Os papéis de gerenciamento de identidade e acesso (IAM, na sigla em inglês) definem quanto você pode usar o Serviço gerenciado para a API Microsoft Active Directory (Microsoft AD). Abaixo está uma lista de cada papel do IAM disponível para o Managed Microsoft AD e os métodos disponíveis.
Além disso, as contas de serviços precisam ter a permissão servicemanagement.services.bind
para ver e ativar o Managed Microsoft AD. Saiba mais sobre papéis e permissões de gerenciamento de serviço.
Role | Permissions |
---|---|
Google Cloud Managed Identities Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level. |
|
Google Cloud Managed Identities Backup Admin( Full access to Google Cloud Managed Identities Backup and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Backup Viewer( Read-only access to Google Cloud Managed Identities Backup and related resources. |
|
Google Cloud Managed Identities Domain Admin( Read-Update-Delete to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a resource (domain) level. |
|
Google Cloud Managed Identities Domain Join Beta( Access to domain join VMs with Cloud AD |
|
Google Cloud Managed Identities Peering Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Peering Viewer( Read-only access to Google Cloud Managed Identities Peering and related resources. |
|
Google Cloud Managed Identities Viewer( Read-only access to Google Cloud Managed Identities Domains and related resources. |
|
Para mais informações sobre papéis do IAM, consulte Noções básicas sobre papéis.