.delete
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.blueprints.propose
telcoautomation.blueprints.update
telcoautomation.deployments.computeStatus
telcoautomation.deployments.get
telcoautomation.deployments.list
telcoautomation.hydratedDeployments.get
telcoautomation.hydratedDeployments.list
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
telcoautomation.publicBlueprints.*
|
Telco Automation Deployment Admin
Beta
(roles/telcoautomation.deploymentAdmin )
Kann Bereitstellungen verwalten
|
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.deployments.*
telcoautomation.hydratedDeployments.*
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
|
Telco Automation Tier 1 Operations Admin
Beta
(roles/telcoautomation.opsAdminTier1 )
Kann Status von Bereitstellungen abrufen
|
logging.buckets.get
logging.buckets.list
logging.exclusions.get
logging.exclusions.list
logging.links.get
logging.links.list
logging.locations.*
logging.logEntries.list
logging.logMetrics.get
logging.logMetrics.list
logging.logServiceIndexes.list
logging.logServices.list
logging.logs.list
logging.operations.get
logging.operations.list
logging.queries.getShared
logging.queries.listShared
logging.queries.usePrivate
logging.sinks.get
logging.sinks.list
logging.usage.get
logging.views.get
logging.views.list
observability.scopes.get
resourcemanager.projects.get
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.deployments.computeStatus
telcoautomation.deployments.get
telcoautomation.deployments.list
telcoautomation.hydratedDeployments.get
telcoautomation.hydratedDeployments.list
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
|
Telco Automation Tier 4 Operations Admin
Beta
(roles/telcoautomation.opsAdminTier4 )
Kann Bereitstellungen und deren Status verwalten
|
logging.buckets.get
logging.buckets.list
logging.exclusions.get
logging.exclusions.list
logging.links.get
logging.links.list
logging.locations.*
logging.logEntries.list
logging.logMetrics.get
logging.logMetrics.list
logging.logServiceIndexes.list
logging.logServices.list
logging.logs.list
logging.operations.get
logging.operations.list
logging.queries.getShared
logging.queries.listShared
logging.queries.usePrivate
logging.sinks.get
logging.sinks.list
logging.usage.get
logging.views.get
logging.views.list
observability.scopes.get
resourcemanager.projects.get
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.deployments.*
telcoautomation.hydratedDeployments.*
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
|
Telco Automation Service Orchestrator
Beta
(roles/telcoautomation.serviceOrchestrator )
Kann Bereitstellungen verwalten
|
telcoautomation.blueprints.get
telcoautomation.blueprints.list
telcoautomation.deployments.*
telcoautomation.hydratedDeployments.*
telcoautomation.orchestrationClusters.get
telcoautomation.orchestrationClusters.list
|
Insights-Datensatzzeitreihen-Bearbeiter
Beta
(roles/timeseriesinsights.datasetsEditor )
Bearbeitungszugriff auf Datasets.
|
timeseriesinsights.*
|
Insights-Datensatzzeitreihen-Inhaber
Beta
(roles/timeseriesinsights.datasetsOwner )
Vollständiger Zugriff auf Datasets.
|
timeseriesinsights.*
|
Insights-Datensatzzeitreihen-Betrachter
Beta
(roles/timeseriesinsights.datasetsViewer )
Lesezugriff (Auflisten und Abfrage) auf Datasets.
|
timeseriesinsights.datasets.evaluate
timeseriesinsights.datasets.list
timeseriesinsights.datasets.query
timeseriesinsights.locations.*
|
Traffic Director-Client
Beta
(roles/trafficdirector.client )
Kann Dienstkonfigurationen und Berichtsmesswerte abrufen.
|
trafficdirector.*
|
Translation Hub-Administrator
Beta
(roles/translationhub.admin )
Administrator von Translation Hub
|
automl.models.get
automl.models.list
automl.models.predict
cloudtranslate.customModels.get
cloudtranslate.customModels.list
cloudtranslate.customModels.predict
cloudtranslate.glossaries.create
cloudtranslate.glossaries.delete
cloudtranslate.glossaries.get
cloudtranslate.glossaries.list
cloudtranslate.glossaries.predict
resourcemanager.projects.get
resourcemanager.projects.list
translationhub.*
|
Nutzer des Translation Hub-Portals
Beta
(roles/translationhub.portalUser )
Portalnutzer von Translation Hub
|
automl.models.get
automl.models.list
automl.models.predict
cloudtranslate.customModels.get
cloudtranslate.customModels.list
cloudtranslate.customModels.predict
cloudtranslate.glossaries.get
cloudtranslate.glossaries.list
cloudtranslate.glossaries.predict
resourcemanager.projects.get
resourcemanager.projects.list
translationhub.portals.get
translationhub.portals.list
|
Visual Inspection AI-Lösungsbearbeiter
(roles/visualinspection.editor )
Lese- und Schreibzugriff auf alle Visual Inspection AI-Ressourcen mit Ausnahme von „visualinspection.locations.reportUsageMetrics“
|
visualinspection.annotationSets.*
visualinspection.annotationSpecs.*
visualinspection.annotations.*
visualinspection.datasets.*
visualinspection.images.*
visualinspection.locations.get
visualinspection.locations.list
visualinspection.modelEvaluations.*
visualinspection.models.*
visualinspection.modules.*
visualinspection.operations.*
visualinspection.solutionArtifacts.*
visualinspection.solutions.*
|
Reporter für Visual Inspection AI-Nutzungsmesswerte
(roles/visualinspection.usageMetricsReporter )
ReportUsageMetric-Zugriff auf Visual Inspection AI-Dienst
|
visualinspection.locations.reportUsageMetrics
|
Visual Inspection AI-Betrachter
(roles/visualinspection.viewer )
Lesezugriff auf Visual Inspection AI-Ressourcen
|
visualinspection.annotationSets.get
visualinspection.annotationSets.list
visualinspection.annotationSpecs.get
visualinspection.annotationSpecs.list
visualinspection.annotations.get
visualinspection.annotations.list
visualinspection.datasets.export
visualinspection.datasets.get
visualinspection.datasets.list
visualinspection.images.get
visualinspection.images.list
visualinspection.locations.get
visualinspection.locations.list
visualinspection.modelEvaluations.*
visualinspection.models.get
visualinspection.models.list
visualinspection.modules.get
visualinspection.modules.list
visualinspection.operations.*
visualinspection.solutionArtifacts.get
visualinspection.solutionArtifacts.list
visualinspection.solutionArtifacts.predict
visualinspection.solutions.get
visualinspection.solutions.list
|