2026 年 3 月 29 日當週即將進行的權限變更

為提供更標準化的控制功能,並讓您存取新舊功能,我們將為下表所列的預先定義角色新增權限。這些異動將於 2026 年 3 月 29 日生效。

服務 詳細資料
Vertex AI

以下權限將新增至 Vertex AI 檢視者角色 (roles/aiplatform.viewer):

aiplatform.endpoints.explain
aiplatform.endpoints.getIamPolicy
aiplatform.endpoints.predict
aiplatform.entityTypes.exportFeatureValues
aiplatform.entityTypes.getIamPolicy
aiplatform.entityTypes.readFeatureValues
aiplatform.entityTypes.streamingReadFeatureValues
aiplatform.featureGroups.getIamPolicy
aiplatform.featureOnlineStores.getIamPolicy
aiplatform.featureViews.getIamPolicy
aiplatform.featurestores.batchReadFeatureValues
aiplatform.featurestores.getIamPolicy
aiplatform.featurestores.readFeatures
aiplatform.humanInTheLoops.queryAnnotationStats
aiplatform.locations.evaluateInstances
aiplatform.memories.retrieve
aiplatform.migratableResources.search
aiplatform.notebookRuntimeTemplates.apply
aiplatform.notebookRuntimeTemplates.getIamPolicy

BigQuery sharing

下列權限將新增至 Analytics Hub 管理員角色 (roles/analyticshub.admin):

analyticshub.dataExchanges.subscribe
analyticshub.listings.subscribe

BigQuery sharing

以下權限將新增至 Analytics Hub 檢視者角色 (roles/analyticshub.viewer):

analyticshub.subscriptions.get
analyticshub.subscriptions.list

Apigee Connect

以下權限將新增至 Apigee Connect 管理員角色 (roles/apigeeconnect.Admin):

apigeeconnect.endpoints.connect

App Hub

下列權限將新增至 App Hub 編輯者角色 (roles/apphub.editor):

apphub.applications.getIamPolicy
apphub.serviceProjectAttachments.create
apphub.serviceProjectAttachments.delete
apphub.serviceProjectAttachments.get
apphub.serviceProjectAttachments.list

App Hub

以下權限將新增至 App Hub 檢視者角色 (roles/apphub.viewer):

apphub.applications.getIamPolicy
apphub.serviceProjectAttachments.get
apphub.serviceProjectAttachments.list

Artifact Registry

以下權限將新增至 Artifact Registry 管理員角色 (roles/artifactregistry.admin):

artifactregistry.repositories.createOnPush

備份和災難復原

以下權限將新增至備份和災難復原管理員角色 (roles/backupdr.admin):

backupdr.resourceBackupConfigs.get
backupdr.resourceBackupConfigs.list

備份和災難復原

以下權限將新增至備份和災難復原檢視者角色 (roles/backupdr.viewer):

backupdr.resourceBackupConfigs.get
backupdr.resourceBackupConfigs.list

Bare Metal 解決方案

以下權限將新增至 Bare Metal 解決方案管理員角色 (roles/baremetalsolution.admin):

baremetalsolution.procurements.create

Bare Metal 解決方案

以下權限將新增至 Bare Metal 解決方案編輯者角色 (roles/baremetalsolution.editor):

baremetalsolution.procurements.create

批次

以下權限將新增至 Batch 管理員角色 (roles/batch.admin):

batch.states.report

BigLake

以下權限將新增至 BigLake 編輯者角色 (roles/biglake.editor):

biglake.databases.create
biglake.databases.delete
biglake.databases.get
biglake.databases.list
biglake.databases.update
biglake.locks.check
biglake.locks.create
biglake.locks.delete
biglake.locks.list
biglake.tables.lock

BigQuery Migration API

以下權限將新增至 MigrationWorkflow 編輯者角色 (roles/bigquerymigration.editor):

bigquerymigration.translation.translate

Bigtable

以下權限將新增至 Bigtable 檢視者角色 (roles/bigtable.viewer):

bigtable.authorizedViews.getIamPolicy
bigtable.authorizedViews.listEffectiveTags
bigtable.authorizedViews.listTagBindings
bigtable.authorizedViews.readRows
bigtable.authorizedViews.sampleRowKeys
bigtable.backups.getIamPolicy
bigtable.backups.read
bigtable.instances.executeQuery
bigtable.instances.getIamPolicy
bigtable.instances.ping
bigtable.keyvisualizer.get
bigtable.keyvisualizer.list
bigtable.logicalViews.getIamPolicy
bigtable.logicalViews.readRows
bigtable.materializedViews.getIamPolicy
bigtable.materializedViews.readRows
bigtable.materializedViews.sampleRowKeys
bigtable.schemaBundles.getIamPolicy
bigtable.tables.getIamPolicy
bigtable.tables.readRows
bigtable.tables.sampleRowKeys

Cloud Billing

以下權限將新增至帳單帳戶管理員角色 (roles/billing.admin):

billing.costRecommendations.listScoped
billing.resourceCosts.get
billing.resourcebudgets.read
billing.resourcebudgets.write

Cloud Billing

下列權限將新增至帳單帳戶檢視者角色 (roles/billing.viewer):

billing.costRecommendations.listScoped
billing.resourceCosts.get
billing.resourcebudgets.read

Certificate Manager

以下權限將新增至 Certificate Manager 編輯者角色 (roles/certificatemanager.editor):

certificatemanager.certissuanceconfigs.delete
certificatemanager.certmapentries.delete
certificatemanager.certmaps.delete
certificatemanager.certs.delete
certificatemanager.dnsauthorizations.delete
certificatemanager.operations.cancel
certificatemanager.operations.delete
certificatemanager.trustconfigs.delete

