Dataplex Universal Catalog IAM roles
Stay organized with collections
Save and categorize content based on your preferences.
Identity and access management (IAM) lets you control who can do what
within Dataplex Universal Catalog. You can adopt the security principle of least
privilege, to protect private data, avoid unauthorized access, reduce the attack
surface, or meet regulatory compliance.
Dataplex Universal Catalog provides several predefined IAM roles,
each with a specific set of permissions that let users perform actions.
You can grant these roles using an IAM policy.
For more granular control, you can create a custom IAM role by
choosing specific permissions and assigning that new role to users. Custom roles
let you build an access model that matches your organization's needs.
This document describes the predefined and custom IAM roles that
are relevant to Dataplex Universal Catalog.
For a detailed description of IAM and its features, see the IAM documentation.
If you're using Data Catalog, then the Data Catalog
entry access grants aren't carried over to the Dataplex Universal Catalog
entries automatically. You must explicitly grant access to the
Dataplex Universal Catalog entries before using them.
About Dataplex Universal Catalog roles
Dataplex Universal Catalog IAM roles are a bundle of one or more
permissions. You grant roles to principals to let them perform actions on
the Dataplex Universal Catalog resources in your project. For example, the Dataplex
Viewer role contains the dataplex.*.get and dataplex.*.list permissions,
which let users get and list Dataplex Universal Catalog
resources in a project. For more information, see Dataplex Universal Catalog
permissions.
You can apply Dataplex Universal Catalog roles to any resources in the service
hierarchy, including the following:
Projects
Lakes, data zones, and assets
Data scans, tasks, and environments
Entry groups, entry types, aspect types, and glossaries
Data taxonomies, data attributes, and data attribute bindings
Predefined roles for Dataplex Universal Catalog
Predefined roles contain the permissions that are needed to perform a task or a
group of related tasks.
The following roles provide broad access to Dataplex Universal Catalog resources:
Role
Description
Dataplex Administrator
(roles/dataplex.admin)
Full access to Dataplex Universal Catalog resources.
Dataplex Editor
(roles/dataplex.editor)
Edit access to Dataplex Universal Catalog resources.
Dataplex Viewer
(roles/dataplex.viewer)
Read-only access to Dataplex Universal Catalog resources.
Dataplex Developer
(roles/dataplex.developer)
Lets you run data analytics workloads.
The Dataplex Administrator (roles/dataplex.admin), Dataplex Editor
(roles/dataplex.editor), and Dataplex Viewer (roles/dataplex.viewer)
roles don't provide access to metadata resources such as entry groups, entry
types, aspect types, and entries.
The following table lists the Dataplex Universal Catalog
predefined roles and the permissions associated with each role:
Role
Permissions
Dataplex Administrator
(roles/dataplex.admin)
Full access to Dataplex Universal Catalog resources, except for catalog resources like entries and entry groups.
cloudasset.assets.analyzeIamPolicy
cloudasset.assets.searchAllIamPolicies
cloudasset.assets.searchAllResources
dataplex.assetActions.list
dataplex.assets.create
dataplex.assets.delete
dataplex.assets.get
dataplex.assets.getIamPolicy
dataplex.assets.list
dataplex.assets.setIamPolicy
dataplex.assets.update
dataplex.content.*
dataplex.content.create
dataplex.content.delete
dataplex.content.get
dataplex.content.getIamPolicy
dataplex.content.list
dataplex.content.setIamPolicy
dataplex.content.update
dataplex.dataAssets.*
dataplex.dataAssets.create
dataplex.dataAssets.delete
dataplex.dataAssets.get
dataplex.dataAssets.list
dataplex.dataAssets.update
dataplex.dataAttributeBindings.*
dataplex.dataAttributeBindings.create
dataplex.dataAttributeBindings.delete
dataplex.dataAttributeBindings.get
dataplex.dataAttributeBindings.getIamPolicy
dataplex.dataAttributeBindings.list
