Questa pagina descrive le opzioni di controllo dell'accesso disponibili in
Eventarc.
Panoramica 
Eventarc utilizza Identity and Access Management (IAM) per controllo dell'accesso.
Per un'introduzione a IAM e alle sue funzionalità, consulta la
panoramica di IAM . Per scoprire come concedere e
revocare l'accesso, consulta
Gestire l'accesso a progetti, cartelle e organizzazioni .
Per gli elenchi delle autorizzazioni e dei ruoli supportati da Eventarc, consulta le sezioni seguenti.
Eventarc service agent 
Alcuni servizi Google Cloud hanno agenti di servizio  che consentono al servizio di accedere alle tue risorse se vengono concesse le autorizzazioni appropriate. Se un'API richiede un service agent, Google Cloud lo crea
in un momento successivo all'attivazione e all'utilizzo dell'API.
Eventarc utilizza un modello di provisioning che crea il proprio service agent
solo quando è necessario, ad esempio quando crei una risorsa Eventarc
per la prima volta, e non quando l'API viene inizialmente abilitata.
Il provisioning del service agent e la propagazione delle modifiche nel sistema
possono richiedere diversi minuti.  Per ulteriori informazioni
su questo ritardo, consulta
Autorizzazione negata durante l'utilizzo dell'agente di servizio Eventarc .
Abilita le API Eventarc 
Per visualizzare e assegnare ruoli IAM per Eventarc,
devi abilitare le API Eventarc per il tuo progetto. Non potrai visualizzare
i ruoli Eventarc nella console Google Cloud 
finché non abiliti le API.
Abilita l'API Eventarc  e l'API Eventarc Publishing :
 Console  
  
   
   
     
   
  
   
   
     
   
  
   
   
     
   
  
 
 
   
 
 
  
  
    
      
        
      
Roles required to enable APIs 
          To enable APIs, you need the Service Usage Admin IAM
          role (roles/serviceusage.serviceUsageAdmin), which
          contains the serviceusage.services.enable permission. Learn how to grant
          roles .
        
Enable the APIs 
    
  
  
 gcloud  
  
   
   
  
   
   
  
   
   
  
 
 
 
  
  
    
  
  Roles required to enable APIs 
      To enable APIs, you need the Service Usage Admin IAM
      role (roles/serviceusage.serviceUsageAdmin), which contains the
      serviceusage.services.enable permission. Learn how to grant
      roles .
    
gcloud  services  enable   eventarc.googleapis.com eventarcpublishing.googleapis.com   
Ruoli predefiniti 
La tabella seguente elenca i ruoli IAM predefiniti di Eventarc con un elenco corrispondente di tutte le autorizzazioni incluse in ciascun ruolo.
I ruoli predefiniti coprono la maggior parte dei casi d'uso tipici. Se il tuo caso d'uso non è
coperto dai ruoli predefiniti, puoi
creare un ruolo personalizzato IAM .
Ruoli Eventarc 
  
Role 
Permissions 
 
 
Eventarc Admin
 
(roles/eventarc.admin )
Full control over all Eventarc resources.
 
Lowest-level resources where you can grant this role:
 
  
    
      eventarc.*
    
      eventarc.channelConnections.create  eventarc.channelConnections.delete  eventarc.channelConnections.get  eventarc.channelConnections.getIamPolicy  eventarc.channelConnections.list  eventarc.channelConnections.publish  eventarc.channelConnections.setIamPolicy  eventarc.channels.attacheventarc.channels.createeventarc.channels.deleteeventarc.channels.geteventarc.channels.getIamPolicyeventarc.channels.listeventarc.channels.publisheventarc.channels.setIamPolicyeventarc.channels.undeleteeventarc.channels.updateeventarc.enrollments.createeventarc.enrollments.deleteeventarc.enrollments.geteventarc.enrollments.getIamPolicy  eventarc.enrollments.listeventarc.enrollments.setIamPolicy  eventarc.enrollments.updateeventarc.events.receiveAuditLogWritten  eventarc.events.receiveEventeventarc.googleApiSources.create  eventarc.googleApiSources.delete  eventarc.googleApiSources.geteventarc.googleApiSources.getIamPolicy  eventarc.googleApiSources.listeventarc.googleApiSources.setIamPolicy  eventarc.googleApiSources.update  eventarc.googleChannelConfigs.get  eventarc.googleChannelConfigs.update  eventarc.kafkaSources.createeventarc.kafkaSources.deleteeventarc.kafkaSources.geteventarc.kafkaSources.getIamPolicy  eventarc.kafkaSources.listeventarc.kafkaSources.setIamPolicy  eventarc.locations.geteventarc.locations.listeventarc.messageBuses.createeventarc.messageBuses.deleteeventarc.messageBuses.geteventarc.messageBuses.getIamPolicy  eventarc.messageBuses.listeventarc.messageBuses.publisheventarc.messageBuses.setIamPolicy  eventarc.messageBuses.updateeventarc.messageBuses.useeventarc.multiProjectSources.collectGoogleApiEvents  eventarc.operations.canceleventarc.operations.deleteeventarc.operations.geteventarc.operations.listeventarc.pipelines.createeventarc.pipelines.deleteeventarc.pipelines.geteventarc.pipelines.getIamPolicy  eventarc.pipelines.listeventarc.pipelines.setIamPolicy  eventarc.pipelines.updateeventarc.providers.geteventarc.providers.listeventarc.triggers.createeventarc.triggers.deleteeventarc.triggers.geteventarc.triggers.getIamPolicyeventarc.triggers.listeventarc.triggers.setIamPolicyeventarc.triggers.undeleteeventarc.triggers.update 
   
