本頁說明 Memorystore for Redis Cluster 適用的 Identity and Access Management 角色,以及這些角色的相關聯權限。Memorystore for Redis Cluster 和 Memorystore for Redis 使用相同的 IAM 角色。本頁面列出這些角色授予的 Memorystore for Redis Cluster 權限。如要瞭解這些角色授予的 Memorystore for Redis 權限,請參閱「Memorystore for Redis 存取權控管」頁面。雖然這兩個頁面分別列出權限,但角色會授予 Memorystore for Redis Cluster 和 Memorystore for Redis 的權限。
Memorystore for Redis Cluster 使用的權限命名結構與 Memorystore for Redis 不同:
Memorystore for Redis Cluster 執行個體使用 redis.clusters.[PERMISSION]。
Memorystore for Redis 執行個體會使用 redis.instances.[PERMISSION]。
[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[],[],null,["# Access control with IAM\n\nThis page explains the Identity and Access Management roles available for Memorystore for Redis Cluster,\nand the associated permissions for those roles. Memorystore for Redis Cluster and\nMemorystore for Redis use the same IAM roles. The permissions\nthese roles grant for Memorystore for Redis Cluster are listed on this page. The\npermissions these roles grant for Memorystore for Redis are listed on the\n[Memorystore for Redis Access control](/memorystore/docs/redis/access-control)\npage. Although the permissions are listed separately on both pages, the roles\ngrant permissions for both Memorystore for Redis Cluster and Memorystore for Redis.\n\nMemorystore for Redis Cluster uses a different permissions naming structure than\nMemorystore for Redis:\n\n- Memorystore for Redis Cluster instances use `redis.clusters.[PERMISSION]`.\n- Memorystore for Redis instances use `redis.instances.[PERMISSION]`.\n\nTo view more information about the Redis Admin role, see [Predefined roles](/memorystore/docs/redis/access-control#predefined_roles).\n\nTo learn how to grant the role to a user in your project, see [Grant or revoke a single role](/iam/docs/granting-changing-revoking-access#single-role).\n| **Note:** Modifications to IAM settings for Memorystore for Redis Cluster take on the order of minutes to take effect.\n\nPredefined roles\n----------------\n\nThe following predefined roles are available for Memorystore for Redis Cluster. If you update a role for an [Identity and Access Management principal](/iam/docs/overview#concepts_related_identity), the change takes several minutes to [take effect](/iam/docs/access-change-propagation).\n\n### Permissions and their roles\n\nThe following table lists each permission that Memorystore for Redis Cluster supports\nand the Memorystore for Redis roles that include it:\n\n### Custom roles\n\nIf the predefined roles do not address your unique business requirements, you\ncan define your own custom roles with permissions that you specify. To support\nthis, IAM offers [custom roles](/iam/docs/understanding-custom-roles). When you create custom roles\nfor Memorystore for Redis Cluster, make sure that you include\nboth `resourcemanager.projects.get` and `resourcemanager.projects.list`.\nOtherwise, the Google Cloud console will not function correctly\nfor Memorystore for Redis Cluster. For more information, see\n[Permission dependencies](/iam/docs/understanding-custom-roles#permission_dependencies).\nTo learn how to create a custom role, see [Creating a custom role](/iam/docs/creating-custom-roles#creating_a_custom_role).\n\nIn-transit encryption permissions\n---------------------------------\n\nThe table below shows permissions required for enabling and managing [In-transit encryption](/memorystore/docs/cluster/about-in-transit-encryption)\nfor Memorystore for Redis Cluster.\n\nNetwork connectivity policy creation role\n-----------------------------------------\n\nThe permissions described in this section are needed for the Network Admin who\nis establishing a service connection policy for Memorystore for Redis Cluster, as\ndescribed in the [Networking](/memorystore/docs/cluster/networking) page.\n\nTo establish the policy required for Memorystore cluster creation,\nthe Network Admin must have the `networkconnectivity.googleapis.com/consumerNetworkAdmin`\nrole, which grants the following permissions:\n\n- networkconnectivity.serviceconnectionpolicies.create\n- networkconnectivity.serviceconnectionpolicies.list\n- networkconnectivity.serviceconnectionpolicies.get\n- networkconnectivity.serviceconnectionpolicies.delete\n- networkconnectivity.serviceconnectionpolicies.update"]]