2026년 3월 29일이 속한 주에 예정된 권한 변경사항

새로운 기능과 기존 기능에 대한 더 표준화된 제어 및 액세스를 제공하기 위해 다음 표에 나열된 사전 정의된 역할에 새로운 권한이 추가됩니다. 변경사항은 2026년 3월 29일부터 적용됩니다.

서비스 세부정보
Vertex AI

Vertex AI 뷰어 역할 (roles/aiplatform.viewer)에 다음 권한이 추가됩니다.

aiplatform.endpoints.explain
aiplatform.endpoints.getIamPolicy
aiplatform.endpoints.predict
aiplatform.entityTypes.exportFeatureValues
aiplatform.entityTypes.getIamPolicy
aiplatform.entityTypes.readFeatureValues
aiplatform.entityTypes.streamingReadFeatureValues
aiplatform.featureGroups.getIamPolicy
aiplatform.featureOnlineStores.getIamPolicy
aiplatform.featureViews.getIamPolicy
aiplatform.featurestores.batchReadFeatureValues
aiplatform.featurestores.getIamPolicy
aiplatform.featurestores.readFeatures
aiplatform.humanInTheLoops.queryAnnotationStats
aiplatform.locations.evaluateInstances
aiplatform.memories.retrieve
aiplatform.migratableResources.search
aiplatform.notebookRuntimeTemplates.apply
aiplatform.notebookRuntimeTemplates.getIamPolicy

BigQuery Sharing

Analytics Hub 관리자 역할 (roles/analyticshub.admin)에 다음 권한이 추가됩니다.

analyticshub.dataExchanges.subscribe
analyticshub.listings.subscribe

BigQuery Sharing

Analytics Hub 뷰어 역할 (roles/analyticshub.viewer)에 다음 권한이 추가됩니다.

analyticshub.subscriptions.get
analyticshub.subscriptions.list

Apigee Connect

Apigee Connect 관리자 역할 (roles/apigeeconnect.Admin)에 다음 권한이 추가됩니다.

apigeeconnect.endpoints.connect

App Hub

App Hub 편집자 역할 (roles/apphub.editor)에 다음 권한이 추가됩니다.

apphub.applications.getIamPolicy
apphub.serviceProjectAttachments.create
apphub.serviceProjectAttachments.delete
apphub.serviceProjectAttachments.get
apphub.serviceProjectAttachments.list

App Hub

App Hub 뷰어 역할 (roles/apphub.viewer)에 다음 권한이 추가됩니다.

apphub.applications.getIamPolicy
apphub.serviceProjectAttachments.get
apphub.serviceProjectAttachments.list

Artifact Registry

Artifact Registry 관리자 역할 (roles/artifactregistry.admin)에 다음 권한이 추가됩니다.

artifactregistry.repositories.createOnPush

백업 및 재해 복구

백업 및 DR 관리자 역할 (roles/backupdr.admin)에 다음 권한이 추가됩니다.

backupdr.resourceBackupConfigs.get
backupdr.resourceBackupConfigs.list

백업 및 재해 복구

백업 및 DR 뷰어 역할 (roles/backupdr.viewer)에 다음 권한이 추가됩니다.

backupdr.resourceBackupConfigs.get
backupdr.resourceBackupConfigs.list

베어메탈 솔루션

다음 권한이 베어메탈 솔루션 관리자 역할 (roles/baremetalsolution.admin)에 추가됩니다.

baremetalsolution.procurements.create

베어메탈 솔루션

베어메탈 솔루션 편집자 역할 (roles/baremetalsolution.editor)에 다음 권한이 추가됩니다.

baremetalsolution.procurements.create

일괄

다음 권한이 배치 관리자 역할 (roles/batch.admin)에 추가됩니다.

batch.states.report

BigLake

BigLake 편집자 역할 (roles/biglake.editor)에 다음 권한이 추가됩니다.

biglake.databases.create
biglake.databases.delete
biglake.databases.get
biglake.databases.list
biglake.databases.update
biglake.locks.check
biglake.locks.create
biglake.locks.delete
biglake.locks.list
biglake.tables.lock

BigQuery Migration API

MigrationWorkflow 편집자 역할 (roles/bigquerymigration.editor)에 다음 권한이 추가됩니다.

bigquerymigration.translation.translate

Bigtable

Bigtable 뷰어 역할 (roles/bigtable.viewer)에 다음 권한이 추가됩니다.

bigtable.authorizedViews.getIamPolicy
bigtable.authorizedViews.listEffectiveTags
bigtable.authorizedViews.listTagBindings
bigtable.authorizedViews.readRows
bigtable.authorizedViews.sampleRowKeys
bigtable.backups.getIamPolicy
bigtable.backups.read
bigtable.instances.executeQuery
bigtable.instances.getIamPolicy
bigtable.instances.ping
bigtable.keyvisualizer.get
bigtable.keyvisualizer.list
bigtable.logicalViews.getIamPolicy
bigtable.logicalViews.readRows
bigtable.materializedViews.getIamPolicy
bigtable.materializedViews.readRows
bigtable.materializedViews.sampleRowKeys
bigtable.schemaBundles.getIamPolicy
bigtable.tables.getIamPolicy
bigtable.tables.readRows
bigtable.tables.sampleRowKeys

Cloud Billing

결제 계정 관리자 역할 (roles/billing.admin)에 다음 권한이 추가됩니다.

billing.costRecommendations.listScoped
billing.resourceCosts.get
billing.resourcebudgets.read
billing.resourcebudgets.write

Cloud Billing

결제 계정 뷰어 역할 (roles/billing.viewer)에 다음 권한이 추가됩니다.

billing.costRecommendations.listScoped
billing.resourceCosts.get
billing.resourcebudgets.read

인증서 관리자

인증서 관리자 편집자 역할 (roles/certificatemanager.editor)에 다음 권한이 추가됩니다.

