このページでは、Network Connectivity Center の使用に必要な Identity and Access Management(IAM)のロールと権限について説明します。
大まかな流れは次のとおりです。
事前定義された Network Connectivity Center の権限(事前定義ロール を参照)。
次のような追加の権限があります。
共有 VPC ネットワークの Network Connectivity Center を使用する必要がある場合は、ホスト プロジェクトで必要なすべての権限が付与されている必要があります。 ハブとそのスポーク、すべての関連リソースはホスト プロジェクトに存在する必要があります。
権限を付与する方法については、IAM の概要 をご覧ください。
事前定義ロール
次の表は、Network Connectivity Center の事前定義ロールを示したものです。
Role
Permissions
Service Automation Consumer Network Admin
(roles/ networkconnectivity.consumerNetworkAdmin
)
Service Automation Consumer Network Admin is responsible for setting up ServiceConnectionPolicies.
networkconnectivity. serviceConnectionPolicies.*
networkconnectivity. serviceConnectionPolicies. create
networkconnectivity. serviceConnectionPolicies. delete
networkconnectivity. serviceConnectionPolicies. get
networkconnectivity. serviceConnectionPolicies. list
networkconnectivity. serviceConnectionPolicies. update
resourcemanager.projects.get
resourcemanager.projects.list
Group User
(roles/ networkconnectivity.groupUser
)
Enables use access on group resources
networkconnectivity.groups.use
Hub & Spoke Admin
(roles/ networkconnectivity.hubAdmin
)
Enables full access to hub and spoke resources.
Lowest-level resources where you can grant this role:
networkconnectivity.groups.*
networkconnectivity. groups. acceptSpoke
networkconnectivity.groups.get
networkconnectivity. groups. getIamPolicy
networkconnectivity. groups. list
networkconnectivity. groups. rejectSpoke
networkconnectivity. groups. setIamPolicy
networkconnectivity.groups.use
networkconnectivity. hubRouteTables.*
networkconnectivity. hubRouteTables. get
networkconnectivity. hubRouteTables. getIamPolicy
networkconnectivity. hubRouteTables. list
networkconnectivity. hubRouteTables. setIamPolicy
networkconnectivity. hubRoutes.*
networkconnectivity. hubRoutes. get
networkconnectivity. hubRoutes. getIamPolicy
networkconnectivity. hubRoutes. list
networkconnectivity. hubRoutes. setIamPolicy
networkconnectivity.hubs.*
networkconnectivity. hubs. create
networkconnectivity. hubs. delete
networkconnectivity.hubs.get
networkconnectivity. hubs. getIamPolicy
networkconnectivity.hubs.list
networkconnectivity. hubs. listSpokes
networkconnectivity. hubs. queryStatus
networkconnectivity. hubs. setIamPolicy
networkconnectivity. hubs. update
networkconnectivity. locations.*
networkconnectivity. locations. get
networkconnectivity. locations. list
networkconnectivity. operations.*
networkconnectivity. operations. cancel
networkconnectivity. operations. delete
networkconnectivity. operations. get
networkconnectivity. operations. list
networkconnectivity.spokes.*
networkconnectivity. spokes. create
networkconnectivity. spokes. delete
networkconnectivity.spokes.get
networkconnectivity. spokes. getIamPolicy
networkconnectivity. spokes. list
networkconnectivity. spokes. setIamPolicy
networkconnectivity. spokes. update
resourcemanager.projects.get
resourcemanager.projects.list
Hub & Spoke Viewer
(roles/ networkconnectivity.hubViewer
)
Enables read-only access to hub and spoke resources.
Lowest-level resources where you can grant this role:
networkconnectivity.groups.get
networkconnectivity. groups. getIamPolicy
networkconnectivity. groups. list
networkconnectivity. hubRouteTables. get
networkconnectivity. hubRouteTables. getIamPolicy
networkconnectivity. hubRouteTables. list
networkconnectivity. hubRoutes. get
networkconnectivity. hubRoutes. getIamPolicy
networkconnectivity. hubRoutes. list
networkconnectivity.hubs.get
networkconnectivity. hubs. getIamPolicy
networkconnectivity.hubs.list
networkconnectivity. hubs. listSpokes
networkconnectivity. hubs. queryStatus
networkconnectivity. locations.*
networkconnectivity. locations. get
networkconnectivity. locations. list
networkconnectivity.spokes.get
networkconnectivity. spokes. getIamPolicy
networkconnectivity. spokes. list
resourcemanager.projects.get
resourcemanager.projects.list
Regional Endpoint Admin
(roles/ networkconnectivity.regionalEndpointAdmin
)
Full access to all Regional Endpoint resources.
networkconnectivity. regionalEndpoints.*
networkconnectivity. regionalEndpoints. create
networkconnectivity. regionalEndpoints. delete
networkconnectivity. regionalEndpoints. get
networkconnectivity. regionalEndpoints. list
resourcemanager.projects.get
resourcemanager.projects.list
Regional Endpoint Viewer
(roles/ networkconnectivity.regionalEndpointViewer
)
Read-only access to all Regional Endpoint resources.
