Skip to content

Instantly share code, notes, and snippets.

@thombashi
Last active February 7, 2024 23:51
Show Gist options
  • Save thombashi/a834b8578403d3641cb30eb409fa7ecc to your computer and use it in GitHub Desktop.
Save thombashi/a834b8578403d3641cb30eb409fa7ecc to your computer and use it in GitHub Desktop.
GCP IAM roles
# gcloud iam roles list
---
description: Ability to view or act on access approval requests and view configuration
etag: AA==
name: roles/accessapproval.approver
stage: GA
title: Access Approval Approver
---
description: Ability to update the Access Approval configuration
etag: AA==
name: roles/accessapproval.configEditor
stage: GA
title: Access Approval Config Editor
---
description: Ability to invalidate existing approved approval requests
etag: AA==
name: roles/accessapproval.invalidator
stage: GA
title: Access Approval Invalidator
---
description: Ability to view access approval requests and configuration
etag: AA==
name: roles/accessapproval.viewer
stage: GA
title: Access Approval Viewer
---
description: Create, edit, and change Cloud access bindings.
etag: AA==
name: roles/accesscontextmanager.gcpAccessAdmin
stage: GA
title: Cloud Access Binding Admin
---
description: Read access to Cloud access bindings.
etag: AA==
name: roles/accesscontextmanager.gcpAccessReader
stage: GA
title: Cloud Access Binding Reader
---
description: Full access to policies, access levels, access zones and authorized orgs
descs.
etag: AA==
name: roles/accesscontextmanager.policyAdmin
stage: GA
title: Access Context Manager Admin
---
description: Edit access to policies. Create, edit, and change access levels, access
zones and authorized orgs descs.
etag: AA==
name: roles/accesscontextmanager.policyEditor
stage: GA
title: Access Context Manager Editor
---
description: Read access to policies, access levels, access zones and authorized orgs
descs.
etag: AA==
name: roles/accesscontextmanager.policyReader
stage: GA
title: Access Context Manager Reader
---
etag: AA==
name: roles/accesscontextmanager.vpcScTroubleshooterViewer
stage: GA
title: VPC Service Controls Troubleshooter Viewer
---
description: Access to edit and deploy an action
etag: AA==
name: roles/actions.Admin
stage: GA
title: Actions Admin
---
description: Access to view an action
etag: AA==
name: roles/actions.Viewer
stage: GA
title: Actions Viewer
---
description: Grants write access to settings in Advisory Notifications
etag: AA==
name: roles/advisorynotifications.admin
stage: GA
title: Advisory Notifications Admin
---
description: Grants view access in Advisory Notifications
etag: AA==
name: roles/advisorynotifications.viewer
stage: GA
title: Advisory Notifications Viewer
---
description: Grants full access to all resources in Vertex AI
etag: AA==
name: roles/aiplatform.admin
stage: GA
title: Vertex AI Administrator
---
description: Admin role of using colab enterprise.
etag: AA==
name: roles/aiplatform.colabEnterpriseAdmin
stage: GA
title: Colab Enterprise Admin
---
description: User role of using colab enterprise.
etag: AA==
name: roles/aiplatform.colabEnterpriseUser
stage: GA
title: Colab Enterprise User
---
description: Gives Vertex AI Custom Code the proper permissions.
etag: AA==
name: roles/aiplatform.customCodeServiceAgent
stage: GA
title: Vertex AI Custom Code Service Agent
---
description: Provides full access to all permissions for a particular entity type
resource.
etag: AA==
name: roles/aiplatform.entityTypeOwner
stage: GA
title: Vertex AI Feature Store EntityType owner
---
description: Grants full access to all resources in Vertex AI Feature Store
etag: AA==
name: roles/aiplatform.featurestoreAdmin
stage: GA
title: Vertex AI Feature Store Admin
---
description: This role provides permissions to read Feature data.
etag: AA==
name: roles/aiplatform.featurestoreDataViewer
stage: GA
title: Vertex AI Feature Store Data Viewer
---
description: This role provides permissions to read and write Feature data.
etag: AA==
name: roles/aiplatform.featurestoreDataWriter
stage: GA
title: Vertex AI Feature Store Data Writer
---
description: Administrator of Featurestore resources, but not the child resources
under Featurestores.
etag: AA==
name: roles/aiplatform.featurestoreInstanceCreator
stage: GA
title: Vertex AI Feature Store Instance Creator
---
description: Viewer of all resources in Vertex AI Feature Store but cannot make changes.
etag: AA==
name: roles/aiplatform.featurestoreResourceViewer
stage: GA
title: Vertex AI Feature Store Resource Viewer
---
description: Deprecated. Use featurestoreAdmin instead.
etag: AA==
name: roles/aiplatform.featurestoreUser
stage: BETA
title: Vertex AI Feature Store User
---
description: Grants access to use migration service in Vertex AI
etag: AA==
name: roles/aiplatform.migrator
stage: GA
title: Vertex AI Migration Service User
---
description: Grants full access to all runtime templates and runtimes in Notebook
Service.
etag: AA==
name: roles/aiplatform.notebookRuntimeAdmin
stage: GA
title: Notebook Runtime Admin
---
description: Grants users permissions to create runtime resources using a runtime
template and manage the runtime resources they created.
etag: AA==
name: roles/aiplatform.notebookRuntimeUser
stage: GA
title: Notebook Runtime User
---
description: Vertex AI Service Agent used to run Notebook managed resources in user
project with restricted permissions.
etag: AA==
name: roles/aiplatform.notebookServiceAgent
stage: GA
title: Vertex AI Notebook Service Agent
---
description: Gives Vertex AI the permissions it needs to function.
etag: AA==
name: roles/aiplatform.serviceAgent
stage: GA
title: Vertex AI Service Agent
---
description: Grants access to the Vertex AI Tensorboard web app. Using the web app
will incur charges.
etag: AA==
name: roles/aiplatform.tensorboardWebAppUser
stage: BETA
title: Vertex AI Tensorboard Web App User
---
description: Grants access to use all resource in Vertex AI
etag: AA==
name: roles/aiplatform.user
stage: GA
title: Vertex AI User
---
description: Grants access to view all resource in Vertex AI
etag: AA==
name: roles/aiplatform.viewer
stage: GA
title: Vertex AI Viewer
---
description: Full access to Cloud AlloyDB all resources.
etag: AA==
name: roles/alloydb.admin
stage: BETA
title: Cloud AlloyDB Admin
---
description: Connectivity access to Cloud AlloyDB instances.
etag: AA==
name: roles/alloydb.client
stage: BETA
title: Cloud AlloyDB Client
---
description: Role allowing access to login as a database user.
etag: AA==
name: roles/alloydb.databaseUser
stage: BETA
title: Cloud AlloyDB Database User
---
description: Gives the AlloyDB service account permission to manage customer resources
etag: AA==
name: roles/alloydb.serviceAgent
stage: GA
title: AlloyDB Service Agent
---
description: Read-only access to Cloud AlloyDB all resources.
etag: AA==
name: roles/alloydb.viewer
stage: BETA
title: Cloud AlloyDB Viewer
---
description: Administer Data Exchanges and Listings
etag: AA==
name: roles/analyticshub.admin
stage: GA
title: Analytics Hub Admin
---
description: Grants full control over the Listing, including updating, deleting and
setting ACLs
etag: AA==
name: roles/analyticshub.listingAdmin
stage: GA
title: Analytics Hub Listing Admin
---
description: Can publish to Data Exchanges thus creating Listings
etag: AA==
name: roles/analyticshub.publisher
stage: GA
title: Analytics Hub Publisher
---
description: Can browse Data Exchanges and subscribe to Listings
etag: AA==
name: roles/analyticshub.subscriber
stage: GA
title: Analytics Hub Subscriber
---
description: Grants full control over the Subscription, including updating and deleting
etag: AA==
name: roles/analyticshub.subscriptionOwner
stage: GA
title: Analytics Hub Subscription Owner
---
description: Can browse Data Exchanges and Listings
etag: AA==
name: roles/analyticshub.viewer
stage: GA
title: Analytics Hub Viewer
---
description: Full access to manage devices.
etag: AA==
name: roles/androidmanagement.user
stage: GA
title: Android Management User
---
description: Gives the Anthos service agent access to Cloud Platformresources.
etag: AA==
name: roles/anthos.serviceAgent
stage: GA
title: Anthos Service Agent
---
description: Gives the Anthos Audit service agent access toCloud Platform resources.
etag: AA==
name: roles/anthosaudit.serviceAgent
stage: GA
title: Anthos Audit Service Agent
---
description: Gives the Anthos Config Management service agent access toCloud Platform
resources.
etag: AA==
name: roles/anthosconfigmanagement.serviceAgent
stage: GA
title: Anthos Config Management Service Agent
---
description: Gives the Anthos Identity service agent access to Cloud Platform resources.
etag: AA==
name: roles/anthosidentityservice.serviceAgent
stage: GA
title: Anthos Identity Service Agent
---
description: Gives the Anthos Policy Controller service agent access toCloud Platform
resources.
etag: AA==
name: roles/anthospolicycontroller.serviceAgent
stage: GA
title: Anthos Policy Controller Service Agent
---
description: Gives the Anthos Service Mesh service agent access to Cloud Platform
resources.
etag: AA==
name: roles/anthosservicemesh.serviceAgent
stage: GA
title: Anthos Service Mesh Service Agent
---
description: ' Gives the Anthos Support Service Agent access to Cloud Platform resource.'
etag: AA==
name: roles/anthossupport.serviceAgent
stage: GA
title: Anthos Support Service Agent
---
description: Full access to ApiGateway and related resources.
etag: AA==
name: roles/apigateway.admin
stage: GA
title: ApiGateway Admin
---
description: Gives Cloud API Gateway service account access to Service Management
check and reports as well as impersonation on user-specified service accounts.
