Cloud Run 역할 및 권한

이 페이지에는 Cloud Run의 IAM 역할과 권한이 나와 있습니다. 모든 역할과 권한을 검색하려면 역할 및 권한 색인을 참조하세요.

Cloud Run 역할

Role Permissions

(roles/run.admin)

Full control over all Cloud Run resources.

Lowest-level resources where you can grant this role:

  • Cloud Run service
  • Cloud Run job

recommender.locations.*

  • recommender.locations.get
  • recommender.locations.list

recommender.runServiceCostInsights.*

  • recommender.runServiceCostInsights.get
  • recommender.runServiceCostInsights.list
  • recommender.runServiceCostInsights.update

recommender.runServiceCostRecommendations.*

  • recommender.runServiceCostRecommendations.get
  • recommender.runServiceCostRecommendations.list
  • recommender.runServiceCostRecommendations.update

recommender.runServiceIdentityInsights.*

  • recommender.runServiceIdentityInsights.get
  • recommender.runServiceIdentityInsights.list
  • recommender.runServiceIdentityInsights.update

recommender.runServiceIdentityRecommendations.*

  • recommender.runServiceIdentityRecommendations.get
  • recommender.runServiceIdentityRecommendations.list
  • recommender.runServiceIdentityRecommendations.update

recommender.runServicePerformanceInsights.*

  • recommender.runServicePerformanceInsights.get
  • recommender.runServicePerformanceInsights.list
  • recommender.runServicePerformanceInsights.update

recommender.runServicePerformanceRecommendations.*

  • recommender.runServicePerformanceRecommendations.get
  • recommender.runServicePerformanceRecommendations.list
  • recommender.runServicePerformanceRecommendations.update

recommender.runServiceSecurityInsights.*

  • recommender.runServiceSecurityInsights.get
  • recommender.runServiceSecurityInsights.list
  • recommender.runServiceSecurityInsights.update

recommender.runServiceSecurityRecommendations.*

  • recommender.runServiceSecurityRecommendations.get
  • recommender.runServiceSecurityRecommendations.list
  • recommender.runServiceSecurityRecommendations.update

resourcemanager.projects.get

resourcemanager.projects.list

run.*

  • run.configurations.get
  • run.configurations.list
  • run.executions.cancel
  • run.executions.delete
  • run.executions.get
  • run.executions.list
  • run.jobs.create
  • run.jobs.createTagBinding
  • run.jobs.delete
  • run.jobs.deleteTagBinding
  • run.jobs.get
  • run.jobs.getIamPolicy
  • run.jobs.list
  • run.jobs.listEffectiveTags
  • run.jobs.listTagBindings
  • run.jobs.run
  • run.jobs.runWithOverrides
  • run.jobs.setIamPolicy
  • run.jobs.update
  • run.locations.list
  • run.operations.delete
  • run.operations.get
  • run.operations.list
  • run.revisions.delete
  • run.revisions.get
  • run.revisions.list
  • run.routes.get
  • run.routes.invoke
  • run.routes.list
  • run.services.create
  • run.services.createTagBinding
  • run.services.delete
  • run.services.deleteTagBinding
  • run.services.get
  • run.services.getIamPolicy
  • run.services.list
  • run.services.listEffectiveTags
  • run.services.listTagBindings
  • run.services.setIamPolicy
  • run.services.update
  • run.tasks.get
  • run.tasks.list

(roles/run.builder)

Can build Cloud Run functions and source deployed services.

artifactregistry.repositories.deleteArtifacts

artifactregistry.repositories.downloadArtifacts

artifactregistry.repositories.uploadArtifacts

logging.logEntries.create

source.repos.get

storage.objects.get

(roles/run.developer)

Read and write access to all Cloud Run resources.