dataplex.dataAttributeBindings.setIamPolicy
dataplex.dataAttributeBindings.update
dataplex.dataAttributes.*
dataplex.dataAttributes.bind
dataplex.dataAttributes.create
dataplex.dataAttributes.delete
dataplex.dataAttributes.get
dataplex.dataAttributes.getIamPolicy
dataplex.dataAttributes.list
dataplex.dataAttributes.setIamPolicy
dataplex.dataAttributes.update
dataplex.dataProducts.*
dataplex.dataProducts.create
dataplex.dataProducts.delete
dataplex.dataProducts.get
dataplex.dataProducts.getIamPolicy
dataplex.dataProducts.list
dataplex.dataProducts.setIamPolicy
dataplex.dataProducts.update
dataplex.dataTaxonomies.*
dataplex.dataTaxonomies.configureDataAccess
dataplex.dataTaxonomies.configureResourceAccess
dataplex.dataTaxonomies.create
dataplex.dataTaxonomies.delete
dataplex.dataTaxonomies.get
dataplex.dataTaxonomies.getIamPolicy
dataplex.dataTaxonomies.list
dataplex.dataTaxonomies.setIamPolicy
dataplex.dataTaxonomies.update
dataplex.datascans.*
dataplex.datascans.create
dataplex.datascans.delete
dataplex.datascans.get
dataplex.datascans.getData
dataplex.datascans.getIamPolicy
dataplex.datascans.list
dataplex.datascans.run
dataplex.datascans.setIamPolicy
dataplex.datascans.update
dataplex.entities.*
dataplex.entities.create
dataplex.entities.delete
dataplex.entities.get
dataplex.entities.list
dataplex.entities.update
dataplex.entries.link
dataplex.entryGroups.export
dataplex.entryGroups.import
dataplex.entryGroups.useDefinitionEntryLink
dataplex.entryGroups.useRelatedEntryLink
dataplex.entryGroups.useSynonymEntryLink
dataplex.entryLinks.*
dataplex.entryLinks.create
dataplex.entryLinks.delete
dataplex.entryLinks.get
dataplex.entryLinks.reference
dataplex.environments.*
dataplex.environments.create
dataplex.environments.delete
dataplex.environments.execute
dataplex.environments.get
dataplex.environments.getIamPolicy
dataplex.environments.list
dataplex.environments.setIamPolicy
dataplex.environments.update
dataplex.glossaries.*
dataplex.glossaries.create
dataplex.glossaries.delete
dataplex.glossaries.get
dataplex.glossaries.getIamPolicy
dataplex.glossaries.import
dataplex.glossaries.list
dataplex.glossaries.setIamPolicy
dataplex.glossaries.update
dataplex.glossaryCategories.*
dataplex.glossaryCategories.create
dataplex.glossaryCategories.delete
dataplex.glossaryCategories.get
dataplex.glossaryCategories.list
dataplex.glossaryCategories.update
dataplex.glossaryTerms.*
dataplex.glossaryTerms.create
dataplex.glossaryTerms.delete
dataplex.glossaryTerms.get
dataplex.glossaryTerms.list
dataplex.glossaryTerms.update
dataplex.glossaryTerms.use
dataplex.lakeActions.list
dataplex.lakes.*
dataplex.lakes.create
dataplex.lakes.delete
dataplex.lakes.get
dataplex.lakes.getIamPolicy
dataplex.lakes.list
dataplex.lakes.setIamPolicy
dataplex.lakes.update
dataplex.locations.*
dataplex.locations.get
dataplex.locations.list
dataplex.metadataFeeds.*
dataplex.metadataFeeds.create
dataplex.metadataFeeds.delete
dataplex.metadataFeeds.get
dataplex.metadataFeeds.list
dataplex.metadataFeeds.update
dataplex.metadataJobs.*
dataplex.metadataJobs.cancel
dataplex.metadataJobs.create
dataplex.metadataJobs.get
dataplex.metadataJobs.list
dataplex.operations.*
dataplex.operations.cancel
dataplex.operations.delete
dataplex.operations.get
dataplex.operations.list
dataplex.partitions.*
dataplex.partitions.create
dataplex.partitions.delete
dataplex.partitions.get
dataplex.partitions.list
dataplex.partitions.update
dataplex.tasks.*
dataplex.tasks.cancel
dataplex.tasks.create
dataplex.tasks.delete
dataplex.tasks.get
dataplex.tasks.getIamPolicy
dataplex.tasks.list
dataplex.tasks.run
dataplex.tasks.setIamPolicy
dataplex.tasks.update
dataplex.zoneActions.list
dataplex.zones.*
dataplex.zones.create
dataplex.zones.delete
dataplex.zones.get
dataplex.zones.getIamPolicy
dataplex.zones.list
dataplex.zones.setIamPolicy
dataplex.zones.update
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Aspect Type Owner
(roles/dataplex.aspectTypeOwner)
Grants access to creating and managing Aspect Types. Does not give the right to create/modify Entries.