etag: AA==
name: roles/apigateway.serviceAgent
stage: GA
title: Cloud API Gateway Service Agent
---
description: Read-only access to ApiGateway and related resources.
etag: AA==
name: roles/apigateway.viewer
stage: GA
title: ApiGateway Viewer
---
description: Gives Cloud API Gateway service account access to retrieve aService configuration.
etag: AA==
name: roles/apigateway_management.serviceAgent
stage: GA
title: Cloud API Gateway Management Service Agent
---
description: Full access to all apigee resource features
etag: AA==
name: roles/apigee.admin
stage: GA
title: Apigee Organization Admin
---
description: Curated set of permissions for Apigee Universal Data Collection Agent
to manage analytics for an Apigee Organization
etag: AA==
name: roles/apigee.analyticsAgent
stage: GA
title: Apigee Analytics Agent
---
description: Analytics editor for an Apigee Organization
etag: AA==
name: roles/apigee.analyticsEditor
stage: GA
title: Apigee Analytics Editor
---
description: Analytics viewer for an Apigee Organization
etag: AA==
name: roles/apigee.analyticsViewer
stage: GA
title: Apigee Analytics Viewer
---
description: Full read/write access to all apigee API resources
etag: AA==
name: roles/apigee.apiAdminV2
stage: GA
title: Apigee API Admin
---
description: Reader of apigee resources
etag: AA==
name: roles/apigee.apiReaderV2
stage: GA
title: Apigee API Reader
---
description: Developer admin of apigee resources
etag: AA==
name: roles/apigee.developerAdmin
stage: GA
title: Apigee Developer Admin
---
description: Full read/write access to apigee environment resources, including deployments.
etag: AA==
name: roles/apigee.environmentAdmin
stage: GA
title: Apigee Environment Admin
---
description: All permissions related to monetization
etag: AA==
name: roles/apigee.monetizationAdmin
stage: GA
title: Apigee Monetization Admin
---
description: Portal admin for an Apigee Organization
etag: AA==
name: roles/apigee.portalAdmin
stage: GA
title: Apigee Portal Admin
---
description: Viewer of all apigee resources
etag: AA==
name: roles/apigee.readOnlyAdmin
stage: GA
title: Apigee Read-only Admin
---
description: Curated set of permissions for a runtime agent to access Apigee Organization
resources
etag: AA==
name: roles/apigee.runtimeAgent
stage: GA
title: Apigee Runtime Agent
---
description: Security admin for an Apigee Organization
etag: AA==
name: roles/apigee.securityAdmin
stage: GA
title: Apigee Security Admin
---
description: Security viewer for an Apigee Organization
etag: AA==
name: roles/apigee.securityViewer
stage: GA
title: Apigee Security Viewer
---
description: Service agent that grants access to Apigee resources - API Products,
Developers, Developer Apps, and App Keys.
etag: AA==
name: roles/apigee.serviceAgent
stage: GA
title: Apigee Service Agent
---
description: Curated set of permissions for a Synchronizer to manage environments
in an Apigee Organization
etag: AA==
name: roles/apigee.synchronizerManager
stage: GA
title: Apigee Synchronizer Manager
---
description: Admin of Apigee Connect
etag: AA==
name: roles/apigeeconnect.Admin
stage: GA
title: Apigee Connect Admin
---
description: Ability to set up Apigee Connect agent between external clusters and
Google.
etag: AA==
name: roles/apigeeconnect.Agent
stage: GA
title: Apigee Connect Agent
---
description: Full access to Cloud Apigee Registry Registry and Runtime resources.
etag: AA==
name: roles/apigeeregistry.admin
stage: BETA
title: Cloud Apigee Registry Admin
---
description: Edit access to Cloud Apigee Registry Registry resources.
etag: AA==
name: roles/apigeeregistry.editor
stage: BETA
title: Cloud Apigee Registry Editor
---
description: Read-only access to Cloud Apigee Registry Registry resources.
etag: AA==
name: roles/apigeeregistry.viewer
stage: BETA
title: Cloud Apigee Registry Viewer
---
description: The role used by Apigee Registry application workers to read and update
Apigee Registry Artifacts.
etag: AA==
name: roles/apigeeregistry.worker
stage: BETA
title: Cloud Apigee Registry Worker
---
description: Give the App Development Experience service agent access toCloud Platform
resources.
etag: AA==
name: roles/appdevelopmentexperience.serviceAgent
stage: GA
title: App Development Experience Service Agent
---
description: Full management of App Engine apps (but not storage).
etag: AA==
name: roles/appengine.appAdmin
stage: GA
title: App Engine Admin
---
description: Ability to create the App Engine resource for the project.
etag: AA==
name: roles/appengine.appCreator
stage: GA
title: App Engine Creator
---
description: Ability to view App Engine app status.
etag: AA==
name: roles/appengine.appViewer
stage: GA
title: App Engine Viewer
---
description: Ability to view App Engine app status and deployed source code.
etag: AA==
name: roles/appengine.codeViewer
stage: GA
title: App Engine Code Viewer
---
description: Ability to read or manage v2 instances.
etag: AA==
name: roles/appengine.debugger
stage: GA
title: App Engine Managed VM Debug Access
---
description: Necessary permissions to deploy new code to App Engine, and remove old
versions.
etag: AA==
name: roles/appengine.deployer
stage: GA
title: App Engine Deployer
---
description: Can get, set, delete, and flush App Engine Memcache items.
etag: AA==
name: roles/appengine.memcacheDataAdmin
stage: GA
title: App Engine Memcache Data Admin
---
description: Can view and change traffic splits, scaling settings, and delete old
versions; can't create new versions.
etag: AA==
name: roles/appengine.serviceAdmin
stage: GA
title: App Engine Service Admin
---
description: Give App Engine Standard Enviroment service account access to managed
resources. Includes access to service accounts.
etag: AA==
name: roles/appengine.serviceAgent
stage: GA
title: App Engine Standard Environment Service Agent
---
description: Can edit and manage App Engine Flexible Environment apps. Includes access
to service accounts.
etag: AA==
name: roles/appengineflex.serviceAgent
stage: GA
title: App Engine flexible environment Service Agent
---
description: Full access to App Hub resources.
etag: AA==
name: roles/apphub.admin
stage: BETA
title: App Hub Admin
---
description: Edit access to App Hub resources.
etag: AA==
name: roles/apphub.editor
stage: BETA
title: App Hub Editor
---
description: View access to App Hub resources.
etag: AA==
name: roles/apphub.viewer
stage: BETA
title: App Hub Viewer
---
description: Grants access to approve commands to run on appliances
etag: AA==
name: roles/applianceactivation.approver
stage: BETA
title: Appliance troubleshooting commands approver
---
description: Grants access to read commands for an appliance and send its result.
etag: AA==
name: roles/applianceactivation.client
stage: BETA
title: On-appliance troubleshooting client
---
description: Grants access to send new commands to run on appliances and view the
outputs
etag: AA==
name: roles/applianceactivation.troubleshooter
stage: BETA
title: Appliance troubleshooter
---
description: Administrator access to create and manage repositories.
etag: AA==
name: roles/artifactregistry.admin
stage: GA
title: Artifact Registry Administrator
---
description: Access to manage artifacts in repositories, as well as create new repositories
on push
etag: AA==
name: roles/artifactregistry.createOnPushRepoAdmin
stage: GA
title: Artifact Registry Create-on-Push Repository Administrator
---
description: Access to read and write repository items, as well as create new repositories
on push
etag: AA==
name: roles/artifactregistry.createOnPushWriter
stage: GA
title: Artifact Registry Create-on-Push Writer
---
description: Access to read repository items.
etag: AA==
name: roles/artifactregistry.reader
stage: GA
title: Artifact Registry Reader
---
description: Access to manage artifacts in repositories.
etag: AA==
name: roles/artifactregistry.repoAdmin
stage: GA
title: Artifact Registry Repository Administrator
---
description: Gives the Artifact Registry service account access to managed resources.
etag: AA==
name: roles/artifactregistry.serviceAgent
stage: GA
title: Artifact Registry Service Agent
---
description: Access to read and write repository items.
etag: AA==
name: roles/artifactregistry.writer
stage: GA
title: Artifact Registry Writer
---
description: Full access to Assured OSS resources.
etag: AA==
name: roles/assuredoss.admin
stage: BETA
title: Assured OSS Admin
---
description: Read access to all Assured OSS resources.
etag: AA==
name: roles/assuredoss.reader
stage: BETA
title: Assured OSS Reader
---
description: Read access to Assured OSS packages and metadata.
etag: AA==
name: roles/assuredoss.user
stage: BETA
title: Assured OSS User
---
description: Grants full access to Assured Workloads resources, CRM resources - project/folder
and Organization Policy administration
etag: AA==
name: roles/assuredworkloads.admin
stage: GA
title: Assured Workloads Administrator
---
description: Grants read, write access to Assured Workloads resources, CRM resources
- project/folder and Organization Policy administration
etag: AA==
name: roles/assuredworkloads.editor
stage: GA
title: Assured Workloads Editor
---
description: Gives the Assured Workloads service account access to create CAIS feed
and monitor Assured Workloads.
etag: AA==
name: roles/assuredworkloads.monitoringServiceAgent
stage: GA
title: Assured Workloads Monitoring Service Agent
---
description: Grants read access to all Assured Workloads resources and CRM resources
- project/folder
etag: AA==
name: roles/assuredworkloads.reader
stage: GA
title: Assured Workloads Reader
---
description: Gives the Assured Workloads service account access to create KMS keyrings
and keys, and to monitor Assured Workloads.
etag: AA==
name: roles/assuredworkloads.serviceAgent
stage: GA
title: Assured Workloads Service Agent
---
description: Grants Audit Manager Service Agent access to various list/get rpcs of
products to perform an audit.