Lowest-level resources where you can grant this role:

  • Cloud Run service
  • Cloud Run job

recommender.locations.*

  • recommender.locations.get
  • recommender.locations.list

recommender.runServiceCostInsights.*

  • recommender.runServiceCostInsights.get
  • recommender.runServiceCostInsights.list
  • recommender.runServiceCostInsights.update

recommender.runServiceCostRecommendations.*

  • recommender.runServiceCostRecommendations.get
  • recommender.runServiceCostRecommendations.list
  • recommender.runServiceCostRecommendations.update

recommender.runServiceIdentityInsights.*

  • recommender.runServiceIdentityInsights.get
  • recommender.runServiceIdentityInsights.list
  • recommender.runServiceIdentityInsights.update

recommender.runServiceIdentityRecommendations.*

  • recommender.runServiceIdentityRecommendations.get
  • recommender.runServiceIdentityRecommendations.list
  • recommender.runServiceIdentityRecommendations.update

recommender.runServicePerformanceInsights.*

  • recommender.runServicePerformanceInsights.get
  • recommender.runServicePerformanceInsights.list
  • recommender.runServicePerformanceInsights.update

recommender.runServicePerformanceRecommendations.*

  • recommender.runServicePerformanceRecommendations.get
  • recommender.runServicePerformanceRecommendations.list
  • recommender.runServicePerformanceRecommendations.update

recommender.runServiceSecurityInsights.*

  • recommender.runServiceSecurityInsights.get
  • recommender.runServiceSecurityInsights.list
  • recommender.runServiceSecurityInsights.update

recommender.runServiceSecurityRecommendations.*

  • recommender.runServiceSecurityRecommendations.get
  • recommender.runServiceSecurityRecommendations.list
  • recommender.runServiceSecurityRecommendations.update

resourcemanager.projects.get

resourcemanager.projects.list

run.configurations.*

  • run.configurations.get
  • run.configurations.list

run.executions.*

  • run.executions.cancel
  • run.executions.delete
  • run.executions.get
  • run.executions.list

run.jobs.create

run.jobs.delete

run.jobs.get

run.jobs.getIamPolicy

run.jobs.list

run.jobs.listEffectiveTags

run.jobs.listTagBindings

run.jobs.run

run.jobs.runWithOverrides

run.jobs.update

run.locations.list

run.operations.*

  • run.operations.delete
  • run.operations.get
  • run.operations.list

run.revisions.*

  • run.revisions.delete
  • run.revisions.get
  • run.revisions.list

run.routes.*

  • run.routes.get
  • run.routes.invoke
  • run.routes.list

run.services.create

run.services.delete

run.services.get

run.services.getIamPolicy

run.services.list

run.services.listEffectiveTags

run.services.listTagBindings

run.services.update

run.tasks.*

  • run.tasks.get
  • run.tasks.list

(roles/run.invoker)

Can invoke Cloud Run services and execute Cloud Run jobs.

Lowest-level resources where you can grant this role:

  • Cloud Run service
  • Cloud Run job

run.jobs.run

run.routes.invoke

(roles/run.jobsExecutor)

Can execute and cancel Cloud Run jobs.

run.executions.cancel

run.jobs.run

(roles/run.jobsExecutorWithOverrides)

Can execute and cancel Cloud Run jobs with overrides.

run.executions.cancel

run.jobs.run

run.jobs.runWithOverrides

(roles/run.serviceAgent)

Gives Cloud Run service account access to managed resources.