Google Security Operations

下列權限將新增至 Chronicle API 管理員角色 (roles/chronicle.admin):

chronicle.federationGroups.create
chronicle.federationGroups.delete
chronicle.federationGroups.get
chronicle.federationGroups.list
chronicle.federationGroups.update
chronicle.instances.delete
chronicle.instances.permitFederationAccess
chronicle.instances.soarThreatManager
chronicle.instances.soarVulnerabilityManager
chronicle.instances.undelete

Google Security Operations

下列權限將新增至 Chronicle API 編輯者角色 (roles/chronicle.editor):

chronicle.calculatedFieldDefinitions.update
chronicle.collectors.create
chronicle.collectors.delete
chronicle.collectors.update
chronicle.connectors.delete
chronicle.connectors.get
chronicle.connectors.update
chronicle.customFields.update
chronicle.enrichmentControls.delete
chronicle.entitiesBlocklists.delete
chronicle.entitiesBlocklists.update
chronicle.errorNotificationConfigs.create
chronicle.errorNotificationConfigs.delete
chronicle.errorNotificationConfigs.update
chronicle.federationGroups.get
chronicle.federationGroups.list
chronicle.formDynamicParameters.update
chronicle.forwarders.create
chronicle.forwarders.delete
chronicle.forwarders.update
chronicle.instances.permitFederationAccess
chronicle.instances.verifyNonce
chronicle.integrationActions.delete
chronicle.integrations.delete
chronicle.jobs.delete
chronicle.legacyCaseFederationPlatforms.delete
chronicle.legacyCaseFederationPlatforms.get
chronicle.legacyCaseFederationPlatforms.update
chronicle.logProcessingPipelines.associateStreams
chronicle.logProcessingPipelines.create
chronicle.logProcessingPipelines.delete
chronicle.logProcessingPipelines.dissociateStreams
chronicle.logProcessingPipelines.update
chronicle.moduleSettingsProperties.get
chronicle.rules.delete
chronicle.shareConfigs.get
chronicle.shareConfigs.update
chronicle.systemNotifications.get
chronicle.systemNotifications.update
chronicle.tenants.create
chronicle.tenants.list
chronicle.tenants.update

Google Security Operations

下列權限將新增至 Chronicle API 檢視者角色 (roles/chronicle.viewer):

chronicle.caseWallRecords.get
chronicle.connectorInstanceLogs.get
chronicle.connectorInstances.get
chronicle.connectorRevisions.get
chronicle.connectors.get
chronicle.contentPacks.export
chronicle.customLists.get
chronicle.emailTemplates.get
chronicle.entitiesBlocklists.get
chronicle.federationGroups.get
chronicle.federationGroups.list
chronicle.instances.permitFederationAccess
chronicle.instances.verifyNonce
chronicle.integrationActionRevisions.get
chronicle.integrationInstances.get
chronicle.integrationLogicalOperatorRevisions.get
chronicle.integrationLogicalOperators.get
chronicle.integrations.get
chronicle.jobInstanceLogs.get
chronicle.jobInstances.get
chronicle.jobRevisions.get
chronicle.jobs.get
chronicle.legacyCaseFederationPlatforms.get
chronicle.legacyPlaybooks.get
chronicle.managerRevisions.get
chronicle.managers.get
chronicle.moduleSettingsProperties.get
chronicle.notificationSettings.get
chronicle.remoteAgents.get
chronicle.shareConfigs.get
chronicle.systemNotifications.get
chronicle.tasks.get
chronicle.tenants.list
chronicle.transformerDefinitions.get
chronicle.transformerDefinitions.list
chronicle.transformerRevisions.get
chronicle.uniqueEntities.get
chronicle.userLocalizations.get
chronicle.userNotifications.get
chronicle.workdeskContacts.get
chronicle.workdeskLinks.get
chronicle.workdeskNotes.get

Cloud Asset Inventory

以下權限將新增至 Cloud Asset 檢視者角色 (roles/cloudasset.viewer):

cloudasset.savedqueries.get
cloudasset.savedqueries.list

Cloud Run 函式

以下權限將新增至 Cloud Functions 檢視者角色 (roles/cloudfunctions.viewer):

cloudfunctions.functions.sourceCodeGet

Talent Solution

下列權限將新增至 Cloud Talent Solution 管理員角色 (roles/cloudjobdiscovery.admin):

cloudjobdiscovery.companies.create
cloudjobdiscovery.companies.delete
cloudjobdiscovery.companies.get
cloudjobdiscovery.companies.list
cloudjobdiscovery.companies.update
cloudjobdiscovery.events.create
cloudjobdiscovery.jobs.create
cloudjobdiscovery.jobs.delete
cloudjobdiscovery.jobs.get
cloudjobdiscovery.jobs.search
cloudjobdiscovery.jobs.update
cloudjobdiscovery.profiles.create
cloudjobdiscovery.profiles.delete
cloudjobdiscovery.profiles.get
cloudjobdiscovery.profiles.search
cloudjobdiscovery.profiles.update
cloudjobdiscovery.tenants.create
cloudjobdiscovery.tenants.delete
cloudjobdiscovery.tenants.get
cloudjobdiscovery.tenants.update

