사용자, 그룹, 서비스 계정에 인스턴스 액세스 권한 역할(roles/securesourcemanager.instanceAccessor) 또는 인스턴스 저장소 생성자 역할 (roles.securesourcemanager.instanceRepositoryCreator)이 부여되어야 저장소 역할을 부여할 수 있습니다. 인스턴스 역할 부여에 대한 자세한 내용은 Secure Source Manager API로 인스턴스 역할 부여 또는 취소를 참고하세요.
서드 파티 ID 공급업체와 직원 ID 제휴를 사용하여 Secure Source Manager에 인증하는 경우 주 구성원을 직원 ID 풀에 추가하고 인스턴스 액세스 권한자 역할(roles/securesourcemanager.instanceAccessor) 이상을 부여해야 합니다. 직원 ID 풀 관리에 관한 자세한 내용은 직원 ID 풀 및 제공업체 관리를 참고하세요.
Secure Source Manager API 또는 Secure Source Manager 웹 인터페이스를 사용하여 사용자, 그룹, 서비스 계정에 저장소 수준 역할을 부여할 수 있습니다. 자세한 내용은 IAM으로 액세스 제어를 참고하세요.
웹 인터페이스를 사용하여 사용자 또는 서비스 계정에 저장소 수준 역할을 부여하려면 다음 단계를 따르세요.
웹 인터페이스를 통해 Secure Source Manager 인스턴스에 액세스하려면 다음 URL을 브라우저 주소 표시줄에 복사합니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[],[],null,["# Grant users repository access\n\nThis page describes how to grant repository-level roles to users, groups, and\nservice accounts in the Secure Source Manager web interface.\n\nFor information on which roles to grant for a certain use-case, see\n[Repository role management](/secure-source-manager/docs/access-control#repository_role_management).\n\nRequired roles\n--------------\n\n\nTo get the permissions that\nyou need to grant users repository-level roles,\n\nask your administrator to grant you the\nfollowing IAM roles:\n\n- [Secure Source Manager Instance Accessor](/iam/docs/roles-permissions/securesourcemanager#securesourcemanager.instanceAccessor) (`roles/securesourcemanager.instanceAccessor`) on the Secure Source Manager instance\n- [Secure Source Manager Repo Admin](/iam/docs/roles-permissions/securesourcemanager#securesourcemanager.repoAdmin) (`roles/securesourcemanager.repoAdmin`) on the repository\n\n\nFor more information about granting roles, see [Manage access to projects, folders, and organizations](/iam/docs/granting-changing-revoking-access).\n\n\nYou might also be able to get\nthe required permissions through [custom\nroles](/iam/docs/creating-custom-roles) or other [predefined\nroles](/iam/docs/roles-overview#predefined).\n\nFor information on granting Secure Source Manager roles,\nsee [Access control with IAM](/secure-source-manager/docs/access-control) and\n[Grant users instance access](/secure-source-manager/docs/grant-users-instance-access).\n\nGrant users repository-level roles\n----------------------------------\n\nUsers, groups, and service accounts must be granted the Instance Accessor role\n(`roles/securesourcemanager.instanceAccessor`) or Instance Repository Creator\nrole (`roles.securesourcemanager.instanceRepositoryCreator`) before they can be\ngranted repository roles. For information on granting instance roles, see\n[Grant or revoke instance roles with Secure Source Manager API](/secure-source-manager/docs/grant-iam-roles#grant-revoke-instance-roles).\n\nIf you're authenticating to Secure Source Manager using a third-party\nidentity provider and Workforce Identity Federation, then principals must be added\nto your workforce identity pool, and granted at least the Instance Accessor role\n(`roles/securesourcemanager.instanceAccessor`). For information about managing\nworkforce identity pools, see\n[Manage workforce identity pools and providers](/iam/docs/manage-workforce-identity-pools-providers).\n\nYou can use the Secure Source Manager API or the Secure Source Manager web interface to grant\nusers, groups, and service accounts repository-level roles. For more\ninformation, see\n[Access control with IAM](/secure-source-manager/docs/access-control).\n\nTo grant users or service accounts repository-level roles using the web\ninterface:\n\n1. To access the Secure Source Manager instance through its web interface, copy the following URL\n into your browser address bar.\n\n\n \u003cvar translate=\"no\"\u003eINSTANCE_ID\u003c/var\u003e-\u003cvar translate=\"no\"\u003ePROJECT_NUMBER\u003c/var\u003e.\u003cvar translate=\"no\"\u003eLOCATION\u003c/var\u003e.sourcemanager.dev\n\n \u003cbr /\u003e\n\n\n Replace the following:\n\n\n - \u003cvar translate=\"no\"\u003eINSTANCE_ID\u003c/var\u003e with the instance name.\n - \u003cvar translate=\"no\"\u003ePROJECT_NUMBER\u003c/var\u003e with the instance's Google Cloud project number. For information on identifying projects, see [Identifying projects](/resource-manager/docs/creating-managing-projects#identifying_projects).\n - \u003cvar translate=\"no\"\u003eLOCATION\u003c/var\u003e with the instance's region.\n\n \u003cbr /\u003e\n\n2. From the **My repositories** page, Select your repository.\n3. Click the **Permissions** tab.\n4. In the **People and permissions** section, click **Add users**.\n5. In the **Add principal** field, enter the email of the user or service account you want to grant the role to.\n6. In the **Assign a role** menu, select the role to assign.\n7. Click **Save**.\n\nTo add additional roles click the\nedit **Edit** icon and add the\nroles using the **Assign a role** menu.\n\nWhat's next\n-----------\n\n- [Use Git source code management](/secure-source-manager/docs/use-git) with Secure Source Manager.\n- Learn more about [access control with IAM](/secure-source-manager/docs/access-control).\n- [Grant and revoke IAM roles](/secure-source-manager/docs/update-iam-policy)."]]