certificatemanager.certissuanceconfigs.delete
certificatemanager.certmapentries.delete
certificatemanager.certmaps.delete
certificatemanager.certs.delete
certificatemanager.dnsauthorizations.delete
certificatemanager.operations.cancel
certificatemanager.operations.delete
certificatemanager.trustconfigs.delete

Google Security Operations

Chronicle API 관리자 역할 (roles/chronicle.admin)에 다음 권한이 추가됩니다.

chronicle.federationGroups.create
chronicle.federationGroups.delete
chronicle.federationGroups.get
chronicle.federationGroups.list
chronicle.federationGroups.update
chronicle.instances.delete
chronicle.instances.permitFederationAccess
chronicle.instances.soarThreatManager
chronicle.instances.soarVulnerabilityManager
chronicle.instances.undelete

Google Security Operations

Chronicle API 편집자 역할 (roles/chronicle.editor)에 다음 권한이 추가됩니다.

chronicle.calculatedFieldDefinitions.update
chronicle.collectors.create
chronicle.collectors.delete
chronicle.collectors.update
chronicle.connectors.delete
chronicle.connectors.get
chronicle.connectors.update
chronicle.customFields.update
chronicle.enrichmentControls.delete
chronicle.entitiesBlocklists.delete
chronicle.entitiesBlocklists.update
chronicle.errorNotificationConfigs.create
chronicle.errorNotificationConfigs.delete
chronicle.errorNotificationConfigs.update
chronicle.federationGroups.get
chronicle.federationGroups.list
chronicle.formDynamicParameters.update
chronicle.forwarders.create
chronicle.forwarders.delete
chronicle.forwarders.update
chronicle.instances.permitFederationAccess
chronicle.instances.verifyNonce
chronicle.integrationActions.delete
chronicle.integrations.delete
chronicle.jobs.delete
chronicle.legacyCaseFederationPlatforms.delete
chronicle.legacyCaseFederationPlatforms.get
chronicle.legacyCaseFederationPlatforms.update
chronicle.logProcessingPipelines.associateStreams
chronicle.logProcessingPipelines.create
chronicle.logProcessingPipelines.delete
chronicle.logProcessingPipelines.dissociateStreams
chronicle.logProcessingPipelines.update
chronicle.moduleSettingsProperties.get
chronicle.rules.delete
chronicle.shareConfigs.get
chronicle.shareConfigs.update
chronicle.systemNotifications.get
chronicle.systemNotifications.update
chronicle.tenants.create
chronicle.tenants.list
chronicle.tenants.update

Google Security Operations

Chronicle API 뷰어 역할 (roles/chronicle.viewer)에 다음 권한이 추가됩니다.

chronicle.caseWallRecords.get
chronicle.connectorInstanceLogs.get
chronicle.connectorInstances.get
chronicle.connectorRevisions.get
chronicle.connectors.get
chronicle.contentPacks.export
chronicle.customLists.get
chronicle.emailTemplates.get
chronicle.entitiesBlocklists.get
chronicle.federationGroups.get
chronicle.federationGroups.list
chronicle.instances.permitFederationAccess
chronicle.instances.verifyNonce
chronicle.integrationActionRevisions.get
chronicle.integrationInstances.get
chronicle.integrationLogicalOperatorRevisions.get
chronicle.integrationLogicalOperators.get
chronicle.integrations.get
chronicle.jobInstanceLogs.get
chronicle.jobInstances.get
chronicle.jobRevisions.get
chronicle.jobs.get
chronicle.legacyCaseFederationPlatforms.get
chronicle.legacyPlaybooks.get
chronicle.managerRevisions.get
chronicle.managers.get
chronicle.moduleSettingsProperties.get
chronicle.notificationSettings.get
chronicle.remoteAgents.get
chronicle.shareConfigs.get
chronicle.systemNotifications.get
chronicle.tasks.get
chronicle.tenants.list
chronicle.transformerDefinitions.get
chronicle.transformerDefinitions.list
chronicle.transformerRevisions.get
chronicle.uniqueEntities.get
chronicle.userLocalizations.get
chronicle.userNotifications.get
chronicle.workdeskContacts.get
chronicle.workdeskLinks.get
chronicle.workdeskNotes.get

Cloud 애셋 인벤토리

Cloud 애셋 뷰어 역할 (roles/cloudasset.viewer)에 다음 권한이 추가됩니다.

cloudasset.savedqueries.get
cloudasset.savedqueries.list

Cloud Run Functions

Cloud Functions 뷰어 역할 (roles/cloudfunctions.viewer)에 다음 권한이 추가됩니다.

cloudfunctions.functions.sourceCodeGet

Talent Solution

Cloud Talent Solution 관리자 역할 (roles/cloudjobdiscovery.admin)에 다음 권한이 추가됩니다.

cloudjobdiscovery.companies.create
cloudjobdiscovery.companies.delete
cloudjobdiscovery.companies.get
cloudjobdiscovery.companies.list
cloudjobdiscovery.companies.update
cloudjobdiscovery.events.create
cloudjobdiscovery.jobs.create
cloudjobdiscovery.jobs.delete
cloudjobdiscovery.jobs.get
cloudjobdiscovery.jobs.search
cloudjobdiscovery.jobs.update
cloudjobdiscovery.profiles.create
cloudjobdiscovery.profiles.delete
cloudjobdiscovery.profiles.get
cloudjobdiscovery.profiles.search
cloudjobdiscovery.profiles.update
cloudjobdiscovery.tenants.create
cloudjobdiscovery.tenants.delete
cloudjobdiscovery.tenants.get
cloudjobdiscovery.tenants.update

Cloud Key Management Service

Cloud KMS 관리자 역할 (roles/cloudkms.admin)에 다음 권한이 추가됩니다.

