Questa pagina descrive i ruoli e le autorizzazioni Identity and Access Management (IAM) necessari per utilizzare Network Connectivity Center (NCC).
A livello generale, devi disporre di quanto segue:
- Autorizzazioni NCC predefinite, descritte in Ruoli predefiniti.
- Autorizzazioni aggiuntive come segue:
- Per creare spoke, devi disporre dell'autorizzazione per leggere i tipi di risorse spoke pertinenti, come descritto in Autorizzazione per creare uno spoke.
- Per utilizzare NCC nella console Google Cloud , devi disporre dell'autorizzazione per visualizzare determinate risorse di rete Virtual Private Cloud (VPC), come descritto in Autorizzazione per utilizzare NCC nella console Google Cloud .
Tieni presente che se devi lavorare con NCC in una rete VPC condiviso, devi disporre di tutte le autorizzazioni necessarie nel progetto host. Un hub, i relativi spoke e tutte le risorse correlate devono trovarsi nel progetto host.
Per informazioni su come concedere le autorizzazioni, consulta la panoramica di IAM.
Ruoli predefiniti
La tabella seguente descrive i ruoli predefiniti di NCC.
(
Service Automation Consumer Network Admin is responsible for setting up ServiceConnectionPolicies.
(
Enables full access to group resources and read-only access to hub and spoke resources
(
Enables use access on group resources
(
Enables full access to hub and spoke resources.
Lowest-level resources where you can grant this role:
(
Enables read-only access to hub and spoke resources.
Lowest-level resources where you can grant this role:
(
Full access to all Multicloud Data Transfer Config resources.
(
Read-only access to all Multicloud Data Transfer Config resources.
(
Access to all Destination resources.
(
Read-only access to all Destination resources.
(
Full access to all Regional Endpoint resources.
(
Read-only access to all Regional Endpoint resources.
(
Grants the Network Connectivity API authority to read some networking resources. It does not mutate these resources.
(
Service Class User uses a ServiceClass
(
Service Automation Producer Admin uses information from a consumer request to manage ServiceClasses and ServiceConnectionMaps
(
Enables full access to spoke resources and read-only access to hub resources.
Lowest-level resources where you can grant this role:
(
Enables full access to Transport resources
(
Enables view access to Transport resources
Role
Permissions
Service Automation Consumer Network Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Group Admin
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.groups.*
networkconnectivity.networkconnectivity.networkconnectivity.groups.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.groups.usenetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.hubs.getnetworkconnectivity.networkconnectivity.hubs.listnetworkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.spokes.getnetworkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Group User
roles/)
networkconnectivity.groups.use
Hub & Spoke Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.groups.*
networkconnectivity.networkconnectivity.networkconnectivity.groups.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.groups.usenetworkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.hubs.*
networkconnectivity.networkconnectivity.networkconnectivity.hubs.getnetworkconnectivity.networkconnectivity.hubs.listnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.spokes.*
networkconnectivity.networkconnectivity.networkconnectivity.spokes.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Hub & Spoke Viewer
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.groups.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.hubs.getnetworkconnectivity.networkconnectivity.hubs.listnetworkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.spokes.getnetworkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Multicloud Data Transfer Config Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Multicloud Data Transfer Config Viewer
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Destination Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Destination Viewer
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Regional Endpoint Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Regional Endpoint Viewer
roles/)
networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Network Connectivity Service Agent
roles/)
compute.addresses.createcompute.compute.addresses.deletecompute.compute.addresses.getcompute.addresses.setLabelscompute.addresses.usecompute.forwardingRules.createcompute.forwardingRules.deletecompute.forwardingRules.getcompute.compute.compute.compute.compute.compute.instances.getcompute.compute.networks.getcompute.networks.updatePolicycompute.networks.usecompute.projects.getcompute.regionOperations.getcompute.routers.getcompute.subnetworks.createcompute.subnetworks.deletecompute.subnetworks.getcompute.compute.subnetworks.listcompute.compute.subnetworks.usecompute.vpnTunnels.getdns.changes.createdns.managedZoneOperations.*
dns.managedZoneOperations.getdns.managedZoneOperations.listdns.managedZones.createdns.managedZones.deletedns.managedZones.getdns.managedZones.listdns.managedZones.updatedns.dns.resourceRecordSets.*
dns.resourceRecordSets.createdns.resourceRecordSets.deletedns.resourceRecordSets.getdns.resourceRecordSets.listdns.resourceRecordSets.updatenetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.servicedirectory.servicedirectory.servicedirectory.servicedirectory.servicedirectory.
