[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-02。"],[],[],null,["# Roles and permissions\n\nWhen you use Cloud Load Balancing, you make API requests. Each API request requires\nthat the [Identity and Access Management (IAM) principal](/iam/docs/overview#how_cloud_iam_works) who\nmakes the request has appropriate permission to create, modify, or delete the\nassociated resources.\n\nIn IAM, permission to access a Google Cloud resource\nisn't granted directly to the end user. Instead, permissions are grouped\ninto roles, and roles are granted to authenticated principals. Principals can be\nof the following types: a user, group, service account, or Google domain.\nAn IAM policy defines and enforces what roles are\ngranted to which principals, and this policy is then attached to a resource.\n\nThis page provides an overview of relevant IAM roles and\npermissions for Cloud Load Balancing. For a detailed description of\nIAM, see the [IAM documentation](/iam/docs).\n\nRoles and permissions\n---------------------\n\nTo follow the examples in the load balancing [how-to guides](/load-balancing/docs/how-to), principals\nneed to create instances, firewall rules, and VPC networks. You\ncan provide the necessary permissions in one of the following ways:\n\n- Grant the [predefined roles](/compute/docs/access/iam) that are related to load\n balancing.\n To view the specific permissions included in the predefined roles, see the\n following sections:\n\n - Compute Load Balancer Admin role ([`roles/compute.loadBalancerAdmin`](/compute/docs/access/iam#compute.loadBalancerAdmin))\n - Compute Network Admin role ([`roles/compute.networkAdmin`](/compute/docs/access/iam#compute.networkAdmin))\n - Compute Security Admin role ([`roles/compute.securityAdmin`](/compute/docs/access/iam#compute.securityAdmin))\n - Compute Instance Admin role ([`roles/compute.instanceAdmin`](/compute/docs/access/iam#compute.instanceAdmin))\n- [Create and grant custom roles](/iam/docs/creating-custom-roles) that at least contain the\n permissions included in the predefined roles.\n\n- Use [basic roles](/iam/docs/understanding-roles#basic), making the principals project owners\n or editors. Whenever possible, avoid using the basic roles; they grant a\n large number of permissions, which violates the principle of least privilege.\n\nRole change latency\n-------------------\n\nCloud Load Balancing caches IAM permissions for five minutes,\nso it takes up to five minutes for a role change to become effective.\n\nManaging Access Control for Cloud Load Balancing using IAM\n----------------------------------------------------------\n\nYou can get and set IAM policies using the Google Cloud console, the\nIAM API, or the Google Cloud CLI. See [Granting,\nchanging, and revoking access](/iam/docs/granting-changing-revoking-access) for details.\n\nWhat's next\n-----------\n\n- Learn more about [IAM](/iam/docs).\n- [Grant IAM roles](/iam/docs/granting-changing-revoking-access).\n- Learn about [IAM Conditions for forwarding\n rules](/load-balancing/docs/access-control/iam-conditions).\n- Learn about [organization policy constraints for Cloud Load\n Balancing](/load-balancing/docs/org-policy-constraints)."]]