cloudkms.cryptoKeyVersions.manageRawAesCbcKeys
cloudkms.cryptoKeyVersions.manageRawAesCtrKeys
cloudkms.cryptoKeyVersions.manageRawPKCS1Keys
cloudkms.cryptoKeyVersions.useToDecapsulate
cloudkms.cryptoKeyVersions.useToDecrypt
cloudkms.cryptoKeyVersions.useToEncrypt
cloudkms.cryptoKeyVersions.useToSign
cloudkms.cryptoKeyVersions.useToVerify
cloudkms.cryptoKeyVersions.viewPublicKey
cloudkms.locations.generateRandomBytes
cloudkms.protectedResources.search
cloudkms.singleTenantHsmInstanceProposals.approve
cloudkms.singleTenantHsmInstanceProposals.create
cloudkms.singleTenantHsmInstanceProposals.execute

Cloud Key Management Service

Cloud KMS 뷰어 역할 (roles/cloudkms.viewer)에 다음 권한이 추가됩니다.

cloudkms.cryptoKeys.getIamPolicy
cloudkms.ekmConfigs.getIamPolicy
cloudkms.ekmConnections.getIamPolicy
cloudkms.ekmConnections.verifyConnectivity
cloudkms.importJobs.getIamPolicy
cloudkms.keyRings.getIamPolicy
cloudkms.keyRings.listEffectiveTags
cloudkms.keyRings.listTagBindings
cloudkms.locations.generateRandomBytes
cloudkms.projects.showEffectiveAutokeyConfig
cloudkms.projects.showEffectiveKajEnrollmentConfig
cloudkms.projects.showEffectiveKajPolicyConfig
cloudkms.protectedResources.search

Cloud SQL

Cloud SQL 편집자 역할 (roles/cloudsql.editor)에 다음 권한이 추가됩니다.

cloudsql.backupRuns.delete
cloudsql.databases.delete
cloudsql.instances.clone
cloudsql.instances.create
cloudsql.instances.createBackupDrBackup
cloudsql.instances.delete
cloudsql.instances.demoteMaster
cloudsql.instances.executeSql
cloudsql.instances.import
cloudsql.instances.login
cloudsql.instances.promoteReplica
cloudsql.instances.resetSslConfig
cloudsql.instances.restoreBackup
cloudsql.instances.startReplica
cloudsql.instances.stopReplica
cloudsql.instances.updateBackupDrConfig
cloudsql.sslCerts.create
cloudsql.sslCerts.delete
cloudsql.users.create
cloudsql.users.delete
cloudsql.users.update

Cloud SQL

Cloud SQL 뷰어 역할 (roles/cloudsql.viewer)에 다음 권한이 추가됩니다.

cloudsql.instances.createBackupDrBackup
cloudsql.schemas.view

Google Cloud 고객지원

지원 계정 관리자 역할 (roles/cloudsupport.admin)에 다음 권한이 추가됩니다.

cloudsupport.techCases.create
cloudsupport.techCases.escalate
cloudsupport.techCases.get
cloudsupport.techCases.list
cloudsupport.techCases.update

Google Cloud 고객지원

지원 계정 뷰어 역할 (roles/cloudsupport.viewer)에 다음 권한이 추가됩니다.

cloudsupport.accounts.getIamPolicy
cloudsupport.operations.get
cloudsupport.techCases.get
cloudsupport.techCases.list

번역

Cloud Translation API 뷰어 역할 (roles/cloudtranslate.viewer)에 다음 권한이 추가됩니다.

cloudtranslate.adaptiveMtDatasets.predict
cloudtranslate.customModels.predict
cloudtranslate.datasets.export
cloudtranslate.generalModels.batchDocPredict
cloudtranslate.generalModels.batchPredict
cloudtranslate.generalModels.docPredict
cloudtranslate.generalModels.predict
cloudtranslate.glossaries.batchDocPredict
cloudtranslate.glossaries.batchPredict
cloudtranslate.glossaries.docPredict
cloudtranslate.glossaries.predict
cloudtranslate.languageDetectionModels.predict

Compute Engine

Compute 뷰어 역할 (roles/compute.viewer)에 다음 권한이 추가됩니다.

compute.disks.createSnapshot
compute.disks.useReadOnly
compute.healthChecks.useReadOnly
compute.httpHealthChecks.useReadOnly
compute.httpsHealthChecks.useReadOnly
compute.images.useReadOnly
compute.instanceTemplates.useReadOnly
compute.instances.useReadOnly
compute.instantSnapshots.useReadOnly
compute.machineImages.useReadOnly
compute.regionHealthChecks.useReadOnly
compute.resourcePolicies.useReadOnly
compute.snapshots.useReadOnly

커넥터

커넥터 관리자 역할 (roles/connectors.admin)에 다음 권한이 추가됩니다.

connectors.connections.listenEvent

커넥터

커넥터 뷰어 역할 (roles/connectors.viewer)에 다음 권한이 추가됩니다.

connectors.actions.list
connectors.entities.get
connectors.entities.list
connectors.entityTypes.list

Google Cloud Contact Center as a Service

Contact Center AI Platform 관리자 역할 (roles/contactcenteraiplatform.admin)에 다음 권한이 추가됩니다.

contactcenteraiplatform.locations.generateShifts

Google Cloud Contact Center as a Service

Contact Center AI Platform 뷰어 역할 (roles/contactcenteraiplatform.viewer)에 다음 권한이 추가됩니다.

contactcenteraiplatform.contactCenters.queryQuota

고객 경험 인사이트

Contact Center AI Insights 편집자 역할 (roles/contactcenterinsights.editor)에 다음 권한이 추가됩니다.

contactcenterinsights.authorizedViews.getIamPolicy

고객 경험 인사이트

Contact Center AI Insights 뷰어 역할 (roles/contactcenterinsights.viewer)에 다음 권한이 추가됩니다.

contactcenterinsights.authorizedViews.getIamPolicy

Google Kubernetes Engine

다음 권한이 Kubernetes Engine 클러스터 뷰어 역할 (roles/container.clusterViewer)에 추가됩니다.

