Roles and permissions

This page describes the Identity and Access Management (IAM) permissions that are necessary to perform specific Secure Web Proxy operations. It also explains how to create a custom IAM role and assign the required permissions to the role for managing various Secure Web Proxy resources.

Permissions

The following table lists the permissions that you require to perform specific operations in Secure Web Proxy. For more information, see the IAM permissions reference.

Operation Resource Permission (method)
Create a policy Gateway security policies networksecurity.gatewaySecurityPolicies.create
Delete a policy Gateway security policies networksecurity.gatewaySecurityPolicies.delete
Retrieve a policy Gateway security policies networksecurity.gatewaySecurityPolicies.get
List policies Gateway security policies networksecurity.gatewaySecurityPolicies.list
Update a policy Gateway security policies networksecurity.gatewaySecurityPolicies.update
Create a rule Gateway security policy rules networksecurity.gatewaySecurityPolicyRules.create
Delete a rule Gateway security policy rules networksecurity.gatewaySecurityPolicyRules.delete
Retrieve a rule Gateway security policy rules networksecurity.gatewaySecurityPolicyRules.get
List rules Gateway security policy rules networksecurity.gatewaySecurityPolicyRules.list
Update a rule Gateway security policy rules networksecurity.gatewaySecurityPolicyRules.update
Retrieve an operation Operations networksecurity.operations.get
Create a TLS inspection policy TLS inspection policies networksecurity.tlsInspectionPolicies.create
Delete a TLS inspection policy TLS inspection policies networksecurity.tlsInspectionPolicies.delete
Retrieve a TLS inspection policy TLS inspection policies networksecurity.tlsInspectionPolicies.get
List TLS inspection policies TLS inspection policies networksecurity.tlsInspectionPolicies.list
Update a TLS inspection policy TLS inspection policies networksecurity.tlsInspectionPolicies.update
Attach a TLS inspection policy to a Secure Web Proxy policy TLS inspection policies networksecurity.tlsInspectionPolicies.use
Create a URL list URL lists networksecurity.urlLists.create
Delete a URL list URL lists networksecurity.urlLists.delete
Retrieve a URL list URL lists networksecurity.urlLists.get
List all URL lists URL lists networksecurity.urlLists.list
Update a URL list URL lists networksecurity.urlLists.update
Attach a URL list to a Secure Web Proxy rule URL lists networksecurity.urlLists.use
Provision and manage a Secure Web Proxy instance Various Certificate Manager, Compute Engine, Secure Web Proxy, Resource Manager, and Cloud Monitoring resources
  • certificatemanager.certs.get
  • certificatemanager.certs.list
  • certificatemanager.certs.use
  • compute.addresses.create
  • compute.addresses.createInternal
  • compute.addresses.list
  • compute.instances.update
  • compute.networks.get
  • compute.networks.list
  • compute.projects.get
  • compute.regionOperations.get
  • compute.routers.create
  • compute.routers.delete
  • compute.routers.get
  • compute.routers.list
  • compute.routers.update
  • compute.subnetworks.get
  • compute.subnetworks.list
  • networksecurity.gatewaySecurityPolicies.get
  • networksecurity.gatewaySecurityPolicies.list
  • networksecurity.gatewaySecurityPolicies.use
  • networksecurity.gatewaySecurityPolicyRules.get
  • networksecurity.gatewaySecurityPolicyRules.list
  • networksecurity.locations.list
  • networksecurity.urlLists.get
  • networksecurity.urlLists.list
  • networksecurity.urlLists.use
  • networkservices.gateways.create
  • networkservices.gateways.delete
  • networkservices.gateways.get
  • networkservices.gateways.list
  • networkservices.gateways.update
  • networkservices.gateways.use
  • networkservices.locations.list
  • networkservices.operations.get
  • networkservices.operations.list
  • resourcemanager.projects.get
  • resourcemanager.projects.list
  • serviceusage.quotas.get
  • serviceusage.services.get
  • serviceusage.services.list

Roles

To get the permissions that you need to provision a Secure Web Proxy instance, ask your administrator to grant you the following IAM roles on your project:

For more information about granting roles, see Manage access to projects, folders, and organizations.

You might also be able to get the required permissions through custom roles or other predefined roles.

Optional: If you have a set of users who are responsible for managing your Compute Engine organization security policies, then grant them the Compute Organization Security Policy Admin role (roles/compute.orgSecurityPolicyAdmin).

For more information about project roles and permissions, see the following:

What's next