etag: AA==
name: roles/auditmanager.serviceAgent
stage: GA
title: Audit Manager Auditing Service Agent
---
description: Full access to all AutoML resources
etag: AA==
name: roles/automl.admin
stage: BETA
title: AutoML Admin
---
description: Editor of all AutoML resources
etag: AA==
name: roles/automl.editor
stage: BETA
title: AutoML Editor
---
description: Predict using models
etag: AA==
name: roles/automl.predictor
stage: BETA
title: AutoML Predictor
---
description: AutoML service agent can act as Cloud Storage admin and export BigQuery
tables, which can be backed by Cloud Storage and Cloud Bigtable.
etag: AA==
name: roles/automl.serviceAgent
stage: GA
title: AutoML Service Agent
---
description: Viewer of all AutoML resources
etag: AA==
name: roles/automl.viewer
stage: BETA
title: AutoML Viewer
---
description: Full access to all Recommendations AI resources.
etag: AA==
name: roles/automlrecommendations.admin
stage: BETA
title: Recommendations AI Admin
---
description: Viewer of all Recommendations AI resources.
etag: AA==
name: roles/automlrecommendations.adminViewer
stage: BETA
title: Recommendations AI Admin Viewer
---
description: Editor of all Recommendations AI resources.
etag: AA==
name: roles/automlrecommendations.editor
stage: BETA
title: Recommendations AI Editor
---
description: Recommendations AI service uploads catalog feeds from Cloud Storage,
reports results to the customer Cloud Storage bucket, writes logs to customer projects,
and writes and reads Stackdriver metrics for customer projects.
etag: AA==
name: roles/automlrecommendations.serviceAgent
stage: GA
title: Recommendations AI Service Agent
---
description: Viewer of all Recommendations AI resources except automlrecommendations.apiKeys.
To have all read access use Recommendations AI Admin Viewer role instead.
etag: AA==
name: roles/automlrecommendations.viewer
stage: BETA
title: Recommendations AI Viewer
---
description: Access to write metrics for autoscaling site
etag: AA==
name: roles/autoscaling.metricsWriter
stage: BETA
title: Autoscaling Metrics Writer
---
description: Access to read recommendations from autoscaling site
etag: AA==
name: roles/autoscaling.recommendationsReader
stage: BETA
title: Autoscaling Recommendations Reader
---
description: Full access to all autoscaling site features
etag: AA==
name: roles/autoscaling.sitesAdmin
stage: BETA
title: Autoscaling Site Admin
---
description: Access to write state for autoscaling site
etag: AA==
name: roles/autoscaling.stateWriter
stage: BETA
title: Autoscaling State Writer
---
description: Enable Access Transparency for Organization
etag: AA==
name: roles/axt.admin
stage: GA
title: Access Transparency Admin
---
description: 'Provides full access to all Backup and DR resources. '
etag: AA==
name: roles/backupdr.admin
stage: GA
title: Backup and DR Admin
---
description: Allows the user to apply existing backup plans. This role cannot create
backup plans or restore from a backup.
etag: AA==
name: roles/backupdr.backupUser
stage: GA
title: Backup and DR Backup User
---
description: Allows a Backup and DR service account to store and manage data (backups
or metadata) in Cloud Storage.
etag: AA==
name: roles/backupdr.cloudStorageOperator
stage: GA
title: Backup and DR Cloud Storage Operator
---
description: Allows a Backup and DR service account to discover, back up, and restore
Compute Engine VM instances.
etag: AA==
name: roles/backupdr.computeEngineOperator
stage: GA
title: Backup and DR Compute Engine Operator
---
description: Allows the user to mount from a backup. This role cannot create a backup
plan or restore from a backup.
etag: AA==
name: roles/backupdr.mountUser
stage: GA
title: Backup and DR Mount User
---
description: Allows the user to restore or mount from a backup. This role cannot create
a backup plan.
etag: AA==
name: roles/backupdr.restoreUser
stage: GA
title: Backup and DR Restore User
---
description: Grants the Backup and DR Service access to protect GCE instances.
etag: AA==
name: roles/backupdr.serviceAgent
stage: GA
title: Backup and DR Service Agent
---
description: Provides access to management console. Granular Backup and DR permissions
depend on ACL configuration provided by Backup and DR admin within the management
console.
etag: AA==
name: roles/backupdr.user
stage: GA
title: Backup and DR User
---
description: Provides full access to Backup and DR resources except deploying and
managing backup infrastructure, expiring backups, changing data sensitivity and
configuring on-premises billing.
etag: AA==
name: roles/backupdr.userv2
stage: GA
title: Backup and DR User V2
---
description: Provides read-only access to all Backup and DR resources.
etag: AA==
name: roles/backupdr.viewer
stage: GA
title: Backup and DR Viewer
---
description: Administrator of Bare Metal Solution resources
etag: AA==
name: roles/baremetalsolution.admin
stage: GA
title: Bare Metal Solution Admin
---
description: Editor of Bare Metal Solution resources
etag: AA==
name: roles/baremetalsolution.editor
stage: GA
title: Bare Metal Solution Editor
---
description: Admin of Bare Metal Solution Instance resources
etag: AA==
name: roles/baremetalsolution.instancesadmin
stage: GA
title: Bare Metal Solution Instances Admin
---
description: Viewer of Bare Metal Solution Instance resources
etag: AA==
name: roles/baremetalsolution.instancesviewer
stage: GA
title: Bare Metal Solution Instances Viewer
---
description: Administrator of Bare Metal Solution Lun resources
etag: AA==
name: roles/baremetalsolution.lunsadmin
stage: GA
title: Luns Admin
---
description: Viewer of Bare Metal Solution Lun resources
etag: AA==
name: roles/baremetalsolution.lunsviewer
stage: GA
title: Luns Viewer
---
description: Administrator of Bare Metal Solution maintenance events resources
etag: AA==
name: roles/baremetalsolution.maintenanceeventsadmin
stage: GA
title: Maintenance Events Admin
---
description: Editor of Bare Metal Solution maintenance events resources
etag: AA==
name: roles/baremetalsolution.maintenanceeventseditor
stage: GA
title: Maintenance Events Editor
---
description: Viewer of Bare Metal Solution maintenance events resources
etag: AA==
name: roles/baremetalsolution.maintenanceeventsviewer
stage: GA
title: Maintenance Events Viewer
---
description: Admin of Bare Metal Solution networks resources
etag: AA==
name: roles/baremetalsolution.networksadmin
stage: GA
title: Networks Admin
---
description: Administrator of Bare Metal Solution NFS Share resources
etag: AA==
name: roles/baremetalsolution.nfssharesadmin
stage: GA
title: NFS Shares Admin
---
description: Editor of Bare Metal Solution NFS Share resources
etag: AA==
name: roles/baremetalsolution.nfsshareseditor
stage: GA
title: NFS Shares Editor
---
description: Viewer of Bare Metal Solution NFS Share resources
etag: AA==
name: roles/baremetalsolution.nfssharesviewer
stage: GA
title: NFS Shares Viewer
---
description: Viewer of Bare Metal Solution OS images resources
etag: AA==
name: roles/baremetalsolution.osimagesviewer
stage: GA
title: OS Images Viewer
---
description: Administrator of Bare Metal Solution Procurements
etag: AA==
name: roles/baremetalsolution.procurementsadmin
stage: GA
title: Bare Metal Solution Procurements Admin
---
description: Editor of Bare Metal Solution Procurements
etag: AA==
name: roles/baremetalsolution.procurementseditor
stage: GA
title: Bare Metal Solution Procurements Editor
---
description: Viewer of Bare Metal Solution Procurements
etag: AA==
name: roles/baremetalsolution.procurementsviewer
stage: GA
title: Bare Metal Solution Procurements Viewer
---
description: Gives permission to manage network resources such as interconnect pairing
keys, required for Bare Metal Solution.
etag: AA==
name: roles/baremetalsolution.serviceAgent
stage: GA
title: Bare Metal Solution Service Agent
---
description: Administrator of Bare Metal Solution storage resources
etag: AA==
name: roles/baremetalsolution.storageadmin
stage: GA
title: Bare Metal Solution Storage Admin
---
description: Viewer of Bare Metal Solution resources
etag: AA==
name: roles/baremetalsolution.viewer
stage: GA
title: Bare Metal Solution Viewer
---
description: Administrator of Bare Metal Solution volume resources
etag: AA==
name: roles/baremetalsolution.volumesadmin
stage: GA
title: Volume Admin
---
description: Editor of Bare Metal Solution volumes resources
etag: AA==
name: roles/baremetalsolution.volumeseditor
stage: GA
title: Volumes Editor
---
description: Administrator of Bare Metal Solution snapshots resources
etag: AA==
name: roles/baremetalsolution.volumesnapshotsadmin
stage: GA
title: Snapshots Admin
---
description: Editor of Bare Metal Solution snapshots resources
etag: AA==
name: roles/baremetalsolution.volumesnapshotseditor
stage: GA
title: Snapshots Editor
---
description: Viewer of Bare Metal Solution snapshots resources
etag: AA==
name: roles/baremetalsolution.volumesnapshotsviewer
stage: GA
title: Snapshots Viewer
---
description: Viewer of Bare Metal Solution volumes resources
etag: AA==
name: roles/baremetalsolution.volumessviewer
stage: GA
title: Volumes Viewer
---
description: Reporter of batch agent states.
etag: AA==
name: roles/batch.agentReporter
stage: BETA
title: Batch Agent Reporter
---
description: Editor of batch Jobs
etag: AA==
name: roles/batch.jobsEditor
stage: BETA
title: Batch Job Editor
---
description: Viewer of Batch Jobs, Task Groups and Tasks
etag: AA==
name: roles/batch.jobsViewer
stage: BETA
title: Batch Job Viewer
---
description: Gives Google Batch account access to manage customer resources.
