本頁列出 Google Distributed Cloud 連結網路方案所需的權限,以及包含這些權限的 Identity and Access Management (IAM) 角色。
Distributed Cloud Edge Container API 角色和權限
下表列出 Distributed Cloud Edge Container API 的 Google Cloud 專案角色,以及這些角色封裝的 Distributed Cloud 連線權限。
| Role | Permissions |
|---|---|
Edge Container Admin( Full access to Edge Container all resources. |
|
Edgecontainer Editor( Editor role for edgecontainer |
|
Edge Container Viewer( Read-only access to Edge Container all resources. |
|
Edge Container API Key Admin( Access to manage API Keys. |
|
Edge Container API Key Viewer( Read-only access to API Keys. |
|
Edge Container Identity Provider Admin( Access to manage Identity Providers. |
|
Edge Container Identity Provider Viewer( Read-only access to Identity Providers. |
|
Edge Container Machine User( Access to use Edge Container Machine resources. |
|
Edge Container Cluster offline Credential User( Access to get Edge Container cluster offline credentials |
|
Edge Container Service Account Admin( Access to manage Service Accounts. |
|
Edge Container Service Account Key Admin( Access to manage Service Account Keys. |
|
Edge Container Service Account Key Viewer( Access to view Service Account Keys. |
|
Edge Container Service Account Viewer( Read-only access to Service Accounts. |
|
Edge Container Zonal Project Admin( Access to manage zonal projects. |
|
Edge Container Zonal Project Viewer( Read-only access to zonal projects. |
|
Edge Container Zonal Service Admin( Access to mutate zonal service. |
|
Edge Container Zonal Service Viewer( Read-only access to zonal services. |
|
Edge Container Zone Iam Policy Admin( Access to manage Iam Policy in the zone. |
|
Edge Container Zone Iam Policy Viewer( Read-only access to Iam Policy in the zone. |
|
Edge Container Roles Viewer( Read-only access to Roles in the zone. |
|
Edge Container Zone Viewer( Read-only access to zones. |
|
Service agent roles
Service agent roles should only be granted to service agents.
| Role | Permissions |
|---|---|
Edge Container Cluster Service Agent( Grants the Edge Container Cluster Service Account access to manage resources. |
|
Edge Container Service Agent( Grants the Edge Container Service Account access to manage resources. |
|
Distributed Cloud Edge Network API 角色和權限
下表列出 Distributed Cloud Edge Network API 的 Google Cloud 專案角色,以及這些角色封裝的 Distributed Cloud 連線權限。
| Role | Permissions |
|---|---|
Edge Network Admin( Full access to Edge Network all resources. |
|
Edge Network Editor( Editor role for Edge Network |
|
Edge Network Viewer( Read-only access to Edge Network all resources. |
|
GDC Hardware Management API 角色和權限
下表列出 GDC Hardware Management API 的 Google Cloud 專案角色,以及這些角色封裝的 Distributed Cloud 連線權限。
| Role | Permissions |
|---|---|
GDC Hardware Management Admin Beta( Full access to GDC Hardware Management resources. |
|
Gdchardwaremanagement Viewer Beta( Viewer role for gdchardwaremanagement |
|
GDC Hardware Management Operator Beta( Create, read, and update access to GDC Hardware Management resources that support those operations. Also grants delete access to HardwareGroup resource. |
|
GDC Hardware Management Reader Beta( Readonly access to GDC Hardware Management resources. |
|
連結閘道角色和權限
下表說明 Connect 閘道存取叢集所需的 Google Cloud 專案角色。
- Connect Gateway Admin (
roles/gkehub.gatewayAdmin):授予 Connect Gateway API 的存取權。這個角色可讓您使用kubectl指令列工具管理叢集。 - Connect Gateway 編輯者 (
roles/gkehub.gatewayEditor):授予叢集的讀取和寫入權限。 - Connect Gateway 讀取者 (
roles/gkehub.gatewayReader):授予叢集的唯讀存取權。 - GKE Hub 檢視者 (
roles/gkehub.viewer):可從叢集擷取 kubeconfig 檔案。
Config Sync 機群套件角色和權限
以下列出建立及管理機群套件所需的 Google Cloud 專案角色。
- Config Delivery Admin (
roles/configdelivery.admin):建立及管理機群套件和推出時必須具備此角色。 - Developer Connect 管理員 (
roles/developerconnect.admin):必須具備此角色才能建立及管理存放區連線。 - 專案 IAM 管理員 (
roles/resourcemanager.projectIamAdmin):必須具備此角色,才能將必要角色授予服務帳戶。
機群套件服務帳戶角色
- Config Delivery 資源組合發布者
(
roles/configdelivery.resourceBundlePublisher):允許服務帳戶建立及管理資源組合和發布內容。 - Cloud Build 連線使用者 (
roles/cloudbuild.connectionUser):允許服務帳戶使用 Cloud Build 存放區連線。 - 記錄記錄檔寫入者 (
roles/logging.logWriter):允許服務帳戶寫入建構記錄。 - Artifact Registry 寫入者 (
roles/artifactregistry.writer):允許服務帳戶將已編號的版本套件組合推送至 Artifact Registry。 - Developer Connect 連線使用者
(
roles/developerconnect.connectionUser):允許服務帳戶使用 Developer Connect 連線。