  resourcemanager.projects.get
  resourcemanager.projects.list
 
 
Eventarc Connection Publisher
Beta 
 
(roles/eventarc.connectionPublisher )
Can publish events to Eventarc channel connections.
 
Lowest-level resources where you can grant this role:
 
  eventarc.channelConnections.get  
  eventarc.channelConnections.list  
  eventarc.channelConnections.publish  
  resourcemanager.projects.get
  resourcemanager.projects.list
 
 
Eventarc Developer
 
(roles/eventarc.developer )
Access to read and write Eventarc resources.
 
Lowest-level resources where you can grant this role:
 
  eventarc.channelConnections.create  
  eventarc.channelConnections.delete  
  eventarc.channelConnections.get  
  eventarc.channelConnections.getIamPolicy  
  eventarc.channelConnections.list  
  eventarc.channelConnections.publish  
  eventarc.channels.attach
  eventarc.channels.create
  eventarc.channels.delete
  eventarc.channels.get
  eventarc.channels.getIamPolicy
  eventarc.channels.list
  eventarc.channels.publish
  eventarc.channels.undelete
  eventarc.channels.update
  eventarc.enrollments.create
  eventarc.enrollments.delete
  eventarc.enrollments.get
  eventarc.enrollments.getIamPolicy  
  eventarc.enrollments.list
  eventarc.enrollments.update
  eventarc.googleApiSources.create  
  eventarc.googleApiSources.delete  
  eventarc.googleApiSources.get
  eventarc.googleApiSources.getIamPolicy  
  eventarc.googleApiSources.list
  eventarc.googleApiSources.update  
  
    
      eventarc.googleChannelConfigs.* 
    
      eventarc.googleChannelConfigs.get  eventarc.googleChannelConfigs.update   
   
  eventarc.kafkaSources.create
  eventarc.kafkaSources.delete
  eventarc.kafkaSources.get
  eventarc.kafkaSources.getIamPolicy  
  eventarc.kafkaSources.list
  
    
      eventarc.locations.*
    
      eventarc.locations.geteventarc.locations.list 
   
  
    
      eventarc.operations.*
    
      eventarc.operations.canceleventarc.operations.deleteeventarc.operations.geteventarc.operations.list 
   
  eventarc.pipelines.create
  eventarc.pipelines.delete
  eventarc.pipelines.get
  eventarc.pipelines.getIamPolicy  
  eventarc.pipelines.list
  eventarc.pipelines.update
  
    
      eventarc.providers.*
    
      eventarc.providers.geteventarc.providers.list 
   
  eventarc.triggers.create
  eventarc.triggers.delete
  eventarc.triggers.get
  eventarc.triggers.getIamPolicy
  eventarc.triggers.list
  eventarc.triggers.undelete
  eventarc.triggers.update
  resourcemanager.projects.get
  resourcemanager.projects.list
 
 
Eventarc Event Receiver
 
(roles/eventarc.eventReceiver )
Can receive events from all event providers.
 
