Creating a Custom Role for GCP Organization Application
    • PDF

    Creating a Custom Role for GCP Organization Application

    • PDF

    Article Summary

    You must create a custom role and permissions in GCP.

    1. Login to GCP Console using the administrative privileges.
    2. Select IAM & Admin -> Roles from the navigation menu.
    3. Click + CREATE ROLE.
    4. Enter the following values on the Create Role page:
      1. Enter the Title as Britive Integration Role.
      2. Enter the ID as BritiveIntegrationRole.
      3. Click ADD PERMISSIONS to add the following permissions:
        • iam.roles.get
        • iam.roles.list
        • iam.serviceAccountKeys.create
        • iam.serviceAccountKeys.delete
        • iam.serviceAccountKeys.get
        • iam.serviceAccountKeys.list
        • iam.serviceAccounts.create
        • iam.serviceAccounts.delete
        • iam.serviceAccounts.disable
        • iam.serviceAccounts.enable
        • iam.serviceAccounts.get
        • iam.serviceAccounts.getIamPolicy
        • iam.serviceAccounts.list
        • iam.serviceAccounts.setIamPolicy
        • iam.serviceAccounts.undelete
        • iam.serviceAccounts.update
        • orgpolicy.policy.get
        • resourcemanager.folders.get
        • resourcemanager.folders.getIamPolicy
        • resourcemanager.folders.list
        • resourcemanager.folders.setIamPolicy
        • resourcemanager.organizations.get
        • resourcemanager.organizations.getIamPolicy
        • resourcemanager.organizations.setIamPolicy
        • resourcemanager.projects.get
        • resourcemanager.projects.getIamPolicy
        • resourcemanager.projects.list
        • resourcemanager.projects.setIamPolicy
      4. The following permissions are required to support BigQuery constraint management. These permissions can be ignored if you are not using this feature. 
        • bigquery.datasets.update
        • bigquery.tables.get
        • bigquery.tables.getIamPolicy
        • bigquery.tables.setIamPolicy
      5. The following permissions are required to support Apigee environment constraint management. These permissions can be ignored if you are not using this feature.
        • apigee.environments.get
        • apigee.environments.getIamPolicy
        • apigee.environments.setIamPolicy
      6. Click ADD.
    5. Click CREATE.

    For more information about custom roles in GCP, see Creating and managing custom roles.


    Was this article helpful?