This page lists the IAM roles and permissions for Confidential Computing. To search through all roles and permissions, see the role and permission index .
Confidential Computing roles
Confidentialcomputing Admin
( roles/
)
Admin role for confidentialcomputing
Confidentialcomputing Viewer
( roles/
)
Viewer role for confidentialcomputing
Confidential GKE Workload User
( roles/
)
Grants the ability to generate a GKE attestation token and run a workload in a GKE cluster.
Confidential Space Workload User
( roles/
)
Grants the ability to generate an attestation token and run a workload in a VM. Intended for service accounts that run on Confidential Space VMs.
Confidential Computing permissions
| Permission | Included in roles |
|---|---|
|
Owner
( Editor
( Confidentialcomputing Admin
( Confidential GKE Workload User
( Confidential Space Workload User
( |
|
Owner
( Editor
( Confidentialcomputing Admin
( Confidential Space Workload User
( |
|
Owner
( Editor
( Confidentialcomputing Admin
( Confidential GKE Workload User
( |
|
Owner
( Editor
( Viewer
( Confidentialcomputing Admin
( Confidentialcomputing Viewer
( Confidential GKE Workload User
( Confidential Space Workload User
( Support User
( |
|
Owner
( Editor
( Viewer
( Confidentialcomputing Admin
( Confidentialcomputing Viewer
( Security Admin
( Security Reviewer
( Confidential GKE Workload User
( Confidential Space Workload User
( Security Auditor
( Support User
( |