container.clusters.listEffectiveTags
container.clusters.listTagBindings
container.pods.getLogs
container.selfSubjectAccessReviews.create
container.selfSubjectRulesReviews.create
container.volumeSnapshots.getStatus

콘텐츠 웨어하우스

다음 권한이 콘텐츠 저장소 관리자 역할 (roles/contentwarehouse.admin)에 추가됩니다.

contentwarehouse.links.create
contentwarehouse.links.delete
contentwarehouse.links.get
contentwarehouse.links.update

데이터베이스 통계

데이터베이스 통계 뷰어 역할 (roles/databaseinsights.viewer)에 다음 권한이 추가됩니다.

databaseinsights.aggregatedEvents.query
databaseinsights.clusterEvents.query
databaseinsights.instanceEvents.query

Data Catalog

Data Catalog 뷰어 역할 (roles/datacatalog.viewer)에 다음 권한이 추가됩니다.

datacatalog.categories.getIamPolicy
datacatalog.taxonomies.getIamPolicy

Dataflow

Dataflow 관리자 역할 (roles/dataflow.admin)에 다음 권한이 추가됩니다.

dataflow.shuffle.read
dataflow.shuffle.write
dataflow.streamingWorkItems.ImportState
dataflow.streamingWorkItems.commitWork
dataflow.streamingWorkItems.getData
dataflow.streamingWorkItems.getWork
dataflow.streamingWorkItems.getWorkerMetadata
dataflow.workItems.lease
dataflow.workItems.sendMessage
dataflow.workItems.update

Dataform

Dataform 편집자 역할 (roles/dataform.editor)에 다음 권한이 추가됩니다.

dataform.commentThreads.create
dataform.commentThreads.delete
dataform.commentThreads.update
dataform.comments.create
dataform.comments.delete
dataform.comments.update
dataform.config.update
dataform.folders.addContents
dataform.folders.create
dataform.folders.delete
dataform.folders.move
dataform.folders.update
dataform.operations.cancel
dataform.operations.delete
dataform.releaseConfigs.create
dataform.releaseConfigs.delete
dataform.releaseConfigs.update
dataform.repositories.commit
dataform.repositories.create
dataform.repositories.delete
dataform.repositories.move
dataform.repositories.scheduleRelease
dataform.repositories.scheduleWorkflow
dataform.repositories.update
dataform.teamFolders.create
dataform.teamFolders.delete
dataform.teamFolders.update
dataform.workflowConfigs.create
dataform.workflowConfigs.delete
dataform.workflowConfigs.update

Data Lineage API

데이터 계보 편집자 역할 (roles/datalineage.editor)에 다음 권한이 추가됩니다.

datalineage.configs.get
datalineage.configs.update
datalineage.processes.delete
datalineage.runs.delete

Data Lineage API

데이터 계보 뷰어 역할 (roles/datalineage.viewer)에 다음 권한이 추가됩니다.

datalineage.configs.get
datalineage.operations.get

Dataplex Universal Catalog

Dataplex 관리자 역할 (roles/dataplex.admin)에 다음 권한이 추가됩니다.

dataplex.aspectTypes.create
dataplex.aspectTypes.delete
dataplex.aspectTypes.get
dataplex.aspectTypes.getIamPolicy
dataplex.aspectTypes.list
dataplex.aspectTypes.setIamPolicy
dataplex.aspectTypes.update
dataplex.aspectTypes.use
dataplex.assets.ownData
dataplex.assets.readData
dataplex.assets.writeData
dataplex.encryptionConfig.create
dataplex.encryptionConfig.delete
dataplex.encryptionConfig.get
dataplex.encryptionConfig.list
dataplex.encryptionConfig.update
dataplex.entries.create
dataplex.entries.delete
dataplex.entries.get
dataplex.entries.getData
dataplex.entries.list
dataplex.entries.update
dataplex.entryGroups.create
dataplex.entryGroups.delete
dataplex.entryGroups.get
dataplex.entryGroups.getIamPolicy
dataplex.entryGroups.list
dataplex.entryGroups.setIamPolicy
dataplex.entryGroups.update
dataplex.entryGroups.useContactsAspect
dataplex.entryGroups.useDataProfileAspect
dataplex.entryGroups.useDataQualityScorecardAspect
dataplex.entryGroups.useDescriptionsAspect
dataplex.entryGroups.useGenericAspect
dataplex.entryGroups.useGenericEntry
dataplex.entryGroups.useOverviewAspect
dataplex.entryGroups.useQueriesAspect
dataplex.entryGroups.useRefreshCadenceAspect
dataplex.entryGroups.useSchemaAspect
dataplex.entryGroups.useStorageAspect
dataplex.entryTypes.create
dataplex.entryTypes.delete
dataplex.entryTypes.get
dataplex.entryTypes.getIamPolicy
dataplex.entryTypes.list
dataplex.entryTypes.setIamPolicy
dataplex.entryTypes.update
dataplex.entryTypes.use
dataplex.projects.search

Dataplex Universal Catalog

Dataplex 편집자 역할 (roles/dataplex.editor)에 다음 권한이 추가됩니다.

