Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Identity and Access Management (IAM) memungkinkan Anda
memberikan peran secara bersyarat. Namun, beberapa layanan Google Cloud
tidak mengizinkan binding peran kondisional dalam kebijakan izin resource
mereka.
Halaman ini mencantumkan layanan yang mengizinkan binding peran bersyarat dalam
kebijakan izin resource-nya. Untuk melihat jenis resource untuk layanan ini yang memiliki
kebijakan izin, lihat Jenis resource yang menerima kebijakan
izin.
Jika Anda perlu memberikan akses bersyarat ke resource yang tidak mengizinkan
kondisi atau resource yang tidak memiliki kebijakan izin, lihat Dukungan untuk
kondisi yang diwariskan.
Layanan yang mengizinkan kondisi
Anda dapat menambahkan kondisi untuk mengizinkan kebijakan untuk resource dari
layanan berikut:
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-21 UTC."],[],[],null,["# Services that allow conditional role bindings\n\nIdentity and Access Management (IAM) lets you\n[grant roles conditionally](/iam/docs/conditions-overview). However, some Google Cloud\nservices don't allow conditional role bindings in their resources' allow\npolicies.\n\nThis page lists the services that allow conditional role bindings in their\nresources' allow policies. To see which resource types for these services have\nallow policies, see [Resource types that accept allow\npolicies](/iam/docs/resource-types-with-policies).\n\nIf you need to grant conditional access to a resource that doesn't allow\nconditions or a resource that doesn't have an allow policy, see [Support for\ninherited conditions](/iam/docs/conditions-attribute-reference#inherited-support).\n\nServices that allow conditions\n------------------------------\n\nYou can add conditions to allow policies for resources from the\nfollowing services:\n\n- [Cloud Bigtable Admin API](/bigtable/docs)\n\n\u003c!-- --\u003e\n\n- [Binary Authorization](/binary-authorization/docs)\n\n\u003c!-- --\u003e\n\n- [BigQuery](/bigquery/docs)\n\n\u003c!-- --\u003e\n\n- [Certificate Authority Service](/certificate-authority-service/docs)\n\n\u003c!-- --\u003e\n\n- [Chrome Enterprise Premium](/chrome-enterprise-premium/docs)\n\n\u003c!-- --\u003e\n\n- [Cloud Deploy](/deploy/docs)\n\n\u003c!-- --\u003e\n\n- [Cloud Key Management Service (Cloud KMS)](/kms/docs)\n- [Cloud Logging](/logging/docs)\n\n\u003c!-- --\u003e\n\n- [Cloud Run](/run/docs)\n\n\u003c!-- --\u003e\n\n- [Cloud Storage](/storage/docs)\n\n\u003c!-- --\u003e\n\n- [Cloud Workstations](/workstations/docs)\n\n\u003c!-- --\u003e\n\n- [Compute Engine](/compute/docs)\n\n\u003c!-- --\u003e\n\n- [Dataproc](/dataproc/docs)\n\n\u003c!-- --\u003e\n\n- [Identity-Aware Proxy (IAP)](/iap/docs)\n\n\u003c!-- --\u003e\n\n- [Identity and Access Management (IAM)](/iam/docs)\n- [Resource Manager](/resource-manager/docs)\n\n\u003c!-- --\u003e\n\n- [Secret Manager](/secret-manager/docs)\n\n\u003c!-- --\u003e\n\n- [Service Management](/service-infrastructure/docs/service-management/getting-started)\n\n\u003c!-- --\u003e\n\n- [Spanner](/spanner/docs)"]]