etag: AA==
name: roles/batch.serviceAgent
stage: GA
title: Google Batch Service Agent
---
description: Full access to all Cloud BeyondCorp resources.
etag: AA==
name: roles/beyondcorp.admin
stage: BETA
title: Cloud BeyondCorp Admin
---
description: Full access to all BeyondCorp Client Connector resources.
etag: AA==
name: roles/beyondcorp.clientConnectorAdmin
stage: BETA
title: Cloud BeyondCorp Client Connector Admin
---
description: Access Client Connector Service
etag: AA==
name: roles/beyondcorp.clientConnectorServiceUser
stage: BETA
title: Cloud BeyondCorp Client Connector Service User
---
description: Read-only access to all BeyondCorp Client Connector resources.
etag: AA==
name: roles/beyondcorp.clientConnectorViewer
stage: BETA
title: Cloud BeyondCorp Client Connector Viewer
---
description: Delegates access to all BeyondCorp partner service resources to a BeyondCorp
Enterprise partner.
etag: AA==
name: roles/beyondcorp.partnerServiceDelegateAdmin
stage: BETA
title: Cloud BeyondCorp Partner Service Delegate Admin
---
description: Delegates read-only access to all BeyondCorp partner service resources
to a BeyondCorp Enterprise partner.
etag: AA==
name: roles/beyondcorp.partnerServiceDelegateViewer
stage: BETA
title: Cloud BeyondCorp Partner Service Delegate Viewer
---
description: Full access to all BeyondCorp Subscription resources.
etag: AA==
name: roles/beyondcorp.subscriptionAdmin
stage: BETA
title: Cloud BeyondCorp Subscription Admin
---
description: Read-only access to all BeyondCorp Subscription resources.
etag: AA==
name: roles/beyondcorp.subscriptionViewer
stage: BETA
title: Cloud BeyondCorp Subscription Viewer
---
description: Read-only access to all Cloud BeyondCorp resources.
etag: AA==
name: roles/beyondcorp.viewer
stage: BETA
title: Cloud BeyondCorp Viewer
---
description: Provides full access to all BigLake resources.
etag: AA==
name: roles/biglake.admin
stage: GA
title: BigLake Admin
---
description: Provides read-only access to all BigLake resources.
etag: AA==
name: roles/biglake.viewer
stage: GA
title: BigLake Viewer
---
description: Administer all BigQuery resources and data
etag: AA==
name: roles/bigquery.admin
stage: GA
title: BigQuery Admin
---
etag: AA==
name: roles/bigquery.connectionAdmin
stage: GA
title: BigQuery Connection Admin
---
etag: AA==
name: roles/bigquery.connectionUser
stage: GA
title: BigQuery Connection User
---
description: Access to edit all the contents of datasets
etag: AA==
name: roles/bigquery.dataEditor
stage: GA
title: BigQuery Data Editor
---
description: Full access to datasets and all of their contents
etag: AA==
name: roles/bigquery.dataOwner
stage: GA
title: BigQuery Data Owner
---
description: Access to view datasets and all of their contents
etag: AA==
name: roles/bigquery.dataViewer
stage: GA
title: BigQuery Data Viewer
---
description: Access to view filtered table data defined by a row access policy
etag: AA==
name: roles/bigquery.filteredDataViewer
stage: GA
title: BigQuery Filtered Data Viewer
---
description: Access to run jobs
etag: AA==
name: roles/bigquery.jobUser
stage: GA
title: BigQuery Job User
---
description: Access to view table and dataset metadata
etag: AA==
name: roles/bigquery.metadataViewer
stage: GA
title: BigQuery Metadata Viewer
---
description: Access to create and use read sessions
etag: AA==
name: roles/bigquery.readSessionUser
stage: GA
title: BigQuery Read Session User
---
description: Administers BigQuery workloads, including slot assignments, commitments,
and reservations.
etag: AA==
name: roles/bigquery.resourceAdmin
stage: GA
title: BigQuery Resource Admin
---
description: Manages BigQuery workloads, but is unable to create or modify slot commitments.
etag: AA==
name: roles/bigquery.resourceEditor
stage: GA
title: BigQuery Resource Editor
---
description: Can view BigQuery workloads, but cannot create or modify slot reservations
or commitments.
etag: AA==
name: roles/bigquery.resourceViewer
stage: GA
title: BigQuery Resource Viewer
---
description: Combination role of BigQuery Admin, Dataform Admin, and Notebook Runtime
Admin.
etag: AA==
name: roles/bigquery.studioAdmin
stage: BETA
title: BigQuery Studio Admin
---
description: Combination role of BigQuery Job User, BigQuery Read Session User, Dataform
Code Creator, and Notebook Runtime User.
etag: AA==
name: roles/bigquery.studioUser
stage: BETA
title: BigQuery Studio User
---
description: When applied to a project, access to run queries, create datasets, read
dataset metadata, and list tables. When applied to a dataset, access to read dataset
metadata and list tables within the dataset.
etag: AA==
name: roles/bigquery.user
stage: GA
title: BigQuery User
---
description: Gives BigQuery Connection Service access to Cloud SQL instances in user
projects.
etag: AA==
name: roles/bigqueryconnection.serviceAgent
stage: GA
title: BigQuery Connection Service Agent
---
description: Masked read access to sub-resources tagged by the policy tag associated
with a data policy, for example, BigQuery columns
etag: AA==
name: roles/bigquerydatapolicy.maskedReader
stage: GA
title: Masked Reader
---
description: 'Gives BigQuery Data Transfer Service access to start bigquery jobs in
consumer project. '
etag: AA==
name: roles/bigquerydatatransfer.serviceAgent
stage: GA
title: BigQuery Data Transfer Service Agent
---
description: Editor of EDW migration workflows.
etag: AA==
name: roles/bigquerymigration.editor
stage: GA
title: MigrationWorkflow Editor
---
description: Orchestrator of EDW migration tasks.
etag: AA==
name: roles/bigquerymigration.orchestrator
stage: GA
title: Task Orchestrator
---
description: User of EDW migration interactive SQL translation service.
etag: AA==
name: roles/bigquerymigration.translationUser
stage: GA
title: Migration Translation User
---
description: Viewer of EDW migration MigrationWorkflow.
etag: AA==
name: roles/bigquerymigration.viewer
stage: GA
title: MigrationWorkflow Viewer
---
description: Worker that executes EDW migration subtasks.
etag: AA==
name: roles/bigquerymigration.worker
stage: GA
title: Task Worker
---
description: Gives BigQuery Omni access to tables in user projects.
etag: AA==
name: roles/bigqueryomni.serviceAgent
stage: GA
title: BigQuery Omni Service Agent
---
description: Gives BigQuery Spark access to the service accounts in the user project.
etag: AA==
name: roles/bigqueryspark.serviceAgent
stage: GA
title: BigQuery Spark Service Agent
---
description: Full access to all Bigtable resources and ability to assign Bigtable
IAM roles.
etag: AA==
name: roles/bigtable.admin
stage: GA
title: Bigtable Administrator
---
description: Read access to data in existing tables; read access to metadata for instances,
clusters, and tables, including column families.
etag: AA==
name: roles/bigtable.reader
stage: GA
title: Bigtable Reader
---
description: Read and write access to data in existing tables; read access to metadata
for instances, clusters, and tables, including column families.
etag: AA==
name: roles/bigtable.user
stage: GA
title: Bigtable User
---
description: Read access to metadata for instances, clusters, and tables, including
column families.
etag: AA==
name: roles/bigtable.viewer
stage: GA
title: Bigtable Viewer
---
description: Authorized to see and manage all aspects of billing accounts.
etag: AA==
name: roles/billing.admin
stage: GA
title: Billing Account Administrator
---
etag: AA==
name: roles/billing.carbonViewer
stage: GA
title: Carbon Footprint Viewer
---
description: Can view and export cost information of billing accounts.
etag: AA==
name: roles/billing.costsManager
stage: GA
title: Billing Account Costs Manager
---
description: Creator of billing accounts.
etag: AA==
name: roles/billing.creator
stage: GA
title: Billing Account Creator
---
description: Can assign a project's billing account or disable its billing.
etag: AA==
name: roles/billing.projectManager
stage: GA
title: Project Billing Manager
---
description: Can associate projects with billing accounts
etag: AA==
name: roles/billing.user
stage: GA
title: Billing Account User
---
description: Can view information about billing accounts.
etag: AA==
name: roles/billing.viewer
stage: GA
title: Billing Account Viewer
---
description: Adminstrator of Binary Authorization Attestors
etag: AA==
name: roles/binaryauthorization.attestorsAdmin
stage: GA
title: Binary Authorization Attestor Admin
---
description: Editor of Binary Authorization Attestors
etag: AA==
name: roles/binaryauthorization.attestorsEditor
stage: GA
title: Binary Authorization Attestor Editor
---
description: Caller of Binary Authorization Attestors VerifyImageAttested
etag: AA==
name: roles/binaryauthorization.attestorsVerifier
stage: GA
title: Binary Authorization Attestor Image Verifier
---
description: Viewer of Binary Authorization Attestors
etag: AA==
name: roles/binaryauthorization.attestorsViewer
stage: GA
title: Binary Authorization Attestor Viewer
---
description: Administrator of Binary Authorization Policy
etag: AA==
name: roles/binaryauthorization.policyAdmin
stage: GA
title: Binary Authorization Policy Administrator
---
description: Editor of Binary Authorization Policy
etag: AA==
name: roles/binaryauthorization.policyEditor
stage: GA
title: Binary Authorization Policy Editor
---
description: Evaluator of Binary Authorization Policy
etag: AA==
name: roles/binaryauthorization.policyEvaluator
stage: BETA
title: Binary Authorization Policy Evaluator
---
description: Viewer of Binary Authorization Policy
etag: AA==
name: roles/binaryauthorization.policyViewer
stage: GA
title: Binary Authorization Policy Viewer
---
description: Can read Notes and Occurrences from the Container Analysis Service to
find and verify signatures.
