Nesta página, descrevemos os papéis e as permissões do Identity and Access Management (IAM, na sigla em inglês) necessários para usar o Network Connectivity Center.
Em geral, você precisa de:
- permissões predefinidas do Network Connectivity Center, descritas em Papéis predefinidos;
- Permissões adicionais da seguinte maneira:
- Para criar spokes, é necessário ter permissão para ler os tipos de recursos de spoke relevantes, conforme descrito em Permissão para criar um spoke.
- Para trabalhar com o Network Connectivity Center no Google Cloud console, é preciso ter permissão para acessar determinados recursos de rede da nuvem privada virtual (VPC), conforme descrito em Permissão para usar o Network Connectivity Center no Google Cloud console.
Se precisar trabalhar com o Network Connectivity Center em uma rede VPC compartilhada, você precisará ter todas as permissões necessárias no projeto host. Um hub, os spokes dele e todos os recursos relacionados precisam estar no projeto host.
Para mais informações sobre como conceder permissões, consulte a visão geral do IAM.
Papéis predefinidos
A tabela a seguir descreve os papéis predefinidos do Network Connectivity Center.
(
Service Automation Consumer Network Admin is responsible for setting up ServiceConnectionPolicies.
(
Enables full access to group resources and read-only access to hub and spoke resources
(
Enables use access on group resources
(
Enables full access to hub and spoke resources.
Lowest-level resources where you can grant this role:
(
Enables read-only access to hub and spoke resources.
Lowest-level resources where you can grant this role:
(
Full access to all Multicloud Data Transfer Config resources.
(
Read-only access to all Multicloud Data Transfer Config resources.
(
Access to all Destination resources.
(
Read-only access to all Destination resources.
(
Full access to all Regional Endpoint resources.
(
Read-only access to all Regional Endpoint resources.
(
Grants the Network Connectivity API authority to read some networking resources. It does not mutate these resources.
(
Service Class User uses a ServiceClass
(
Service Automation Producer Admin uses information from a consumer request to manage ServiceClasses and ServiceConnectionMaps
(
Enables full access to spoke resources and read-only access to hub resources.
Lowest-level resources where you can grant this role:
Role
Permissions
Service Automation Consumer Network Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Group Admin
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.groups.*
networkconnectivity.networkconnectivity.networkconnectivity.groups.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.groups.usenetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.hubs.getnetworkconnectivity.networkconnectivity.hubs.listnetworkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.spokes.getnetworkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Group User
roles/)
networkconnectivity.groups.use
Hub & Spoke Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.groups.*
networkconnectivity.networkconnectivity.networkconnectivity.groups.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.groups.usenetworkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.hubs.*
networkconnectivity.networkconnectivity.networkconnectivity.hubs.getnetworkconnectivity.networkconnectivity.hubs.listnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.spokes.*
networkconnectivity.networkconnectivity.networkconnectivity.spokes.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Hub & Spoke Viewer
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.groups.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.hubs.getnetworkconnectivity.networkconnectivity.hubs.listnetworkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.spokes.getnetworkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Multicloud Data Transfer Config Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Multicloud Data Transfer Config Viewer
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Destination Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Destination Viewer
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Regional Endpoint Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Regional Endpoint Viewer
roles/)
networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Network Connectivity Service Agent
roles/)
compute.addresses.createcompute.compute.addresses.deletecompute.compute.addresses.getcompute.addresses.setLabelscompute.addresses.usecompute.forwardingRules.createcompute.forwardingRules.deletecompute.forwardingRules.getcompute.compute.compute.compute.compute.compute.instances.getcompute.compute.networks.getcompute.networks.usecompute.projects.getcompute.regionOperations.getcompute.routers.getcompute.subnetworks.createcompute.subnetworks.deletecompute.subnetworks.getcompute.compute.subnetworks.listcompute.compute.subnetworks.usecompute.vpnTunnels.getdns.managedZones.createdns.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.servicedirectory.servicedirectory.servicedirectory.servicedirectory.servicedirectory.
Service Class User
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Service Automation Service Producer Admin
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Spoke Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.hubs.getnetworkconnectivity.networkconnectivity.hubs.listnetworkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.spokes.*
networkconnectivity.networkconnectivity.networkconnectivity.spokes.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Outras permissões obrigatórias
Dependendo do que você precisa fazer no Network Connectivity Center, talvez precise das permissões descritas nas seções a seguir.
Permissão para criar um spoke
Para criar um spoke, você precisa ter permissão para ler o tipo de recurso do spoke. Exemplo:
- Para spokes de túnel VPN, anexos de VLAN e spokes do dispositivo roteador, você precisa de
compute.routers.get. - Para criar spokes do dispositivo do Router, você precisa de
compute.instances.get. Além disso, antes de usar um spoke do dispositivo do Router, você precisa configurar o peering entre o Cloud Router e a instância do appliance do roteador. Para estabelecer o peering, você precisa das seguintes permissões:compute.instances.usecompute.routers.update
- Para criar spokes de anexos da VLAN, você precisa de
compute.interconnectAttachments.get. - Para criar spokes de túnel de VPN, você precisa de
compute.vpnTunnels.get. Para criar spokes de VPC, você precisa das seguintes permissões:
compute.networks.usecompute.networks.get
Para criar spokes de VPC em um projeto diferente do hub ao qual ele está associado, você precisa de
networkconnectivity.groups.use.
Permissão para usar o Network Connectivity Center no console Google Cloud
Para usar o Network Connectivity Center no console Google Cloud , você precisa
de um papel, como
Leitor da rede do Compute
(roles/compute.networkViewer), que inclui as permissões descritas
na tabela a seguir. Para usar essas permissões, é necessário primeiro
criar um papel personalizado.
Tarefa |
Permissões necessárias |
|---|---|
| Acessar a página Network Connectivity Center |
|
| Acessar e usar a página Adicionar spokes |
|
| Adicionar um spoke de anexo da VLAN |
|
| Adicionar um spoke do túnel VPN |
|
| Adicionar um spoke do dispositivo roteador |
|
| Adicionar um spoke VPC |
|
Como proteger recursos com o VPC Service Controls
Para proteger ainda mais os recursos do Network Connectivity Center, use o VPC Service Controls.
O VPC Service Controls oferece mais segurança aos recursos para ajudar a reduzir o risco de exfiltração de dados. Ao usar o VPC Service Controls, é possível colocar os recursos do Network Connectivity Center dentro dos perímetros de serviço. O VPC Service Controls protege esses recursos de solicitações originadas fora do perímetro.
Para mais informações sobre perímetros de serviço, consulte a página de configuração do perímetro de serviço na documentação do VPC Service Controls.
A seguir
Para mais informações sobre papéis e Google Cloud recursos do projeto, consulte a seguinte documentação:
- Para entender os papéis e as permissões do IAM, consulte Controle de acesso para projetos que usam o IAM.
- Para entender os tipos de papéis, consulte Referência dos papéis básicos e predefinidos do Identity and Access Management.
- Para saber mais sobre papéis predefinidos, consulte Papéis e permissões de IAM do Compute Engine.
- Para saber mais sobre o Network Connectivity Center, consulte Visão geral do Network Connectivity Center.
- Para saber como gerenciar hubs e spokes, consulte Trabalhar com hubs e spokes.