datacatalog.migrationConfig.get
dataplex.aspectTypes.*
dataplex.aspectTypes.create
dataplex.aspectTypes.delete
dataplex.aspectTypes.get
dataplex.aspectTypes.getIamPolicy
dataplex.aspectTypes.list
dataplex.aspectTypes.setIamPolicy
dataplex.aspectTypes.update
dataplex.aspectTypes.use
dataplex.operations.get
dataplex.projects.search
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Aspect Type User
(roles/dataplex.aspectTypeUser)
Grants access to use Aspect Types to create/modify Entries with the corresponding aspects.
datacatalog.migrationConfig.get
dataplex.aspectTypes.get
dataplex.aspectTypes.list
dataplex.aspectTypes.use
dataplex.projects.search
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Binding Administrator
(roles/dataplex.bindingAdmin)
Full access on DataAttribute Binding resources.
dataplex.dataAttributeBindings.*
dataplex.dataAttributeBindings.create
dataplex.dataAttributeBindings.delete
dataplex.dataAttributeBindings.get
dataplex.dataAttributeBindings.getIamPolicy
dataplex.dataAttributeBindings.list
dataplex.dataAttributeBindings.setIamPolicy
dataplex.dataAttributeBindings.update
Dataplex Catalog Admin
(roles/dataplex.catalogAdmin)
Full access to catalog resources, including entries, entry groups, and glossaries.
Grants access to creating and managing Entry Types. Does not give the right to create/modify Entries.
datacatalog.migrationConfig.get
dataplex.entryTypes.*
dataplex.entryTypes.create
dataplex.entryTypes.delete
dataplex.entryTypes.get
dataplex.entryTypes.getIamPolicy
dataplex.entryTypes.list
dataplex.entryTypes.setIamPolicy
dataplex.entryTypes.update
dataplex.entryTypes.use
dataplex.operations.get
dataplex.projects.search
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Entry Type User
(roles/dataplex.entryTypeUser)
Grants access to use Entry Types to create/modify Entries of those types.
datacatalog.migrationConfig.get
dataplex.entryTypes.get
dataplex.entryTypes.list
dataplex.entryTypes.use
dataplex.projects.search
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Metadata Feed Owner
(roles/dataplex.metadataFeedOwner)
Grants access to creating and managing Metadata Feeds. Does not give the right to create/modify Entry Groups.
dataplex.metadataFeeds.*
dataplex.metadataFeeds.create
dataplex.metadataFeeds.delete
dataplex.metadataFeeds.get
dataplex.metadataFeeds.list
dataplex.metadataFeeds.update
dataplex.operations.get
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Metadata Feed Viewer
(roles/dataplex.metadataFeedViewer)
Read access to Metadata Feed resources.
dataplex.metadataFeeds.get
dataplex.metadataFeeds.list
dataplex.operations.get
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Metadata Job Owner
(roles/dataplex.metadataJobOwner)
Grants access to creating and managing Metadata Jobs. Does not give the right to create/modify Entry Groups.
dataplex.metadataJobs.*
dataplex.metadataJobs.cancel
dataplex.metadataJobs.create
dataplex.metadataJobs.get
dataplex.metadataJobs.list
dataplex.operations.get
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Metadata Job Viewer
(roles/dataplex.metadataJobViewer)
Read access to Metadata Job resources.
dataplex.metadataJobs.get
dataplex.metadataJobs.list
dataplex.operations.get
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Metadata Reader
(roles/dataplex.metadataReader)
Read only access to metadata within table and fileset entities and partitions.
dataplex.assets.get
dataplex.assets.list
dataplex.entities.get
dataplex.entities.list
dataplex.partitions.get
dataplex.partitions.list
dataplex.zones.get
dataplex.zones.list
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Metadata Writer
(roles/dataplex.metadataWriter)
Write and read access to metadata within table and fileset entities and partitions.
dataplex.assets.get
dataplex.assets.list
dataplex.entities.*
dataplex.entities.create
dataplex.entities.delete
dataplex.entities.get
dataplex.entities.list
dataplex.entities.update
dataplex.partitions.*
dataplex.partitions.create
dataplex.partitions.delete
dataplex.partitions.get
dataplex.partitions.list
dataplex.partitions.update
dataplex.zones.get
dataplex.zones.list
resourcemanager.projects.get
resourcemanager.projects.list
Dataplex Security Administrator
(roles/dataplex.securityAdmin)
Permissions configure ResourceAccess and DataAccess Specs on Data Attributes.
dataplex.dataTaxonomies.configureDataAccess
dataplex.dataTaxonomies.configureResourceAccess
Cloud Dataplex Service Agent
(roles/dataplex.serviceAgent)
Gives the Dataplex service account access to project resources. This access will be used in data discovery, data management and data workload management.
