Configure um projeto e autorizações

Esta página mostra como criar um Google Cloud projeto, ativar a IA de AML, criar credenciais de autenticação, e conceder à sua conta um ou mais papéis do IAM.

  1. Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
  2. Install the Google Cloud CLI.

  3. Se estiver a usar um fornecedor de identidade (IdP) externo, tem primeiro de iniciar sessão na CLI gcloud com a sua identidade federada.

  4. Para inicializar a CLI gcloud, execute o seguinte comando:

    gcloud init
  5. Create or select a Google Cloud project.

    Roles required to select or create a project

    • Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project: To create a project, you need the Project Creator (roles/resourcemanager.projectCreator), which contains the resourcemanager.projects.create permission. Learn how to grant roles.
    • Create a Google Cloud project:

      gcloud projects create PROJECT_ID

      Replace PROJECT_ID with a name for the Google Cloud project you are creating.

    • Select the Google Cloud project that you created:

      gcloud config set project PROJECT_ID

      Replace PROJECT_ID with your Google Cloud project name.

  6. Verify that billing is enabled for your Google Cloud project.

  7. Enable the required APIs:

    Roles required to enable APIs

    To enable APIs, you need the Service Usage Admin IAM role (roles/serviceusage.serviceUsageAdmin), which contains the serviceusage.services.enable permission. Learn how to grant roles.

    gcloud services enable financialservices.googleapis.com bigquery.googleapis.com cloudkms.googleapis.com
  8. If you're using a local shell, then create local authentication credentials for your user account:

    gcloud auth application-default login

    You don't need to do this if you're using Cloud Shell.

    If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.

  9. Grant roles to your user account. Run the following command once for each of the following IAM roles: roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin

    gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE

    Replace the following:

    • PROJECT_ID: your project ID.
    • USER_IDENTIFIER: the identifier for your user account—for example, myemail@example.com.
    • ROLE: the IAM role that you grant to your user account.
  10. Install the Google Cloud CLI.

  11. Se estiver a usar um fornecedor de identidade (IdP) externo, tem primeiro de iniciar sessão na CLI gcloud com a sua identidade federada.

  12. Para inicializar a CLI gcloud, execute o seguinte comando:

    gcloud init
  13. Create or select a Google Cloud project.

    Roles required to select or create a project

    • Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project: To create a project, you need the Project Creator (roles/resourcemanager.projectCreator), which contains the resourcemanager.projects.create permission. Learn how to grant roles.
    • Create a Google Cloud project:

      gcloud projects create PROJECT_ID

      Replace PROJECT_ID with a name for the Google Cloud project you are creating.

    • Select the Google Cloud project that you created:

      gcloud config set project PROJECT_ID

      Replace PROJECT_ID with your Google Cloud project name.

  14. Verify that billing is enabled for your Google Cloud project.

  15. Enable the required APIs:

    Roles required to enable APIs

    To enable APIs, you need the Service Usage Admin IAM role (roles/serviceusage.serviceUsageAdmin), which contains the serviceusage.services.enable permission. Learn how to grant roles.

    gcloud services enable financialservices.googleapis.com bigquery.googleapis.com cloudkms.googleapis.com
  16. If you're using a local shell, then create local authentication credentials for your user account:

    gcloud auth application-default login

    You don't need to do this if you're using Cloud Shell.

    If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.

  17. Grant roles to your user account. Run the following command once for each of the following IAM roles: roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin

    gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE

    Replace the following:

    • PROJECT_ID: your project ID.
    • USER_IDENTIFIER: the identifier for your user account—for example, myemail@example.com.
    • ROLE: the IAM role that you grant to your user account.
  18. Estas funções cumprem as seguintes autorizações obrigatórias:

    Autorizações necessárias

    As seguintes autorizações são necessárias para concluir o início rápido e são necessárias para realizar muitas operações vitais na IA de AML.

    Autorização Descrição
    resourcemanager.projects.getObtenha um Google Cloud projeto
    resourcemanager.projects.listList Google Cloud projects
    cloudkms.keyRings.createCrie um conjunto de chaves do Cloud KMS
    cloudkms.cryptoKeys.createCrie uma chave do Cloud KMS
    financialservices.v1instances.createCrie uma instância de IA de AML
    financialservices.operations.getObtenha uma operação de IA de AML
    cloudkms.cryptoKeys.getIamPolicyObtenha a política IAM numa chave do Cloud KMS
    cloudkms.cryptoKeys.setIamPolicyDefina a Política IAM numa chave do Cloud KMS
    bigquery.datasets.createCrie um conjunto de dados do BigQuery
    bigquery.datasets.getObtenha um conjunto de dados do BigQuery
    bigquery.transfers.getReceba uma transferência do Serviço de transferência de dados do BigQuery
    bigquery.transfers.updateCrie ou elimine uma transferência do Serviço de transferência de dados do BigQuery
    bigquery.datasets.setIamPolicyDefina a política IAM num conjunto de dados do BigQuery
    bigquery.datasets.updateAtualize um conjunto de dados do BigQuery
    financialservices.v1datasets.createCrie um conjunto de dados de IA para AML
    financialservices.v1engineconfigs.createCrie uma configuração do motor de IA de AML
    financialservices.v1models.createCrie um modelo de IA de combate ao branqueamento de capitais
    financialservices.v1backtests.createCrie um resultado de teste retroativo de IA de AML
    financialservices.v1backtests.exportMetadataExporte metadados de um resultado de teste retroativo de IA de AML
    financialservices.v1instances.importRegisteredPartiesImporte partes registadas para uma instância de IA de AML
    financialservices.v1predictions.createCrie um resultado de previsão de IA de AML
    bigquery.jobs.createCrie uma tarefa do BigQuery
    bigquery.tables.getDataObtenha dados de uma tabela do BigQuery
    financialservices.v1predictions.deleteElimine um resultado de previsão de IA de AML
    financialservices.v1backtests.deleteElimine um resultado do teste retrospetivo de IA de AML
    financialservices.v1models.deleteElimine um modelo de IA de AML
    financialservices.v1engineconfigs.deleteElimine uma configuração do motor de IA de AML
    financialservices.v1datasets.deleteElimine um conjunto de dados de IA de AML
    financialservices.v1instances.deleteElimine uma instância de IA de AML
    bigquery.datasets.deleteElimine um conjunto de dados do BigQuery