Les rôles IAM (Identity and Access Management indiquent comment utiliser l'API Managed Service pour Microsoft Active Directory (Microsoft AD géré). Vous trouverez ci-dessous une liste de chaque rôle Cloud IAM disponible pour Microsoft AD géré et les méthodes disponibles.
En outre, les comptes de services doivent disposer de l'autorisation servicemanagement.services.bind
pour afficher et activer Microsoft AD géré. En savoir plus sur les rôles et autorisations de gestion des services.
Role | Permissions |
---|---|
Google Cloud Managed Identities Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level. |
|
Google Cloud Managed Identities Backup Admin( Full access to Google Cloud Managed Identities Backup and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Backup Viewer( Read-only access to Google Cloud Managed Identities Backup and related resources. |
|
Google Cloud Managed Identities Domain Admin( Read-Update-Delete to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a resource (domain) level. |
|
Google Cloud Managed Identities Domain Join Beta( Access to domain join VMs with Cloud AD |
|
Google Cloud Managed Identities Peering Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Peering Viewer( Read-only access to Google Cloud Managed Identities Peering and related resources. |
|
Google Cloud Managed Identities Viewer( Read-only access to Google Cloud Managed Identities Domains and related resources. |
|
Pour en savoir plus sur les rôles IAM, consultez la page Comprendre les rôles.