artifactregistry.attachments.get

artifactregistry.attachments.list

artifactregistry.dockerimages.*

  • artifactregistry.dockerimages.get
  • artifactregistry.dockerimages.list

artifactregistry.files.download

artifactregistry.files.get

artifactregistry.files.list

artifactregistry.locations.*

  • artifactregistry.locations.get
  • artifactregistry.locations.list

artifactregistry.mavenartifacts.*

  • artifactregistry.mavenartifacts.get
  • artifactregistry.mavenartifacts.list

artifactregistry.npmpackages.*

  • artifactregistry.npmpackages.get
  • artifactregistry.npmpackages.list

artifactregistry.packages.get

artifactregistry.packages.list

artifactregistry.projectsettings.get

artifactregistry.pythonpackages.*

  • artifactregistry.pythonpackages.get
  • artifactregistry.pythonpackages.list

artifactregistry.repositories.downloadArtifacts

artifactregistry.repositories.get

artifactregistry.repositories.list

artifactregistry.repositories.listEffectiveTags

artifactregistry.repositories.listTagBindings

artifactregistry.repositories.readViaVirtualRepository

artifactregistry.repositories.uploadArtifacts

artifactregistry.rules.get

artifactregistry.rules.list

artifactregistry.tags.get

artifactregistry.tags.list

artifactregistry.versions.get

artifactregistry.versions.list

binaryauthorization.platformPolicies.evaluatePolicy

binaryauthorization.policy.evaluatePolicy

clientauthconfig.clients.list

cloudbuild.builds.create

cloudbuild.builds.get

compute.addresses.create

compute.addresses.createInternal

compute.addresses.delete

compute.addresses.deleteInternal

compute.addresses.get

compute.addresses.list

compute.globalOperations.get

compute.networks.access

compute.networks.get

compute.regionOperations.get

compute.subnetworks.get

compute.subnetworks.use

compute.zoneOperations.get

iam.serviceAccounts.actAs

iam.serviceAccounts.getAccessToken

iam.serviceAccounts.getOpenIdToken

iam.serviceAccounts.signBlob

networkservices.meshes.get

resourcemanager.projects.get

resourcemanager.projects.getIamPolicy

resourcemanager.projects.list

run.routes.invoke

serviceusage.services.get

serviceusage.services.use

storage.folders.get

storage.folders.list

storage.managedFolders.get

storage.managedFolders.list

storage.objects.get

storage.objects.list

vpcaccess.connectors.get

vpcaccess.connectors.use

(roles/run.servicesInvoker)

Can invoke Cloud Run services.

run.routes.invoke

(roles/run.sourceDeveloper)

Deploy and manage Cloud Run source deployed resources.

artifactregistry.attachments.get

artifactregistry.attachments.list

artifactregistry.dockerimages.*

  • artifactregistry.dockerimages.get
  • artifactregistry.dockerimages.list

artifactregistry.files.download

artifactregistry.files.get

artifactregistry.files.list

artifactregistry.locations.*

  • artifactregistry.locations.get
  • artifactregistry.locations.list

artifactregistry.mavenartifacts.*

  • artifactregistry.mavenartifacts.get
  • artifactregistry.mavenartifacts.list

artifactregistry.npmpackages.*

  • artifactregistry.npmpackages.get
  • artifactregistry.npmpackages.list

artifactregistry.packages.get

artifactregistry.packages.list

artifactregistry.projectsettings.get

artifactregistry.pythonpackages.*

  • artifactregistry.pythonpackages.get
  • artifactregistry.pythonpackages.list

artifactregistry.repositories.create

artifactregistry.repositories.downloadArtifacts

artifactregistry.repositories.get

artifactregistry.repositories.list

artifactregistry.repositories.listEffectiveTags

artifactregistry.repositories.listTagBindings

artifactregistry.repositories.readViaVirtualRepository

artifactregistry.rules.get

artifactregistry.rules.list

artifactregistry.tags.get

artifactregistry.tags.list

artifactregistry.versions.get

artifactregistry.versions.list

cloudbuild.builds.create

cloudbuild.builds.get

cloudbuild.builds.list

cloudbuild.builds.update

cloudbuild.locations.*

  • cloudbuild.locations.get
  • cloudbuild.locations.list

cloudbuild.operations.*

  • cloudbuild.operations.get
  • cloudbuild.operations.list

eventarc.channelConnections.create

eventarc.channelConnections.delete

eventarc.channelConnections.get

eventarc.channelConnections.getIamPolicy

eventarc.channelConnections.list

eventarc.channelConnections.publish

eventarc.channels.attach

eventarc.channels.create

eventarc.channels.delete

eventarc.channels.get

eventarc.channels.getIamPolicy

eventarc.channels.list

eventarc.channels.publish

eventarc.channels.undelete

eventarc.channels.update

eventarc.enrollments.create

eventarc.enrollments.delete

eventarc.enrollments.get

eventarc.enrollments.getIamPolicy

eventarc.enrollments.list

eventarc.enrollments.update

eventarc.googleApiSources.create

eventarc.googleApiSources.delete

eventarc.googleApiSources.get

eventarc.googleApiSources.getIamPolicy

eventarc.googleApiSources.list

eventarc.googleApiSources.update

eventarc.googleChannelConfigs.*

  • eventarc.googleChannelConfigs.get
  • eventarc.googleChannelConfigs.update

eventarc.kafkaSources.create

eventarc.kafkaSources.delete

eventarc.kafkaSources.get

eventarc.kafkaSources.getIamPolicy

eventarc.kafkaSources.list

eventarc.locations.*

  • eventarc.locations.get
  • eventarc.locations.list

eventarc.operations.*

  • eventarc.operations.cancel
  • eventarc.operations.delete
  • eventarc.operations.get
  • eventarc.operations.list