dataplex.aspectTypes.create
dataplex.aspectTypes.delete
dataplex.aspectTypes.get
dataplex.aspectTypes.getIamPolicy
dataplex.aspectTypes.list
dataplex.aspectTypes.update
dataplex.aspectTypes.use
dataplex.assets.readData
dataplex.assets.writeData
dataplex.content.create
dataplex.content.update
dataplex.datascans.getData
dataplex.encryptionConfig.create
dataplex.encryptionConfig.delete
dataplex.encryptionConfig.get
dataplex.encryptionConfig.list
dataplex.encryptionConfig.update
dataplex.entities.create
dataplex.entities.delete
dataplex.entities.get
dataplex.entities.list
dataplex.entities.update
dataplex.entries.create
dataplex.entries.delete
dataplex.entries.get
dataplex.entries.getData
dataplex.entries.link
dataplex.entries.list
dataplex.entries.update
dataplex.entryGroups.create
dataplex.entryGroups.delete
dataplex.entryGroups.export
dataplex.entryGroups.get
dataplex.entryGroups.getIamPolicy
dataplex.entryGroups.import
dataplex.entryGroups.list
dataplex.entryGroups.update
dataplex.entryGroups.useContactsAspect
dataplex.entryGroups.useDataProfileAspect
dataplex.entryGroups.useDataQualityScorecardAspect
dataplex.entryGroups.useDefinitionEntryLink
dataplex.entryGroups.useDescriptionsAspect
dataplex.entryGroups.useGenericAspect
dataplex.entryGroups.useGenericEntry
dataplex.entryGroups.useOverviewAspect
dataplex.entryGroups.useQueriesAspect
dataplex.entryGroups.useRefreshCadenceAspect
dataplex.entryGroups.useRelatedEntryLink
dataplex.entryGroups.useSchemaAspect
dataplex.entryGroups.useStorageAspect
dataplex.entryGroups.useSynonymEntryLink
dataplex.entryLinks.create
dataplex.entryLinks.delete
dataplex.entryLinks.get
dataplex.entryLinks.reference
dataplex.entryTypes.create
dataplex.entryTypes.delete
dataplex.entryTypes.get
dataplex.entryTypes.getIamPolicy
dataplex.entryTypes.list
dataplex.entryTypes.update
dataplex.entryTypes.use
dataplex.environments.execute
dataplex.glossaries.create
dataplex.glossaries.delete
dataplex.glossaries.get
dataplex.glossaries.getIamPolicy
dataplex.glossaries.import
dataplex.glossaries.list
dataplex.glossaries.update
dataplex.glossaryCategories.create
dataplex.glossaryCategories.delete
dataplex.glossaryCategories.get
dataplex.glossaryCategories.list
dataplex.glossaryCategories.update
dataplex.glossaryTerms.create
dataplex.glossaryTerms.delete
dataplex.glossaryTerms.get
dataplex.glossaryTerms.list
dataplex.glossaryTerms.update
dataplex.glossaryTerms.use
dataplex.locations.get
dataplex.locations.list
dataplex.metadataJobs.cancel
dataplex.metadataJobs.create
dataplex.metadataJobs.get
dataplex.metadataJobs.list
dataplex.partitions.create
dataplex.partitions.delete
dataplex.partitions.get
dataplex.partitions.list
dataplex.partitions.update
dataplex.projects.search

Dataplex Universal Catalog

Dataplex 뷰어 역할 (roles/dataplex.viewer)에 다음 권한이 추가됩니다.

dataplex.aspectTypes.get
dataplex.aspectTypes.getIamPolicy
dataplex.aspectTypes.list
dataplex.assets.readData
dataplex.datascans.getData
dataplex.encryptionConfig.get
dataplex.encryptionConfig.list
dataplex.entities.get
dataplex.entities.list
dataplex.entries.get
dataplex.entries.getData
dataplex.entries.list
dataplex.entryGroups.export
dataplex.entryGroups.get
dataplex.entryGroups.getIamPolicy
dataplex.entryGroups.list
dataplex.entryLinks.get
dataplex.entryTypes.get
dataplex.entryTypes.getIamPolicy
dataplex.entryTypes.list
dataplex.glossaries.get
dataplex.glossaries.getIamPolicy
dataplex.glossaries.list
dataplex.glossaryCategories.get
dataplex.glossaryCategories.list
dataplex.glossaryTerms.get
dataplex.glossaryTerms.list
dataplex.locations.get
dataplex.locations.list
dataplex.metadataJobs.get
dataplex.metadataJobs.list
dataplex.partitions.get
dataplex.partitions.list
dataplex.projects.search

Dataproc

Dataproc 관리자 역할 (roles/dataproc.admin)에 다음 권한이 추가됩니다.

dataproc.agents.create
dataproc.agents.delete
dataproc.agents.get
dataproc.agents.list
dataproc.agents.update
dataproc.tasks.lease
dataproc.tasks.listInvalidatedLeases
dataproc.tasks.reportStatus

Dataproc

Dataproc 편집자 역할 (roles/dataproc.editor)에 다음 권한이 추가됩니다.

dataproc.agents.create
dataproc.agents.delete
dataproc.agents.get
dataproc.agents.list
dataproc.agents.update
dataproc.autoscalingPolicies.getIamPolicy
dataproc.clusters.getIamPolicy
dataproc.jobs.getIamPolicy
dataproc.operations.getIamPolicy
dataproc.tasks.lease
dataproc.tasks.listInvalidatedLeases
dataproc.tasks.reportStatus
dataproc.workflowTemplates.getIamPolicy

Dataproc

Dataproc 뷰어 역할 (roles/dataproc.viewer)에 다음 권한이 추가됩니다.

dataproc.agents.get
dataproc.agents.list
dataproc.autoscalingPolicies.getIamPolicy
dataproc.autoscalingPolicies.use
dataproc.clusters.getIamPolicy
dataproc.jobs.getIamPolicy
dataproc.operations.getIamPolicy
dataproc.tasks.listInvalidatedLeases
dataproc.workflowTemplates.getIamPolicy

Firestore

Cloud Datastore 뷰어 역할 (roles/datastore.viewer)에 다음 권한이 추가됩니다.

datastore.backupSchedules.get
datastore.backupSchedules.list
datastore.backups.get
datastore.backups.list
datastore.databases.listEffectiveTags
datastore.databases.listTagBindings
datastore.keyVisualizerScans.get
datastore.keyVisualizerScans.list
datastore.operations.get
datastore.operations.list
datastore.userCreds.get
datastore.userCreds.list

검색 엔진

탐색 엔진 관리자 역할 (roles/discoveryengine.admin)에 다음 권한이 추가됩니다.