Service Class User
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Service Automation Service Producer Admin
roles/)
networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Spoke Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.hubs.getnetworkconnectivity.networkconnectivity.hubs.listnetworkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.spokes.*
networkconnectivity.networkconnectivity.networkconnectivity.spokes.getnetworkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Transport Admin
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Transport Viewer
roles/)
networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.
networkconnectivity.networkconnectivity.networkconnectivity.networkconnectivity.resourcemanager.projects.getresourcemanager.projects.list
Autorizzazioni aggiuntive richieste
A seconda delle azioni che devi intraprendere in NCC, potresti aver bisogno delle autorizzazioni descritte nelle sezioni seguenti.
Autorizzazione per creare uno spoke
Per creare uno spoke, devi disporre dell'autorizzazione per leggere il tipo di risorsa dello spoke. Ad esempio:
- Per gli spoke del tunnel VPN, gli spoke del collegamento VLAN e gli spoke dell'appliance router, devi utilizzare
compute.routers.get. - Per creare spoke dell'appliance router, devi disporre di
compute.instances.get. Inoltre, prima di poter utilizzare uno spoke dell'appliance router, devi configurare il peering tra il router Cloud e l'istanza dell'appliance router. Per stabilire il peering, devi disporre delle seguenti autorizzazioni:compute.instances.usecompute.routers.update
- Per creare spoke di collegamento VLAN, devi
compute.interconnectAttachments.get. - Per creare spoke del tunnel VPN, devi disporre di
compute.vpnTunnels.get. Per creare spoke VPC, devi disporre delle seguenti autorizzazioni:
compute.networks.usecompute.networks.get
Per creare spoke VPC in un progetto diverso dall'hub a cui è associato, devi disporre di
networkconnectivity.groups.use.
Autorizzazione per utilizzare NCC nella console Google Cloud
Per utilizzare NCC nella console Google Cloud , devi disporre di un ruolo, ad esempio
Visualizzatore rete Compute
(roles/compute.networkViewer), che includa le autorizzazioni descritte
nella tabella seguente. Per utilizzare queste autorizzazioni, devi prima
creare un ruolo personalizzato.
Attività |
Autorizzazioni obbligatorie |
|---|---|
| Accedere alla pagina NCC |
|
| Accedere alla pagina Aggiungi spoke e utilizzarla |
|
| Aggiungi uno spoke del collegamento VLAN |
|
| Aggiungi uno spoke del tunnel VPN |
|
| Aggiungere uno spoke dell'appliance router |
|
| Aggiungi uno spoke VPC |
|
Protezione delle risorse con Controlli di servizio VPC
Per proteggere ulteriormente le risorse NCC, utilizza i Controlli di servizio VPC.
I Controlli di servizio VPC forniscono alle tue risorse una sicurezza aggiuntiva per contribuire a mitigare il rischio di esfiltrazione di dati. Utilizzando i Controlli di servizio VPC, puoi inserire le risorse NCC all'interno dei perimetri di servizio. I Controlli di servizio VPC proteggono quindi queste risorse dalle richieste provenienti dall'esterno del perimetro.
Per saperne di più sui perimetri di servizio, consulta la pagina Configurazione dei perimetri di servizio della documentazione sui Controlli di servizio VPC.
Passaggi successivi
Per saperne di più sui ruoli del progetto e sulle risorse, consulta la seguente documentazione: Google Cloud
- Per comprendere ruoli e autorizzazioni IAM, consulta Controllo dell'accesso per i progetti con IAM.
- Per comprendere i tipi di ruoli, consulta il riferimento ai ruoli di base e predefiniti di Identity and Access Management.
- Per scoprire di più sui ruoli predefiniti, consulta la pagina Ruoli e autorizzazioni IAM di Compute Engine.
- Per saperne di più su NCC, consulta la panoramica di NCC.
- Per scoprire come gestire hub e spoke, consulta Utilizzare hub e spoke.