Owner access to data. Should not be used directly. This role is granted by Dataplex to managed resources like Cloud Storage buckets, BigQuery datasets etc.
bigquery.datasets.get
bigquery.models.create
bigquery.models.delete
bigquery.models.export
bigquery.models.getData
bigquery.models.getMetadata
bigquery.models.list
bigquery.models.updateData
bigquery.models.updateMetadata
bigquery.routines.create
bigquery.routines.delete
bigquery.routines.get
bigquery.routines.list
bigquery.routines.update
bigquery.tables.create
bigquery.tables.createSnapshot
bigquery.tables.delete
bigquery.tables.deleteSnapshot
bigquery.tables.export
bigquery.tables.get
bigquery.tables.getData
bigquery.tables.list
bigquery.tables.restoreSnapshot
bigquery.tables.update
bigquery.tables.updateData
storage.buckets.get
storage.objects.create
storage.objects.delete
storage.objects.get
storage.objects.list
storage.objects.update
Dataplex Storage Data Reader
(roles/dataplex.storageDataReader)
Read only access to data. Should not be used directly. This role is granted by Dataplex to managed resources like Cloud Storage buckets, BigQuery datasets etc.
bigquery.datasets.get
bigquery.models.export
bigquery.models.getData
bigquery.models.getMetadata
bigquery.models.list
bigquery.routines.get
bigquery.routines.list
bigquery.tables.export
bigquery.tables.get
bigquery.tables.getData
bigquery.tables.list
storage.buckets.get
storage.objects.get
storage.objects.list
Dataplex Storage Data Writer
(roles/dataplex.storageDataWriter)
Write access to data. Should not be used directly. This role is granted by Dataplex to managed resources like Cloud Storage buckets, BigQuery datasets etc.
bigquery.tables.updateData
storage.objects.create
storage.objects.delete
storage.objects.update
Dataplex Taxonomy Administrator
(roles/dataplex.taxonomyAdmin)
Full access to DataTaxonomy, DataAttribute resources.
dataplex.dataAttributes.*
dataplex.dataAttributes.bind
dataplex.dataAttributes.create
dataplex.dataAttributes.delete
dataplex.dataAttributes.get
dataplex.dataAttributes.getIamPolicy
dataplex.dataAttributes.list
dataplex.dataAttributes.setIamPolicy
dataplex.dataAttributes.update
dataplex.dataTaxonomies.create
dataplex.dataTaxonomies.delete
dataplex.dataTaxonomies.get
dataplex.dataTaxonomies.getIamPolicy
dataplex.dataTaxonomies.list
dataplex.dataTaxonomies.setIamPolicy
dataplex.dataTaxonomies.update
Dataplex Taxonomy Viewer
(roles/dataplex.taxonomyViewer)
Read access on DataTaxonomy, DataAttribute resources.
dataplex.dataAttributes.get
dataplex.dataAttributes.getIamPolicy
dataplex.dataAttributes.list
dataplex.dataTaxonomies.get
dataplex.dataTaxonomies.getIamPolicy
dataplex.dataTaxonomies.list
Dataplex Viewer
(roles/dataplex.viewer)
Read access to Dataplex Universal Catalog resources, except for catalog resources like entries, entry groups, and glossaries.