discoveryengine.accounts.create
discoveryengine.audioOverviews.create
discoveryengine.audioOverviews.delete
discoveryengine.audioOverviews.get
discoveryengine.audioOverviews.getIceConfig
discoveryengine.audioOverviews.sendSdpOffer
discoveryengine.notebooks.create
discoveryengine.notebooks.generateGuide
discoveryengine.notebooks.get
discoveryengine.notebooks.getAnalytics
discoveryengine.notebooks.getIamPolicy
discoveryengine.notebooks.interactSources
discoveryengine.notebooks.list
discoveryengine.notebooks.removeSelf
discoveryengine.notebooks.setIamPolicy
discoveryengine.notebooks.update
discoveryengine.notes.create
discoveryengine.notes.delete
discoveryengine.notes.get
discoveryengine.notes.update
discoveryengine.podcasts.create
discoveryengine.sources.checkFreshness
discoveryengine.sources.create
discoveryengine.sources.delete
discoveryengine.sources.generateDocumentGuide
discoveryengine.sources.get
discoveryengine.sources.refresh
discoveryengine.sources.update

검색 엔진

검색 엔진 편집자 역할 (roles/discoveryengine.editor)에 다음 권한이 추가됩니다.

discoveryengine.accounts.create
discoveryengine.aclConfigs.update
discoveryengine.alertPolicies.create
discoveryengine.alertPolicies.update
discoveryengine.assistants.create
discoveryengine.assistants.delete
discoveryengine.assistants.update
discoveryengine.audioOverviews.create
discoveryengine.audioOverviews.delete
discoveryengine.audioOverviews.get
discoveryengine.audioOverviews.getIceConfig
discoveryengine.audioOverviews.sendSdpOffer
discoveryengine.cmekConfigs.update
discoveryengine.collections.delete
discoveryengine.completionConfigs.update
discoveryengine.controls.create
discoveryengine.controls.delete
discoveryengine.controls.update
discoveryengine.dataConnectors.startConnectorRun
discoveryengine.dataConnectors.update
discoveryengine.dataStores.create
discoveryengine.dataStores.delete
discoveryengine.dataStores.enrollSolutions
discoveryengine.dataStores.update
discoveryengine.documentProcessingConfigs.update
discoveryengine.documents.purge
discoveryengine.engines.create
discoveryengine.engines.delete
discoveryengine.engines.getIamPolicy
discoveryengine.engines.update
discoveryengine.evaluations.create
discoveryengine.licenseConfigs.create
discoveryengine.licenseConfigs.update
discoveryengine.locations.estimateDataSize
discoveryengine.locations.exchangeAuthCredentials
discoveryengine.locations.getConnectorSource
discoveryengine.locations.listConnectorSources
discoveryengine.locations.setUpDataConnector
discoveryengine.notebooks.create
discoveryengine.notebooks.generateGuide
discoveryengine.notebooks.get
discoveryengine.notebooks.getAnalytics
discoveryengine.notebooks.getIamPolicy
discoveryengine.notebooks.interactSources
discoveryengine.notebooks.list
discoveryengine.notebooks.removeSelf
discoveryengine.notebooks.update
discoveryengine.notes.create
discoveryengine.notes.delete
discoveryengine.notes.get
discoveryengine.notes.update
discoveryengine.podcasts.create
discoveryengine.projects.provision
discoveryengine.projects.reportConsentChange
discoveryengine.schemas.create
discoveryengine.schemas.delete
discoveryengine.schemas.update
discoveryengine.servingConfigs.create
discoveryengine.servingConfigs.delete
discoveryengine.servingConfigs.update
discoveryengine.siteSearchEngines.batchVerifyTargetSites
discoveryengine.siteSearchEngines.disableAdvancedSiteSearch
discoveryengine.siteSearchEngines.enableAdvancedSiteSearch
discoveryengine.siteSearchEngines.fetchDomainVerificationStatus
discoveryengine.siteSearchEngines.recrawlUris
discoveryengine.sitemaps.create
discoveryengine.sitemaps.delete
discoveryengine.sitemaps.fetch
discoveryengine.sources.checkFreshness
discoveryengine.sources.create
discoveryengine.sources.delete
discoveryengine.sources.generateDocumentGuide
discoveryengine.sources.get
discoveryengine.sources.refresh
discoveryengine.sources.update
discoveryengine.suggestionDenyListEntries.import
discoveryengine.suggestionDenyListEntries.purge
discoveryengine.targetSites.batchCreate
discoveryengine.targetSites.create
discoveryengine.targetSites.delete
discoveryengine.targetSites.update
discoveryengine.userEvents.purge
discoveryengine.userStores.batchUpdateUserLicenses
discoveryengine.userStores.listUserLicenses

검색 엔진

다음 권한이 Discovery Engine 뷰어 역할 (roles/discoveryengine.viewer)에 추가됩니다.

discoveryengine.audioOverviews.get
discoveryengine.audioOverviews.getIceConfig
discoveryengine.audioOverviews.sendSdpOffer
discoveryengine.engines.getIamPolicy
discoveryengine.licenseConfigs.get
discoveryengine.licenseConfigs.list
discoveryengine.locations.estimateDataSize
discoveryengine.locations.exchangeAuthCredentials
discoveryengine.locations.getConnectorSource
discoveryengine.locations.listConnectorSources
discoveryengine.notebooks.generateGuide
discoveryengine.notebooks.get
discoveryengine.notebooks.getAnalytics
discoveryengine.notebooks.getIamPolicy
discoveryengine.notebooks.interactSources
discoveryengine.notebooks.list
discoveryengine.notes.get
discoveryengine.sessions.search
discoveryengine.siteSearchEngines.fetchDomainVerificationStatus
discoveryengine.sitemaps.fetch
discoveryengine.sources.checkFreshness
discoveryengine.sources.generateDocumentGuide
discoveryengine.sources.get
discoveryengine.userStores.listUserLicenses

