This page describes the Identity and Access Management (IAM) roles and permissions needed for setting up a Secure Web Proxy instance.
You can grant users or service accounts permissions or a predefined role, or you can create a custom role that uses permissions that you specify. The following table describes the IAM predefined roles and their associated permissions.
For more information, see the IAM permissions reference .
Create a custom role with the specified permissions. For information about creating a custom role, see Create a custom role.
-
certificatemanager.certs.get
-
certificatemanager.certs.list
-
certificatemanager.certs.use
-
compute.addresses.create
-
compute.addresses.createInternal
-
compute.addresses.list
-
compute.instances.update
-
compute.networks.get
-
compute.networks.list
-
compute.projects.get
-
compute.projects.get
-
compute.regionOperations.get
-
compute.routers.create
-
compute.routers.delete
-
compute.routers.get
-
compute.routers.list
-
compute.routers.update
-
compute.subnetworks.get
-
compute.subnetworks.list
-
networksecurity.gatewaySecurityPolicies.get
-
networksecurity.gatewaySecurityPolicies.list
-
networksecurity.gatewaySecurityPolicies.use
-
networksecurity.gatewaySecurityPolicyRules.get
-
networksecurity.gatewaySecurityPolicyRules.list
-
networksecurity.locations.list
-
networksecurity.urlLists.get
-
networksecurity.urlLists.list
-
networksecurity.urlLists.use
-
networkservices.gateways.create
-
networkservices.gateways.delete
-
networkservices.gateways.get
-
networkservices.gateways.list
-
networkservices.gateways.update
-
networkservices.gateways.use
-
networkservices.locations.list
-
networkservices.operations.get
-
networkservices.operations.list
-
resourcemanager.projects.get
-
resourcemanager.projects.list
-
serviceusage.quotas.get
-
serviceusage.services.get
-
serviceusage.services.list
Create a custom role with the specified permissions. For information about creating a custom role, see Create a custom role.
-
networksecurity.gatewaySecurityPolicies.create
-
networksecurity.gatewaySecurityPolicies.delete
-
networksecurity.gatewaySecurityPolicies.get
-
networksecurity.gatewaySecurityPolicies.list
-
networksecurity.gatewaySecurityPolicies.update
-
networksecurity.gatewaySecurityPolicyRules.create
-
networksecurity.gatewaySecurityPolicyRules.delete
-
networksecurity.gatewaySecurityPolicyRules.get
-
networksecurity.gatewaySecurityPolicyRules.list
-
networksecurity.gatewaySecurityPolicyRules.update
-
networksecurity.operations.get
-
networksecurity.tlsInspectionPolicies.create
-
networksecurity.tlsInspectionPolicies.delete
-
networksecurity.tlsInspectionPolicies.get
-
networksecurity.tlsInspectionPolicies.list
-
networksecurity.tlsInspectionPolicies.update
-
networksecurity.tlsInspectionPolicies.use
-
networksecurity.urlLists.create
-
networksecurity.urlLists.delete
-
networksecurity.urlLists.get
-
networksecurity.urlLists.list
-
networksecurity.urlLists.update
-
networksecurity.urlLists.use
For more information about project roles and permissions, see the following:
- Identity and Access Management documentation
- Compute Engine API documentation
- Cloud Monitoring API documentation
What's next
- To complete the setup tasks, see Initial setup steps .