Identity and Access Management (IAM) 角色會規定 Managed Service for Microsoft Active Directory (Managed Microsoft AD) API 的使用方式。以下列出可用於 Managed Microsoft AD 的各項 IAM 角色,以及這些角色可用的做法。
此外,服務帳戶必須具備 servicemanagement.services.bind 權限,才能查看及啟用 Managed Microsoft AD。進一步瞭解服務管理角色和權限。
| Role | Permissions |
|---|---|
Google Cloud Managed Identities Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level. |
|
Google Cloud Managed Identities Editor( Editor role for Google Cloud Managed Identities |
|
Google Cloud Managed Identities Viewer( Read-only access to Google Cloud Managed Identities Domains and related resources. |
|
Google Cloud Managed Identities Backup Admin( Full access to Google Cloud Managed Identities Backup and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Backup Viewer( Read-only access to Google Cloud Managed Identities Backup and related resources. |
|
Google Cloud Managed Identities Domain Admin( Read-Update-Delete to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a resource (domain) level. |
|
Google Cloud Managed Identities Domain Join Beta( Access to domain join VMs with Cloud AD |
|
Google Cloud Managed Identities Peering Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Peering Viewer( Read-only access to Google Cloud Managed Identities Peering and related resources. |
|
Service agent roles
Service agent roles should only be granted to service agents.
| Role | Permissions |
|---|---|
Cloud Managed Identities Service Agent( Gives Managed Identities service account access to managed resources. |
|
如要進一步瞭解身分與存取權管理 (IAM) 角色,請參閱「瞭解角色」一文。