networkconnectivity. regionalEndpoints. get
networkconnectivity. regionalEndpoints. list
resourcemanager.projects.get
resourcemanager.projects.list
Service Class User
(roles/ networkconnectivity.serviceClassUser
)
Service Class User uses a ServiceClass
networkconnectivity. serviceClasses. get
networkconnectivity. serviceClasses. list
networkconnectivity. serviceClasses. use
resourcemanager.projects.get
resourcemanager.projects.list
Service Automation Service Producer Admin
(roles/ networkconnectivity.serviceProducerAdmin
)
Service Automation Producer Admin uses information from a consumer request to manage ServiceClasses and ServiceConnectionMaps
networkconnectivity. operations. get
networkconnectivity. operations. list
networkconnectivity. serviceClasses.*
networkconnectivity. serviceClasses. create
networkconnectivity. serviceClasses. delete
networkconnectivity. serviceClasses. get
networkconnectivity. serviceClasses. list
networkconnectivity. serviceClasses. update
networkconnectivity. serviceClasses. use
networkconnectivity. serviceConnectionMaps.*
networkconnectivity. serviceConnectionMaps. create
networkconnectivity. serviceConnectionMaps. delete
networkconnectivity. serviceConnectionMaps. get
networkconnectivity. serviceConnectionMaps. list
networkconnectivity. serviceConnectionMaps. update
resourcemanager.projects.get
resourcemanager.projects.list
Spoke Admin
(roles/ networkconnectivity.spokeAdmin
)
Enables full access to spoke resources and read-only access to hub resources.
Lowest-level resources where you can grant this role:
networkconnectivity. hubRouteTables. get
networkconnectivity. hubRouteTables. getIamPolicy
networkconnectivity. hubRouteTables. list
networkconnectivity. hubRoutes. get
networkconnectivity. hubRoutes. getIamPolicy
networkconnectivity. hubRoutes. list
networkconnectivity.hubs.get
networkconnectivity. hubs. getIamPolicy
networkconnectivity.hubs.list
networkconnectivity. locations.*
networkconnectivity. locations. get
networkconnectivity. locations. list
networkconnectivity. operations. get
networkconnectivity. operations. list
networkconnectivity.spokes.*
networkconnectivity. spokes. create
networkconnectivity. spokes. delete
networkconnectivity.spokes.get
networkconnectivity. spokes. getIamPolicy
networkconnectivity. spokes. list
networkconnectivity. spokes. setIamPolicy
networkconnectivity. spokes. update
resourcemanager.projects.get
resourcemanager.projects.list
必要な追加の権限
Network Connectivity Center で行う必要があるアクションによっては、次のセクションで説明する権限が必要になる場合があります。
スポークを作成する権限
スポークを作成するには、スポークのリソースタイプを読み取る権限が必要です。次に例を示します。
Google Cloud コンソールで Network Connectivity Center を使用するための権限
Google Cloud コンソールで Network Connectivity Center を使用するには、Compute ネットワーク閲覧者 (roles/compute.networkViewer
)などのロールが必要です。これには、次の表に示す権限が含まれています。これらの権限を使用するには、まずカスタムロールを作成 する必要があります。
タスク
必要な権限
[Network Connectivity Center ] ページにアクセスする
compute.projects.get
compute.networks.get
[スポークを追加する ] ページにアクセスして使用する
compute.networks.list
compute.regions.list
compute.routers.list
compute.zones.list
compute.networks.get
VLAN アタッチメントのスポークを追加する
compute.interconnectAttachments.list
compute.interconnectAttachments.get
compute.networks.get
compute.routers.list
compute.routers.get
VPN トンネル スポークを追加する
compute.forwardingRules.list
compute.networks.get
compute.routers.get
compute.routers.list
compute.targetVpnGateways.list
compute.vpnGateways.list
compute.vpnTunnels.get
compute.vpnTunnels.list
Router アプライアンス スポークを追加する
compute.instances.list
compute.instances.get
compute.networks.get
VPC スポークを追加する
compute.networks.use
compute.networks.get
compute.subnetworks.list
注: スポークを作成するには、スポークによって使用されるリソースタイプを読み取る権限も必要です(スポークを作成する権限 を参照)。 VPC Service Controls によるリソースの保護
Network Connectivity Center のリソースのセキュリティを強化するには、VPC Service Controls を使用します。
VPC Service Controls は、リソースのセキュリティを強化し、データの引き出しのリスクを軽減します。VPC Service Controls を使用すると、Network Connectivity Center のリソースをサービス境界内に配置できます。VPC Service Controls は、こうしたリソースを境界外からのリクエストから保護します。
サービス境界の詳細については、VPC Service Controls ドキュメントのサービス境界の構成ページ をご覧ください。
次のステップ
プロジェクト ロールと Google Cloud リソースの詳細については、次のドキュメントをご覧ください。