This page describes the Identity and Access Management (IAM) roles and permissions needed for setting up a Secure Web Proxy instance.
You can grant users or service accounts permissions or a predefined role, or you can create a custom role that uses permissions that you specify. The following table describes the IAM predefined roles and their associated permissions.
For more information, see the IAM permissions reference.
Description | Role | Permissions (methods) |
---|---|---|
Provision and manage a Secure Web Proxy instance | Create a custom role with the specified permissions. For information about creating a custom role, see Create a custom role. |
|
View, create, update, list, and delete Secure Web Proxy policies | Create a custom role with the specified permissions. For information about creating a custom role, see Create a custom role. |
|
For more information about project roles and permissions, see the following:
- Identity and Access Management documentation
- Compute Engine API documentation
- Cloud Monitoring API documentation
What's next
- To complete the setup tasks, see Initial setup steps.