cloudasset.assets.analyzeIamPolicy
dataplex.assetActions.list
dataplex.assets.get
dataplex.assets.getIamPolicy
dataplex.assets.list
dataplex.content.get
dataplex.content.getIamPolicy
dataplex.content.list
dataplex.dataAssets.get
dataplex.dataAssets.list
dataplex.dataAttributeBindings.get
dataplex.dataAttributeBindings.getIamPolicy
dataplex.dataAttributeBindings.list
dataplex.dataAttributes.get
dataplex.dataAttributes.getIamPolicy
dataplex.dataAttributes.list
dataplex.dataProducts.get
dataplex.dataProducts.getIamPolicy
dataplex.dataProducts.list
dataplex.dataTaxonomies.get
dataplex.dataTaxonomies.getIamPolicy
dataplex.dataTaxonomies.list
dataplex.datascans.get
dataplex.datascans.getIamPolicy
dataplex.datascans.list
dataplex.environments.get
dataplex.environments.getIamPolicy
dataplex.environments.list
dataplex.lakeActions.list
dataplex.lakes.get
dataplex.lakes.getIamPolicy
dataplex.lakes.list
dataplex.operations.get
dataplex.operations.list
dataplex.tasks.get
dataplex.tasks.getIamPolicy
dataplex.tasks.list
dataplex.zoneActions.list
dataplex.zones.get
dataplex.zones.getIamPolicy
dataplex.zones.list
Dataplex Entry and EntryLink Owner role
The Dataplex Entry and EntryLink Owner (roles/dataplex.entryOwner) role
includes the following features:
Grants full access to entry-related operations.
Grants permissions to add aspects of some of the system aspect types, such
as Schema, Generic, Overview, and Contacts.
Grants permissions to create entries of the GenericEntry type.
This role lets you create an entry with an entry type and aspect type, where
the entry type and aspect type are defined in the same project as the entry.
Otherwise, you must also grant the Dataplex Entry Type User
(roles/dataplex.entryTypeUser) and Dataplex Aspect Type User
(roles/dataplex.aspectTypeUser) roles on the projects where the entry and
aspect types are defined.
This role doesn't grant permissions to read entries that are created
from Google Cloud resources outside of Dataplex Universal Catalog, such
as BigQuery entries, when using the
LookupEntry
or the
SearchEntries
methods. To read these entries, you must have permissions on the source
system resources. Alternatively, you can read the entries with only the
Dataplex Entry and EntryLink Owner (roles/dataplex.entryOwner) role by
using the
GetEntry method.
Role considerations
No role grants permissions to add or delete Dataplex Universal Catalog entries
from system-defined entry groups, such as @bigquery and @dataplex.
To view data aspects
attached to an entry, you need permissions to read data from the source asset
that the entry represents, in addition to permissions to view the entry. If
you have permission to view an entry but lack data-read permissions for the
source asset, you can still view all other metadata on the entry. However,
Dataplex Universal Catalog hides the content of any attached data aspects.
The Dataplex Catalog Admin (roles/dataplex.catalogAdmin) and Dataplex
Catalog Editor (roles/dataplex.catalogEditor) roles grant permissions
to view custom entries.
To search for entries using the SearchEntries
method, you must have at least one of the following IAM roles
on the project used in the API request: Dataplex Catalog Admin
(roles/dataplex.catalogAdmin), Dataplex Catalog Editor
(roles/dataplex.catalogEditor), or Dataplex Catalog Viewer
(roles/dataplex.catalogViewer). Permissions on search results are checked
independently of the selected project.
Predefined roles for data lineage
To access the lineage for any Dataplex Universal Catalog entry, you need a viewer
role on the corresponding system resource
or the Dataplex Catalog Viewer role
(roles/dataplex.catalogViewer) on the project that stores the Dataplex Universal Catalog entry.
This section describes the roles required to work with lineage.
Data Lineage Administrator role
The Data Lineage Administrator role
(roles/datalineage.admin) grants full control over all Dataplex Universal Catalog
lineage resources.
Data Lineage Editor role
The Data Lineage Editor role
(roles/datalineage.editor) grants permissions to create, update, and delete
Dataplex Universal Catalog lineage resources.
Data Lineage Events Producer role
The Data Lineage Events Producer role
(roles/datalineage.eventsProducer) grants permissions to create, update, and
delete lineage events. This role is intended for services that generate lineage
events, such as BigQuery.
Lineage viewer role
The Data Lineage Viewer role
(roles/datalineage.viewer) lets you view Dataplex Universal Catalog
lineage in the Google Cloud console and read lineage information using the Data Lineage API. The runs and
events for a given process are all stored in the same project as the process. In
the case of automated lineage, the process, runs,
and events are stored in the project in which the job that generated the lineage
was running. For example, this could be the project in which a BigQuery
job was running.
