本文將說明 Cloud Storage 的 Identity and Access Management (IAM) 角色和權限。
預先定義的角色
下表說明與 Cloud Storage 相關聯的 Identity and Access Management (IAM) 角色,並列出每個角色所包含的權限。除非另外說明,否則這些角色可以套用到專案、bucket 或受管理的資料夾。不過,您只能將舊版角色授予個別 bucket。
如要瞭解如何控管值區存取權,請參閱使用 IAM 權限。如要瞭解如何控管代管資料夾的存取權,請參閱使用 IAM 管理代管資料夾。
Role | Permissions |
---|---|
Storage Admin( Grants full control of objects and buckets. When applied to an individual bucket, control applies only to the specified bucket and objects within the bucket. Lowest-level resources where you can grant this role:
|
|
Storage Bucket Viewer Beta( Grants permission to view buckets and their metadata, excluding IAM policies. |
|
Storage Express Mode Service Input Beta( Grants permission to Express Mode service accounts at a managed folder so they can create objects but not read them on input folders. |
|
Storage Express Mode Service Output Beta( Grants permission to EasyGCP service accounts at a managed folder so they can read objects but not write them on output folders. |
|
Storage Express Mode User Access Beta( Grants permission to Express Mode accounts at the project level so they can read, list, create and delete any object in any of their buckets in Express Mode. |
|
Storage Folder Admin( Grants full control over folders and objects, including listing, creating, viewing, and deleting objects. |
|
Storage HMAC Key Admin( Full control of Cloud Storage HMAC keys. |
|
Storage Insights Collector Service( Read-only access to Cloud Storage Inventory metadata for Storage Insights. |
|
Storage Legacy Bucket Owner( Grants permission to create, overwrite, and delete objects; list objects in a bucket and read object metadata, excluding allow policies, when listing; and read and edit bucket metadata, including allow policies. Use of this role is also reflected in the bucket's ACLs. For more information, see IAM relation to ACLs. Lowest-level resources where you can grant this role:
|
|
Storage Legacy Bucket Reader( Grants permission to list a bucket's contents and read bucket metadata, excluding allow policies. Also grants permission to read object metadata, excluding allow policies, when listing objects. Use of this role is also reflected in the bucket's ACLs. For more information, see IAM relation to ACLs. Lowest-level resources where you can grant this role:
|
|
Storage Legacy Bucket Writer( Grants permission to create, overwrite, and delete objects; list objects in a bucket and read object metadata, excluding allow policies, when listing; and read bucket metadata, excluding allow policies. Use of this role is also reflected in the bucket's ACLs. For more information, see IAM relation to ACLs. Lowest-level resources where you can grant this role:
|
|
Storage Legacy Object Owner( Grants permission to view and edit objects and their metadata, including ACLs. Lowest-level resources where you can grant this role:
|
|
Storage Legacy Object Reader( Grants permission to view objects and their metadata, excluding ACLs. Lowest-level resources where you can grant this role:
|
|
Storage Object Admin( Grants full control of objects, including listing, creating, viewing, and deleting objects. Lowest-level resources where you can grant this role:
|
|
