Esta página descreve as funções e as autorizações da gestão de identidade e de acesso (IAM) necessárias para usar o Network Connectivity Center.
A um nível elevado, precisa do seguinte:
- Autorizações do Centro de conectividade de rede predefinidas, que são descritas em Funções predefinidas.
- Autorizações adicionais da seguinte forma:
- Para criar raios, precisa de autorização para ler os tipos de recursos de raios relevantes, conforme descrito em Autorização para criar um raio.
- Para trabalhar com o Network Connectivity Center na Google Cloud consola, precisa de autorização para ver determinados recursos de rede da nuvem virtual privada (VPC), conforme descrito no artigo Autorização para usar o Network Connectivity Center na Google Cloud consola.
Tenha em atenção que, se precisar de trabalhar com o Centro de conetividade de rede numa rede de VPC partilhada, tem de ter todas as autorizações necessárias no projeto anfitrião. Um hub, os respetivos raios e todos os recursos relacionados têm de estar no projeto anfitrião.
Para ver informações sobre como conceder autorizações, consulte a vista geral do IAM.
Funções predefinidas
A tabela seguinte descreve as funções predefinidas do Network Connectivity Center.
(
Service Automation Consumer Network Admin is responsible for setting up ServiceConnectionPolicies.
(
Enables full access to group resources and read-only access to hub and spoke resources
(
Enables use access on group resources
(
Enables full access to hub and spoke resources.
Lowest-level resources where you can grant this role:
(
Enables read-only access to hub and spoke resources.
Lowest-level resources where you can grant this role:
(
Full access to all Multicloud Data Transfer Config resources.
(
Read-only access to all Multicloud Data Transfer Config resources.
(
Access to all Destination resources.
(
Read-only access to all Destination resources.
(
Full access to all Regional Endpoint resources.
(
Read-only access to all Regional Endpoint resources.
(
Grants the Network Connectivity API authority to read some networking resources. It does not mutate these resources.
(
Service Class User uses a ServiceClass
(
Service Automation Producer Admin uses information from a consumer request to manage ServiceClasses and ServiceConnectionMaps
(
Enables full access to spoke resources and read-only access to hub resources.
Lowest-level resources where you can grant this role:
Role
Permissions
Service Automation Consumer Network Admin
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Group Admin
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.groups.*
networkconnectivity.
networkconnectivity.
networkconnectivity.groups.get
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.groups.use
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.hubs.get
networkconnectivity.
networkconnectivity.hubs.list
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.spokes.get
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Group User
roles/
)
networkconnectivity.groups.use
Hub & Spoke Admin
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.groups.*
networkconnectivity.
networkconnectivity.
networkconnectivity.groups.get
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.groups.use
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.hubs.*
networkconnectivity.
networkconnectivity.
networkconnectivity.hubs.get
networkconnectivity.
networkconnectivity.hubs.list
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.spokes.*
networkconnectivity.
networkconnectivity.
networkconnectivity.spokes.get
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Hub & Spoke Viewer
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.groups.get
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.hubs.get
networkconnectivity.
networkconnectivity.hubs.list
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.spokes.get
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Multicloud Data Transfer Config Admin
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Multicloud Data Transfer Config Viewer
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Destination Admin
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Destination Viewer
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Regional Endpoint Admin
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Regional Endpoint Viewer
roles/
)
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Network Connectivity Service Agent
roles/
)
compute.addresses.create
compute.
compute.addresses.delete
compute.
compute.addresses.get
compute.addresses.setLabels
compute.addresses.use
compute.forwardingRules.create
compute.forwardingRules.delete
compute.forwardingRules.get
compute.
compute.
compute.
compute.
compute.
compute.instances.get
compute.
compute.networks.get
compute.networks.use
compute.projects.get
compute.regionOperations.get
compute.routers.get
compute.subnetworks.create
compute.subnetworks.delete
compute.subnetworks.get
compute.
compute.subnetworks.list
compute.
compute.subnetworks.use
compute.vpnTunnels.get
dns.managedZones.create
dns.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
servicedirectory.
servicedirectory.
servicedirectory.
servicedirectory.
servicedirectory.
Service Class User
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Service Automation Service Producer Admin
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Spoke Admin
roles/
)
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.hubs.get
networkconnectivity.
networkconnectivity.hubs.list
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.spokes.*
networkconnectivity.
networkconnectivity.
networkconnectivity.spokes.get
networkconnectivity.
networkconnectivity.
networkconnectivity.
networkconnectivity.
resourcemanager.projects.get
resourcemanager.projects.list
Autorizações adicionais necessárias
Consoante as ações que tem de realizar no Network Connectivity Center, pode precisar das autorizações descritas nas secções seguintes.
Autorização para criar um spoke
Para criar um spoke, tem de ter autorização para ler o tipo de recurso do spoke. Por exemplo:
- Para raios de túnel VPN, raios de associação VLAN e raios de dispositivo de router, precisa de
compute.routers.get
. - Para criar raios de dispositivos de encaminhamento, precisa de
compute.instances.get
. Além disso, antes de poder usar um spoke de dispositivo de router, tem de configurar a interligação entre o Cloud Router e a instância do dispositivo de router. Para estabelecer uma relação de peering, precisa das seguintes autorizações:compute.instances.use
compute.routers.update
- Para criar raios de associação VLAN, precisa de
compute.interconnectAttachments.get
. - Para criar raios de túnel de VPN, precisa de
compute.vpnTunnels.get
. Para criar raios de VPC, precisa das seguintes autorizações:
compute.networks.use
compute.networks.get
Para criar nós de VPC num projeto diferente do centro ao qual está associado, precisa de
networkconnectivity.groups.use
.
Autorização para usar o Network Connectivity Center na consola Google Cloud
Para usar o Network Connectivity Center na Google Cloud consola, precisa de
uma função, como
Visualizador de rede de computação
(roles/compute.networkViewer
), que inclua as autorizações descritas
na tabela seguinte. Para usar estas autorizações, primeiro tem de
criar uma função personalizada.
Tarefa |
Autorizações necessárias |
---|---|
Aceda à página Network Connectivity Center |
|
Aceda e use a página Adicionar raios |
|
Adicione um spoke de associação VLAN |
|
Adicione um spoke de túnel de VPN |
|
Adicione um spoke de dispositivo de router |
|
Adicione um spoke de VPC |
|
Proteger recursos com os VPC Service Controls
Para proteger ainda mais os recursos do Network Connectivity Center, use os VPC Service Controls.
O VPC Service Controls oferece aos seus recursos segurança adicional para ajudar a mitigar o risco de exfiltração de dados. Ao usar os VPC Service Controls, pode colocar recursos do Network Connectivity Center dentro de perímetros de serviço. Em seguida, o VPC Service Controls protege estes recursos contra pedidos originados fora do perímetro.
Para saber mais acerca dos perímetros de serviço, consulte a página Configuração do perímetro de serviço da documentação do VPC Service Controls.
O que se segue?
Para mais informações sobre as funções e os Google Cloud recursos do projeto, consulte a seguinte documentação:
- Para compreender as funções e as autorizações de IAM, consulte o artigo Controlo de acesso para projetos através da IAM.
- Para compreender os tipos de funções, consulte a referência de funções básicas e predefinidas do Identity and Access Management.
- Para saber mais sobre as funções predefinidas, consulte o artigo Funções e autorizações de IAM do Compute Engine.
- Para saber mais sobre o Network Connectivity Center, consulte o artigo Vista geral do Network Connectivity Center.
- Para saber como gerir hubs e raios, consulte o artigo Trabalhe com hubs e raios.