Configurar un proyecto y permisos

En esta página se explica cómo crear un Google Cloud proyecto, habilitar AML AI, crear credenciales de autenticación y asignar a tu cuenta uno o varios roles de gestión de identidades y accesos.

  1. Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
  2. Install the Google Cloud CLI.

  3. Si utilizas un proveedor de identidades (IdP) externo, primero debes iniciar sesión en la CLI de gcloud con tu identidad federada.

  4. Para inicializar gcloud CLI, ejecuta el siguiente comando:

    gcloud init
  5. Create or select a Google Cloud project.

    Roles required to select or create a project

    • Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project: To create a project, you need the Project Creator (roles/resourcemanager.projectCreator), which contains the resourcemanager.projects.create permission. Learn how to grant roles.
    • Create a Google Cloud project:

      gcloud projects create PROJECT_ID

      Replace PROJECT_ID with a name for the Google Cloud project you are creating.

    • Select the Google Cloud project that you created:

      gcloud config set project PROJECT_ID

      Replace PROJECT_ID with your Google Cloud project name.

  6. Verify that billing is enabled for your Google Cloud project.

  7. Enable the required APIs:

    Roles required to enable APIs

    To enable APIs, you need the Service Usage Admin IAM role (roles/serviceusage.serviceUsageAdmin), which contains the serviceusage.services.enable permission. Learn how to grant roles.

    gcloud services enable financialservices.googleapis.com bigquery.googleapis.com cloudkms.googleapis.com
  8. If you're using a local shell, then create local authentication credentials for your user account:

    gcloud auth application-default login

    You don't need to do this if you're using Cloud Shell.

    If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.

  9. Grant roles to your user account. Run the following command once for each of the following IAM roles: roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin

    gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE

    Replace the following:

    • PROJECT_ID: your project ID.
    • USER_IDENTIFIER: the identifier for your user account—for example, myemail@example.com.
    • ROLE: the IAM role that you grant to your user account.
  10. Install the Google Cloud CLI.

  11. Si utilizas un proveedor de identidades (IdP) externo, primero debes iniciar sesión en la CLI de gcloud con tu identidad federada.

  12. Para inicializar gcloud CLI, ejecuta el siguiente comando:

    gcloud init
  13. Create or select a Google Cloud project.

    Roles required to select or create a project

    • Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project: To create a project, you need the Project Creator (roles/resourcemanager.projectCreator), which contains the resourcemanager.projects.create permission. Learn how to grant roles.
    • Create a Google Cloud project:

      gcloud projects create PROJECT_ID

      Replace PROJECT_ID with a name for the Google Cloud project you are creating.

    • Select the Google Cloud project that you created:

      gcloud config set project PROJECT_ID

      Replace PROJECT_ID with your Google Cloud project name.

  14. Verify that billing is enabled for your Google Cloud project.

  15. Enable the required APIs:

    Roles required to enable APIs

    To enable APIs, you need the Service Usage Admin IAM role (roles/serviceusage.serviceUsageAdmin), which contains the serviceusage.services.enable permission. Learn how to grant roles.

    gcloud services enable financialservices.googleapis.com bigquery.googleapis.com cloudkms.googleapis.com
  16. If you're using a local shell, then create local authentication credentials for your user account:

    gcloud auth application-default login

    You don't need to do this if you're using Cloud Shell.

    If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.

  17. Grant roles to your user account. Run the following command once for each of the following IAM roles: roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin

    gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE

    Replace the following:

    • PROJECT_ID: your project ID.
    • USER_IDENTIFIER: the identifier for your user account—for example, myemail@example.com.
    • ROLE: the IAM role that you grant to your user account.
  18. Estos roles cumplen los siguientes permisos obligatorios:

    Permisos obligatorios

    Para completar la guía de inicio rápido, se necesitan los siguientes permisos, que también son necesarios para llevar a cabo muchas operaciones vitales en la IA de AML.

    Permiso Descripción
    resourcemanager.projects.getObtener un Google Cloud proyecto
    resourcemanager.projects.listList Google Cloud projects
    cloudkms.keyRings.createCrear un conjunto de claves de Cloud KMS
    cloudkms.cryptoKeys.createCrear una clave de Cloud KMS
    financialservices.v1instances.createCrear una instancia de AML AI
    financialservices.operations.getObtener una operación de AML AI
    cloudkms.cryptoKeys.getIamPolicyObtener la política de gestión de identidades y accesos de una clave de Cloud KMS
    cloudkms.cryptoKeys.setIamPolicyDefinir la política de gestión de identidades y accesos en una clave de Cloud KMS
    bigquery.datasets.createCrear un conjunto de datos de BigQuery
    bigquery.datasets.getObtener un conjunto de datos de BigQuery
    bigquery.transfers.getObtener una transferencia de BigQuery Data Transfer Service
    bigquery.transfers.updateCrear o eliminar una transferencia de BigQuery Data Transfer Service
    bigquery.datasets.setIamPolicyDefinir la política de gestión de identidades y accesos en un conjunto de datos de BigQuery
    bigquery.datasets.updateActualizar un conjunto de datos de BigQuery
    financialservices.v1datasets.createCrear un conjunto de datos de AML AI
    financialservices.v1engineconfigs.createCrear una configuración de motor de AML AI
    financialservices.v1models.createCrear un modelo de IA de AML
    financialservices.v1backtests.createCrear un resultado de prueba retrospectiva de AML AI
    financialservices.v1backtests.exportMetadataExportar metadatos de un resultado de una prueba retrospectiva de IA de lucha contra el blanqueo de dinero
    financialservices.v1instances.importRegisteredPartiesImportar partes registradas a una instancia de IA de lucha contra el blanqueo de dinero
    financialservices.v1predictions.createCrear un resultado de predicción de AML AI
    bigquery.jobs.createCrear un trabajo de BigQuery
    bigquery.tables.getDataObtener datos de una tabla de BigQuery
    financialservices.v1predictions.deleteEliminar un resultado de predicción de IA de AML
    financialservices.v1backtests.deleteEliminar un resultado de una prueba retrospectiva de AML AI
    financialservices.v1models.deleteEliminar un modelo de IA de AML
    financialservices.v1engineconfigs.deleteEliminar una configuración de motor de IA de AML
    financialservices.v1datasets.deleteEliminar un conjunto de datos de AML AI
    financialservices.v1instances.deleteEliminar una instancia de AML AI
    bigquery.datasets.deleteEliminar un conjunto de datos de BigQuery