eventarc.pipelines.create

eventarc.pipelines.delete

eventarc.pipelines.get

eventarc.pipelines.getIamPolicy

eventarc.pipelines.list

eventarc.pipelines.update

eventarc.providers.*

  • eventarc.providers.get
  • eventarc.providers.list

eventarc.triggers.create

eventarc.triggers.delete

eventarc.triggers.get

eventarc.triggers.getIamPolicy

eventarc.triggers.list

eventarc.triggers.undelete

eventarc.triggers.update

orgpolicy.policy.get

pubsub.messageTransforms.validate

pubsub.schemas.attach

pubsub.schemas.commit

pubsub.schemas.create

pubsub.schemas.delete

pubsub.schemas.get

pubsub.schemas.list

pubsub.schemas.listRevisions

pubsub.schemas.rollback

pubsub.schemas.validate

pubsub.snapshots.create

pubsub.snapshots.delete

pubsub.snapshots.get

pubsub.snapshots.list

pubsub.snapshots.seek

pubsub.snapshots.update

pubsub.subscriptions.consume

pubsub.subscriptions.create

pubsub.subscriptions.delete

pubsub.subscriptions.get

pubsub.subscriptions.list

pubsub.subscriptions.update

pubsub.topics.attachSubscription

pubsub.topics.create

pubsub.topics.delete

pubsub.topics.detachSubscription

pubsub.topics.get

pubsub.topics.list

pubsub.topics.publish

pubsub.topics.update

pubsub.topics.updateTag

recommender.locations.*

  • recommender.locations.get
  • recommender.locations.list

recommender.runServiceCostInsights.*

  • recommender.runServiceCostInsights.get
  • recommender.runServiceCostInsights.list
  • recommender.runServiceCostInsights.update

recommender.runServiceCostRecommendations.*

  • recommender.runServiceCostRecommendations.get
  • recommender.runServiceCostRecommendations.list
  • recommender.runServiceCostRecommendations.update

recommender.runServiceIdentityInsights.*

  • recommender.runServiceIdentityInsights.get
  • recommender.runServiceIdentityInsights.list
  • recommender.runServiceIdentityInsights.update

recommender.runServiceIdentityRecommendations.*

  • recommender.runServiceIdentityRecommendations.get
  • recommender.runServiceIdentityRecommendations.list
  • recommender.runServiceIdentityRecommendations.update

recommender.runServicePerformanceInsights.*

  • recommender.runServicePerformanceInsights.get
  • recommender.runServicePerformanceInsights.list
  • recommender.runServicePerformanceInsights.update

recommender.runServicePerformanceRecommendations.*

  • recommender.runServicePerformanceRecommendations.get
  • recommender.runServicePerformanceRecommendations.list
  • recommender.runServicePerformanceRecommendations.update

recommender.runServiceSecurityInsights.*

  • recommender.runServiceSecurityInsights.get
  • recommender.runServiceSecurityInsights.list
  • recommender.runServiceSecurityInsights.update

recommender.runServiceSecurityRecommendations.*

  • recommender.runServiceSecurityRecommendations.get
  • recommender.runServiceSecurityRecommendations.list
  • recommender.runServiceSecurityRecommendations.update

remotebuildexecution.blobs.get

resourcemanager.projects.get

resourcemanager.projects.list

run.configurations.*

  • run.configurations.get
  • run.configurations.list

run.executions.*

  • run.executions.cancel
  • run.executions.delete
  • run.executions.get
  • run.executions.list

run.jobs.create

run.jobs.delete

run.jobs.get

run.jobs.getIamPolicy

run.jobs.list

run.jobs.listEffectiveTags

run.jobs.listTagBindings

run.jobs.run

run.jobs.runWithOverrides

run.jobs.update

run.locations.list

run.operations.*

  • run.operations.delete
  • run.operations.get
  • run.operations.list

run.revisions.*

  • run.revisions.delete
  • run.revisions.get
  • run.revisions.list

run.routes.*

  • run.routes.get
  • run.routes.invoke
  • run.routes.list

run.services.create

run.services.delete

run.services.get

run.services.getIamPolicy

run.services.list

run.services.listEffectiveTags

run.services.listTagBindings

run.services.update

run.tasks.*

  • run.tasks.get
  • run.tasks.list

serviceusage.quotas.get

serviceusage.services.get

serviceusage.services.list

serviceusage.services.use

storage.buckets.create

storage.buckets.get

storage.buckets.list

storage.folders.create

storage.folders.get

storage.folders.list

storage.managedFolders.create

storage.managedFolders.get

storage.managedFolders.list

storage.multipartUploads.abort

storage.multipartUploads.create

storage.multipartUploads.listParts

storage.objects.create

storage.objects.get

storage.objects.list

(roles/run.sourceViewer)