Cloud Key Management Service

下列權限將新增至 Cloud KMS 管理員角色 (roles/cloudkms.admin):

cloudkms.cryptoKeyVersions.manageRawAesCbcKeys
cloudkms.cryptoKeyVersions.manageRawAesCtrKeys
cloudkms.cryptoKeyVersions.manageRawPKCS1Keys
cloudkms.cryptoKeyVersions.useToDecapsulate
cloudkms.cryptoKeyVersions.useToDecrypt
cloudkms.cryptoKeyVersions.useToEncrypt
cloudkms.cryptoKeyVersions.useToSign
cloudkms.cryptoKeyVersions.useToVerify
cloudkms.cryptoKeyVersions.viewPublicKey
cloudkms.locations.generateRandomBytes
cloudkms.protectedResources.search
cloudkms.singleTenantHsmInstanceProposals.approve
cloudkms.singleTenantHsmInstanceProposals.create
cloudkms.singleTenantHsmInstanceProposals.execute

Cloud Key Management Service

以下權限將新增至 Cloud KMS 檢視者角色 (roles/cloudkms.viewer):

cloudkms.cryptoKeys.getIamPolicy
cloudkms.ekmConfigs.getIamPolicy
cloudkms.ekmConnections.getIamPolicy
cloudkms.ekmConnections.verifyConnectivity
cloudkms.importJobs.getIamPolicy
cloudkms.keyRings.getIamPolicy
cloudkms.keyRings.listEffectiveTags
cloudkms.keyRings.listTagBindings
cloudkms.locations.generateRandomBytes
cloudkms.projects.showEffectiveAutokeyConfig
cloudkms.projects.showEffectiveKajEnrollmentConfig
cloudkms.projects.showEffectiveKajPolicyConfig
cloudkms.protectedResources.search

Cloud SQL

下列權限將新增至 Cloud SQL 編輯者角色 (roles/cloudsql.editor):

cloudsql.backupRuns.delete
cloudsql.databases.delete
cloudsql.instances.clone
cloudsql.instances.create
cloudsql.instances.createBackupDrBackup
cloudsql.instances.delete
cloudsql.instances.demoteMaster
cloudsql.instances.executeSql
cloudsql.instances.import
cloudsql.instances.login
cloudsql.instances.promoteReplica
cloudsql.instances.resetSslConfig
cloudsql.instances.restoreBackup
cloudsql.instances.startReplica
cloudsql.instances.stopReplica
cloudsql.instances.updateBackupDrConfig
cloudsql.sslCerts.create
cloudsql.sslCerts.delete
cloudsql.users.create
cloudsql.users.delete
cloudsql.users.update

Cloud SQL

以下權限將新增至 Cloud SQL 檢視者角色 (roles/cloudsql.viewer):

cloudsql.instances.createBackupDrBackup
cloudsql.schemas.view

Google Cloud 支援

下列權限將新增至支援帳戶管理員角色 (roles/cloudsupport.admin):

cloudsupport.techCases.create
cloudsupport.techCases.escalate
cloudsupport.techCases.get
cloudsupport.techCases.list
cloudsupport.techCases.update

Google Cloud 支援

下列權限將新增至支援帳戶檢視者角色 (roles/cloudsupport.viewer):

cloudsupport.accounts.getIamPolicy
cloudsupport.operations.get
cloudsupport.techCases.get
cloudsupport.techCases.list

翻譯

以下權限將新增至 Cloud Translation API 檢視者角色 (roles/cloudtranslate.viewer):

cloudtranslate.adaptiveMtDatasets.predict
cloudtranslate.customModels.predict
cloudtranslate.datasets.export
cloudtranslate.generalModels.batchDocPredict
cloudtranslate.generalModels.batchPredict
cloudtranslate.generalModels.docPredict
cloudtranslate.generalModels.predict
cloudtranslate.glossaries.batchDocPredict
cloudtranslate.glossaries.batchPredict
cloudtranslate.glossaries.docPredict
cloudtranslate.glossaries.predict
cloudtranslate.languageDetectionModels.predict

Compute Engine

以下權限將新增至 Compute 檢視者角色 (roles/compute.viewer):

compute.disks.createSnapshot
compute.disks.useReadOnly
compute.healthChecks.useReadOnly
compute.httpHealthChecks.useReadOnly
compute.httpsHealthChecks.useReadOnly
compute.images.useReadOnly
compute.instanceTemplates.useReadOnly
compute.instances.useReadOnly
compute.instantSnapshots.useReadOnly
compute.machineImages.useReadOnly
compute.regionHealthChecks.useReadOnly
compute.resourcePolicies.useReadOnly
compute.snapshots.useReadOnly

連接器

下列權限將新增至連結器管理員角色 (roles/connectors.admin):

connectors.connections.listenEvent

連接器

下列權限將新增至連結器檢視者角色 (roles/connectors.viewer):

connectors.actions.list
connectors.entities.get
connectors.entities.list
connectors.entityTypes.list

Google Cloud Contact Center as a Service

下列權限將新增至 Contact Center AI 平台管理員角色 (roles/contactcenteraiplatform.admin):

contactcenteraiplatform.locations.generateShifts

Google Cloud Contact Center as a Service

下列權限將新增至 Contact Center AI 平台檢視者角色 (roles/contactcenteraiplatform.viewer):

contactcenteraiplatform.contactCenters.queryQuota

Customer Experience Insights

下列權限將新增至 Contact Center AI Insights 編輯者角色 (roles/contactcenterinsights.editor):

contactcenterinsights.authorizedViews.getIamPolicy

Customer Experience Insights

下列權限將新增至 Contact Center AI Insights 檢視者角色 (roles/contactcenterinsights.viewer):

contactcenterinsights.authorizedViews.getIamPolicy

Google Kubernetes Engine

系統會將下列權限新增至 Kubernetes Engine 叢集檢視者角色 (roles/container.clusterViewer):

container.clusters.listEffectiveTags
container.clusters.listTagBindings
container.pods.getLogs
container.selfSubjectAccessReviews.create
container.selfSubjectRulesReviews.create
container.volumeSnapshots.getStatus

