Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Kontrol akses untuk tenant
Identity Platform menyediakan Admin API untuk mengelola tenant, pengguna, dan token autentikasi Anda. Anda dapat memanfaatkan
Identity and Access Management untuk mencegah akses yang tidak diinginkan menggunakan API ini.
Memberikan, mengubah, dan mencabut akses
Ikuti langkah-langkah berikut untuk memberikan peran kepada pengguna di resource tenant:
Buka halaman Identity Platform Tenants di Google Cloud konsol. Buka halaman tenant
Pilih tenant dari daftar.
Beralihlah ke tab Izin di panel info di sebelah kanan.
Klik Tambahkan akun utama untuk memberi pengguna peran baru, atau gunakan daftar untuk
mengubah atau mencabut akses bagi pengguna yang ada.
Untuk mempelajari kontrol akses lebih lanjut menggunakan IAM, lihat
dokumentasi IAM. Untuk menetapkan kebijakan kontrol akses untuk resource, gunakan metode setIamPolicy.
Izin API
Tabel ini mencantumkan peran yang diperlukan untuk memanggil setiap metode di Identity Platform API. Peran harus ditetapkan di resource tenant.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-11 UTC."],[[["\u003cp\u003eIdentity Platform uses Admin APIs to manage tenants, users, and authentication tokens, with Identity and Access Management (IAM) for access control.\u003c/p\u003e\n"],["\u003cp\u003eYou can grant, modify, or revoke user access to a tenant resource directly within the Google Cloud console's Identity Platform Tenants page under the Permissions tab.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003esetIamPolicy\u003c/code\u003e method can be used to set the access control policy for tenant resources, allowing for direct management of permissions.\u003c/p\u003e\n"],["\u003cp\u003eDifferent Identity Platform API methods require specific roles, such as Editor or Viewer, which need to be assigned to a tenant resource for access.\u003c/p\u003e\n"],["\u003cp\u003eTo control access to various tenant management operations, such as creating or deleting a tenant, users need the Editor or Viewer roles on the corresponding project or tenant.\u003c/p\u003e\n"]]],[],null,["# Access control for tenants\n==========================\n\nIdentity Platform provides Admin APIs to manage your tenants, users, and\nauthentication tokens. You can leverage\n[Identity and Access Management](/iam) to prevent unwanted access using these APIs.\n\nGranting, changing, and revoking access\n---------------------------------------\n\nFollow these steps to grant a user a role on a tenant resource:\n\n1. Open the Identity Platform Tenants page in the Google Cloud console. \n\n [Go to the tenants page](https://console.cloud.google.com/customer-identity/tenants)\n\n2. Select a tenant from the list.\n\n3. Switch to the **Permissions** tab in the info panel on the right.\n\n4. Click **Add principal** to grant a user a new role, or use the list to\n modify or revoke access for an existing user.\n\nTo learn more about access control using IAM, see the\n[IAM documentation](/iam/docs). To set the access control policy\nfor a resource, use the [`setIamPolicy` method](/identity-platform/docs/reference/rest/v2/projects.tenants/setIamPolicy).\n\nAPI permissions\n---------------\n\nThis table lists the role required to call each method in the\nIdentity Platform API. The role should be assigned on the tenant resource."]]