다음 표에서는 Cloud Scheduler 사전 정의 IAM 역할과 각 역할에 포함된 모든 권한 목록을 보여줍니다.
사전 정의된 역할은 일반적인 사용 사례를 대부분 처리합니다. 사용 사례가 사전 정의된 역할로 처리되지 않는 경우, IAM 커스텀 역할을 만들 수 있습니다.
Cloud Scheduler 역할
Role
Permissions
Cloud Scheduler Admin
(roles/cloudscheduler.admin)
Full access to jobs and executions.
Note that a Cloud Scheduler Admin (or any custom role with the permission
cloudscheduler.jobs.create) can create jobs that publish to any Pub/Sub topics within the
project.
appengine.applications.get
cloudscheduler.*
cloudscheduler.jobs.create
cloudscheduler.jobs.delete
cloudscheduler.jobs.enable
cloudscheduler.jobs.fullView
cloudscheduler.jobs.get
cloudscheduler.jobs.list
cloudscheduler.jobs.pause
cloudscheduler.jobs.run
cloudscheduler.jobs.update
cloudscheduler.locations.get
cloudscheduler.locations.list
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.services.get
serviceusage.services.list
Cloud Scheduler Job Runner
(roles/cloudscheduler.jobRunner)
Access to run jobs.
appengine.applications.get
cloudscheduler.jobs.fullView
cloudscheduler.jobs.run
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.services.get
serviceusage.services.list
Cloud Scheduler Service Agent
(roles/cloudscheduler.serviceAgent)
Grants Cloud Scheduler Service Account access to manage resources.
iam.serviceAccounts.getAccessToken
iam.serviceAccounts.getOpenIdToken
logging.logEntries.create
logging.logEntries.route
pubsub.topics.publish
Cloud Scheduler Viewer
(roles/cloudscheduler.viewer)
Get and list access to jobs, executions, and locations.
appengine.applications.get
cloudscheduler.jobs.fullView
cloudscheduler.jobs.get
cloudscheduler.jobs.list
cloudscheduler.locations.*
cloudscheduler.locations.get
cloudscheduler.locations.list
resourcemanager.projects.get
resourcemanager.projects.list
serviceusage.services.get
serviceusage.services.list
프로젝트 수준 IAM 관리
프로젝트 수준에서 Google Cloud 콘솔, IAM API 또는 Google Cloud CLI를 사용하여 IAM 역할을 부여, 변경, 취소할 수 있습니다.
자세한 내용은 프로젝트, 폴더, 조직에 대한 액세스 관리를 참조하세요.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[],[],null,["# Access control with IAM\n\nThis page describes the access control options that are available to you in\nCloud Scheduler.\n\nOverview\n--------\n\nCloud Scheduler uses Identity and Access Management (IAM) for access control.\n\nFor an introduction to IAM and its features, see the\n[IAM overview](/iam/docs/overview). To learn how to grant and\nrevoke access, see\n[Manage access to projects, folders, and organizations](/iam/docs/granting-changing-revoking-access).\n\nFor lists of the permissions and roles that Cloud Scheduler\nsupports, see the following sections.\n\nEnable the Cloud Scheduler API\n------------------------------\n\nTo view and assign IAM roles for Cloud Scheduler,\nyou must enable the Cloud Scheduler API for your project. You won't be able to\nsee the Cloud Scheduler roles in the Google Cloud console\nuntil you enable the API.\n\n\n[Enable the API](https://console.cloud.google.com/flows/enableapi?apiid=cloudscheduler.googleapis.com&redirect=https://console.cloud.google.com)\n\nPredefined roles\n----------------\n\nThe following table lists the Cloud Scheduler predefined\nIAM roles with a corresponding list of all the permissions each\nrole includes.\n\nThe predefined roles address most typical use cases. If your use case isn't\ncovered by the predefined roles, you can\n[create an IAM custom role](/iam/docs/understanding-custom-roles).\n\n### Cloud Scheduler roles\n\nProject-level IAM management\n----------------------------\n\nAt the project level, you can grant, change, and revoke IAM roles\nusing the Google Cloud console, the IAM API, or the Google Cloud CLI.\nFor instructions, see\n[Manage access to projects, folders, and organizations](/iam/docs/granting-changing-revoking-access)."]]