Google Cloud Identity and Access Management Operations: Difference between revisions

From NovaOrdis Knowledge Base
Jump to navigation Jump to search
 
(2 intermediate revisions by the same user not shown)
Line 17: Line 17:
   --member="serviceAccount:my-service-account@my-project-id.iam.gserviceaccount.com" \
   --member="serviceAccount:my-service-account@my-project-id.iam.gserviceaccount.com" \
   --role="roles/owner"
   --role="roles/owner"
</syntaxhighlight>
==Generate a Key File for Service Account==
The following command generates a [[Google_Cloud_Identity_and_Access_Management_Concepts#Service_Account_Key_File|key file]] for a service account:
<syntaxhighlight lang='bash'>
gcloud iam service-accounts keys create my-service-account-key-file.json --iam-account=my-service-account@my-project-id.iam.gserviceaccount.com
</syntaxhighlight>
</syntaxhighlight>

Latest revision as of 23:50, 24 August 2021

Internal

Overview

Service Account Operations

See:

Service Account

Create Service Account

Via console: https://cloud.google.com/docs/authentication/getting-started#creating_a_service_account.

In command line:

gcloud iam service-accounts create test-sa

Give Service Account Permissions on a Project

A service account (as member) can be given permissions to a project (a resource, by binding the service account to a role, via a role binding that is added to the project's IAM policy:

gcloud projects add-iam-policy-binding my-project-id \
  --member="serviceAccount:my-service-account@my-project-id.iam.gserviceaccount.com" \
  --role="roles/owner"

Generate a Key File for Service Account

The following command generates a key file for a service account:

gcloud iam service-accounts keys create my-service-account-key-file.json --iam-account=my-service-account@my-project-id.iam.gserviceaccount.com