etag: AA==
name: roles/binaryauthorization.serviceAgent
stage: GA
title: Binary Authorization Service Agent
---
description: Full access to Blockchain Node Engine resources.
etag: AA==
name: roles/blockchainnodeengine.admin
stage: GA
title: Blockchain Node Engine Admin
---
description: Readonly access to Blockchain Node Engine resources.
etag: AA==
name: roles/blockchainnodeengine.viewer
stage: GA
title: Blockchain Node Engine Viewer
---
description: Access to browse GCP resources.
etag: AA==
name: roles/browser
stage: GA
title: Browser
---
description: Read-only access to Capacity Planner usage resources
etag: AA==
name: roles/capacityplanner.viewer
stage: BETA
title: Capacity Planner Usage Viewer
---
description: This role can view all properties of Patients.
etag: AA==
name: roles/carestudio.viewer
stage: GA
title: Care Studio Patients Viewer
---
description: Edit access to Certificate Manager all resources.
etag: AA==
name: roles/certificatemanager.editor
stage: GA
title: Certificate Manager Editor
---
description: Full access to Certificate Manager all resources.
etag: AA==
name: roles/certificatemanager.owner
stage: GA
title: Certificate Manager Owner
---
description: Grants Certificate Manager access to services and APIs in the user project.
etag: AA==
name: roles/certificatemanager.serviceAgent
stage: GA
title: Certificate Manager Service Agent
---
description: Read-only access to Certificate Manager all resources.
etag: AA==
name: roles/certificatemanager.viewer
stage: GA
title: Certificate Manager Viewer
---
description: Can view and modify bot configurations
etag: AA==
name: roles/chat.owner
stage: GA
title: Chat Bots Owner
---
description: Can view bot configurations
etag: AA==
name: roles/chat.reader
stage: GA
title: Chat Bots Viewer
---
description: Full access to the Chronicle API services, including global settings.
etag: AA==
name: roles/chronicle.admin
stage: GA
title: Chronicle API Admin
---
description: Modify Access to Chronicle API resources.
etag: AA==
name: roles/chronicle.editor
stage: GA
title: Chronicle API Editor
---
description: Grants readonly access to Chronicle API resources, excluding Rules and
Retrohunts.
etag: AA==
name: roles/chronicle.limitedViewer
stage: GA
title: Chronicle API Limited Viewer
---
description: Grants access to data controlled by Data Access Scopes. Intended to be
refined by IAM Conditions.
etag: AA==
name: roles/chronicle.restrictedDataAccess
stage: BETA
title: Chronicle API Restricted Data Access
---
description: Grants readonly access to Chronicle API resources without global data
access scope.
etag: AA==
name: roles/chronicle.restrictedDataAccessViewer
stage: BETA
title: Chronicle API Restricted Data Access Viewer
---
description: Grants Chronicle scoped access to customer project
etag: AA==
name: roles/chronicle.serviceAgent
stage: GA
title: Chronicle Service Agent
---
description: Readonly access to the Chronicle API resources.
etag: AA==
name: roles/chronicle.viewer
stage: GA
title: Chronicle API Viewer
---
description: Admins can view and modify Chronicle service details.
etag: AA==
name: roles/chroniclesm.admin
stage: GA
title: Chronicle Service Admin
---
description: Viewers can see Chronicle service details but not change them.
etag: AA==
name: roles/chroniclesm.viewer
stage: GA
title: Chronicle Service Viewer
---
description: Read and enumerate locations available for resource creation.
etag: AA==
name: roles/cloud.locationReader
stage: BETA
title: Location reader
---
description: A user who can receive assistance from Cloud AI Companion
etag: AA==
name: roles/cloudaicompanion.user
stage: BETA
title: Cloud AI Companion User
---
description: Give effective policy service account access to search all resources
and IAM policies.
etag: AA==
name: roles/cloudasset.effectivePolicyServiceAgent
stage: GA
title: Effective Policies Service Agent
---
description: Service Agent used by other-cloud config to collect assets data from
other-cloud.
etag: AA==
name: roles/cloudasset.otherCloudConfigServiceAgent
title: Other Cloud Config Service Agent
---
description: Full access to cloud assets metadata
etag: AA==
name: roles/cloudasset.owner
stage: GA
title: Cloud Asset Owner
---
description: Gives Cloud Asset service agent permissions to Cloud Storage and BigQuery
for exporting Assets, and permission to publish to Cloud Pub/Sub topics for Asset
Real Time Feed.
etag: AA==
name: roles/cloudasset.serviceAgent
stage: GA
title: Cloud Asset Service Agent
---
description: Read only access to cloud assets metadata
etag: AA==
name: roles/cloudasset.viewer
stage: GA
title: Cloud Asset Viewer
---
description: Can approve or reject pending builds.
etag: AA==
name: roles/cloudbuild.builds.approver
stage: GA
title: Cloud Build Approver
---
description: Can perform builds
etag: AA==
name: roles/cloudbuild.builds.builder
stage: GA
title: Cloud Build Service Account
---
description: Can create and cancel builds
etag: AA==
name: roles/cloudbuild.builds.editor
stage: GA
title: Cloud Build Editor
---
description: Can view builds
etag: AA==
name: roles/cloudbuild.builds.viewer
stage: GA
title: Cloud Build Viewer
---
description: Can manage connections and repositories.
etag: AA==
name: roles/cloudbuild.connectionAdmin
stage: GA
title: Cloud Build Connection Admin
---
description: Can view and list connections and repositories.
etag: AA==
name: roles/cloudbuild.connectionViewer
stage: GA
title: Cloud Build Connection Viewer
---
description: Can update Integrations
etag: AA==
name: roles/cloudbuild.integrationsEditor
stage: GA
title: Cloud Build Integrations Editor
---
description: Can create/delete Integrations
etag: AA==
name: roles/cloudbuild.integrationsOwner
stage: GA
title: Cloud Build Integrations Owner
---
description: Can view Integrations
etag: AA==
name: roles/cloudbuild.integrationsViewer
stage: GA
title: Cloud Build Integrations Viewer
---
description: Gives the Cloud Build logging-specific service account access to write
logs.
etag: AA==
name: roles/cloudbuild.loggingServiceAgent
stage: GA
title: Cloud Build Logging Service Agent
---
description: Can view the connection and access its read-only token.
etag: AA==
name: roles/cloudbuild.readTokenAccessor
stage: GA
title: Cloud Build Read Only Token Accessor
---
description: Gives Cloud Build service account access to managed resources.
etag: AA==
name: roles/cloudbuild.serviceAgent
stage: GA
title: Cloud Build Service Agent
---
description: Can view the connection and access its read/write and read-only tokens.
etag: AA==
name: roles/cloudbuild.tokenAccessor
stage: GA
title: Cloud Build Token Accessor
---
description: Can update and view WorkerPools
etag: AA==
name: roles/cloudbuild.workerPoolEditor
stage: GA
title: Cloud Build WorkerPool Editor
---
description: Can create, delete, update, and view WorkerPools
etag: AA==
name: roles/cloudbuild.workerPoolOwner
stage: GA
title: Cloud Build WorkerPool Owner
---
description: Can run builds in the WorkerPool
etag: AA==
name: roles/cloudbuild.workerPoolUser
stage: GA
title: Cloud Build WorkerPool User
---
description: Can view WorkerPools
etag: AA==
name: roles/cloudbuild.workerPoolViewer
stage: GA
title: Cloud Build WorkerPool Viewer
---
description: Full access to Firebase Remote Config resources.
etag: AA==
name: roles/cloudconfig.admin
stage: GA
title: Firebase Remote Config Admin
---
description: Gives Infrastructure Manager service agent access to managed resources
etag: AA==
name: roles/cloudconfig.serviceAgent
stage: GA
title: Infrastructure Manager Service Agent
---
description: Read access to Firebase Remote Config resources.
etag: AA==
name: roles/cloudconfig.viewer
stage: GA
title: Firebase Remote Config Viewer
---
description: Gives the Partner Console service account access to read Access Approval
Requests for workloads associated with a partner.
etag: AA==
name: roles/cloudcontrolspartner.accessApprovalServiceAgent
stage: GA
title: Cloud Controls Partner Access Approval Service Agent
---
description: Full access to Cloud Controls Partner resources.
etag: AA==
name: roles/cloudcontrolspartner.admin
stage: BETA
title: Cloud Controls Partner Admin
---
description: Editor access to Cloud Controls Partner resources.
etag: AA==
name: roles/cloudcontrolspartner.editor
stage: BETA
title: Cloud Controls Partner Editor
---
description: Gives Cloud Controls Partner service agent permission to list EKM connections,
get EKM connection status, and provide EKM diagnostic information.
etag: AA==
name: roles/cloudcontrolspartner.ekmServiceAgent
stage: GA
title: Cloud Controls Partner EKM Service Agent
---
description: Readonly access to Cloud Controls Partner inspectability resources.
etag: AA==
name: roles/cloudcontrolspartner.inspectabilityReader
stage: BETA
title: Cloud Controls Partner Inspectability Reader
---
description: Readonly access to Cloud Controls Partner monitoring resources.
etag: AA==
name: roles/cloudcontrolspartner.monitoringReader
stage: BETA
title: Cloud Controls Partner Monitoring Reader
---
description: Gives Cloud Controls Partner monitoring service agent permission to view
and list Assured Workload violations. The role is assigned to enable partner monitoring
capability.
etag: AA==
name: roles/cloudcontrolspartner.monitoringServiceAgent
stage: GA
title: Cloud Controls Partner Monitoring Service Agent
---
description: Readonly access to Cloud Controls Partner resources.