Cloud DNS

DNS 관리자 역할 (roles/dns.admin)에 다음 권한이 추가됩니다.

dns.managedZones.setIamPolicy

Firebase 보안 규칙

Firebase 규칙 뷰어 역할 (roles/firebaserules.viewer)에 다음 권한이 추가됩니다.

firebaserules.releases.getExecutable
firebaserules.rulesets.test

GKE 허브

다음 권한이 Fleet 관리자 (이전의 GKE 허브 관리자) 역할 (roles/gkehub.admin)에 추가됩니다.

gkehub.endpoints.connect
gkehub.gateway.delete
gkehub.gateway.generateCredentials
gkehub.gateway.get
gkehub.gateway.patch
gkehub.gateway.post
gkehub.gateway.put
gkehub.gateway.stream

GKE 허브

Fleet 편집자 (이전 명칭: GKE 허브 편집자) 역할 (roles/gkehub.editor)에 다음 권한이 추가됩니다.

gkehub.gateway.delete
gkehub.gateway.generateCredentials
gkehub.gateway.get
gkehub.gateway.patch
gkehub.gateway.post
gkehub.gateway.put
gkehub.gateway.stream

GKE 허브

Fleet 뷰어 (이전 명칭: GKE 허브 뷰어) 역할 (roles/gkehub.viewer)에 다음 권한이 추가됩니다.

gkehub.gateway.generateCredentials
gkehub.gateway.get
gkehub.scopes.getIamPolicy

IAP(Identity-Aware Proxy)

다음 권한이 IAP 정책 관리자 역할 (roles/iap.admin)에 추가됩니다.

iap.projects.getSettings
iap.projects.updateSettings
iap.tunnelDestGroups.accessViaIAP
iap.tunnelDestGroups.create
iap.tunnelDestGroups.delete
iap.tunnelDestGroups.get
iap.tunnelDestGroups.list
iap.tunnelDestGroups.remediate
iap.tunnelDestGroups.update
iap.tunnelInstances.accessViaIAP
iap.tunnelinstances.remediate
iap.web.getSettings
iap.web.updateSettings
iap.webServiceVersions.getSettings
iap.webServiceVersions.remediate
iap.webServiceVersions.updateSettings
iap.webServices.getSettings
iap.webServices.updateSettings
iap.webTypes.getSettings
iap.webTypes.updateSettings

Cloud License Manager

Cloud License Manager 뷰어 역할 (roles/licensemanager.viewer)에 다음 권한이 추가됩니다.

licensemanager.configurations.aggregateUsage
licensemanager.configurations.queryLicenseUsage

Cloud Logging

로그 뷰어 역할 (roles/logging.viewer)에 다음 권한이 추가됩니다.

logging.buckets.copyLogEntries
logging.buckets.listEffectiveTags
logging.buckets.listTagBindings
logging.logEntries.download
logging.notificationRules.get
logging.notificationRules.list
logging.settings.get
logging.views.getIamPolicy
logging.views.listLogs
logging.views.listResourceKeys
logging.views.listResourceValues

Microsoft Active Directory용 관리형 서비스

Google Cloud 관리형 ID 뷰어 역할 (roles/managedidentities.viewer)에 다음 권한이 추가됩니다.

managedidentities.domains.checkMigrationPermission
managedidentities.domains.validateTrust

Memorystore for Memcached

Cloud Memorystore Memcached 편집자 역할 (roles/memcache.editor)에 다음 권한이 추가됩니다.

memcache.instances.applySoftwareUpdate
memcache.instances.create
memcache.instances.delete
memcache.instances.rescheduleMaintenance
memcache.instances.upgrade

Memorystore for Memcached

Cloud Memorystore Memcached 뷰어 역할 (roles/memcache.viewer)에 다음 권한이 추가됩니다.

memcache.instances.listEffectiveTags
memcache.instances.listTagBindings

Dataproc Metastore

Dataproc Metastore 관리자 역할 (roles/metastore.admin)에 다음 권한이 추가됩니다.

metastore.databases.create
metastore.databases.delete
metastore.databases.get
metastore.databases.getIamPolicy
metastore.databases.list
metastore.databases.setIamPolicy
metastore.databases.update
metastore.services.mutateMetadata
metastore.services.queryMetadata
metastore.services.use
metastore.tables.create
metastore.tables.delete
metastore.tables.get
metastore.tables.getIamPolicy
metastore.tables.list
metastore.tables.setIamPolicy
metastore.tables.update

Dataproc Metastore

Dataproc Metastore 편집자 역할 (roles/metastore.editor)에 다음 권한이 추가됩니다.

metastore.backups.getIamPolicy
metastore.databases.create
metastore.databases.delete
metastore.databases.get
metastore.databases.getIamPolicy
metastore.databases.list
metastore.databases.update
metastore.federations.getIamPolicy
metastore.federations.use
metastore.services.use
metastore.tables.create
metastore.tables.delete
metastore.tables.get
metastore.tables.getIamPolicy
metastore.tables.list
metastore.tables.update

AI Platform

AI Platform 뷰어 역할 (roles/ml.viewer)에 다음 권한이 추가됩니다.

ml.jobs.getIamPolicy
ml.models.getIamPolicy
ml.models.predict
ml.versions.predict

Model Armor

Model Armor 관리자 역할 (roles/modelarmor.admin)에 다음 권한이 추가됩니다.

modelarmor.callouts.invoke
modelarmor.floorSettings.get
modelarmor.floorSettings.update

Model Armor

Model Armor 뷰어 역할 (roles/modelarmor.viewer)에 다음 권한이 추가됩니다.

modelarmor.floorSettings.get

Oracle Database@Google Cloud

Oracle Database@Google Cloud 뷰어 역할 (roles/oracledatabase.viewer)에 다음 권한이 추가됩니다.

oracledatabase.dbSystemInitialStorageSizes.list
oracledatabase.dbVersions.list
oracledatabase.systemVersions.list