內容倉儲

以下權限將新增至內容倉儲管理員角色 (roles/contentwarehouse.admin):

contentwarehouse.links.create
contentwarehouse.links.delete
contentwarehouse.links.get
contentwarehouse.links.update

資料庫深入分析

下列權限將新增至資料庫洞察檢視者角色 (roles/databaseinsights.viewer):

databaseinsights.aggregatedEvents.query
databaseinsights.clusterEvents.query
databaseinsights.instanceEvents.query

Data Catalog

以下權限將新增至 Data Catalog 檢視者角色 (roles/datacatalog.viewer):

datacatalog.categories.getIamPolicy
datacatalog.taxonomies.getIamPolicy

Dataflow

以下權限將新增至 Dataflow 管理員角色 (roles/dataflow.admin):

dataflow.shuffle.read
dataflow.shuffle.write
dataflow.streamingWorkItems.ImportState
dataflow.streamingWorkItems.commitWork
dataflow.streamingWorkItems.getData
dataflow.streamingWorkItems.getWork
dataflow.streamingWorkItems.getWorkerMetadata
dataflow.workItems.lease
dataflow.workItems.sendMessage
dataflow.workItems.update

Dataform

以下權限將新增至 Dataform 編輯者角色 (roles/dataform.editor):

dataform.commentThreads.create
dataform.commentThreads.delete
dataform.commentThreads.update
dataform.comments.create
dataform.comments.delete
dataform.comments.update
dataform.config.update
dataform.folders.addContents
dataform.folders.create
dataform.folders.delete
dataform.folders.move
dataform.folders.update
dataform.operations.cancel
dataform.operations.delete
dataform.releaseConfigs.create
dataform.releaseConfigs.delete
dataform.releaseConfigs.update
dataform.repositories.commit
dataform.repositories.create
dataform.repositories.delete
dataform.repositories.move
dataform.repositories.scheduleRelease
dataform.repositories.scheduleWorkflow
dataform.repositories.update
dataform.teamFolders.create
dataform.teamFolders.delete
dataform.teamFolders.update
dataform.workflowConfigs.create
dataform.workflowConfigs.delete
dataform.workflowConfigs.update

Data Lineage API

以下權限將新增至資料沿革編輯者角色 (roles/datalineage.editor):

datalineage.configs.get
datalineage.configs.update
datalineage.processes.delete
datalineage.runs.delete

Data Lineage API

以下權限將新增至資料沿革檢視者角色 (roles/datalineage.viewer):

datalineage.configs.get
datalineage.operations.get

Dataplex Universal Catalog

下列權限將新增至 Dataplex 管理員角色 (roles/dataplex.admin):

dataplex.aspectTypes.create
dataplex.aspectTypes.delete
dataplex.aspectTypes.get
dataplex.aspectTypes.getIamPolicy
dataplex.aspectTypes.list
dataplex.aspectTypes.setIamPolicy
dataplex.aspectTypes.update
dataplex.aspectTypes.use
dataplex.assets.ownData
dataplex.assets.readData
dataplex.assets.writeData
dataplex.encryptionConfig.create
dataplex.encryptionConfig.delete
dataplex.encryptionConfig.get
dataplex.encryptionConfig.list
dataplex.encryptionConfig.update
dataplex.entries.create
dataplex.entries.delete
dataplex.entries.get
dataplex.entries.getData
dataplex.entries.list
dataplex.entries.update
dataplex.entryGroups.create
dataplex.entryGroups.delete
dataplex.entryGroups.get
dataplex.entryGroups.getIamPolicy
dataplex.entryGroups.list
dataplex.entryGroups.setIamPolicy
dataplex.entryGroups.update
dataplex.entryGroups.useContactsAspect
dataplex.entryGroups.useDataProfileAspect
dataplex.entryGroups.useDataQualityScorecardAspect
dataplex.entryGroups.useDescriptionsAspect
dataplex.entryGroups.useGenericAspect
dataplex.entryGroups.useGenericEntry
dataplex.entryGroups.useOverviewAspect
dataplex.entryGroups.useQueriesAspect
dataplex.entryGroups.useRefreshCadenceAspect
dataplex.entryGroups.useSchemaAspect
dataplex.entryGroups.useStorageAspect
dataplex.entryTypes.create
dataplex.entryTypes.delete
dataplex.entryTypes.get
dataplex.entryTypes.getIamPolicy
dataplex.entryTypes.list
dataplex.entryTypes.setIamPolicy
dataplex.entryTypes.update
dataplex.entryTypes.use
dataplex.projects.search

Dataplex Universal Catalog

以下權限將新增至 Dataplex 編輯者角色 (roles/dataplex.editor):

