このページでは、Memorystore for Redis Cluster で使用できる Identity and Access Management ロールと、それらのロールに関連付けられた権限について説明します。Memorystore for Redis Cluster と Memorystore for Redis は、同じ IAM ロールを使用します。このロールにより Memorystore for Redis Cluster に付与される権限がこのページに示されています。このロールにより Memorystore for Redis に付与される権限は、Memorystore for Redis のアクセス制御ページに示されています。権限は両方のページに個別に示されていますが、ロールにより Memorystore for Redis Cluster と Memorystore for Redis の両方に権限が付与されます。
Memorystore for Redis Cluster は、Memorystore for Redis とは異なる権限命名構造を使用します。
Memorystore for Redis Cluster インスタンスは、redis.clusters.[PERMISSION] を使用します。
Memorystore for Redis インスタンスは、redis.instances.[PERMISSION] を使用します。
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-04 UTC。"],[],[],null,["# Access control with IAM\n\nThis page explains the Identity and Access Management roles available for Memorystore for Redis Cluster,\nand the associated permissions for those roles. Memorystore for Redis Cluster and\nMemorystore for Redis use the same IAM roles. The permissions\nthese roles grant for Memorystore for Redis Cluster are listed on this page. The\npermissions these roles grant for Memorystore for Redis are listed on the\n[Memorystore for Redis Access control](/memorystore/docs/redis/access-control)\npage. Although the permissions are listed separately on both pages, the roles\ngrant permissions for both Memorystore for Redis Cluster and Memorystore for Redis.\n\nMemorystore for Redis Cluster uses a different permissions naming structure than\nMemorystore for Redis:\n\n- Memorystore for Redis Cluster instances use `redis.clusters.[PERMISSION]`.\n- Memorystore for Redis instances use `redis.instances.[PERMISSION]`.\n\nTo view more information about the Redis Admin role, see [Predefined roles](/memorystore/docs/redis/access-control#predefined_roles).\n\nTo learn how to grant the role to a user in your project, see [Grant or revoke a single role](/iam/docs/granting-changing-revoking-access#single-role).\n| **Note:** Modifications to IAM settings for Memorystore for Redis Cluster take on the order of minutes to take effect.\n\nPredefined roles\n----------------\n\nThe following predefined roles are available for Memorystore for Redis Cluster. If you update a role for an [Identity and Access Management principal](/iam/docs/overview#concepts_related_identity), the change takes several minutes to [take effect](/iam/docs/access-change-propagation).\n\n### Permissions and their roles\n\nThe following table lists each permission that Memorystore for Redis Cluster supports\nand the Memorystore for Redis roles that include it:\n\n### Custom roles\n\nIf the predefined roles do not address your unique business requirements, you\ncan define your own custom roles with permissions that you specify. To support\nthis, IAM offers [custom roles](/iam/docs/understanding-custom-roles). When you create custom roles\nfor Memorystore for Redis Cluster, make sure that you include\nboth `resourcemanager.projects.get` and `resourcemanager.projects.list`.\nOtherwise, the Google Cloud console will not function correctly\nfor Memorystore for Redis Cluster. For more information, see\n[Permission dependencies](/iam/docs/understanding-custom-roles#permission_dependencies).\nTo learn how to create a custom role, see [Creating a custom role](/iam/docs/creating-custom-roles#creating_a_custom_role).\n\nIn-transit encryption permissions\n---------------------------------\n\nThe table below shows permissions required for enabling and managing [In-transit encryption](/memorystore/docs/cluster/about-in-transit-encryption)\nfor Memorystore for Redis Cluster.\n\nNetwork connectivity policy creation role\n-----------------------------------------\n\nThe permissions described in this section are needed for the Network Admin who\nis establishing a service connection policy for Memorystore for Redis Cluster, as\ndescribed in the [Networking](/memorystore/docs/cluster/networking) page.\n\nTo establish the policy required for Memorystore cluster creation,\nthe Network Admin must have the `networkconnectivity.googleapis.com/consumerNetworkAdmin`\nrole, which grants the following permissions:\n\n- networkconnectivity.serviceconnectionpolicies.create\n- networkconnectivity.serviceconnectionpolicies.list\n- networkconnectivity.serviceconnectionpolicies.get\n- networkconnectivity.serviceconnectionpolicies.delete\n- networkconnectivity.serviceconnectionpolicies.update"]]