etag: AA==
name: roles/cloudcontrolspartner.reader
stage: BETA
title: Cloud Controls Partner Reader
---
description: Cloud Debugger agents are allowed to register and provide debug snapshot
data.
etag: AA==
name: roles/clouddebugger.agent
stage: BETA
title: Cloud Debugger Agent
---
description: User Access to Cloud Debugger. Can create, delete and view snapshots
and logpoints.
etag: AA==
name: roles/clouddebugger.user
stage: BETA
title: Cloud Debugger User
---
description: Full control of Cloud Deploy resources.
etag: AA==
name: roles/clouddeploy.admin
stage: GA
title: Cloud Deploy Admin
---
description: Permission to approve or reject rollouts.
etag: AA==
name: roles/clouddeploy.approver
stage: GA
title: Cloud Deploy Approver
---
description: Permission to manage CustomTargetType resources
etag: AA==
name: roles/clouddeploy.customTargetTypeAdmin
stage: BETA
title: Cloud Deploy Custom Target Type Admin
---
description: Permission to manage deployment configuration without permission to access
operational resources, such as targets.
etag: AA==
name: roles/clouddeploy.developer
stage: GA
title: Cloud Deploy Developer
---
description: Permission to execute Cloud Deploy work without permission to deliver
to a target.
etag: AA==
name: roles/clouddeploy.jobRunner
stage: GA
title: Cloud Deploy Runner
---
description: Permission to manage deployment configuration.
etag: AA==
name: roles/clouddeploy.operator
stage: GA
title: Cloud Deploy Operator
---
description: Permission to create Cloud Deploy releases and rollouts.
etag: AA==
name: roles/clouddeploy.releaser
stage: GA
title: Cloud Deploy Releaser
---
description: Gives Cloud Deploy Service Account access to managed resources.
etag: AA==
name: roles/clouddeploy.serviceAgent
stage: GA
title: Cloud Deploy Service Agent
---
description: Can view Cloud Deploy resources.
etag: AA==
name: roles/clouddeploy.viewer
stage: GA
title: Cloud Deploy Viewer
---
description: Full access to functions, operations and locations.
etag: AA==
name: roles/cloudfunctions.admin
stage: GA
title: Cloud Functions Admin
---
description: Read and write access to all functions-related resources.
etag: AA==
name: roles/cloudfunctions.developer
stage: GA
title: Cloud Functions Developer
---
description: Ability to invoke HTTP functions with restricted access.
etag: AA==
name: roles/cloudfunctions.invoker
stage: GA
title: Cloud Functions Invoker
---
description: Gives Cloud Functions service account access to managed resources.
etag: AA==
name: roles/cloudfunctions.serviceAgent
stage: GA
title: Cloud Functions Service Agent
---
description: Read-only access to functions and locations.
etag: AA==
name: roles/cloudfunctions.viewer
stage: GA
title: Cloud Functions Viewer
---
description: Full control of all Cloud IoT resources and permissions.
etag: AA==
name: roles/cloudiot.admin
stage: GA
title: Cloud IoT Admin
---
description: Access to update the device configuration, but not to create or delete
devices.
etag: AA==
name: roles/cloudiot.deviceController
stage: GA
title: Cloud IoT Device Controller
---
description: Read-write access to all Cloud IoT resources.
etag: AA==
name: roles/cloudiot.editor
stage: GA
title: Cloud IoT Editor
---
description: Access to create and delete devices from registries, but not to modify
the registries, and enable devices to publish to topics associated with IoT registry.
etag: AA==
name: roles/cloudiot.provisioner
stage: GA
title: Cloud IoT Provisioner
---
description: 'Grants the ability to manage Cloud IoT Core resources, including publishing
data to Cloud Pub/Sub and writing device activity logs to Stackdriver. Warning:
If this role is removed from the Cloud IoT service account, Cloud IoT Core will
be unable to publish data or write device activity logs.'
etag: AA==
name: roles/cloudiot.serviceAgent
stage: GA
title: Cloud IoT Core Service Agent
---
description: Read-only access to all Cloud IoT resources.
etag: AA==
name: roles/cloudiot.viewer
stage: GA
title: Cloud IoT Viewer
---
description: Access to Cloud Talent Solution Self-Service Tools.
etag: AA==
name: roles/cloudjobdiscovery.admin
stage: GA
title: Admin
---
description: Write access to all job data in Cloud Talent Solution.
etag: AA==
name: roles/cloudjobdiscovery.jobsEditor
stage: GA
title: Job Editor
---
description: Read access to all job data in Cloud Talent Solution.
etag: AA==
name: roles/cloudjobdiscovery.jobsViewer
stage: GA
title: Job Viewer
---
description: Write access to all profile data in Cloud Talent Solution.
etag: AA==
name: roles/cloudjobdiscovery.profilesEditor
stage: GA
title: Profile Editor
---
description: Read access to all profile data in Cloud Talent Solution.
etag: AA==
name: roles/cloudjobdiscovery.profilesViewer
stage: GA
title: Profile Viewer
---
description: Enables management of crypto resources.
etag: AA==
name: roles/cloudkms.admin
stage: GA
title: Cloud KMS Admin
---
description: Enables Decrypt operations
etag: AA==
name: roles/cloudkms.cryptoKeyDecrypter
stage: GA
title: Cloud KMS CryptoKey Decrypter
---
description: Enables Decrypt operations via other GCP services
etag: AA==
name: roles/cloudkms.cryptoKeyDecrypterViaDelegation
stage: GA
title: Cloud KMS CryptoKey Decrypter Via Delegation
---
description: Enables Encrypt operations
etag: AA==
name: roles/cloudkms.cryptoKeyEncrypter
stage: GA
title: Cloud KMS CryptoKey Encrypter
---
description: Enables Encrypt and Decrypt operations
etag: AA==
name: roles/cloudkms.cryptoKeyEncrypterDecrypter
stage: GA
title: Cloud KMS CryptoKey Encrypter/Decrypter
---
description: Enables Encrypt and Decrypt operations via other GCP services
etag: AA==
name: roles/cloudkms.cryptoKeyEncrypterDecrypterViaDelegation
stage: GA
title: Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation
---
description: Enables Encrypt operations via other GCP services
etag: AA==
name: roles/cloudkms.cryptoKeyEncrypterViaDelegation
stage: GA
title: Cloud KMS CryptoKey Encrypter Via Delegation
---
description: Enables all Crypto Operations.
etag: AA==
name: roles/cloudkms.cryptoOperator
stage: GA
title: Cloud KMS Crypto Operator
---
description: Enables management of EkmConnections.
etag: AA==
name: roles/cloudkms.ekmConnectionsAdmin
stage: GA
title: Cloud KMS EkmConnections Admin
---
description: Enables raw AES-CBC keys management.
etag: AA==
name: roles/cloudkms.expertRawAesCbc
stage: GA
title: Cloud KMS Expert Raw AES-CBC Key Manager
---
description: Enables raw AES-CTR keys management.
etag: AA==
name: roles/cloudkms.expertRawAesCtr
stage: GA
title: Cloud KMS Expert Raw AES-CTR Key Manager
---
description: Enables raw PKCS#1 keys management.
etag: AA==
name: roles/cloudkms.expertRawPKCS1
stage: GA
title: Cloud KMS Expert Raw PKCS#1 Key Manager
---
description: Enables ImportCryptoKeyVersion, CreateImportJob, ListImportJobs, and
GetImportJob operations
etag: AA==
name: roles/cloudkms.importer
stage: GA
title: Cloud KMS Importer
---
description: Gives Cloud KMS organization-level service account access to managed
resources.
etag: AA==
name: roles/cloudkms.orgServiceAgent
stage: GA
title: Cloud KMS Organization Service Agent
---
description: Enables viewing protected resources.
etag: AA==
name: roles/cloudkms.protectedResourcesViewer
stage: GA
title: Cloud KMS Protected Resources Viewer
---
description: Enables GetPublicKey operations
etag: AA==
name: roles/cloudkms.publicKeyViewer
stage: GA
title: Cloud KMS CryptoKey Public Key Viewer
---
description: Gives Cloud KMS service account access to managed resources.
etag: AA==
name: roles/cloudkms.serviceAgent
stage: GA
title: Cloud KMS Service Agent
---
description: Enables Sign operations
etag: AA==
name: roles/cloudkms.signer
stage: GA
title: Cloud KMS CryptoKey Signer
---
description: Enables Sign, Verify, and GetPublicKey operations
etag: AA==
name: roles/cloudkms.signerVerifier
stage: GA
title: Cloud KMS CryptoKey Signer/Verifier
---
description: Enables Verify and GetPublicKey operations
etag: AA==
name: roles/cloudkms.verifier
stage: GA
title: Cloud KMS CryptoKey Verifier
---
description: Enables Get and List operations.
etag: AA==
name: roles/cloudkms.viewer
stage: GA
title: Cloud KMS Viewer
---
description: Ability to create and manage Compute VMs to run Velostrata Infrastructure
etag: AA==
name: roles/cloudmigration.inframanager
stage: BETA
title: Velostrata Manager
---
description: Ability to access migration storage
etag: AA==
name: roles/cloudmigration.storageaccess
stage: BETA
title: Velostrata Storage Access
---
description: Ability to set up connection between Velostrata Manager and Google
etag: AA==
name: roles/cloudmigration.velostrataconnect
stage: BETA
title: Velostrata Manager Connection Agent
---
description: Administrator of Cloud Optimization AI resources
etag: AA==
name: roles/cloudoptimization.admin
stage: GA
title: Cloud Optimization AI Admin
---
description: Editor of Cloud Optimization AI resources
etag: AA==
name: roles/cloudoptimization.editor
stage: GA
title: Cloud Optimization AI Editor
---
description: Grants Cloud Optimization Service Account access to read and write data
in the user project.
