Admin Memorystore
Pengguna Koneksi Database Memorystore
Pemilik
memorystore.instances.rescheduleMaintenance
Admin Memorystore
Pemilik
Peran khusus
Jika peran bawaan tidak memenuhi persyaratan bisnis unik Anda, Anda
dapat menentukan peran khusus sendiri dengan izin yang Anda tentukan. Untuk mendukung hal ini, IAM menawarkan peran khusus. Saat Anda membuat peran khusus
untuk Memorystore for Valkey, pastikan Anda menyertakan
resourcemanager.projects.get dan resourcemanager.projects.list.
Jika tidak, konsol Google Cloud tidak akan berfungsi dengan benar
untuk Memorystore for Valkey. Untuk mengetahui informasi selengkapnya, lihat
Dependensi izin.
Untuk mempelajari cara membuat peran khusus, lihat Membuat peran khusus.
Izin enkripsi saat transit
Tabel di bawah menunjukkan izin yang diperlukan untuk mengaktifkan dan mengelola Enkripsi dalam transit
untuk Memorystore for Valkey.
Izin diperlukan
Membuat instance Memorystore dengan enkripsi saat transit
Mendownload Certificate Authority
memorystore.instances.create
✓
X
memorystore.instances.get
X
✓
Peran pembuatan kebijakan konektivitas jaringan
Izin yang dijelaskan di bagian ini diperlukan untuk Admin Jaringan yang membuat kebijakan koneksi layanan untuk Memorystore for Valkey, seperti yang dijelaskan di halaman Jaringan.
Untuk menetapkan kebijakan yang diperlukan untuk pembuatan instance Memorystore for Valkey, Admin Jaringan harus memiliki peran networkconnectivity.consumerNetworkAdmin, yang memberikan izin berikut:
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-19 UTC."],[],[],null,["# Access control\n\nThis page explains the Identity and Access Management roles available for Memorystore for Valkey,\nand the associated permissions for those roles.\n\nTo learn how to grant the role to a user in your project, see [Grant or revoke a single role](/iam/docs/granting-changing-revoking-access#single-role).\n| **Note:** Modifications to IAM settings for Memorystore for Valkey take on the order of minutes to take effect.\n\nPredefined roles\n----------------\n\nThe following predefined roles are available for Memorystore for Valkey. If you update a role for an [Identity and Access Management principal](/iam/docs/overview#concepts_related_identity), the change takes several minutes to [take effect](/iam/docs/access-change-propagation).\n\n### Permissions and their roles\n\nThe following table lists each permission that Memorystore for Valkey supports\nand the Memorystore for Valkey roles that include it:\n\n### Custom roles\n\nIf the predefined roles do not address your unique business requirements, you\ncan define your own custom roles with permissions that you specify. To support\nthis, IAM offers [custom roles](/iam/docs/understanding-custom-roles). When you create custom roles\nfor Memorystore for Valkey, make sure that you include\nboth `resourcemanager.projects.get` and `resourcemanager.projects.list`.\nOtherwise, the Google Cloud console will not function correctly\nfor Memorystore for Valkey. For more information, see\n[Permission dependencies](/iam/docs/understanding-custom-roles#permission_dependencies).\nTo learn how to create a custom role, see [Creating a custom role](/iam/docs/creating-custom-roles#creating_a_custom_role).\n\nIn-transit encryption permissions\n---------------------------------\n\nThe table below shows permissions required for enabling and managing [In-transit encryption](/memorystore/docs/valkey/about-in-transit-encryption)\nfor Memorystore for Valkey.\n\nNetwork connectivity policy creation role\n-----------------------------------------\n\nThe permissions described in this section are needed for the Network Admin who\nis establishing a service connection policy for Memorystore for Valkey, as\ndescribed in the [Networking](/memorystore/docs/valkey/networking) page.\n\nTo establish the policy required for Memorystore for Valkey instance creation,\nthe Network Admin must have the `networkconnectivity.consumerNetworkAdmin`\nrole, which grants the following permissions:\n\n- networkconnectivity.serviceconnectionpolicies.create\n- networkconnectivity.serviceconnectionpolicies.list\n- networkconnectivity.serviceconnectionpolicies.get\n- networkconnectivity.serviceconnectionpolicies.delete\n- networkconnectivity.serviceconnectionpolicies.update"]]