이 페이지에서는 Google Cloud 프로젝트를 만들고, AML AI를 사용 설정하고, 사용자 인증 정보를 만들어 계정에 하나 이상의 IAM 역할을 부여하는 방법을 보여줍니다.
- Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
-
Install the Google Cloud CLI.
-
외부 ID 공급업체(IdP)를 사용하는 경우 먼저 제휴 ID로 gcloud CLI에 로그인해야 합니다.
-
gcloud CLI를 초기화하려면, 다음 명령어를 실행합니다.
gcloud init
-
Create or select a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator
(
roles/resourcemanager.projectCreator
), which contains theresourcemanager.projects.create
permission. Learn how to grant roles.
-
Create a Google Cloud project:
gcloud projects create PROJECT_ID
Replace
PROJECT_ID
with a name for the Google Cloud project you are creating. -
Select the Google Cloud project that you created:
gcloud config set project PROJECT_ID
Replace
PROJECT_ID
with your Google Cloud project name.
-
Verify that billing is enabled for your Google Cloud project.
-
Enable the required APIs:
Roles required to enable APIs
To enable APIs, you need the Service Usage Admin IAM role (
roles/serviceusage.serviceUsageAdmin
), which contains theserviceusage.services.enable
permission. Learn how to grant roles.gcloud services enable financialservices.googleapis.com
bigquery.googleapis.com cloudkms.googleapis.com -
If you're using a local shell, then create local authentication credentials for your user account:
gcloud auth application-default login
You don't need to do this if you're using Cloud Shell.
If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.
-
Grant roles to your user account. Run the following command once for each of the following IAM roles:
roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin
gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE
Replace the following:
PROJECT_ID
: your project ID.USER_IDENTIFIER
: the identifier for your user account—for example,myemail@example.com
.ROLE
: the IAM role that you grant to your user account.
-
Install the Google Cloud CLI.
-
외부 ID 공급업체(IdP)를 사용하는 경우 먼저 제휴 ID로 gcloud CLI에 로그인해야 합니다.
-
gcloud CLI를 초기화하려면, 다음 명령어를 실행합니다.
gcloud init
-
Create or select a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator
(
roles/resourcemanager.projectCreator
), which contains theresourcemanager.projects.create
permission. Learn how to grant roles.
-
Create a Google Cloud project:
gcloud projects create PROJECT_ID
Replace
PROJECT_ID
with a name for the Google Cloud project you are creating. -
Select the Google Cloud project that you created:
gcloud config set project PROJECT_ID
Replace
PROJECT_ID
with your Google Cloud project name.
-
Verify that billing is enabled for your Google Cloud project.
-
Enable the required APIs:
Roles required to enable APIs
To enable APIs, you need the Service Usage Admin IAM role (
roles/serviceusage.serviceUsageAdmin
), which contains theserviceusage.services.enable
permission. Learn how to grant roles.gcloud services enable financialservices.googleapis.com
bigquery.googleapis.com cloudkms.googleapis.com -
If you're using a local shell, then create local authentication credentials for your user account:
gcloud auth application-default login
You don't need to do this if you're using Cloud Shell.
If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.
-
Grant roles to your user account. Run the following command once for each of the following IAM roles:
roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin
gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE
Replace the following:
PROJECT_ID
: your project ID.USER_IDENTIFIER
: the identifier for your user account—for example,myemail@example.com
.ROLE
: the IAM role that you grant to your user account.
필수 권한
다음 권한은 빠른 시작을 완료하고 AML AI에서 여러 중요한 작업을 수행하는 데 필요합니다.
권한 | 설명 |
---|---|
resourcemanager.projects.get | Google Cloud 프로젝트 가져오기 |
resourcemanager.projects.list | Google Cloud 프로젝트 나열 |
cloudkms.keyRings.create | Cloud KMS 키링 만들기 |
cloudkms.cryptoKeys.create | Cloud KMS 키 만들기 |
financialservices.v1instances.create | AML AI 인스턴스 만들기 |
financialservices.operations.get | AML AI 작업 가져오기 |
cloudkms.cryptoKeys.getIamPolicy | Cloud KMS 키의 IAM 정책 가져오기 |
cloudkms.cryptoKeys.setIamPolicy | Cloud KMS 키의 IAM 정책 설정 |
bigquery.datasets.create | BigQuery 데이터 세트 만들기 |
bigquery.datasets.get | BigQuery 데이터 세트 가져오기 |
bigquery.transfers.get | BigQuery Data Transfer Service 전송 가져오기 |
bigquery.transfers.update | BigQuery Data Transfer Service 전송 만들기 또는 삭제 |
bigquery.datasets.setIamPolicy | BigQuery 데이터 세트의 IAM 정책 설정 |
bigquery.datasets.update | BigQuery 데이터 세트 업데이트 |
financialservices.v1datasets.create | AML AI 데이터 세트 만들기 |
financialservices.v1engineconfigs.create | AML AI 엔진 구성 만들기 |
financialservices.v1models.create | AML AI 모델 만들기 |
financialservices.v1backtests.create | AML AI 백테스트 결과 만들기 |
financialservices.v1backtests.exportMetadata | AML AI 백테스트 결과에서 메타데이터 내보내기 |
financialservices.v1instances.importRegisteredParties | 등록된 당사자를 AML AI 인스턴스로 가져오기 |
financialservices.v1predictions.create | AML AI 예측 결과 만들기 |
bigquery.jobs.create | BigQuery 작업 만들기 |
bigquery.tables.getData | BigQuery 테이블에서 데이터 가져오기 |
financialservices.v1predictions.delete | AML AI 예측 결과 삭제 |
financialservices.v1backtests.delete | AML AI 백테스트 결과 삭제 |
financialservices.v1models.delete | AML AI 모델 삭제 |
financialservices.v1engineconfigs.delete | AML AI 엔진 구성 삭제 |
financialservices.v1datasets.delete | AML AI 데이터 세트 삭제 |
financialservices.v1instances.delete | AML AI 인스턴스 삭제 |
bigquery.datasets.delete | BigQuery 데이터 세트 삭제 |