本页面介绍了适用于 Memorystore for Redis 集群的 Identity and Access Management 角色,以及这些角色关联的权限。Memorystore for Redis Cluster 和 Memorystore for Redis 使用相同的 IAM 角色。本页面列出了这些角色针对 Memorystore for Redis 集群授予的权限。这些角色针对 Memorystore for Redis 授予的权限列在 Memorystore for Redis 访问权限控制页面上。虽然这两个页面上列出的权限是分开的,但这些角色会授予 Memorystore for Redis Cluster 和 Memorystore for Redis 的权限。
Memorystore for Redis Cluster 使用的权限命名结构与 Memorystore for Redis 不同:
Memorystore for Redis Cluster 实例使用 redis.clusters.[PERMISSION]。
Memorystore for Redis 实例使用 redis.instances.[PERMISSION]。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[],[],null,["# Access control with IAM\n\nThis page explains the Identity and Access Management roles available for Memorystore for Redis Cluster,\nand the associated permissions for those roles. Memorystore for Redis Cluster and\nMemorystore for Redis use the same IAM roles. The permissions\nthese roles grant for Memorystore for Redis Cluster are listed on this page. The\npermissions these roles grant for Memorystore for Redis are listed on the\n[Memorystore for Redis Access control](/memorystore/docs/redis/access-control)\npage. Although the permissions are listed separately on both pages, the roles\ngrant permissions for both Memorystore for Redis Cluster and Memorystore for Redis.\n\nMemorystore for Redis Cluster uses a different permissions naming structure than\nMemorystore for Redis:\n\n- Memorystore for Redis Cluster instances use `redis.clusters.[PERMISSION]`.\n- Memorystore for Redis instances use `redis.instances.[PERMISSION]`.\n\nTo view more information about the Redis Admin role, see [Predefined roles](/memorystore/docs/redis/access-control#predefined_roles).\n\nTo learn how to grant the role to a user in your project, see [Grant or revoke a single role](/iam/docs/granting-changing-revoking-access#single-role).\n| **Note:** Modifications to IAM settings for Memorystore for Redis Cluster take on the order of minutes to take effect.\n\nPredefined roles\n----------------\n\nThe following predefined roles are available for Memorystore for Redis Cluster. If you update a role for an [Identity and Access Management principal](/iam/docs/overview#concepts_related_identity), the change takes several minutes to [take effect](/iam/docs/access-change-propagation).\n\n### Permissions and their roles\n\nThe following table lists each permission that Memorystore for Redis Cluster supports\nand the Memorystore for Redis roles that include it:\n\n### Custom roles\n\nIf the predefined roles do not address your unique business requirements, you\ncan define your own custom roles with permissions that you specify. To support\nthis, IAM offers [custom roles](/iam/docs/understanding-custom-roles). When you create custom roles\nfor Memorystore for Redis Cluster, make sure that you include\nboth `resourcemanager.projects.get` and `resourcemanager.projects.list`.\nOtherwise, the Google Cloud console will not function correctly\nfor Memorystore for Redis Cluster. For more information, see\n[Permission dependencies](/iam/docs/understanding-custom-roles#permission_dependencies).\nTo learn how to create a custom role, see [Creating a custom role](/iam/docs/creating-custom-roles#creating_a_custom_role).\n\nIn-transit encryption permissions\n---------------------------------\n\nThe table below shows permissions required for enabling and managing [In-transit encryption](/memorystore/docs/cluster/about-in-transit-encryption)\nfor Memorystore for Redis Cluster.\n\nNetwork connectivity policy creation role\n-----------------------------------------\n\nThe permissions described in this section are needed for the Network Admin who\nis establishing a service connection policy for Memorystore for Redis Cluster, as\ndescribed in the [Networking](/memorystore/docs/cluster/networking) page.\n\nTo establish the policy required for Memorystore cluster creation,\nthe Network Admin must have the `networkconnectivity.googleapis.com/consumerNetworkAdmin`\nrole, which grants the following permissions:\n\n- networkconnectivity.serviceconnectionpolicies.create\n- networkconnectivity.serviceconnectionpolicies.list\n- networkconnectivity.serviceconnectionpolicies.get\n- networkconnectivity.serviceconnectionpolicies.delete\n- networkconnectivity.serviceconnectionpolicies.update"]]