Identity and Access Management (IAM) roles prescribe how you can use the Managed Service for Microsoft Active Directory (Managed Microsoft AD) API. Below is a list of each IAM role available for Managed Microsoft AD and the methods available to them.
Additionally, services accounts must have the servicemanagement.services.bind
permission to see and enable Managed Microsoft AD. Learn more about service
management roles and permissions.
Role | Permissions |
---|---|
Google Cloud Managed Identities Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level. |
|
Google Cloud Managed Identities Backup Admin( Full access to Google Cloud Managed Identities Backup and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Backup Viewer( Read-only access to Google Cloud Managed Identities Backup and related resources. |
|
Google Cloud Managed Identities Domain Admin( Read-Update-Delete to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a resource (domain) level. |
|
Google Cloud Managed Identities Domain Join Beta( Access to domain join VMs with Cloud AD |
|
Google Cloud Managed Identities Peering Admin( Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level |
|
Google Cloud Managed Identities Peering Viewer( Read-only access to Google Cloud Managed Identities Peering and related resources. |
|
Google Cloud Managed Identities Viewer( Read-only access to Google Cloud Managed Identities Domains and related resources. |
|
For more information about IAM roles, see understanding roles.