Skip to content

Access control

Controlling who can access resources is key to cloud security. You can manage access through IAM Role Bindings, which set permissions for users, groups and service accounts. While resource manager roles help manage the resource hierarchy, they don’t grant access to the cloud resources within a project.

For more information, see our Access Management documentation.

Roles are made up of permissions, which are needed to perform specific actions. While permissions can’t be assigned directly, they are granted through roles. You might find the same role available at different levels of the hierarchy, but with varying permissions, because not all permissions apply to every scope.

For example, the Resource Manager Reader role at the project level only includes the resource-manager.project.get permission. This is because permissions like resource-manager.folder.get aren’t applicable at the project level, as there are no child folder resources below a project.

Throughout the evolution of our access management system, we’ve introduced few permission changes. Occasionally, you may still encounter some of these deprecated legacy permissions in the system. They remain for now to ensure a safe transition until we can permanently remove them.

The following is a list of these permissions and their descriptions: