Configura un proyecto y los permisos

En esta página, se muestra cómo crear un proyecto Google Cloud , habilitar la IA de AML, crear credenciales de autenticación y otorgar a tu cuenta uno o más roles de IAM.


Googlers: Esta nota solo es visible para los Googlers.
  1. Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
  2. Install the Google Cloud CLI.

  3. Si usas un proveedor de identidad externo (IdP), primero debes acceder a gcloud CLI con tu identidad federada.

  4. Para inicializar gcloud CLI, ejecuta el siguiente comando:

    gcloud init
  5. Create or select a Google Cloud project.

    Roles required to select or create a project

    • Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project: To create a project, you need the Project Creator (roles/resourcemanager.projectCreator), which contains the resourcemanager.projects.create permission. Learn how to grant roles.
    • Create a Google Cloud project:

      gcloud projects create PROJECT_ID

      Replace PROJECT_ID with a name for the Google Cloud project you are creating.

    • Select the Google Cloud project that you created:

      gcloud config set project PROJECT_ID

      Replace PROJECT_ID with your Google Cloud project name.

  6. Verify that billing is enabled for your Google Cloud project.

  7. Enable the required APIs:

    Roles required to enable APIs

    To enable APIs, you need the Service Usage Admin IAM role (roles/serviceusage.serviceUsageAdmin), which contains the serviceusage.services.enable permission. Learn how to grant roles.

    gcloud services enable financialservices.googleapis.com bigquery.googleapis.com cloudkms.googleapis.com
  8. If you're using a local shell, then create local authentication credentials for your user account:

    gcloud auth application-default login

    You don't need to do this if you're using Cloud Shell.

    If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.

  9. Grant roles to your user account. Run the following command once for each of the following IAM roles: roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin

    gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE

    Replace the following:

    • PROJECT_ID: your project ID.
    • USER_IDENTIFIER: the identifier for your user account—for example, myemail@example.com.
    • ROLE: the IAM role that you grant to your user account.
  10. Install the Google Cloud CLI.

  11. Si usas un proveedor de identidad externo (IdP), primero debes acceder a gcloud CLI con tu identidad federada.

  12. Para inicializar gcloud CLI, ejecuta el siguiente comando:

    gcloud init
  13. Create or select a Google Cloud project.

    Roles required to select or create a project

    • Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
    • Create a project: To create a project, you need the Project Creator (roles/resourcemanager.projectCreator), which contains the resourcemanager.projects.create permission. Learn how to grant roles.
    • Create a Google Cloud project:

      gcloud projects create PROJECT_ID

      Replace PROJECT_ID with a name for the Google Cloud project you are creating.

    • Select the Google Cloud project that you created:

      gcloud config set project PROJECT_ID

      Replace PROJECT_ID with your Google Cloud project name.

  14. Verify that billing is enabled for your Google Cloud project.

  15. Enable the required APIs:

    Roles required to enable APIs

    To enable APIs, you need the Service Usage Admin IAM role (roles/serviceusage.serviceUsageAdmin), which contains the serviceusage.services.enable permission. Learn how to grant roles.

    gcloud services enable financialservices.googleapis.com bigquery.googleapis.com cloudkms.googleapis.com
  16. If you're using a local shell, then create local authentication credentials for your user account:

    gcloud auth application-default login

    You don't need to do this if you're using Cloud Shell.

    If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.

  17. Grant roles to your user account. Run the following command once for each of the following IAM roles: roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin

    gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE

    Replace the following:

    • PROJECT_ID: your project ID.
    • USER_IDENTIFIER: the identifier for your user account—for example, myemail@example.com.
    • ROLE: the IAM role that you grant to your user account.
  18. Estos roles cumplen con los siguientes permisos obligatorios:

    Permisos necesarios

    Se requieren los siguientes permisos para completar la guía de inicio rápido y realizar muchas operaciones vitales en AML AI.

    Permiso Descripción
    resourcemanager.projects.getObtén un Google Cloud proyecto
    resourcemanager.projects.listList Google Cloud projects
    cloudkms.keyRings.createCrea un llavero de claves de Cloud KMS
    cloudkms.cryptoKeys.createCrea una clave de Cloud KMS
    financialservices.v1instances.createCrea una instancia de la IA contra lavado de dinero
    financialservices.operations.getObtén una operación de IA contra lavado de dinero
    cloudkms.cryptoKeys.getIamPolicyObtén la política de IAM de una clave de Cloud KMS
    cloudkms.cryptoKeys.setIamPolicyEstablece la política de IAM en una clave de Cloud KMS
    bigquery.datasets.createCrea un conjunto de datos de BigQuery
    bigquery.datasets.getObtén un conjunto de datos de BigQuery
    bigquery.transfers.getObtén una transferencia del Servicio de transferencia de datos de BigQuery
    bigquery.transfers.updateCrea o borra una transferencia del Servicio de transferencia de datos de BigQuery
    bigquery.datasets.setIamPolicyConfigura la política de IAM en un conjunto de datos de BigQuery
    bigquery.datasets.updateActualiza un conjunto de datos de BigQuery
    financialservices.v1datasets.createCrea un conjunto de datos de IA contra lavado de dinero
    financialservices.v1engineconfigs.createCrea una configuración del motor de IA contra lavado de dinero
    financialservices.v1models.createCrea un modelo de IA contra lavado de dinero
    financialservices.v1backtests.createCrea un resultado de prueba retrospectiva de la IA contra lavado de dinero
    financialservices.v1backtests.exportMetadataExporta metadatos desde el resultado de una prueba de simulación retrospectiva de la IA de AML
    financialservices.v1instances.importRegisteredPartiesImporta las partes registradas a una instancia de IA de AML
    financialservices.v1predictions.createCrea un resultado de predicción de la IA contra lavado de dinero
    bigquery.jobs.createCrea un trabajo de BigQuery
    bigquery.tables.getDataObtén datos de una tabla de BigQuery
    financialservices.v1predictions.deleteBorra el resultado de una predicción de IA de AML
    financialservices.v1backtests.deleteCómo borrar el resultado de una prueba retrospectiva de la IA de AML
    financialservices.v1models.deleteBorra un modelo de IA contra lavado de dinero
    financialservices.v1engineconfigs.deleteBorra la configuración de un motor de IA contra lavado de dinero
    financialservices.v1datasets.deleteBorra un conjunto de datos de la IA contra lavado de dinero
    financialservices.v1instances.deleteBorra una instancia de la IA contra lavado de dinero
    bigquery.datasets.deleteBorra un conjunto de datos de BigQuery