[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-19。"],[],[],null,["# Access control\n\nThis page explains the Identity and Access Management roles available for Memorystore for Valkey,\nand the associated permissions for those roles.\n\nTo learn how to grant the role to a user in your project, see [Grant or revoke a single role](/iam/docs/granting-changing-revoking-access#single-role).\n| **Note:** Modifications to IAM settings for Memorystore for Valkey take on the order of minutes to take effect.\n\nPredefined roles\n----------------\n\nThe following predefined roles are available for Memorystore for Valkey. If you update a role for an [Identity and Access Management principal](/iam/docs/overview#concepts_related_identity), the change takes several minutes to [take effect](/iam/docs/access-change-propagation).\n\n### Permissions and their roles\n\nThe following table lists each permission that Memorystore for Valkey supports\nand the Memorystore for Valkey roles that include it:\n\n### Custom roles\n\nIf the predefined roles do not address your unique business requirements, you\ncan define your own custom roles with permissions that you specify. To support\nthis, IAM offers [custom roles](/iam/docs/understanding-custom-roles). When you create custom roles\nfor Memorystore for Valkey, make sure that you include\nboth `resourcemanager.projects.get` and `resourcemanager.projects.list`.\nOtherwise, the Google Cloud console will not function correctly\nfor Memorystore for Valkey. For more information, see\n[Permission dependencies](/iam/docs/understanding-custom-roles#permission_dependencies).\nTo learn how to create a custom role, see [Creating a custom role](/iam/docs/creating-custom-roles#creating_a_custom_role).\n\nIn-transit encryption permissions\n---------------------------------\n\nThe table below shows permissions required for enabling and managing [In-transit encryption](/memorystore/docs/valkey/about-in-transit-encryption)\nfor Memorystore for Valkey.\n\nNetwork connectivity policy creation role\n-----------------------------------------\n\nThe permissions described in this section are needed for the Network Admin who\nis establishing a service connection policy for Memorystore for Valkey, as\ndescribed in the [Networking](/memorystore/docs/valkey/networking) page.\n\nTo establish the policy required for Memorystore for Valkey instance creation,\nthe Network Admin must have the `networkconnectivity.consumerNetworkAdmin`\nrole, which grants the following permissions:\n\n- networkconnectivity.serviceconnectionpolicies.create\n- networkconnectivity.serviceconnectionpolicies.list\n- networkconnectivity.serviceconnectionpolicies.get\n- networkconnectivity.serviceconnectionpolicies.delete\n- networkconnectivity.serviceconnectionpolicies.update"]]