dataplex.aspectTypes.create
dataplex.aspectTypes.delete
dataplex.aspectTypes.get
dataplex.aspectTypes.getIamPolicy
dataplex.aspectTypes.list
dataplex.aspectTypes.update
dataplex.aspectTypes.use
dataplex.assets.readData
dataplex.assets.writeData
dataplex.content.create
dataplex.content.update
dataplex.datascans.getData
dataplex.encryptionConfig.create
dataplex.encryptionConfig.delete
dataplex.encryptionConfig.get
dataplex.encryptionConfig.list
dataplex.encryptionConfig.update
dataplex.entities.create
dataplex.entities.delete
dataplex.entities.get
dataplex.entities.list
dataplex.entities.update
dataplex.entries.create
dataplex.entries.delete
dataplex.entries.get
dataplex.entries.getData
dataplex.entries.link
dataplex.entries.list
dataplex.entries.update
dataplex.entryGroups.create
dataplex.entryGroups.delete
dataplex.entryGroups.export
dataplex.entryGroups.get
dataplex.entryGroups.getIamPolicy
dataplex.entryGroups.import
dataplex.entryGroups.list
dataplex.entryGroups.update
dataplex.entryGroups.useContactsAspect
dataplex.entryGroups.useDataProfileAspect
dataplex.entryGroups.useDataQualityScorecardAspect
dataplex.entryGroups.useDefinitionEntryLink
dataplex.entryGroups.useDescriptionsAspect
dataplex.entryGroups.useGenericAspect
dataplex.entryGroups.useGenericEntry
dataplex.entryGroups.useOverviewAspect
dataplex.entryGroups.useQueriesAspect
dataplex.entryGroups.useRefreshCadenceAspect
dataplex.entryGroups.useRelatedEntryLink
dataplex.entryGroups.useSchemaAspect
dataplex.entryGroups.useStorageAspect
dataplex.entryGroups.useSynonymEntryLink
dataplex.entryLinks.create
dataplex.entryLinks.delete
dataplex.entryLinks.get
dataplex.entryLinks.reference
dataplex.entryTypes.create
dataplex.entryTypes.delete
dataplex.entryTypes.get
dataplex.entryTypes.getIamPolicy
dataplex.entryTypes.list
dataplex.entryTypes.update
dataplex.entryTypes.use
dataplex.environments.execute
dataplex.glossaries.create
dataplex.glossaries.delete
dataplex.glossaries.get
dataplex.glossaries.getIamPolicy
dataplex.glossaries.import
dataplex.glossaries.list
dataplex.glossaries.update
dataplex.glossaryCategories.create
dataplex.glossaryCategories.delete
dataplex.glossaryCategories.get
dataplex.glossaryCategories.list
dataplex.glossaryCategories.update
dataplex.glossaryTerms.create
dataplex.glossaryTerms.delete
dataplex.glossaryTerms.get
dataplex.glossaryTerms.list
dataplex.glossaryTerms.update
dataplex.glossaryTerms.use
dataplex.locations.get
dataplex.locations.list
dataplex.metadataJobs.cancel
dataplex.metadataJobs.create
dataplex.metadataJobs.get
dataplex.metadataJobs.list
dataplex.partitions.create
dataplex.partitions.delete
dataplex.partitions.get
dataplex.partitions.list
dataplex.partitions.update
dataplex.projects.search

Dataplex Universal Catalog

以下權限將新增至 Dataplex 檢視者角色 (roles/dataplex.viewer):

dataplex.aspectTypes.get
dataplex.aspectTypes.getIamPolicy
dataplex.aspectTypes.list
dataplex.assets.readData
dataplex.datascans.getData
dataplex.encryptionConfig.get
dataplex.encryptionConfig.list
dataplex.entities.get
dataplex.entities.list
dataplex.entries.get
dataplex.entries.getData
dataplex.entries.list
dataplex.entryGroups.export
dataplex.entryGroups.get
dataplex.entryGroups.getIamPolicy
dataplex.entryGroups.list
dataplex.entryLinks.get
dataplex.entryTypes.get
dataplex.entryTypes.getIamPolicy
dataplex.entryTypes.list
dataplex.glossaries.get
dataplex.glossaries.getIamPolicy
dataplex.glossaries.list
dataplex.glossaryCategories.get
dataplex.glossaryCategories.list
dataplex.glossaryTerms.get
dataplex.glossaryTerms.list
dataplex.locations.get
dataplex.locations.list
dataplex.metadataJobs.get
dataplex.metadataJobs.list
dataplex.partitions.get
dataplex.partitions.list
dataplex.projects.search

Dataproc

以下權限將新增至 Dataproc 管理員角色 (roles/dataproc.admin):

dataproc.agents.create
dataproc.agents.delete
dataproc.agents.get
dataproc.agents.list
dataproc.agents.update
dataproc.tasks.lease
dataproc.tasks.listInvalidatedLeases
dataproc.tasks.reportStatus

Dataproc

以下權限將新增至 Dataproc 編輯者角色 (roles/dataproc.editor):

dataproc.agents.create
dataproc.agents.delete
dataproc.agents.get
dataproc.agents.list
dataproc.agents.update
dataproc.autoscalingPolicies.getIamPolicy
dataproc.clusters.getIamPolicy
dataproc.jobs.getIamPolicy
dataproc.operations.getIamPolicy
dataproc.tasks.lease
dataproc.tasks.listInvalidatedLeases
dataproc.tasks.reportStatus
dataproc.workflowTemplates.getIamPolicy

Dataproc

以下權限將新增至 Dataproc 檢視者角色 (roles/dataproc.viewer):

dataproc.agents.get
dataproc.agents.list
dataproc.autoscalingPolicies.getIamPolicy
dataproc.autoscalingPolicies.use
dataproc.clusters.getIamPolicy
dataproc.jobs.getIamPolicy
dataproc.operations.getIamPolicy
dataproc.tasks.listInvalidatedLeases
dataproc.workflowTemplates.getIamPolicy

Firestore

以下權限將新增至 Cloud Datastore 檢視者角色 (roles/datastore.viewer):

datastore.backupSchedules.get
datastore.backupSchedules.list
datastore.backups.get
datastore.backups.list
datastore.databases.listEffectiveTags
datastore.databases.listTagBindings
datastore.keyVisualizerScans.get
datastore.keyVisualizerScans.list
datastore.operations.get
datastore.operations.list
datastore.userCreds.get
datastore.userCreds.list