View Cloud Run source deployed resources.

artifactregistry.repositories.get

artifactregistry.repositories.list

cloudbuild.builds.get

cloudbuild.builds.list

cloudbuild.locations.*

  • cloudbuild.locations.get
  • cloudbuild.locations.list

cloudbuild.operations.*

  • cloudbuild.operations.get
  • cloudbuild.operations.list

eventarc.channelConnections.get

eventarc.channelConnections.getIamPolicy

eventarc.channelConnections.list

eventarc.channels.get

eventarc.channels.getIamPolicy

eventarc.channels.list

eventarc.enrollments.get

eventarc.enrollments.getIamPolicy

eventarc.enrollments.list

eventarc.googleApiSources.get

eventarc.googleApiSources.getIamPolicy

eventarc.googleApiSources.list

eventarc.googleChannelConfigs.get

eventarc.kafkaSources.get

eventarc.kafkaSources.getIamPolicy

eventarc.kafkaSources.list

eventarc.locations.*

  • eventarc.locations.get
  • eventarc.locations.list

eventarc.messageBuses.get

eventarc.messageBuses.getIamPolicy

eventarc.messageBuses.list

eventarc.messageBuses.use

eventarc.operations.get

eventarc.operations.list

eventarc.pipelines.get

eventarc.pipelines.getIamPolicy

eventarc.pipelines.list

eventarc.providers.*

  • eventarc.providers.get
  • eventarc.providers.list

eventarc.triggers.get

eventarc.triggers.getIamPolicy

eventarc.triggers.list

pubsub.messageTransforms.validate

pubsub.schemas.get

pubsub.schemas.list

pubsub.schemas.listRevisions

pubsub.schemas.validate

pubsub.snapshots.get

pubsub.snapshots.list

pubsub.subscriptions.get

pubsub.subscriptions.list

pubsub.topics.get

pubsub.topics.list

recommender.locations.*

  • recommender.locations.get
  • recommender.locations.list

recommender.runServiceCostInsights.get

recommender.runServiceCostInsights.list

recommender.runServiceCostRecommendations.get

recommender.runServiceCostRecommendations.list

recommender.runServiceIdentityInsights.get

recommender.runServiceIdentityInsights.list

recommender.runServiceIdentityRecommendations.get

recommender.runServiceIdentityRecommendations.list

recommender.runServicePerformanceInsights.get

recommender.runServicePerformanceInsights.list

recommender.runServicePerformanceRecommendations.get

recommender.runServicePerformanceRecommendations.list

recommender.runServiceSecurityInsights.get

recommender.runServiceSecurityInsights.list

recommender.runServiceSecurityRecommendations.get

recommender.runServiceSecurityRecommendations.list

remotebuildexecution.blobs.get

resourcemanager.projects.get

resourcemanager.projects.list

run.configurations.*

  • run.configurations.get
  • run.configurations.list

run.executions.get

run.executions.list

run.jobs.get

run.jobs.getIamPolicy

run.jobs.list

run.jobs.listEffectiveTags

run.jobs.listTagBindings

run.locations.list

run.operations.get

run.operations.list

run.revisions.get

run.revisions.list

run.routes.get

run.routes.list

run.services.get

run.services.getIamPolicy

run.services.list

run.services.listEffectiveTags

run.services.listTagBindings

run.tasks.*

  • run.tasks.get
  • run.tasks.list

serviceusage.quotas.get

serviceusage.services.get

serviceusage.services.list

storage.folders.get

storage.folders.list

storage.managedFolders.get

storage.managedFolders.list

storage.objects.get

storage.objects.list

(roles/run.viewer)

Can view the state of all Cloud Run resources, including IAM policies.