etag: AA==
name: roles/cloudoptimization.serviceAgent
stage: GA
title: Cloud Optimization Service Agent
---
description: Viewer of Cloud Optimization AI resources
etag: AA==
name: roles/cloudoptimization.viewer
stage: GA
title: Cloud Optimization AI Viewer
---
description: Can browse catalogs in the target resource context.
etag: AA==
name: roles/cloudprivatecatalog.consumer
stage: BETA
title: Catalog Consumer
---
description: Can manage catalog and view its associations.
etag: AA==
name: roles/cloudprivatecatalogproducer.admin
stage: BETA
title: Catalog Admin
---
description: Can manage associations between a catalog and a target resource.
etag: AA==
name: roles/cloudprivatecatalogproducer.manager
stage: BETA
title: Catalog Manager
---
description: Can manage catalog org settings.
etag: AA==
name: roles/cloudprivatecatalogproducer.orgAdmin
stage: BETA
title: Catalog Org Admin
---
description: Cloud Profiler agents are allowed to register and provide the profiling
data.
etag: AA==
name: roles/cloudprofiler.agent
stage: GA
title: Cloud Profiler Agent
---
description: Cloud Profiler users are allowed to query and view the profiling data.
etag: AA==
name: roles/cloudprofiler.user
stage: GA
title: Cloud Profiler User
---
description: Full access to Cloud Quotas resources.
etag: AA==
name: roles/cloudquotas.admin
stage: BETA
title: Cloud Quotas Admin
---
description: Readonly access to Cloud Quotas resources.
etag: AA==
name: roles/cloudquotas.viewer
stage: BETA
title: Cloud Quotas Viewer
---
description: Full access to jobs and executions.
etag: AA==
name: roles/cloudscheduler.admin
stage: GA
title: Cloud Scheduler Admin
---
description: Access to run jobs.
etag: AA==
name: roles/cloudscheduler.jobRunner
stage: GA
title: Cloud Scheduler Job Runner
---
description: Grants Cloud Scheduler Service Account access to manage resources.
etag: AA==
name: roles/cloudscheduler.serviceAgent
stage: GA
title: Cloud Scheduler Service Agent
---
description: Get and list access to jobs, executions, and locations.
etag: AA==
name: roles/cloudscheduler.viewer
stage: GA
title: Cloud Scheduler Viewer
---
description: Full access to all Web Security Scanner resources
etag: AA==
name: roles/cloudsecurityscanner.editor
stage: GA
title: Web Security Scanner Editor
---
description: Read access to Scan and ScanRun, plus the ability to start scans
etag: AA==
name: roles/cloudsecurityscanner.runner
stage: GA
title: Web Security Scanner Runner
---
description: Read access to all Web Security Scanner resources
etag: AA==
name: roles/cloudsecurityscanner.viewer
stage: GA
title: Web Security Scanner Viewer
---
description: Full control of Cloud SQL resources.
etag: AA==
name: roles/cloudsql.admin
stage: GA
title: Cloud SQL Admin
---
description: Connectivity access to Cloud SQL instances.
etag: AA==
name: roles/cloudsql.client
stage: GA
title: Cloud SQL Client
---
description: Full control of existing Cloud SQL instances excluding modifying users,
SSL certificates or deleting resources.
etag: AA==
name: roles/cloudsql.editor
stage: GA
title: Cloud SQL Editor
---
description: Role allowing access to a Cloud SQL instance
etag: AA==
name: roles/cloudsql.instanceUser
stage: GA
title: Cloud SQL Instance User
---
description: Grants Cloud SQL access to services and APIs in the user project
etag: AA==
name: roles/cloudsql.serviceAgent
stage: GA
title: Cloud SQL Service Agent
---
description: Read-only access to Cloud SQL resources.
etag: AA==
name: roles/cloudsql.viewer
stage: GA
title: Cloud SQL Viewer
---
description: Allows management of a support account without giving access to support
cases.
etag: AA==
name: roles/cloudsupport.admin
stage: GA
title: Support Account Administrator
---
description: Full read-write access to technical support cases (applicable for GCP
Customer Care and Maps support).
etag: AA==
name: roles/cloudsupport.techSupportEditor
stage: GA
title: Tech Support Editor
---
description: Read-only access to technical support cases (applicable for GCP Customer
Care and Maps support).
etag: AA==
name: roles/cloudsupport.techSupportViewer
stage: GA
title: Tech Support Viewer
---
description: Read-only access to details of a support account. This does not allow
viewing cases.
etag: AA==
name: roles/cloudsupport.viewer
stage: GA
title: Support Account Viewer
---
description: Full access to queues and tasks.
etag: AA==
name: roles/cloudtasks.admin
stage: BETA
title: Cloud Tasks Admin
---
description: Access to create tasks.
etag: AA==
name: roles/cloudtasks.enqueuer
stage: BETA
title: Cloud Tasks Enqueuer
---
description: Admin access to queues.
etag: AA==
name: roles/cloudtasks.queueAdmin
stage: BETA
title: Cloud Tasks Queue Admin
---
description: Grants Cloud Tasks Service Account access to manage resources.
etag: AA==
name: roles/cloudtasks.serviceAgent
stage: GA
title: Cloud Tasks Service Agent
---
description: Access to delete tasks.
etag: AA==
name: roles/cloudtasks.taskDeleter
stage: BETA
title: Cloud Tasks Task Deleter
---
description: Access to run tasks.
etag: AA==
name: roles/cloudtasks.taskRunner
stage: BETA
title: Cloud Tasks Task Runner
---
description: Get and list access to tasks, queues, and locations.
etag: AA==
name: roles/cloudtasks.viewer
stage: BETA
title: Cloud Tasks Viewer
---
description: Full access to all Test Lab features
etag: AA==
name: roles/cloudtestservice.testAdmin
stage: GA
title: Firebase Test Lab Admin
---
description: Read access to Test Lab features
etag: AA==
name: roles/cloudtestservice.testViewer
stage: GA
title: Firebase Test Lab Viewer
---
description: Give Cloud TPUs service account access to managed resources
etag: AA==
name: roles/cloudtpu.serviceAgent
stage: GA
title: Cloud TPU V2 API Service Agent
---
description: Admin access to Cloud Trace.
etag: AA==
name: roles/cloudtrace.admin
stage: GA
title: Cloud Trace Admin
---
description: Agent access to Cloud Trace. Can write trace data.
etag: AA==
name: roles/cloudtrace.agent
stage: GA
title: Cloud Trace Agent
---
description: User access to Cloud Trace. Can view traces, insights and stats. Can
create, list, view, and delete tasks.
etag: AA==
name: roles/cloudtrace.user
stage: GA
title: Cloud Trace User
---
description: Full access to all Cloud Translation resources
etag: AA==
name: roles/cloudtranslate.admin
stage: GA
title: Cloud Translation API Admin
---
description: Editor of all Cloud Translation resources
etag: AA==
name: roles/cloudtranslate.editor
stage: GA
title: Cloud Translation API Editor
---
description: Gives Cloud Translation Service Account access to consumer resources.
etag: AA==
name: roles/cloudtranslate.serviceAgent
stage: GA
title: Cloud Translation API Service Agent
---
description: User of Cloud Translation and AutoML models
etag: AA==
name: roles/cloudtranslate.user
stage: GA
title: Cloud Translation API User
---
description: Viewer of all Translation resources
etag: AA==
name: roles/cloudtranslate.viewer
stage: GA
title: Cloud Translation API Viewer
---
description: Admin of Commerce Agreement Publishing service
etag: AA==
name: roles/commerceagreementpublishing.admin
stage: BETA
title: Commerce Agreement Publishing Admin
---
description: Viewer of Commerce Agreement Publishing service
etag: AA==
name: roles/commerceagreementpublishing.viewer
stage: BETA
title: Commerce Agreement Publishing Viewer
---
description: Admin of Various Provider Configuration resources
etag: AA==
name: roles/commercebusinessenablement.admin
stage: BETA
title: Commerce Business Enablement Configuration Admin
---
description: Administration of Payment Configuration resource
etag: AA==
name: roles/commercebusinessenablement.paymentConfigAdmin
stage: BETA
title: Commerce Business Enablement PaymentConfig Admin
---
description: Viewer of Payment Configuration resource
etag: AA==
name: roles/commercebusinessenablement.paymentConfigViewer
stage: BETA
title: Commerce Business Enablement PaymentConfig Viewer
---
description: Provides admin access to rebates
etag: AA==
name: roles/commercebusinessenablement.rebatesAdmin
stage: BETA
title: Commerce Business Enablement Rebates Admin
---
description: Provides read-only access to rebates
etag: AA==
name: roles/commercebusinessenablement.rebatesViewer
stage: BETA
title: Commerce Business Enablement Rebates Viewer
---
description: Provides admin access to reseller discount offers
etag: AA==
name: roles/commercebusinessenablement.resellerDiscountAdmin
stage: BETA
title: Commerce Business Enablement Reseller Discount Admin
---
description: Provides read-only access to reseller discount offers
etag: AA==
name: roles/commercebusinessenablement.resellerDiscountViewer
stage: BETA
title: Commerce Business Enablement Reseller Discount Viewer
---
description: Viewer of Various Provider Configuration resource
etag: AA==
name: roles/commercebusinessenablement.viewer
stage: BETA
title: Commerce Business Enablement Configuration Viewer
---
description: Allows viewing offers
etag: AA==
name: roles/commerceoffercatalog.offersViewer
stage: BETA
title: Commerce Offer Catalog Offers Viewer
---
description: Full access to Organization Governance APIs
etag: AA==
name: roles/commerceorggovernance.admin
stage: BETA
title: Commerce Organization Governance Admin
---
description: Full access to Organization Governance read-only APIs.