Discovery Engine

以下權限將新增至 Discovery Engine 管理員角色 (roles/discoveryengine.admin):

discoveryengine.accounts.create
discoveryengine.audioOverviews.create
discoveryengine.audioOverviews.delete
discoveryengine.audioOverviews.get
discoveryengine.audioOverviews.getIceConfig
discoveryengine.audioOverviews.sendSdpOffer
discoveryengine.notebooks.create
discoveryengine.notebooks.generateGuide
discoveryengine.notebooks.get
discoveryengine.notebooks.getAnalytics
discoveryengine.notebooks.getIamPolicy
discoveryengine.notebooks.interactSources
discoveryengine.notebooks.list
discoveryengine.notebooks.removeSelf
discoveryengine.notebooks.setIamPolicy
discoveryengine.notebooks.update
discoveryengine.notes.create
discoveryengine.notes.delete
discoveryengine.notes.get
discoveryengine.notes.update
discoveryengine.podcasts.create
discoveryengine.sources.checkFreshness
discoveryengine.sources.create
discoveryengine.sources.delete
discoveryengine.sources.generateDocumentGuide
discoveryengine.sources.get
discoveryengine.sources.refresh
discoveryengine.sources.update

Discovery Engine

以下權限將新增至 Discovery Engine 編輯者角色 (roles/discoveryengine.editor):

discoveryengine.accounts.create
discoveryengine.aclConfigs.update
discoveryengine.alertPolicies.create
discoveryengine.alertPolicies.update
discoveryengine.assistants.create
discoveryengine.assistants.delete
discoveryengine.assistants.update
discoveryengine.audioOverviews.create
discoveryengine.audioOverviews.delete
discoveryengine.audioOverviews.get
discoveryengine.audioOverviews.getIceConfig
discoveryengine.audioOverviews.sendSdpOffer
discoveryengine.cmekConfigs.update
discoveryengine.collections.delete
discoveryengine.completionConfigs.update
discoveryengine.controls.create
discoveryengine.controls.delete
discoveryengine.controls.update
discoveryengine.dataConnectors.startConnectorRun
discoveryengine.dataConnectors.update
discoveryengine.dataStores.create
discoveryengine.dataStores.delete
discoveryengine.dataStores.enrollSolutions
discoveryengine.dataStores.update
discoveryengine.documentProcessingConfigs.update
discoveryengine.documents.purge
discoveryengine.engines.create
discoveryengine.engines.delete
discoveryengine.engines.getIamPolicy
discoveryengine.engines.update
discoveryengine.evaluations.create
discoveryengine.licenseConfigs.create
discoveryengine.licenseConfigs.update
discoveryengine.locations.estimateDataSize
discoveryengine.locations.exchangeAuthCredentials
discoveryengine.locations.getConnectorSource
discoveryengine.locations.listConnectorSources
discoveryengine.locations.setUpDataConnector
discoveryengine.notebooks.create
discoveryengine.notebooks.generateGuide
discoveryengine.notebooks.get
discoveryengine.notebooks.getAnalytics
discoveryengine.notebooks.getIamPolicy
discoveryengine.notebooks.interactSources
discoveryengine.notebooks.list
discoveryengine.notebooks.removeSelf
discoveryengine.notebooks.update
discoveryengine.notes.create
discoveryengine.notes.delete
discoveryengine.notes.get
discoveryengine.notes.update
discoveryengine.podcasts.create
discoveryengine.projects.provision
discoveryengine.projects.reportConsentChange
discoveryengine.schemas.create
discoveryengine.schemas.delete
discoveryengine.schemas.update
discoveryengine.servingConfigs.create
discoveryengine.servingConfigs.delete
discoveryengine.servingConfigs.update
discoveryengine.siteSearchEngines.batchVerifyTargetSites
discoveryengine.siteSearchEngines.disableAdvancedSiteSearch
discoveryengine.siteSearchEngines.enableAdvancedSiteSearch
discoveryengine.siteSearchEngines.fetchDomainVerificationStatus
discoveryengine.siteSearchEngines.recrawlUris
discoveryengine.sitemaps.create
discoveryengine.sitemaps.delete
discoveryengine.sitemaps.fetch
discoveryengine.sources.checkFreshness
discoveryengine.sources.create
discoveryengine.sources.delete
discoveryengine.sources.generateDocumentGuide
discoveryengine.sources.get
discoveryengine.sources.refresh
discoveryengine.sources.update
discoveryengine.suggestionDenyListEntries.import
discoveryengine.suggestionDenyListEntries.purge
discoveryengine.targetSites.batchCreate
discoveryengine.targetSites.create
discoveryengine.targetSites.delete
discoveryengine.targetSites.update
discoveryengine.userEvents.purge
discoveryengine.userStores.batchUpdateUserLicenses
discoveryengine.userStores.listUserLicenses

Discovery Engine

以下權限將新增至 Discovery Engine 檢視者角色 (roles/discoveryengine.viewer):

discoveryengine.audioOverviews.get
discoveryengine.audioOverviews.getIceConfig
discoveryengine.audioOverviews.sendSdpOffer
discoveryengine.engines.getIamPolicy
discoveryengine.licenseConfigs.get
discoveryengine.licenseConfigs.list
discoveryengine.locations.estimateDataSize
discoveryengine.locations.exchangeAuthCredentials
discoveryengine.locations.getConnectorSource
discoveryengine.locations.listConnectorSources
discoveryengine.notebooks.generateGuide
discoveryengine.notebooks.get
discoveryengine.notebooks.getAnalytics
discoveryengine.notebooks.getIamPolicy
discoveryengine.notebooks.interactSources
discoveryengine.notebooks.list
discoveryengine.notes.get
discoveryengine.sessions.search
discoveryengine.siteSearchEngines.fetchDomainVerificationStatus
discoveryengine.sitemaps.fetch
discoveryengine.sources.checkFreshness
discoveryengine.sources.generateDocumentGuide
discoveryengine.sources.get
discoveryengine.userStores.listUserLicenses