Lowest-level resources where you can grant this role:

  • Cloud Run service
  • Cloud Run job

recommender.locations.*

  • recommender.locations.get
  • recommender.locations.list

recommender.runServiceCostInsights.get

recommender.runServiceCostInsights.list

recommender.runServiceCostRecommendations.get

recommender.runServiceCostRecommendations.list

recommender.runServiceIdentityInsights.get

recommender.runServiceIdentityInsights.list

recommender.runServiceIdentityRecommendations.get

recommender.runServiceIdentityRecommendations.list

recommender.runServicePerformanceInsights.get

recommender.runServicePerformanceInsights.list

recommender.runServicePerformanceRecommendations.get

recommender.runServicePerformanceRecommendations.list

recommender.runServiceSecurityInsights.get

recommender.runServiceSecurityInsights.list

recommender.runServiceSecurityRecommendations.get

recommender.runServiceSecurityRecommendations.list

resourcemanager.projects.get

resourcemanager.projects.list

run.configurations.*

  • run.configurations.get
  • run.configurations.list

run.executions.get

run.executions.list

run.jobs.get

run.jobs.getIamPolicy

run.jobs.list

run.jobs.listEffectiveTags

run.jobs.listTagBindings

run.locations.list

run.operations.get

run.operations.list

run.revisions.get

run.revisions.list

run.routes.get

run.routes.list

run.services.get

run.services.getIamPolicy

run.services.list

run.services.listEffectiveTags

run.services.listTagBindings

run.tasks.*

  • run.tasks.get
  • run.tasks.list

(roles/serverless.serviceAgent)

Gives Cloud Run service account access to managed resources.

artifactregistry.attachments.get

artifactregistry.attachments.list

artifactregistry.dockerimages.*

  • artifactregistry.dockerimages.get
  • artifactregistry.dockerimages.list

artifactregistry.files.download

artifactregistry.files.get

artifactregistry.files.list

artifactregistry.locations.*

  • artifactregistry.locations.get
  • artifactregistry.locations.list

artifactregistry.mavenartifacts.*

  • artifactregistry.mavenartifacts.get
  • artifactregistry.mavenartifacts.list

artifactregistry.npmpackages.*

  • artifactregistry.npmpackages.get
  • artifactregistry.npmpackages.list

artifactregistry.packages.get

artifactregistry.packages.list

artifactregistry.projectsettings.get

artifactregistry.pythonpackages.*

  • artifactregistry.pythonpackages.get
  • artifactregistry.pythonpackages.list

artifactregistry.repositories.downloadArtifacts

artifactregistry.repositories.get

artifactregistry.repositories.list

artifactregistry.repositories.listEffectiveTags

artifactregistry.repositories.listTagBindings

artifactregistry.repositories.readViaVirtualRepository

artifactregistry.rules.get

artifactregistry.rules.list

artifactregistry.tags.get

artifactregistry.tags.list

artifactregistry.versions.get

artifactregistry.versions.list

binaryauthorization.platformPolicies.evaluatePolicy

binaryauthorization.policy.evaluatePolicy

clientauthconfig.clients.list

cloudbuild.builds.create

cloudbuild.builds.get

compute.addresses.create

compute.addresses.createInternal

compute.addresses.delete

compute.addresses.deleteInternal

compute.addresses.get

compute.addresses.list

compute.globalOperations.get

compute.networks.access

compute.networks.get

compute.regionOperations.get

compute.subnetworks.get

compute.subnetworks.use

compute.zoneOperations.get

iam.serviceAccounts.actAs

iam.serviceAccounts.getAccessToken

iam.serviceAccounts.getOpenIdToken

iam.serviceAccounts.signBlob

pubsub.subscriptions.create

pubsub.subscriptions.delete

pubsub.subscriptions.get

pubsub.subscriptions.list

pubsub.topics.attachSubscription

pubsub.topics.create

pubsub.topics.delete

pubsub.topics.get

pubsub.topics.list

pubsub.topics.publish

resourcemanager.projects.get

resourcemanager.projects.getIamPolicy

resourcemanager.projects.list

run.routes.invoke

serviceusage.services.use

storage.folders.get

storage.folders.list

storage.managedFolders.get

storage.managedFolders.list

storage.objects.get

storage.objects.list

vpcaccess.connectors.get

vpcaccess.connectors.use

Cloud Run 권한

권한 역할에 포함됨

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 작업 실행자(roles/run.jobsExecutor)

재정의가 포함된 Cloud Run 작업 실행자(roles/run.jobsExecutorWithOverrides)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

Cloud Functions 관리자(roles/cloudfunctions.admin)

DLP 조직 데이터 프로필 드라이버(roles/dlp.orgdriver)

