This page lists the IAM roles and permissions for Cloud Key Management Service. To search through all roles and permissions, see the role and permission index.
Cloud Key Management Service roles
Role | Permissions |
---|---|
Cloud KMS Admin( Provides access to Cloud KMS resources, except for access to restricted resource types and cryptographic operations. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Autokey Admin( Enables management of AutokeyConfig. |
|
Cloud KMS Autokey User( Grants ability to use KeyHandle resources. |
|
Cloud KMS CryptoKey Decrypter( Provides ability to use Cloud KMS resources for decrypt operations only. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Decrypter Via Delegation( Enables Decrypt operations via other Google Cloud services Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter( Provides ability to use Cloud KMS resources for encrypt operations only. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter/Decrypter( Provides ability to use Cloud KMS resources for encrypt and decrypt operations only. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation( Enables Encrypt and Decrypt operations via other Google Cloud services Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter Via Delegation( Enables Encrypt operations via other Google Cloud services Lowest-level resources where you can grant this role:
|
|
Cloud KMS Crypto Operator( Enables all Crypto Operations. Lowest-level resources where you can grant this role:
|
|
Cloud KMS EkmConnections Admin( Enables management of EkmConnections. |
|
Cloud KMS Expert Raw AES-CBC Key Manager( Enables raw AES-CBC keys management. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Expert Raw AES-CTR Key Manager( Enables raw AES-CTR keys management. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Expert Raw PKCS#1 Key Manager( Enables raw PKCS#1 keys management. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Importer( Enables ImportCryptoKeyVersion, CreateImportJob, ListImportJobs, and GetImportJob operations |
|
Cloud KMS Organization Service Agent( Gives Cloud KMS organization-level service account access to managed resources. |
|
Cloud KMS Protected Resources Viewer( Enables viewing protected resources. |
|
Cloud KMS CryptoKey Public Key Viewer( Enables GetPublicKey operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS Service Agent( Gives Cloud KMS service account access to managed resources. |
|
Cloud KMS CryptoKey Signer( Enables Sign operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Signer/Verifier( Enables Sign, Verify, and GetPublicKey operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Verifier( Enables Verify and GetPublicKey operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS Viewer( Enables Get and List operations. Lowest-level resources where you can grant this role:
|
|
Cloud KMS KACLS Service Agent( Grants Cloud KMS KACLS Service Agent access to KMS resource permissions to perform DEK encryption/decryption. |
|
Cloud Key Management Service permissions
Permission | Included in roles |
---|---|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Autokey Admin (
Cloud KMS Viewer ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS Autokey Admin ( |
|
Owner (
Editor (
Cloud KMS Admin ( |
|
Owner (
Cloud KMS Admin ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Kubernetes Engine KMS Crypto Key User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer ( |
|
Owner (
Cloud KMS Expert Raw AES-CBC Key Manager ( |
|
Owner (
Cloud KMS Expert Raw AES-CTR Key Manager ( |
|
Owner (
Cloud KMS Expert Raw PKCS#1 Key Manager ( |
|
Owner (
Cloud KMS Admin ( |
|
Owner (
Editor (
Cloud KMS Admin ( |
|
Owner (
Cloud KMS CryptoKey Decrypter (
Cloud KMS CryptoKey Encrypter/Decrypter (
Cloud KMS Crypto Operator ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
Cloud KMS CryptoKey Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation ( |
|
Owner (
Cloud KMS CryptoKey Encrypter (
Cloud KMS CryptoKey Encrypter/Decrypter (
Cloud KMS Crypto Operator ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter Via Delegation ( |
|
Owner (
Cloud KMS Crypto Operator (
Cloud KMS CryptoKey Signer (
Cloud KMS CryptoKey Signer/Verifier (
Kubernetes Engine KMS Crypto Key User ( |
|
Owner (
Cloud KMS Crypto Operator (
Cloud KMS CryptoKey Signer/Verifier (
Cloud KMS CryptoKey Verifier (
Kubernetes Engine KMS Crypto Key User ( |
|
Owner (
Cloud KMS Crypto Operator (
Cloud KMS CryptoKey Public Key Viewer (
Cloud KMS CryptoKey Signer/Verifier (
Cloud KMS CryptoKey Verifier (
Kubernetes Engine KMS Crypto Key User ( |
|
Owner (
Editor (
Cloud KMS Admin ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Kubernetes Engine KMS Crypto Key User (
SLZ BQDW Blueprint Project Level Remediator ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer (
SLZ BQDW Blueprint Project Level Remediator ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
SLZ BQDW Blueprint Project Level Remediator ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
Security Admin (
SLZ BQDW Blueprint Project Level Remediator ( |
|
Owner (
Editor (
Cloud KMS Admin (
SLZ BQDW Blueprint Project Level Remediator ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin (
Cloud KMS Viewer ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer ( |
|
Owner (
Cloud KMS Admin (
Security Admin ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin (
Cloud KMS Viewer ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
Security Admin ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin ( |
