IAM-Rollen (Identity and Access Management) beschreiben, wie Sie die Managed Service for Microsoft Active Directory (Managed Microsoft AD) API verwenden können. Unten finden Sie eine Liste aller für verwaltetes Microsoft AD verfügbaren IAM-Rollen und der ihnen zur Verfügung stehenden Methoden.
Darüber hinaus müssen Dienstkonten die Berechtigung servicemanagement.services.bind haben, um Managed Microsoft AD anzeigen zu können und zu aktivieren. Weitere Informationen zu Rollen und Berechtigungen für die Dienstverwaltung
| Role | Permissions |
|---|---|
Google Cloud Managed Identities Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level. |
|
Google Cloud Managed Identities Backup Admin( Full access to Google Cloud Managed Identities Backup and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Backup Viewer( Read-only access to Google Cloud Managed Identities Backup and related resources. |
|
Google Cloud Managed Identities Domain Admin( Read-Update-Delete to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a resource (domain) level. |
|
Google Cloud Managed Identities Domain Join Beta( Access to domain join VMs with Cloud AD |
|
Managedidentities Editor( Editor role for managedidentities |
|
Google Cloud Managed Identities Peering Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Peering Viewer( Read-only access to Google Cloud Managed Identities Peering and related resources. |
|
Cloud Managed Identities Service Agent( Gives Managed Identities service account access to managed resources. |
|
Google Cloud Managed Identities Viewer( Read-only access to Google Cloud Managed Identities Domains and related resources. |
|
Weitere Informationen zu IAM-Rollen finden Sie unter Informationen zu Rollen.