An Application Operator (AO) is a member of the development team within the Platform Administrator (PA) organization. AOs interact with project-level resources. You can assign the following predefined roles to team members:
- AI Gemini Flash Developer: Access the Gemini Flash model service to make requests to the model endpoint.
- AI OCR Developer: Access the Optical Character Recognition service to detect text in images.
- AI Speech Chirp Developer: Access the Chirp model of the Speech-to-Text service to recognize speech and transcribe audio.
- AI Speech Developer: Access the Speech-to-Text service to recognize speech and transcribe audio.
- AI Text Embedding Developer: Access the Text Embedding service to convert English natural language into numerical vectors.
- AI Text Embedding Multilingual Developer: Access the Text Embedding service to convert multilingual natural language into numerical vectors.
- AI Translation Developer: Access the Vertex AI Translation service to translate text.
- Artifact Management Admin: Has admin access to resources in all Harbor projects in the project namespace.
- Artifact Management Editor: Has read and write access to resources in all Harbor projects in the project namespace.
- Backup Creator: Creates manual backups and restores.
- Certificate Authority Service Admin: Has access to manage certificate authorities and certificate requests in their project.
- Dashboard Editor: Has read and write access on
Dashboard
custom resources. - Dashboard Viewer: Has read-only access on
Dashboard
custom resources. - Discovery Engine Admin: Get full access to all Discovery Engine resources.
- Discovery Engine Developer: Get read and write access to all Discovery Engine resources.
- Discovery Engine Reader: Get read access to all Discovery Engine resources.
- Global Load Balancer Admin: Has read and write permissions on all load balancer resources in the project namespace in the global API server.
- Harbor Instance Admin: Has full access to manage Harbor instances in a project.
- Harbor Instance Viewer: Has read-only access to view Harbor instances in a project.
- Harbor Project Creator: Has access to manage Harbor instance projects.
- K8s Network Policy Admin: Manages network policies in user clusters.
- KMS Admin: Manages KMS keys in a project, including the
AEADKey
andSigningKey
keys. This role can also import and export keys. - KMS Creator: Has create and read access on KMS keys in a project.
- KMS Developer: Has access to perform crypto operations using keys in projects.
- KMS Key Export Admin: Has access to export KMS keys as wrapped keys from the KMS.
- KMS Key Import Admin: Has access to import KMS keys as wrapped keys to the KMS.
- KMS Viewer: Has read-only access to KMS keys in their project, and can view key import and export.
- LoggingRule Creator: Creates
LoggingRule
custom resources in the project namespace. - LoggingRule Editor: Edits
LoggingRule
custom resources in the project namespace. - LoggingRule Viewer: Views
LoggingRule
custom resources in the project namespace. - LoggingTarget Creator: Creates
LoggingTarget
custom resources in the project namespace. - LoggingTarget Editor: Edits
LoggingTarget
custom resources in the project namespace. - LoggingTarget Viewer: Views
LoggingTarget
custom resources in the project namespace. - Load Balancer Admin: has read and write permissions on all load balancer resources in the project namespace.
- Marketplace Editor: Has create, update, and delete access on service instances in a project.
- MonitoringRule Editor: Has read and write access to
MonitoringRule
resources. - MonitoringRule Viewer: Has read-only access to
MonitoringRule
custom resources. - MonitoringTarget Editor: Has read and write access to
MonitoringTarget
custom resources. - MonitoringTarget Viewer: Has read-only access to
MonitoringTarget
custom resources. - Namespace Admin: Manages all resources within the project namespace.
- NAT Viewer: Has read-only access to deployments in user clusters.
- ObservabilityPipeline Editor: Has read and write access on
ObservabilityPipeine
custom resources. - ObservabilityPipeline Viewer: Has read-only access on
ObservabilityPipeline
custom resources. - Project Bucket Admin: Manages the storage buckets and objects within buckets.
- Project Bucket Object Admin: Has read-only access on buckets within a project, and read-write access on the objects in those buckets.
- Project Bucket Object Viewer: Has read-only access on buckets within a project and the objects in those buckets.
- Project NetworkPolicy Admin: Manages the project network policies in the project namespace.
- Project DB Admin: Administers Database Service for a project.
- Project DB Editor: Has read-write access to Database Service for a project.
- Project DB Viewer: Has read-only access to Database Service for a project.
- Project IAM Admin: Manages the IAM allow policies of projects.
- Project Viewer: Has read-only access to all resources within project namespaces.
- Project VirtualMachine Admin: Manages VMs in the project namespace.
- Project VirtualMachine Image Admin: Manages VM images in the project namespace.
- Secret Admin: Manages Kubernetes secrets in projects.
- Secret Viewer: Views Kubernetes secrets in projects.
- Service Configuration Admin: Has read and write access to service configurations within a project namespace.
- Service Configuration Viewer: Has read access to service configurations within a project namespace.
- Vertex AI Prediction User: Access the Online Prediction service to make requests to your model endpoint.
- Volume Replication Admin: Manages volume replication resources.
- Workbench Notebooks Admin: Get read and write access to all notebook resources within a project namespace.
- Workbench Notebooks Viewer: Get read-only access to all notebook resources within a project namespace and view the Vertex AI Workbench user interface.
- Workload Viewer: Has read access to workloads in a project.
Common roles
The following predefined common roles apply to all authenticated users:
- AI Platform Viewer: Grants permissions to view pre-trained services.
- DB Options Viewer: Views all configuration options that can be used in Database Service.
- DB UI Viewer: Grants permissions to authenticated users to view the Database Service UI.
- DNS Suffix Viewer: Accesses the domain name service (DNS) suffix config map.
- Flow Log Admin: Has read and write access to all Flow Log resources.
- Flow Log Viewer: Has read-only access to all Flow Log resources.
- Marketplace Viewer: Has read-only access on service versions.
- Pricing Calculator User: Has read-only access to stock keeping unit (SKU) descriptions.
- Project Discovery Viewer: Has read access for all authenticated users to the project view.
- Public Image Viewer: Has read access for all authenticated users on the
public VM images in the namespace
vm-images
. - Virtual Machine Type Viewer: Has read access to cluster-scoped virtual machine types.
- VM Type Viewer: Has read access to the predefined virtual machine types.