Google Cloud Identity and Access Management Operations: Difference between revisions

From NovaOrdis Knowledge Base
Jump to navigation Jump to search
Line 11: Line 11:
gcloud iam service-accounts create test-sa
gcloud iam service-accounts create test-sa
</syntaxhighlight>
</syntaxhighlight>
==Give Service_Account Permissions on a Project==
==Give Service Account Permissions on a Project==
 
A [[Google_Cloud_Identity_and_Access_Management_Concepts#Service_Account|service account]] (as [[Google_Cloud_Identity_and_Access_Management_Concepts#Member|member]]) can be given permissions to a project (a [[Google_Cloud_Identity_and_Access_Management_Concepts#Resource|resource]], by binding the service account to a [[Google_Cloud_Identity_and_Access_Management_Concepts#Role|role]], via a [[Google_Cloud_Identity_and_Access_Management_Concepts#Role_Binding|role binding]] that is added to the project's IAM policy:
A [[Google_Cloud_Identity_and_Access_Management_Concepts#Service_Account|service account]] (as [[Google_Cloud_Identity_and_Access_Management_Concepts#Member|member]]) can be given permissions to a project (a [[Google_Cloud_Identity_and_Access_Management_Concepts#Resource|resource]], by binding the service account to a [[Google_Cloud_Identity_and_Access_Management_Concepts#Role|role]], via a [[Google_Cloud_Identity_and_Access_Management_Concepts#Role_Binding|role binding]] that is added to the project's IAM policy:
<syntaxhighlight lang='bash'>
<syntaxhighlight lang='bash'>

Revision as of 23:45, 24 August 2021

Internal

Overview

Service Account Operations

See:

Service Account

Create Service Account

Via console: https://cloud.google.com/docs/authentication/getting-started#creating_a_service_account.

In command line:

gcloud iam service-accounts create test-sa

Give Service Account Permissions on a Project

A service account (as member) can be given permissions to a project (a resource, by binding the service account to a role, via a role binding that is added to the project's IAM policy:

gcloud projects add-iam-policy-binding my-project-id \
  --member="serviceAccount:my-service-account@my-project-id.iam.gserviceaccount.com" \
  --role="roles/owner"