Los roles de Gestión de Identidades y Accesos (IAM) determinan cómo puedes usar la API del servicio gestionado de Microsoft Active Directory (Managed Microsoft AD). A continuación, se muestra una lista de los roles de IAM disponibles para Managed Microsoft AD y los métodos disponibles para cada uno de ellos.
Además, las cuentas de servicio deben tener el permiso servicemanagement.services.bind
para ver y habilitar Managed Microsoft AD. Más información sobre los roles y permisos de gestión de servicios
| Role | Permissions |
|---|---|
Google Cloud Managed Identities Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level. |
|
Google Cloud Managed Identities Backup Admin( Full access to Google Cloud Managed Identities Backup and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Backup Viewer( Read-only access to Google Cloud Managed Identities Backup and related resources. |
|
Google Cloud Managed Identities Domain Admin( Read-Update-Delete to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a resource (domain) level. |
|
Google Cloud Managed Identities Domain Join Beta( Access to domain join VMs with Cloud AD |
|
Managedidentities Editor( Editor role for managedidentities |
|
Google Cloud Managed Identities Peering Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Peering Viewer( Read-only access to Google Cloud Managed Identities Peering and related resources. |
|
Cloud Managed Identities Service Agent( Gives Managed Identities service account access to managed resources. |
|
Google Cloud Managed Identities Viewer( Read-only access to Google Cloud Managed Identities Domains and related resources. |
|
Para obtener más información sobre los roles de gestión de identidades y accesos, consulta el artículo sobre la descripción de roles.