|
Owner (
Editor (
Cloud KMS Admin ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin ( Service agent roles
|
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS Importer ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Importer (
Cloud KMS Viewer ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Importer (
Cloud KMS Viewer (
Security Admin (
Security Reviewer ( |
|
Owner (
Cloud KMS Admin (
Security Admin ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS Importer ( |
|
Owner (
Editor (
Cloud AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery User (
Bigtable Administrator (
Cloud KMS Admin (
Cloud KMS Autokey User (
Cloud SQL Admin (
Composer Administrator (
Environment and Storage Object Administrator (
Composer Worker (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataflow Developer (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Admin (
Firebase Develop Admin (
Notebooks Legacy Admin (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Cloud Spanner Admin (
Cloud Spanner Database Admin (
Storage Admin ( |
|
Owner (
Editor (
Viewer (
Cloud AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery User (
Bigtable Administrator (
Cloud KMS Admin (
Cloud KMS Autokey User (
Cloud KMS Viewer (
Cloud SQL Admin (
Composer Administrator (
Environment and Storage Object Administrator (
Composer Worker (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataflow Developer (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Admin (
Firebase Develop Admin (
Notebooks Legacy Admin (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Cloud Spanner Admin (
Cloud Spanner Database Admin (
Storage Admin ( |
|
Owner (
Editor (
Viewer (
Cloud AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery User (
Bigtable Administrator (
Cloud KMS Admin (
Cloud KMS Autokey User (
Cloud KMS Viewer (
Cloud SQL Admin (
Composer Administrator (
Environment and Storage Object Administrator (
Composer Worker (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataflow Developer (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Admin (
Firebase Develop Admin (
Security Admin (
Security Reviewer (
Notebooks Legacy Admin (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Cloud Spanner Admin (
Cloud Spanner Database Admin (
Storage Admin ( |
|
Owner (
Editor (
Cloud KMS Admin ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Tag User ( |
|
Owner (
Cloud KMS Admin (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Tag User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer (
SLZ BQDW Blueprint Project Level Remediator ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Tag User (
Tag Viewer ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Tag User (
Tag Viewer ( |
|
Owner (
Cloud KMS Admin (
Security Admin (
SLZ BQDW Blueprint Project Level Remediator ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Crypto Operator ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS CryptoKey Decrypter (
Cloud KMS CryptoKey Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter (
Cloud KMS CryptoKey Encrypter/Decrypter (
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter Via Delegation (
Cloud KMS Crypto Operator (
Cloud KMS Expert Raw AES-CBC Key Manager (
Cloud KMS Expert Raw AES-CTR Key Manager (
Cloud KMS Expert Raw PKCS#1 Key Manager (
Cloud KMS Importer (
Cloud KMS CryptoKey Public Key Viewer (
Cloud KMS CryptoKey Signer (
Cloud KMS CryptoKey Signer/Verifier (
Cloud KMS CryptoKey Verifier (
Cloud KMS Viewer (
Kubernetes Engine KMS Crypto Key User ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS CryptoKey Decrypter (
Cloud KMS CryptoKey Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter (
Cloud KMS CryptoKey Encrypter/Decrypter (
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter Via Delegation (
Cloud KMS Crypto Operator (
Cloud KMS Expert Raw AES-CBC Key Manager (
Cloud KMS Expert Raw AES-CTR Key Manager (
Cloud KMS Expert Raw PKCS#1 Key Manager (
Cloud KMS Importer (
Cloud KMS CryptoKey Public Key Viewer (
Cloud KMS CryptoKey Signer (
Cloud KMS CryptoKey Signer/Verifier (
Cloud KMS CryptoKey Verifier (
Cloud KMS Viewer (
Kubernetes Engine KMS Crypto Key User (
Security Admin (
Security Reviewer ( Service agent roles
|
|
Owner (
Cloud KMS Admin ( |
|
Owner (
Editor (
Viewer (
Cloud AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery User (
Bigtable Administrator (
Cloud KMS Admin (
Cloud KMS Autokey User (
Cloud KMS Viewer (
Cloud SQL Admin (
Composer Administrator (
Environment and Storage Object Administrator (
Composer Worker (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataflow Developer (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Admin (
Firebase Develop Admin (
Notebooks Legacy Admin (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Cloud Spanner Admin (
Cloud Spanner Database Admin (
Storage Admin ( |
|
Owner (
Editor (
Viewer (
Cloud AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery User (
Bigtable Administrator (
Cloud KMS Admin (
Cloud KMS Autokey Admin (
Cloud KMS Autokey User (
Cloud SQL Admin (
Composer Administrator (
Environment and Storage Object Administrator (
Composer Worker (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataflow Developer (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Admin (
Firebase Develop Admin (
Notebooks Legacy Admin (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Cloud Spanner Admin (
Cloud Spanner Database Admin (
Storage Admin ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Protected Resources Viewer ( |