Cloud DNS

下列權限將新增至 DNS 管理員角色 (roles/dns.admin):

dns.managedZones.setIamPolicy

Firebase 安全性規則

以下權限將新增到 Firebase 規則檢視者角色 (roles/firebaserules.viewer):

firebaserules.releases.getExecutable
firebaserules.rulesets.test

GKE Hub

下列權限將新增至機群管理員 (原稱 GKE Hub 管理員) 角色 (roles/gkehub.admin):

gkehub.endpoints.connect
gkehub.gateway.delete
gkehub.gateway.generateCredentials
gkehub.gateway.get
gkehub.gateway.patch
gkehub.gateway.post
gkehub.gateway.put
gkehub.gateway.stream

GKE Hub

以下權限將新增至機群編輯者 (原稱 GKE Hub 編輯者) 角色 (roles/gkehub.editor):

gkehub.gateway.delete
gkehub.gateway.generateCredentials
gkehub.gateway.get
gkehub.gateway.patch
gkehub.gateway.post
gkehub.gateway.put
gkehub.gateway.stream

GKE Hub

以下權限將新增至機群檢視者 (原稱 GKE Hub 檢視者) 角色 (roles/gkehub.viewer):

gkehub.gateway.generateCredentials
gkehub.gateway.get
gkehub.scopes.getIamPolicy

Identity-Aware Proxy

以下權限將新增至 IAP 政策管理員角色 (roles/iap.admin):

iap.projects.getSettings
iap.projects.updateSettings
iap.tunnelDestGroups.accessViaIAP
iap.tunnelDestGroups.create
iap.tunnelDestGroups.delete
iap.tunnelDestGroups.get
iap.tunnelDestGroups.list
iap.tunnelDestGroups.remediate
iap.tunnelDestGroups.update
iap.tunnelInstances.accessViaIAP
iap.tunnelinstances.remediate
iap.web.getSettings
iap.web.updateSettings
iap.webServiceVersions.getSettings
iap.webServiceVersions.remediate
iap.webServiceVersions.updateSettings
iap.webServices.getSettings
iap.webServices.updateSettings
iap.webTypes.getSettings
iap.webTypes.updateSettings

Cloud License Manager

以下權限將新增至 Cloud License Manager 檢視者角色 (roles/licensemanager.viewer):

licensemanager.configurations.aggregateUsage
licensemanager.configurations.queryLicenseUsage

Cloud Logging

以下權限將新增至「記錄檔檢視者」角色 (roles/logging.viewer):

logging.buckets.copyLogEntries
logging.buckets.listEffectiveTags
logging.buckets.listTagBindings
logging.logEntries.download
logging.notificationRules.get
logging.notificationRules.list
logging.settings.get
logging.views.getIamPolicy
logging.views.listLogs
logging.views.listResourceKeys
logging.views.listResourceValues

Managed Service for Microsoft Active Directory

下列權限將新增至 Google Cloud Managed Identities 檢視者角色 (roles/managedidentities.viewer):

managedidentities.domains.checkMigrationPermission
managedidentities.domains.validateTrust

Memorystore for Memcached

以下權限將新增至 Cloud Memorystore Memcached 編輯者角色 (roles/memcache.editor):

memcache.instances.applySoftwareUpdate
memcache.instances.create
memcache.instances.delete
memcache.instances.rescheduleMaintenance
memcache.instances.upgrade

Memorystore for Memcached

下列權限將新增至 Cloud Memorystore Memcached 檢視者角色 (roles/memcache.viewer):

memcache.instances.listEffectiveTags
memcache.instances.listTagBindings

Dataproc Metastore

下列權限將新增至 Dataproc Metastore 管理員角色 (roles/metastore.admin):

metastore.databases.create
metastore.databases.delete
metastore.databases.get
metastore.databases.getIamPolicy
metastore.databases.list
metastore.databases.setIamPolicy
metastore.databases.update
metastore.services.mutateMetadata
metastore.services.queryMetadata
metastore.services.use
metastore.tables.create
metastore.tables.delete
metastore.tables.get
metastore.tables.getIamPolicy
metastore.tables.list
metastore.tables.setIamPolicy
metastore.tables.update

Dataproc Metastore

下列權限將新增至 Dataproc Metastore 編輯者角色 (roles/metastore.editor):

metastore.backups.getIamPolicy
metastore.databases.create
metastore.databases.delete
metastore.databases.get
metastore.databases.getIamPolicy
metastore.databases.list
metastore.databases.update
metastore.federations.getIamPolicy
metastore.federations.use
metastore.services.use
metastore.tables.create
metastore.tables.delete
metastore.tables.get
metastore.tables.getIamPolicy
metastore.tables.list
metastore.tables.update

AI 平台

以下權限將新增至 AI Platform 檢視者角色 (roles/ml.viewer):

ml.jobs.getIamPolicy
ml.models.getIamPolicy
ml.models.predict
ml.versions.predict

Model Armor

以下權限將新增至 Model Armor 管理員角色 (roles/modelarmor.admin):

modelarmor.callouts.invoke
modelarmor.floorSettings.get
modelarmor.floorSettings.update

Model Armor

下列權限將新增至 Model Armor 檢視者角色 (roles/modelarmor.viewer):

modelarmor.floorSettings.get

Oracle Database@Google Cloud

下列權限將新增至 Oracle Database@Google Cloud 檢視者角色 (roles/oracledatabase.viewer):

oracledatabase.dbSystemInitialStorageSizes.list
oracledatabase.dbVersions.list
oracledatabase.systemVersions.list

