[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-05。"],[[["\u003cp\u003eInfra Manager utilizes Identity and Access Management (IAM) to manage access to its service, requiring specific IAM roles to be assigned to service accounts for deploying resources.\u003c/p\u003e\n"],["\u003cp\u003eViewing Infra Manager deployments, revisions, and IAM policies does not require a service account, but access must be granted to the user, group, or service account.\u003c/p\u003e\n"],["\u003cp\u003eDeploying or viewing Google Cloud resources in a Terraform configuration requires permissions specific to those resources, in addition to Infra Manager permissions.\u003c/p\u003e\n"],["\u003cp\u003ePredefined Infra Manager roles, such as Admin, Service Agent, Service Account, and Viewer, grant specific permissions to manage and interact with Infra Manager resources, and it is recommended to use these instead of basic roles whenever possible for security reasons.\u003c/p\u003e\n"],["\u003cp\u003eThe basic roles of Viewer and Owner include the Infra Manager Viewer and Admin roles, respectively, however predefined roles are recommended for security.\u003c/p\u003e\n"]]],[],null,["# Access control with IAM\n\nThis page describes Infrastructure Manager roles and permissions.\n\nInfra Manager uses [Identity and Access Management (IAM)](/iam) to control\naccess to the service. To grant access to deploy resources with\nInfra Manager, assign the needed Infra Manager\n[IAM roles](/iam/docs/understanding-roles#role_types)\nto the [service account](/infrastructure-manager/docs/configure-service-account)\nthat you use to call Infra Manager. For details about how to grant\npermissions to service accounts, see\n[Manage access to service accounts](/iam/docs/manage-access-service-accounts).\n\nA service account is not required to view Infra Manager deployments,\nrevisions, and IAM policies. To view Infra Manager, grant access\nto the user, group, or service account.\n\nTo deploy or view the Google Cloud resources defined in the Terraform\nconfiguration, you need to grant the service account permissions that are\nspecific to these resources. These permissions are in addition to the\nInfra Manager permissions listed on this page. For a list of all\nroles and the permissions they contain, see\n[Identity and Access Management basic and predefined roles reference](/iam/docs/understanding-roles).\n\nPredefined Infra Manager roles\n------------------------------\n\nIAM provides\n[predefined roles](/iam/docs/understanding-roles#predefined_roles) that grant\naccess to specific Google Cloud resources and prevent unauthorized access\nto other resources.\n\nThe following table lists the Infra Manager IAM roles and\nthe permissions that they include:\n\nIn addition to the Infra Manager predefined roles, the\n[basic](/iam/docs/understanding-roles#basic) Viewer and Owner roles also\ninclude permissions related to Infra Manager.\nHowever, we recommend that you grant predefined roles where possible to comply with the\n[security principle of least privilege](/iam/docs/using-iam-securely#least_privilege).\n\nThe following table lists the basic roles and the Infra Manager\nIAM roles\nthat they include.\n\nPermissions\n-----------\n\nPermissions that the caller must have to call each method is listed in the\n[REST API reference](/infrastructure-manager/docs/reference/rest).\n\nWhat's next\n-----------\n\n- Learn about [IAM](/iam/docs).\n- Learn more about [using conditions in IAM](/deploy/docs/securing/iam#about_iam_conditions)\n- Find out more about [Infra Manager service accounts](/infrastructure-manager/docs/configure-service-account)."]]