Cloud Deployment Manager akan mencapai akhir dukungan pada 31 Desember 2025. Jika saat ini Anda menggunakan Deployment Manager, migrasikan ke Infrastructure Manager atau teknologi deployment alternatif paling lambat 31 Desember 2025 untuk memastikan layanan Anda berlanjut tanpa gangguan.
Runtime Configurator mendukung peran dasar
untuk resource-nya. Artinya, Anda dapat memberikan peran pemilik, editor, atau pelihat untuk memberi pengguna lain jumlah akses yang tepat ke resource Runtime Configurator. Anda harus memberikan izin ini di tingkat project atau di
tingkat resource Konfigurasi.
Tidak ada peran yang telah ditentukan sebelumnya untuk Runtime Configurator.
Izin
Dengan IAM, setiap metode API memerlukan izin tertentu agar dapat dipanggil.
Gunakan tabel di bawah untuk menentukan izin yang diperlukan untuk metode API yang diinginkan.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-03 UTC."],[[["\u003cp\u003eThis page explains how to manage access control for Runtime Configurator resources using Google Identity and Access Management (IAM).\u003c/p\u003e\n"],["\u003cp\u003eRuntime Configurator, currently in beta, supports basic IAM roles (owner, editor, viewer), which must be granted at the project or Config resource level.\u003c/p\u003e\n"],["\u003cp\u003eSpecific permissions are required to call each Runtime Configurator API method, and the necessary permissions for each method are listed in a provided table.\u003c/p\u003e\n"],["\u003cp\u003eNo predefined roles exist for Runtime Configurator, but existing roles can be applied to grant permissions.\u003c/p\u003e\n"],["\u003cp\u003eThe beta status of the Runtime Configurator is subject to the "Pre-GA Offerings Terms" with limited support available.\u003c/p\u003e\n"]]],[],null,["# Runtime Configurator Access Control Options\n\n| **Beta**\n|\n|\n| This product or feature is subject to the \"Pre-GA Offerings Terms\" in the General Service Terms section\n| of the [Service Specific Terms](/terms/service-terms#1).\n|\n| Pre-GA products and features are available \"as is\" and might have limited support.\n|\n| For more information, see the\n| [launch stage descriptions](/products#product-launch-stages).\n\nThis page describes how to set access control on your Runtime Configurator\nresources using [Google Identity and Access Management](/iam). For information\nabout Runtime Configurator, read the\n[Runtime Configurator Fundamentals](/deployment-manager/runtime-configurator).\n\nBefore you begin\n----------------\n\n- If you want to use the command-line examples in this guide, install the [\\`gcloud\\` command-line tool](/sdk).\n- If you want to use the API examples in this guide, set up [API access](/deployment-manager/docs/reference/latest).\n- Understand [Google Cloud console](https://support.google.com/cloud/answer/6158853?hl=en&ref_topic=6158848) projects.\n- Understand [Google Identity and Access Management](/iam).\n\nIAM Roles\n---------\n\nRuntime Configurator supports [basic roles](/iam/docs/understanding-roles#basic)\nfor its resources. That means you can grant either the owner, editor, or viewer\nrole to give other users the right amount of access to Runtime Configurator\nresources. You must grant these permissions on the project level or on the\n[Config resource level](/deployment-manager/runtime-configurator/reference/rest/v1beta1/projects.configs/setIamPolicy).\n\nThere are no predefined roles for Runtime Configurator.\n\nPermissions\n-----------\n\nWith IAM, Each API method requires a specific permission in order to be called.\nUse the table below to determine which permissions are necessary for the desired\nAPI method.\n\nWhat's next\n-----------\n\n- Learn about [IAM](/iam).\n- Learn about [basic roles](/iam/docs/understanding-roles#basic)."]]