Pub/Sub

以下權限將新增至 Pub/Sub 編輯者角色 (roles/pubsub.editor):

pubsub.schemas.getIamPolicy

Pub/Sub

下列權限將新增至 Pub/Sub 檢視者角色 (roles/pubsub.viewer):

pubsub.schemas.attach
pubsub.schemas.getIamPolicy
pubsub.snapshots.seek

Pub/Sub Lite

下列權限將新增至 Pub/Sub Lite 檢視者角色 (roles/pubsublite.viewer):

pubsublite.locations.openKafkaStream
pubsublite.subscriptions.subscribe
pubsublite.topics.computeHeadCursor
pubsublite.topics.computeMessageStats
pubsublite.topics.computeTimeCursor
pubsublite.topics.subscribe

reCAPTCHA

下列權限將新增至 reCAPTCHA Enterprise 管理員角色 (roles/recaptchaenterprise.admin):

recaptchaenterprise.assessments.annotate
recaptchaenterprise.assessments.create
recaptchaenterprise.relatedaccountgroupmemberships.list
recaptchaenterprise.relatedaccountgroups.list

reCAPTCHA

下列權限將新增至 reCAPTCHA Enterprise 檢視者角色 (roles/recaptchaenterprise.viewer):

recaptchaenterprise.relatedaccountgroupmemberships.list
recaptchaenterprise.relatedaccountgroups.list

推薦功能

以下權限將新增至建議事項檢視者角色 (roles/recommender.viewer):

recommender.costRecommendations.listAll
recommender.costRecommendations.summarizeAll

Memorystore for Redis

下列權限將新增至 Cloud Memorystore Redis 編輯者角色 (roles/redis.editor):

redis.backupCollections.create
redis.backupCollections.delete
redis.backups.create
redis.backups.delete
redis.backups.export
redis.clusters.connect
redis.clusters.create
redis.clusters.delete
redis.clusters.rescheduleMaintenance
redis.instances.create
redis.instances.delete
redis.instances.export
redis.instances.getAuthString
redis.instances.import
redis.instances.listEffectiveTags
redis.instances.listTagBindings
redis.instances.rescheduleMaintenance
redis.instances.updateAuth
redis.instances.upgrade

Memorystore for Redis

下列權限將新增至 Cloud Memorystore Redis 檢視者角色 (roles/redis.viewer):

redis.backups.export

Retail API

以下權限將新增至零售編輯者角色 (roles/retail.editor):

retail.attributesConfigs.batchRemoveCatalogAttributes
retail.attributesConfigs.removeCatalogAttribute
retail.products.purge
retail.products.setSponsorship
retail.userEvents.purge
retail.userEvents.rejoin

Retail API

以下權限將新增至 Retail 檢視者角色 (roles/retail.viewer):

retail.merchantControls.creatorGet
retail.merchantControls.creatorList
retail.models.pause
retail.models.resume
retail.models.tune

Route Optimization

以下權限將新增至路線最佳化檢視者角色 (roles/routeoptimization.viewer):

routeoptimization.locations.use

Security Center Management API

以下權限將新增至安全中心管理檢視者角色 (roles/securitycentermanagement.viewer):

securitycentermanagement.securityCommandCenter.checkEligibility

安全防護機制 API

以下權限將新增至 Security Posture 檢視者角色 (roles/securityposture.viewer):

securityposture.locations.get
securityposture.locations.list
securityposture.operations.list
securityposture.reports.get
securityposture.reports.list

Spanner

下列權限將新增至 Cloud Spanner 檢視者角色 (roles/spanner.viewer):

spanner.backupOperations.get
spanner.backupOperations.list
spanner.backupSchedules.get
spanner.backupSchedules.getIamPolicy
spanner.backupSchedules.list
spanner.backups.get
spanner.backups.getIamPolicy
spanner.backups.list
spanner.databaseOperations.get
spanner.databaseOperations.list
spanner.databaseRoles.list
spanner.databases.beginReadOnlyTransaction
spanner.databases.getDdl
spanner.databases.getIamPolicy
spanner.databases.partitionQuery
spanner.databases.partitionRead
spanner.databases.read
spanner.databases.select
spanner.databases.useDataBoost
spanner.instanceConfigOperations.get
spanner.instanceConfigOperations.list
spanner.instanceOperations.get
spanner.instanceOperations.list
spanner.instancePartitionOperations.get
spanner.instancePartitionOperations.list
spanner.instances.getIamPolicy
spanner.sessions.create
spanner.sessions.delete
spanner.sessions.get
spanner.sessions.list

Speaker ID

以下權限將新增至 Speaker ID 編輯者角色 (roles/speakerid.editor):

speakerid.settings.get

Speaker ID

以下權限將新增至 Speaker ID 檢視者角色 (roles/speakerid.viewer):

speakerid.settings.get

Speech-to-Text

以下權限將新增至 Cloud Speech 編輯者角色 (roles/speech.editor):

speech.config.get

Cloud Storage

以下權限將新增至「儲存空間管理員」角色 (roles/storage.admin):

storage.hmacKeys.create
storage.hmacKeys.delete
storage.hmacKeys.get
storage.hmacKeys.list
storage.hmacKeys.update

目視檢測 AI

以下權限將新增至目視檢測 AI 解決方案編輯者角色 (roles/visualinspection.editor):

visualinspection.locations.reportUsageMetrics

無伺服器虛擬私有雲存取

無伺服器 VPC 存取檢視者角色 (roles/vpcaccess.viewer) 將新增下列權限:

vpcaccess.connectors.use