Pub/Sub

Pub/Sub 편집자 역할 (roles/pubsub.editor)에 다음 권한이 추가됩니다.

pubsub.schemas.getIamPolicy

Pub/Sub

Pub/Sub 뷰어 역할 (roles/pubsub.viewer)에 다음 권한이 추가됩니다.

pubsub.schemas.attach
pubsub.schemas.getIamPolicy
pubsub.snapshots.seek

Pub/Sub 라이트

Pub/Sub Lite 뷰어 역할 (roles/pubsublite.viewer)에 다음 권한이 추가됩니다.

pubsublite.locations.openKafkaStream
pubsublite.subscriptions.subscribe
pubsublite.topics.computeHeadCursor
pubsublite.topics.computeMessageStats
pubsublite.topics.computeTimeCursor
pubsublite.topics.subscribe

reCAPTCHA

reCAPTCHA Enterprise 관리자 역할 (roles/recaptchaenterprise.admin)에 다음 권한이 추가됩니다.

recaptchaenterprise.assessments.annotate
recaptchaenterprise.assessments.create
recaptchaenterprise.relatedaccountgroupmemberships.list
recaptchaenterprise.relatedaccountgroups.list

reCAPTCHA

reCAPTCHA Enterprise 뷰어 역할 (roles/recaptchaenterprise.viewer)에 다음 권한이 추가됩니다.

recaptchaenterprise.relatedaccountgroupmemberships.list
recaptchaenterprise.relatedaccountgroups.list

추천자

추천자 뷰어 역할 (roles/recommender.viewer)에 다음 권한이 추가됩니다.

recommender.costRecommendations.listAll
recommender.costRecommendations.summarizeAll

Memorystore for Redis

Cloud Memorystore Redis 편집자 역할 (roles/redis.editor)에 다음 권한이 추가됩니다.

redis.backupCollections.create
redis.backupCollections.delete
redis.backups.create
redis.backups.delete
redis.backups.export
redis.clusters.connect
redis.clusters.create
redis.clusters.delete
redis.clusters.rescheduleMaintenance
redis.instances.create
redis.instances.delete
redis.instances.export
redis.instances.getAuthString
redis.instances.import
redis.instances.listEffectiveTags
redis.instances.listTagBindings
redis.instances.rescheduleMaintenance
redis.instances.updateAuth
redis.instances.upgrade

Memorystore for Redis

Cloud Memorystore Redis 뷰어 역할 (roles/redis.viewer)에 다음 권한이 추가됩니다.

redis.backups.export

Retail API

Retail 편집자 역할 (roles/retail.editor)에 다음 권한이 추가됩니다.

retail.attributesConfigs.batchRemoveCatalogAttributes
retail.attributesConfigs.removeCatalogAttribute
retail.products.purge
retail.products.setSponsorship
retail.userEvents.purge
retail.userEvents.rejoin

Retail API

Retail 뷰어 역할 (roles/retail.viewer)에 다음 권한이 추가됩니다.

retail.merchantControls.creatorGet
retail.merchantControls.creatorList
retail.models.pause
retail.models.resume
retail.models.tune

Route Optimization

경로 최적화 뷰어 역할 (roles/routeoptimization.viewer)에 다음 권한이 추가됩니다.

routeoptimization.locations.use

Security Center Management API

보안 센터 관리 뷰어 역할 (roles/securitycentermanagement.viewer)에 다음 권한이 추가됩니다.

securitycentermanagement.securityCommandCenter.checkEligibility

Security Posture API

보안 상황 뷰어 역할 (roles/securityposture.viewer)에 다음 권한이 추가됩니다.

securityposture.locations.get
securityposture.locations.list
securityposture.operations.list
securityposture.reports.get
securityposture.reports.list

Spanner

Cloud Spanner 뷰어 역할 (roles/spanner.viewer)에 다음 권한이 추가됩니다.

spanner.backupOperations.get
spanner.backupOperations.list
spanner.backupSchedules.get
spanner.backupSchedules.getIamPolicy
spanner.backupSchedules.list
spanner.backups.get
spanner.backups.getIamPolicy
spanner.backups.list
spanner.databaseOperations.get
spanner.databaseOperations.list
spanner.databaseRoles.list
spanner.databases.beginReadOnlyTransaction
spanner.databases.getDdl
spanner.databases.getIamPolicy
spanner.databases.partitionQuery
spanner.databases.partitionRead
spanner.databases.read
spanner.databases.select
spanner.databases.useDataBoost
spanner.instanceConfigOperations.get
spanner.instanceConfigOperations.list
spanner.instanceOperations.get
spanner.instanceOperations.list
spanner.instancePartitionOperations.get
spanner.instancePartitionOperations.list
spanner.instances.getIamPolicy
spanner.sessions.create
spanner.sessions.delete
spanner.sessions.get
spanner.sessions.list

Speaker ID

다음 권한이 Speaker ID 편집자 역할 (roles/speakerid.editor)에 추가됩니다.

speakerid.settings.get

Speaker ID

다음 권한이 화자 ID 뷰어 역할 (roles/speakerid.viewer)에 추가됩니다.

speakerid.settings.get

Speech-to-Text

Cloud Speech 편집자 역할 (roles/speech.editor)에 다음 권한이 추가됩니다.

speech.config.get

Cloud Storage

스토리지 관리자 역할 (roles/storage.admin)에 다음 권한이 추가됩니다.

storage.hmacKeys.create
storage.hmacKeys.delete
storage.hmacKeys.get
storage.hmacKeys.list
storage.hmacKeys.update

비전 검사 AI

Visual Inspection AI 솔루션 편집자 역할 (roles/visualinspection.editor)에 다음 권한이 추가됩니다.

visualinspection.locations.reportUsageMetrics

서버리스 VPC 액세스

서버리스 VPC 액세스 뷰어 역할 (roles/vpcaccess.viewer)에 다음 권한이 추가됩니다.

vpcaccess.connectors.use