Lowest-level resources where you can grant this role:
 
  
    
      eventarc.events.*
    
      eventarc.events.receiveAuditLogWritten  eventarc.events.receiveEvent 
   
 
 
Eventarc Message Bus Admin
 
(roles/eventarc.messageBusAdmin )
Full control over Message Buses resources.
 
 
  eventarc.messageBuses.create
  eventarc.messageBuses.delete
  eventarc.messageBuses.get
  eventarc.messageBuses.getIamPolicy  
  eventarc.messageBuses.list
  eventarc.messageBuses.publish
  eventarc.messageBuses.update
  eventarc.messageBuses.use
 
 
Eventarc Message Bus User
 
(roles/eventarc.messageBusUser )
Access to publish to or bind to a Message Bus.
 
 
  eventarc.messageBuses.get
  eventarc.messageBuses.list
  eventarc.messageBuses.publish
  eventarc.messageBuses.use
 
 
Eventarc Event Collector
Beta 
 
(roles/eventarc.multiProjectEventCollector )
Can collect events from multiple projects in an org for a source resource.
 
 
  eventarc.multiProjectSources.collectGoogleApiEvents  
 
 
Eventarc Publisher
Beta 
 
(roles/eventarc.publisher )
Can publish events to Eventarc channels.
 
Lowest-level resources where you can grant this role:
 
  eventarc.channels.get
  eventarc.channels.list
  eventarc.channels.publish
  resourcemanager.projects.get
  resourcemanager.projects.list
 
 
Eventarc Service Agent
 
(roles/eventarc.serviceAgent )
Gives Eventarc service account access to managed resources.
 
  Warning:  Do not grant service agent roles to any principals except
  service agents .
 
 
  cloudfunctions.functions.get
  compute.instanceGroupManagers.get  
  compute.networkAttachments.get
  compute.networkAttachments.update  
  compute.networkAttachments.use
  compute.regionOperations.get
  container.clusters.connect
  container.clusters.get
  container.deployments.create
  container.deployments.delete
  container.deployments.get
  container.deployments.list
  container.deployments.update
  container.namespaces.create
  container.namespaces.delete
  container.namespaces.get
  container.namespaces.list
  container.serviceAccounts.create  
  container.serviceAccounts.delete  
  container.serviceAccounts.get
  container.serviceAccounts.list
  container.services.get
  container.services.list
  dns.networks.targetWithPeeringZone  
  eventarc.channels.publish
  eventarc.messageBuses.publish
  eventarc.operations.get
  iam.serviceAccounts.actAs
  iam.serviceAccounts.getAccessToken  
  iam.serviceAccounts.getOpenIdToken  
  monitoring.timeSeries.create
  pubsub.subscriptions.consume
  pubsub.subscriptions.create
  pubsub.subscriptions.delete
  pubsub.subscriptions.get
  pubsub.subscriptions.list
  pubsub.subscriptions.update
  pubsub.topics.attachSubscription  
  pubsub.topics.create
  pubsub.topics.delete
  pubsub.topics.get
  pubsub.topics.list
  pubsub.topics.publish
  pubsub.topics.update
  run.jobs.get
  run.services.get
  serviceusage.services.use
  storage.buckets.get
  storage.buckets.update
  workflows.workflows.get
 
 
Eventarc Viewer
 
(roles/eventarc.viewer )
Can view the state of all Eventarc resources, including IAM policies.
 
Lowest-level resources where you can grant this role:
 
  eventarc.channelConnections.get  
  eventarc.channelConnections.getIamPolicy  
  eventarc.channelConnections.list  
  eventarc.channels.get
  eventarc.channels.getIamPolicy
  eventarc.channels.list
  eventarc.enrollments.get
  eventarc.enrollments.getIamPolicy  
  eventarc.enrollments.list
  eventarc.googleApiSources.get
  eventarc.googleApiSources.getIamPolicy  
  eventarc.googleApiSources.list
  eventarc.googleChannelConfigs.get  
  eventarc.kafkaSources.get
  eventarc.kafkaSources.getIamPolicy  
  eventarc.kafkaSources.list
  
    
      eventarc.locations.*
    
      eventarc.locations.geteventarc.locations.list 
   
  eventarc.messageBuses.get
  eventarc.messageBuses.getIamPolicy  
  eventarc.messageBuses.list
  eventarc.messageBuses.use
  eventarc.multiProjectSources.collectGoogleApiEvents  
  eventarc.operations.get
  eventarc.operations.list
  eventarc.pipelines.get
  eventarc.pipelines.getIamPolicy  
  eventarc.pipelines.list
  
    
      eventarc.providers.*
    
      eventarc.providers.geteventarc.providers.list 
   
  eventarc.triggers.get
  eventarc.triggers.getIamPolicy
  eventarc.triggers.list
  resourcemanager.projects.get
  resourcemanager.projects.list
 
 
 
 
Gestione IAM a livello di progetto 
A livello di progetto, puoi concedere, modificare e revocare i ruoli IAM
utilizzando la console Google Cloud , l'API IAM o Google Cloud CLI.
Per istruzioni, vedi
Gestisci l'accesso a progetti, cartelle e organizzazioni .