DLP 프로젝트 데이터 프로필 드라이버(roles/dlp.projectdriver)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

태그 사용자(roles/resourcemanager.tagUser)

Cloud Run 관리자(roles/run.admin)

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

Cloud Functions 관리자(roles/cloudfunctions.admin)

DLP 조직 데이터 프로필 드라이버(roles/dlp.orgdriver)

DLP 프로젝트 데이터 프로필 드라이버(roles/dlp.projectdriver)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

태그 사용자(roles/resourcemanager.tagUser)

Cloud Run 관리자(roles/run.admin)

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

DLP 조직 데이터 프로필 드라이버(roles/dlp.orgdriver)

DLP 프로젝트 데이터 프로필 드라이버(roles/dlp.projectdriver)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

태그 사용자(roles/resourcemanager.tagUser)

태그 뷰어(roles/resourcemanager.tagViewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

DLP 조직 데이터 프로필 드라이버(roles/dlp.orgdriver)

DLP 프로젝트 데이터 프로필 드라이버(roles/dlp.projectdriver)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

태그 사용자(roles/resourcemanager.tagUser)

태그 뷰어(roles/resourcemanager.tagViewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 호출자(roles/run.invoker)

Cloud Run 작업 실행자(roles/run.jobsExecutor)

재정의가 포함된 Cloud Run 작업 실행자(roles/run.jobsExecutorWithOverrides)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

재정의가 포함된 Cloud Run 작업 실행자(roles/run.jobsExecutorWithOverrides)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

보안 관리자(roles/iam.securityAdmin)

Cloud Run 관리자(roles/run.admin)

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 호출자(roles/run.invoker)

Cloud Run 서비스 호출자(roles/run.servicesInvoker)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 서비스 에이전트(roles/serverless.serviceAgent)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

Cloud Functions 관리자(roles/cloudfunctions.admin)

DLP 조직 데이터 프로필 드라이버(roles/dlp.orgdriver)

DLP 프로젝트 데이터 프로필 드라이버(roles/dlp.projectdriver)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

태그 사용자(roles/resourcemanager.tagUser)

Cloud Run 관리자(roles/run.admin)

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

Cloud Functions 관리자(roles/cloudfunctions.admin)

DLP 조직 데이터 프로필 드라이버(roles/dlp.orgdriver)

DLP 프로젝트 데이터 프로필 드라이버(roles/dlp.projectdriver)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

태그 사용자(roles/resourcemanager.tagUser)

Cloud Run 관리자(roles/run.admin)

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

Firebase Extensions API 서비스 에이전트(roles/firebasemods.serviceAgent)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

DLP 조직 데이터 프로필 드라이버(roles/dlp.orgdriver)

DLP 프로젝트 데이터 프로필 드라이버(roles/dlp.projectdriver)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

태그 사용자(roles/resourcemanager.tagUser)

태그 뷰어(roles/resourcemanager.tagViewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

DLP 조직 데이터 프로필 드라이버(roles/dlp.orgdriver)

DLP 프로젝트 데이터 프로필 드라이버(roles/dlp.projectdriver)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

태그 사용자(roles/resourcemanager.tagUser)

태그 뷰어(roles/resourcemanager.tagViewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase Extensions API 서비스 에이전트(roles/firebasemods.serviceAgent)

보안 관리자(roles/iam.securityAdmin)

Cloud Run 관리자(roles/run.admin)

소유자(roles/owner)

편집자(roles/editor)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할

소유자(roles/owner)

편집자(roles/editor)

뷰어 (roles/viewer)

Cloud Functions 관리자(roles/cloudfunctions.admin)

Cloud Functions 개발자(roles/cloudfunctions.developer)

Cloud Functions 뷰어(roles/cloudfunctions.viewer)

Firebase 관리자(roles/firebase.admin)

Firebase 개발 관리자(roles/firebase.developAdmin)

Firebase 개발 뷰어(roles/firebase.developViewer)

Firebase 뷰어(roles/firebase.viewer)

보안 관리자(roles/iam.securityAdmin)

보안 검토자(roles/iam.securityReviewer)

Cloud Run 관리자(roles/run.admin)

Cloud Run 개발자(roles/run.developer)

Cloud Run 소스 개발자(roles/run.sourceDeveloper)

Cloud Run 소스 뷰어(roles/run.sourceViewer)

Cloud Run 뷰어(roles/run.viewer)

서비스 에이전트 역할