Cloud Deployment Manager will reach end of support on December 31, 2025. If you currently use Deployment Manager, please migrate to Infrastructure Manager or an alternative deployment technology by December 31, 2025 to ensure your services continue without interruption.
Runtime Configurator supports basic roles
for its resources. That means you can grant either the owner, editor, or viewer
role to give other users the right amount of access to Runtime Configurator
resources. You must grant these permissions on the project level or on the
Config resource level.
There are no predefined roles for Runtime Configurator.
Permissions
With IAM, Each API method requires a specific permission in order to be called.
Use the table below to determine which permissions are necessary for the desired
API method.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis page explains how to manage access control for Runtime Configurator resources using Google Identity and Access Management (IAM).\u003c/p\u003e\n"],["\u003cp\u003eRuntime Configurator, currently in beta, supports basic IAM roles (owner, editor, viewer), which must be granted at the project or Config resource level.\u003c/p\u003e\n"],["\u003cp\u003eSpecific permissions are required to call each Runtime Configurator API method, and the necessary permissions for each method are listed in a provided table.\u003c/p\u003e\n"],["\u003cp\u003eNo predefined roles exist for Runtime Configurator, but existing roles can be applied to grant permissions.\u003c/p\u003e\n"],["\u003cp\u003eThe beta status of the Runtime Configurator is subject to the "Pre-GA Offerings Terms" with limited support available.\u003c/p\u003e\n"]]],[],null,["# Runtime Configurator Access Control Options\n\n| **Beta**\n|\n|\n| This product or feature is subject to the \"Pre-GA Offerings Terms\" in the General Service Terms section\n| of the [Service Specific Terms](/terms/service-terms#1).\n|\n| Pre-GA products and features are available \"as is\" and might have limited support.\n|\n| For more information, see the\n| [launch stage descriptions](/products#product-launch-stages).\n\nThis page describes how to set access control on your Runtime Configurator\nresources using [Google Identity and Access Management](/iam). For information\nabout Runtime Configurator, read the\n[Runtime Configurator Fundamentals](/deployment-manager/runtime-configurator).\n\nBefore you begin\n----------------\n\n- If you want to use the command-line examples in this guide, install the [\\`gcloud\\` command-line tool](/sdk).\n- If you want to use the API examples in this guide, set up [API access](/deployment-manager/docs/reference/latest).\n- Understand [Google Cloud console](https://support.google.com/cloud/answer/6158853?hl=en&ref_topic=6158848) projects.\n- Understand [Google Identity and Access Management](/iam).\n\nIAM Roles\n---------\n\nRuntime Configurator supports [basic roles](/iam/docs/understanding-roles#basic)\nfor its resources. That means you can grant either the owner, editor, or viewer\nrole to give other users the right amount of access to Runtime Configurator\nresources. You must grant these permissions on the project level or on the\n[Config resource level](/deployment-manager/runtime-configurator/reference/rest/v1beta1/projects.configs/setIamPolicy).\n\nThere are no predefined roles for Runtime Configurator.\n\nPermissions\n-----------\n\nWith IAM, Each API method requires a specific permission in order to be called.\nUse the table below to determine which permissions are necessary for the desired\nAPI method.\n\nWhat's next\n-----------\n\n- Learn about [IAM](/iam).\n- Learn about [basic roles](/iam/docs/understanding-roles#basic)."]]