I ruoli IAM (Identity and Access Management) stabiliscono in che modo puoi utilizzare l'API Managed Service for Microsoft Active Directory (Managed Microsoft AD). Di seguito è riportato un elenco di ciascun ruolo IAM disponibile per Managed Microsoft AD e dei metodi a sua disposizione.
Inoltre, gli account di servizio devono disporre dell'autorizzazione servicemanagement.services.bind
per visualizzare e attivare Managed Microsoft AD. Scopri di più su autorizzazioni e ruoli per la gestione dei servizi.
| Role | Permissions |
|---|---|
Google Cloud Managed Identities Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level. |
|
Google Cloud Managed Identities Backup Admin( Full access to Google Cloud Managed Identities Backup and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Backup Viewer( Read-only access to Google Cloud Managed Identities Backup and related resources. |
|
Google Cloud Managed Identities Domain Admin( Read-Update-Delete to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a resource (domain) level. |
|
Google Cloud Managed Identities Domain Join Beta( Access to domain join VMs with Cloud AD |
|
Managedidentities Editor( Editor role for managedidentities |
|
Google Cloud Managed Identities Peering Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Peering Viewer( Read-only access to Google Cloud Managed Identities Peering and related resources. |
|
Cloud Managed Identities Service Agent( Gives Managed Identities service account access to managed resources. |
|
Google Cloud Managed Identities Viewer( Read-only access to Google Cloud Managed Identities Domains and related resources. |
|
Per ulteriori informazioni sui ruoli IAM, consulta la sezione Informazioni sui ruoli.