Storage Object Creator( Allows users to create objects. Does not give permission to view, delete, or overwrite objects. Lowest-level resources where you can grant this role:
|
|
Storage Object User( Access to create, read, update and delete objects and multipart uploads in GCS. |
|
Storage Object Viewer( Grants access to view objects and their metadata, excluding ACLs. Can also list the objects in a bucket. Lowest-level resources where you can grant this role:
|
|
預先定義的 Storage Insights 角色
下表說明與 Storage Insights 相關聯的 IAM 角色,並列出每個角色所包含的權限。
Role | Permissions |
---|---|
Storage Insights Admin( Full access to Storage Insights resources. |
|
Storage Insights Analyst( Data access to Storage Insights. |
|
StorageInsights Service Agent( Permissions for Insights to write reports into customer project |
|
Storage Insights Viewer( Read-only access to Storage Insights resources. |
|
基本角色
基本角色是指在 IAM 推出前就存在的角色。這些角色具有獨特特徵:
基本角色只能指派給整個專案,無法指派給專案中的個別值區。與您為專案授予的其他角色一樣,基本角色會套用至專案中的所有值區和物件。
基本角色包含其他 Google Cloud服務的額外權限,這些服務不在本節涵蓋範圍內。如要一般討論基本角色授予的權限,請參閱基本角色。
每個基本角色都有便利值,可讓您將基本角色視為群組使用。以這種方式使用時,凡是具有基本角色的主體,都會視為群組成員。群組中的每個人都能根據便利值擁有的存取權,取得資源的額外存取權。
授予 bucket 角色時,可以使用便利值。
在物件上設定存取控制清單時,可以使用便利值。
基本角色並不會直接授予名稱所指的 Cloud Storage 資源存取權。而是會提供一部分的預期存取權,其餘預期存取權則透過使用便利值提供。由於便利值可像任何其他 IAM 主體一樣手動新增或移除,因此可能會撤銷主體原本預期擁有的存取權。
如要瞭解主體通常會因便利值而獲得哪些額外存取權 (基本角色),請參閱可修改的行為。
內建權限
下表說明與各基本角色一併提供的 Cloud Storage 權限。
角色 | 說明 | Cloud Storage 權限 |
---|---|---|
檢視者 (roles/viewer ) |
授予權限列出專案中的值區;列出值區時檢視中繼資料 (不含 ACL);以及列出並取得專案中的 HMAC 金鑰。 | storage.buckets.getIpFilter storage.buckets.list storage.hmacKeys.get storage.hmacKeys.list |
編輯者 (roles/editor ) |
授予權限以建立、列出及刪除專案中的值區;列出值區時檢視中繼資料 (不含 ACL);以及控管專案中的 HMAC 金鑰。 | storage.buckets.create storage.buckets.delete storage.buckets.getIpFilter storage.buckets.list storage.hmacKeys.* |
擁有者 (roles/owner ) |
授予權限以在專案中建立、列出及刪除值區;列出值區時檢視中繼資料 (不含 ACL);建立、刪除及列出標記繫結;以及控管專案中的 HMAC 金鑰;在專案、資料夾或機構中啟用、停用、更新及取得 Storage Intelligence 設定。 在 Google Cloud 中,通常具有這個角色的主體可以執行管理工作,例如變更主體的專案角色,或變更帳單資訊。 |
storage.buckets.create storage.buckets.delete storage.buckets.list storage.buckets.createTagBinding storage.buckets.deleteTagBinding storage.buckets.getIpFilter storage.buckets.listEffectiveTags storage.buckets.listTagBindings storage.buckets.setIpFilter storage.hmacKeys.* storage.intelligenceConfigs.get storage.intelligenceConfigs.update |
可變更的行為
由於便利值,獲得基本角色的主體通常會額外取得專案值區和物件的存取權。建立值區時,系統會授予某些值區層級的存取權,但您之後可以編輯值區 IAM 政策和物件 ACL,移除或變更存取權。
建立啟用統一值區層級存取權的值區時,系統會透過便利值授予下列存取權:
獲授
roles/viewer
的主體會取得值區的roles/storage.legacyBucketReader
和roles/storage.legacyObjectReader
角色。獲授
roles/editor
的主體會取得值區的roles/storage.legacyBucketOwner
和roles/storage.legacyObjectOwner
角色。獲授
roles/owner
的主體會取得值區的roles/storage.legacyBucketOwner
和roles/storage.legacyObjectOwner
角色。
建立未啟用統一值區層級存取權的值區時,系統會使用便利值授予下列存取權:
獲授權的主體會取得值區的
roles/storage.legacyBucketReader
角色。roles/viewer
獲授權的主體會取得值區的
roles/storage.legacyBucketOwner
角色。roles/editor
獲授權的主體會取得值區的
roles/storage.legacyBucketOwner
角色。roles/owner
此外,值區有預設物件存取控制清單 (ACL)。這個預設 ACL 通常會套用至值區中的新物件,並授予便利值額外存取權。
自訂角色
您可能會想要定義自己的角色,包含您指定的權限組合。為了支援這方面的需求,身分與存取權管理提供了自訂角色。
後續步驟
使用 IAM 權限控管值區和物件的存取權。
瞭解各項 Cloud Storage 的 IAM 權限。
請參閱 Cloud Storage 適用的 IAM 參考資料,瞭解哪些 IAM 權限允許使用者透過各種工具和 API 執行動作。
如需瞭解其他 Google Cloud 角色,請參閱「瞭解角色」一文。