Nesta página, mostramos como criar um projeto do Google Cloud , ativar a IA de AML, criar credenciais de autenticação e conceder à sua conta um ou mais papéis do IAM.
- Sign in to your Google Cloud account. If you're new to Google Cloud, create an account to evaluate how our products perform in real-world scenarios. New customers also get $300 in free credits to run, test, and deploy workloads.
-
Install the Google Cloud CLI.
-
Ao usar um provedor de identidade (IdP) externo, primeiro faça login na gcloud CLI com sua identidade federada.
-
Para inicializar a gcloud CLI, execute o seguinte comando:
gcloud init
-
Create or select a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator
(
roles/resourcemanager.projectCreator
), which contains theresourcemanager.projects.create
permission. Learn how to grant roles.
-
Create a Google Cloud project:
gcloud projects create PROJECT_ID
Replace
PROJECT_ID
with a name for the Google Cloud project you are creating. -
Select the Google Cloud project that you created:
gcloud config set project PROJECT_ID
Replace
PROJECT_ID
with your Google Cloud project name.
-
Verify that billing is enabled for your Google Cloud project.
-
Enable the required APIs:
Roles required to enable APIs
To enable APIs, you need the Service Usage Admin IAM role (
roles/serviceusage.serviceUsageAdmin
), which contains theserviceusage.services.enable
permission. Learn how to grant roles.gcloud services enable financialservices.googleapis.com
bigquery.googleapis.com cloudkms.googleapis.com -
If you're using a local shell, then create local authentication credentials for your user account:
gcloud auth application-default login
You don't need to do this if you're using Cloud Shell.
If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.
-
Grant roles to your user account. Run the following command once for each of the following IAM roles:
roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin
gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE
Replace the following:
PROJECT_ID
: your project ID.USER_IDENTIFIER
: the identifier for your user account—for example,myemail@example.com
.ROLE
: the IAM role that you grant to your user account.
-
Install the Google Cloud CLI.
-
Ao usar um provedor de identidade (IdP) externo, primeiro faça login na gcloud CLI com sua identidade federada.
-
Para inicializar a gcloud CLI, execute o seguinte comando:
gcloud init
-
Create or select a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator
(
roles/resourcemanager.projectCreator
), which contains theresourcemanager.projects.create
permission. Learn how to grant roles.
-
Create a Google Cloud project:
gcloud projects create PROJECT_ID
Replace
PROJECT_ID
with a name for the Google Cloud project you are creating. -
Select the Google Cloud project that you created:
gcloud config set project PROJECT_ID
Replace
PROJECT_ID
with your Google Cloud project name.
-
Verify that billing is enabled for your Google Cloud project.
-
Enable the required APIs:
Roles required to enable APIs
To enable APIs, you need the Service Usage Admin IAM role (
roles/serviceusage.serviceUsageAdmin
), which contains theserviceusage.services.enable
permission. Learn how to grant roles.gcloud services enable financialservices.googleapis.com
bigquery.googleapis.com cloudkms.googleapis.com -
If you're using a local shell, then create local authentication credentials for your user account:
gcloud auth application-default login
You don't need to do this if you're using Cloud Shell.
If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.
-
Grant roles to your user account. Run the following command once for each of the following IAM roles:
roles/financialservices.admin, roles/cloudkms.admin, roles/bigquery.admin
gcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE
Replace the following:
PROJECT_ID
: your project ID.USER_IDENTIFIER
: the identifier for your user account—for example,myemail@example.com
.ROLE
: the IAM role that you grant to your user account.
Permissões necessárias
As permissões a seguir são necessárias para concluir o guia de início rápido e para realizar muitas operações vitais na AML AI.
Permissão | Descrição |
---|---|
resourcemanager.projects.get | Receber um projeto do Google Cloud |
resourcemanager.projects.list | List Google Cloud projects |
cloudkms.keyRings.create | Criar um keyring do Cloud KMS |
cloudkms.cryptoKeys.create | Criar uma chave do Cloud KMS |
financialservices.v1instances.create | Criar uma instância da AI antilavagem de dinheiro |
financialservices.operations.get | Acessar uma operação de IA antilavagem de dinheiro |
cloudkms.cryptoKeys.getIamPolicy | Acessar a política do IAM em uma chave do Cloud KMS |
cloudkms.cryptoKeys.setIamPolicy | Definir a política do IAM em uma chave do Cloud KMS |
bigquery.datasets.create | Criar um conjunto de dados do BigQuery |
bigquery.datasets.get | Extrair um conjunto de dados do BigQuery |
bigquery.transfers.get | Receber uma transferência do serviço de transferência de dados do BigQuery |
bigquery.transfers.update | Criar ou excluir uma transferência do serviço de transferência de dados do BigQuery |
bigquery.datasets.setIamPolicy | Definir a política do IAM em um conjunto de dados do BigQuery |
bigquery.datasets.update | Atualizar um conjunto de dados do BigQuery |
financialservices.v1datasets.create | Criar um conjunto de dados de IA antilavagem de dinheiro |
financialservices.v1engineconfigs.create | Criar uma configuração do mecanismo de AI antilavagem de dinheiro |
financialservices.v1models.create | Criar um modelo de IA antilavagem de dinheiro |
financialservices.v1backtests.create | Criar um resultado de backtest da IA antilavagem de dinheiro |
financialservices.v1backtests.exportMetadata | Exportar metadados de um resultado de backtest da IA de AML |
financialservices.v1instances.importRegisteredParties | Importar partes registradas para uma instância de IA de AML |
financialservices.v1predictions.create | Criar um resultado de previsão da AI antilavagem de dinheiro |
bigquery.jobs.create | Criar um job do BigQuery |
bigquery.tables.getData | Extrair dados de uma tabela do BigQuery |
financialservices.v1predictions.delete | Excluir um resultado de previsão da IA de AML |
financialservices.v1backtests.delete | Excluir um resultado de backtest da IA de AML |
financialservices.v1models.delete | Excluir um modelo de IA antilavagem de dinheiro |
financialservices.v1engineconfigs.delete | Excluir uma configuração do mecanismo de IA antilavagem de dinheiro |
financialservices.v1datasets.delete | Excluir um conjunto de dados da AI antilavagem de dinheiro |
financialservices.v1instances.delete | Excluir uma instância da AML AI |
bigquery.datasets.delete | Excluir um conjunto de dados do BigQuery |