To view lineage between assets, you need the Data Lineage Viewer
role
(roles/datalineage.viewer) on both the project in which you're viewing lineage
and the projects in which lineage is recorded. Specifically, you need the role on the following projects:
The project in which you're viewing lineage (known as active
project), that is,
the project in the drop-down at the top of the Google Cloud console or the
project from which API calls are made. This is typically the project
containing the resources you create in Dataplex Universal Catalog or
access in other Google Cloud systems with the API.
The projects in which lineage is recorded (known as compute
project). Lineage
is stored in the project where the corresponding process executed, as
described earlier. This project can be different from the project storing
the asset that you're viewing lineage for.
To view asset metadata, you need the same roles used for accessing metadata entries in Dataplex Universal Catalog.
Grants full access to all resources in Data Lineage API
datalineage.*
datalineage.configs.get
datalineage.configs.update
datalineage.events.create
datalineage.events.delete
datalineage.events.get
datalineage.events.getFields
datalineage.events.list
datalineage.locations.processOpenLineageMessage
datalineage.locations.searchLinks
datalineage.operations.get
datalineage.processes.create
datalineage.processes.delete
datalineage.processes.get
datalineage.processes.list
datalineage.processes.update
datalineage.runs.create
datalineage.runs.delete
datalineage.runs.get
datalineage.runs.list
datalineage.runs.update
resourcemanager.projects.get
resourcemanager.projects.list
Data Lineage Editor
(roles/datalineage.editor)
Grants edit access to all resources in Data Lineage API
datalineage.events.*
datalineage.events.create
datalineage.events.delete
datalineage.events.get
datalineage.events.getFields
datalineage.events.list
datalineage.locations.*
datalineage.locations.processOpenLineageMessage
datalineage.locations.searchLinks
datalineage.operations.get
datalineage.processes.create
datalineage.processes.get
datalineage.processes.list
datalineage.processes.update
datalineage.runs.create
datalineage.runs.get
datalineage.runs.list
datalineage.runs.update
resourcemanager.projects.get
resourcemanager.projects.list
Data Lineage Events Producer
(roles/datalineage.producer)
Grants access to creating all resources in Data Lineage API
datalineage.events.create
datalineage.locations.processOpenLineageMessage
datalineage.processes.create
datalineage.processes.get
datalineage.processes.update
datalineage.runs.create
datalineage.runs.get
datalineage.runs.update
resourcemanager.projects.get
resourcemanager.projects.list
Data Lineage Viewer
(roles/datalineage.viewer)
Grants read access to all resources in Data Lineage API
datalineage.events.get
datalineage.events.getFields
datalineage.events.list
datalineage.locations.searchLinks
datalineage.processes.get
datalineage.processes.list
datalineage.runs.get
datalineage.runs.list
resourcemanager.projects.get
resourcemanager.projects.list
Roles to view asset metadata when viewing lineage
To view metadata about an asset stored in Dataplex Universal Catalog, you must
have a viewer role on the corresponding system
resource or the Dataplex Catalog
Viewer role
(roles/dataplex.catalogViewer) on the project storing the
Dataplex Universal Catalog entry. You might have access to assets on the
lineage graph or list through appropriate viewer roles but no access to the
lineage between them. This occurs if you don't have the Data Lineage
Viewer role
(roles/datalineage.viewer) on the project where the lineage was recorded.
In this case, the Data Lineage API and Google Cloud console don't show
the lineage or return an error. This prevents leaking information about the
existence of lineage. Therefore, the absence of lineage for an asset doesn't
mean that no lineage exists, but rather that you might not have permissions to
view it.
Metadata roles
Metadata roles grant permissions to view and update metadata, such as table
schemas.
Lets you read metadata, for example, to query a table.
Data roles
Dataplex Universal Catalog defines the following IAM roles that
apply to any resource managed by Dataplex Universal Catalog.
For more information about the permissions associated with each role, see the
Predefined roles section of
this document.
Role
Description
Dataplex Data Owner
(roles/dataplex.dataOwner)
Full access to the managed resource and its children. Permissions include updating metadata, creating child resources, and granting granular permissions.
Dataplex Data Reader
(roles/dataplex.dataReader)
Read access to data and metadata in the managed resource and its children.
Dataplex Data Writer
(roles/dataplex.dataWriter)
Write access to data in the managed resource. This includes creating, updating, and deleting data, but not metadata.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2026-02-04 UTC."],[],[]]