Questa pagina mostra come creare un progetto Google Cloud , attivare AML AI, creare credenziali di autenticazione e concedere al tuo account uno o più ruoli IAM.
- Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
-
Install the Google Cloud CLI.
-
Se utilizzi un provider di identità (IdP) esterno, devi prima accedere a gcloud CLI con la tua identità federata.
-
Per inizializzare gcloud CLI, esegui questo comando:
gcloud init
-
Create or select a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator
(
roles/resourcemanager.projectCreator
), which contains theresourcemanager.projects.create
permission. Learn how to grant roles.
-
Create a Google Cloud project:
gcloud projects create PROJECT_ID
Replace
PROJECT_ID
with a name for the Google Cloud project you are creating. -
Select the Google Cloud project that you created:
gcloud config set project PROJECT_ID
Replace
PROJECT_ID
with your Google Cloud project name.
-
Verify that billing is enabled for your Google Cloud project.
-
Enable the required APIs:
Roles required to enable APIs
To enable APIs, you need the Service Usage Admin IAM role (
roles/serviceusage.serviceUsageAdmin
), which contains theserviceusage.services.enable
permission. Learn how to grant roles.gcloud services enable financialservices.googleapis.com
bigquery.googleapis.com cloudkms.googleapis.com -
If you're using a local shell, then create local authentication credentials for your user account:
gcloud auth application-default login
You don't need to do this if you're using Cloud Shell.
If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.
-
Grant roles to your user account. Run the following command once for each of the following IAM roles:
roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin
gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE
Replace the following:
PROJECT_ID
: your project ID.USER_IDENTIFIER
: the identifier for your user account—for example,myemail@example.com
.ROLE
: the IAM role that you grant to your user account.
-
Install the Google Cloud CLI.
-
Se utilizzi un provider di identità (IdP) esterno, devi prima accedere a gcloud CLI con la tua identità federata.
-
Per inizializzare gcloud CLI, esegui questo comando:
gcloud init
-
Create or select a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator
(
roles/resourcemanager.projectCreator
), which contains theresourcemanager.projects.create
permission. Learn how to grant roles.
-
Create a Google Cloud project:
gcloud projects create PROJECT_ID
Replace
PROJECT_ID
with a name for the Google Cloud project you are creating. -
Select the Google Cloud project that you created:
gcloud config set project PROJECT_ID
Replace
PROJECT_ID
with your Google Cloud project name.
-
Verify that billing is enabled for your Google Cloud project.
-
Enable the required APIs:
Roles required to enable APIs
To enable APIs, you need the Service Usage Admin IAM role (
roles/serviceusage.serviceUsageAdmin
), which contains theserviceusage.services.enable
permission. Learn how to grant roles.gcloud services enable financialservices.googleapis.com
bigquery.googleapis.com cloudkms.googleapis.com -
If you're using a local shell, then create local authentication credentials for your user account:
gcloud auth application-default login
You don't need to do this if you're using Cloud Shell.
If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.
-
Grant roles to your user account. Run the following command once for each of the following IAM roles:
roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin
gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE
Replace the following:
PROJECT_ID
: your project ID.USER_IDENTIFIER
: the identifier for your user account—for example,myemail@example.com
.ROLE
: the IAM role that you grant to your user account.
Autorizzazioni obbligatorie
Per completare la guida rapida sono necessarie le seguenti autorizzazioni, che sono necessarie per eseguire molte operazioni vitali in AML AI.
Autorizzazione | Descrizione |
---|---|
resourcemanager.projects.get | Ottenere un progetto Google Cloud |
resourcemanager.projects.list | List Google Cloud projects |
cloudkms.keyRings.create | Crea un keyring Cloud KMS |
cloudkms.cryptoKeys.create | Crea una chiave Cloud KMS |
financialservices.v1instances.create | Crea un'istanza AML AI |
financialservices.operations.get | Recupera un'operazione AML AI |
cloudkms.cryptoKeys.getIamPolicy | Recupera il criterio IAM su una chiave Cloud KMS |
cloudkms.cryptoKeys.setIamPolicy | Imposta il criterio IAM su una chiave Cloud KMS |
bigquery.datasets.create | Crea un set di dati BigQuery |
bigquery.datasets.get | Recuperare un set di dati BigQuery |
bigquery.transfers.get | Recupera un trasferimento BigQuery Data Transfer Service |
bigquery.transfers.update | Creare o eliminare un trasferimento BigQuery Data Transfer Service |
bigquery.datasets.setIamPolicy | Impostare il criterio IAM su un set di dati BigQuery |
bigquery.datasets.update | Aggiorna un set di dati BigQuery |
financialservices.v1datasets.create | Crea un set di dati AML AI |
financialservices.v1engineconfigs.create | Crea una configurazione del motore AML AI |
financialservices.v1models.create | Crea un modello AML AI |
financialservices.v1backtests.create | Crea un risultato di backtest AML AI |
financialservices.v1backtests.exportMetadata | Esportare i metadati da un risultato di backtest AML AI |
financialservices.v1instances.importRegisteredParties | Importare le parti registrate in un'istanza AML AI |
financialservices.v1predictions.create | Crea un risultato della previsione AML AI |
bigquery.jobs.create | Crea un job BigQuery |
bigquery.tables.getData | Recuperare i dati da una tabella BigQuery |
financialservices.v1predictions.delete | Eliminare il risultato di una previsione AML AI |
financialservices.v1backtests.delete | Eliminare il risultato di un backtest AML AI |
financialservices.v1models.delete | Eliminare un modello AML AI |
financialservices.v1engineconfigs.delete | Elimina una configurazione del motore AML AI |
financialservices.v1datasets.delete | Eliminare un set di dati AML AI |
financialservices.v1instances.delete | Elimina un'istanza AML AI |
bigquery.datasets.delete | Elimina un set di dati BigQuery |