etag: AA==
name: roles/commerceorggovernance.viewer
stage: BETA
title: Commerce Organization Governance Viewer
---
description: Allows viewing key events for an offer
etag: AA==
name: roles/commercepricemanagement.eventsViewer
stage: BETA
title: Commerce Price Management Events Viewer
---
description: Allows managing private offers
etag: AA==
name: roles/commercepricemanagement.privateOffersAdmin
stage: BETA
title: Commerce Price Management Private Offers Admin
---
description: Allows viewing offers, free trials, skus
etag: AA==
name: roles/commercepricemanagement.viewer
stage: BETA
title: Commerce Price Management Viewer
---
description: Grants full access to all resources in Cloud Commerce Producer API.
etag: AA==
name: roles/commerceproducer.admin
stage: BETA
title: Commerce Producer Admin
---
description: Grants read access to all resources in Cloud Commerce Producer API.
etag: AA==
name: roles/commerceproducer.viewer
stage: BETA
title: Commerce Producer Viewer
---
description: Gives Compliance Scanning the access it needs to analyze containers and
VMs for compliance and create occurrences using the Container Analysis API
etag: AA==
name: roles/compliancescanning.ServiceAgent
stage: GA
title: Compliance Scanning Service Agent
---
description: Cloud Composer v2 API Service Agent Extension is a supplementary role
required to manage Composer v2 environments.
etag: AA==
name: roles/composer.ServiceAgentV2Ext
stage: GA
title: Cloud Composer v2 API Service Agent Extension
---
description: Full control of Composer resources.
etag: AA==
name: roles/composer.admin
stage: GA
title: Composer Administrator
---
description: Full control of Cloud Composer environments and Cloud Storage objects.
etag: AA==
name: roles/composer.environmentAndStorageObjectAdmin
stage: GA
title: Environment and Storage Object Administrator
---
description: Read and use access to Cloud Composer resources and read access Cloud
Storage objects.
etag: AA==
name: roles/composer.environmentAndStorageObjectUser
stage: GA
title: Environment and Storage Object User
---
description: Read access to Cloud Composer environments and Cloud Storage objects.
etag: AA==
name: roles/composer.environmentAndStorageObjectViewer
stage: GA
title: Environment and Storage Object Viewer
---
description: Cloud Composer API service agent can manage environments.
etag: AA==
name: roles/composer.serviceAgent
stage: GA
title: Cloud Composer API Service Agent
---
description: Role that should be assigned to Composer Agent service account in Shared
VPC host project
etag: AA==
name: roles/composer.sharedVpcAgent
stage: GA
title: Composer Shared VPC Agent
---
description: Read and use access to Composer resources.
etag: AA==
name: roles/composer.user
stage: GA
title: Composer User
---
description: Worker access to Composer. Intended for service accounts.
etag: AA==
name: roles/composer.worker
stage: GA
title: Composer Worker
---
description: Full control of all Compute Engine resources.
etag: AA==
name: roles/compute.admin
stage: GA
title: Compute Admin
---
etag: AA==
name: roles/compute.futureReservationAdmin
stage: BETA
title: Compute Future Reservation Admin
---
etag: AA==
name: roles/compute.futureReservationUser
stage: BETA
title: Compute Future Reservation User
---
etag: AA==
name: roles/compute.futureReservationViewer
stage: BETA
title: Compute Future Reservation Viewer
---
description: Read and use image resources.
etag: AA==
name: roles/compute.imageUser
stage: GA
title: Compute Image User
---
description: Full control of Compute Engine instance resources.
etag: AA==
name: roles/compute.instanceAdmin
stage: GA
title: Compute Instance Admin (beta)
---
description: Full control of Compute Engine instances, instance groups, disks, snapshots,
and images. Read access to all Compute Engine networking resources.
etag: AA==
name: roles/compute.instanceAdmin.v1
stage: GA
title: Compute Instance Admin (v1)
---
description: Role containing all permissions required by Managed Instance Groups to
create and managed instances.
etag: AA==
name: roles/compute.instanceGroupManagerServiceAgent
stage: GA
title: Instance Group Manager Service Agent
---
description: Full control of Compute Engine resources related to load balancer.
etag: AA==
name: roles/compute.loadBalancerAdmin
stage: GA
title: Compute Load Balancer Admin
---
description: Permissions to use services from a load balancer in other projects.
etag: AA==
name: roles/compute.loadBalancerServiceUser
stage: GA
title: Compute Load Balancer Services User
---
description: Full control of Compute Engine networking resources.
etag: AA==
name: roles/compute.networkAdmin
stage: GA
title: Compute Network Admin
---
description: Access to use Compute Engine networking resources.
etag: AA==
name: roles/compute.networkUser
stage: GA
title: Compute Network User
---
description: Read-only access to Compute Engine networking resources.
etag: AA==
name: roles/compute.networkViewer
stage: GA
title: Compute Network Viewer
---
description: Full control of Compute Engine Organization Firewall Policies.
etag: AA==
name: roles/compute.orgFirewallPolicyAdmin
stage: GA
title: Compute Organization Firewall Policy Admin
---
description: View or use Compute Engine Firewall Policies to associate with the organization
or folders.
etag: AA==
name: roles/compute.orgFirewallPolicyUser
stage: GA
title: Compute Organization Firewall Policy User
---
description: Full control of Compute Engine Organization Security Policies.
etag: AA==
name: roles/compute.orgSecurityPolicyAdmin
stage: GA
title: Compute Organization Security Policy Admin
---
description: View or use Compute Engine Security Policies to associate with the organization
or folders.
etag: AA==
name: roles/compute.orgSecurityPolicyUser
stage: GA
title: Compute Organization Security Policy User
---
description: Full control of Compute Engine Firewall Policy associations to the organization
or folders.
etag: AA==
name: roles/compute.orgSecurityResourceAdmin
stage: GA
title: Compute Organization Resource Admin
---
description: Access to log in to a Compute Engine instance as an administrator user.
etag: AA==
name: roles/compute.osAdminLogin
stage: GA
title: Compute OS Admin Login
---
description: Access to log in to a Compute Engine instance as a standard (non-administrator)
user.
etag: AA==
name: roles/compute.osLogin
stage: GA
title: Compute OS Login
---
description: Access for an external user to set OS Login information associated with
this organization. This role does not grant access to instances. External users
must be granted one of the required OS Login IAM roles (https://cloud.google.com/compute/docs/instances/managing-instance-access#configure_users)
in order to allow access to instances using SSH.
etag: AA==
name: roles/compute.osLoginExternalUser
stage: GA
title: Compute OS Login External User
---
description: Specify resources to be mirrored.
etag: AA==
name: roles/compute.packetMirroringAdmin
stage: GA
title: Compute packet mirroring admin
---
description: Use Compute Engine packet mirrorings.
etag: AA==
name: roles/compute.packetMirroringUser
stage: GA
title: Compute packet mirroring user
---
description: Full control of public IP address management for Compute Engine.
etag: AA==
name: roles/compute.publicIpAdmin
stage: GA
title: Compute Public IP Admin
---
description: Full control of Compute Engine security resources.
etag: AA==
name: roles/compute.securityAdmin
stage: GA
title: Compute Security Admin
---
description: Gives Compute Engine Service Account access to assert service account
authority. Includes access to service accounts.
etag: AA==
name: roles/compute.serviceAgent
stage: GA
title: Compute Engine Service Agent
---
description: Permissions to view sole tenancy node groups
etag: AA==
name: roles/compute.soleTenantViewer
stage: GA
title: Compute Sole Tenant Viewer
---
description: Full control of Compute Engine storage resources.
etag: AA==
name: roles/compute.storageAdmin
stage: GA
title: Compute Storage Admin
---
description: Read-only access to get and list information about all Compute Engine
resources, including instances, disks, and firewalls. Allows getting and listing
information about disks, images, and snapshots, but does not allow reading the data
stored on them.
etag: AA==
name: roles/compute.viewer
stage: GA
title: Compute Viewer
---
description: Can administer shared VPC network (XPN).
etag: AA==
name: roles/compute.xpnAdmin
stage: GA
title: Compute Shared VPC Admin
---
description: Grants the ability to generate an attestation token and run a workload
in a VM. Intended for service accounts that run on Confidential Space VMs.
etag: AA==
name: roles/confidentialcomputing.workloadUser
stage: GA
title: Confidential Space Workload User
---
description: Full access to Cloud Infrastructure Manager resources.
etag: AA==
name: roles/config.admin
stage: BETA
title: Cloud Infrastructure Manager Admin
---
description: Required permissions to make Cloud Infrastructure Manager work with the
user-specified service account
etag: AA==
name: roles/config.agent
stage: BETA
title: Cloud Infrastructure Manager Agent
---
description: Read-only access to Cloud Infrastructure Manager resources.
etag: AA==
name: roles/config.viewer
stage: BETA
title: Cloud Infrastructure Manager Viewer
---
description: Full access to all resources of Connectors Service.
etag: AA==
name: roles/connectors.admin
stage: GA
title: Connector Admin
---
description: Custom Connector is a global resource which creates custom connector
within the given target project. This role grants Admin access to Custom Connector
resources
etag: AA==
name: roles/connectors.customConnectorAdmin
stage: GA
title: Custom Connectors Admin
---
description: Custom Connector is a global resource which creates custom connector
within the given target project. This role grants Read-only access to Custom Connector
& Custom Connector Version resources.
etag: AA==
name: roles/connectors.customConnectorViewer
stage: GA
title: Custom Connector Viewer
---
description: Endpoint Attachment is a regional resource which creates PSC connection
endpoint for the given PSC Service Attachment. This role grants Admin access to
Connectors Endpoint Attachment resources.
etag: AA==
name: roles/connectors.endpointAttachmentAdmin
stage: GA
title: Connectors Endpoint Attachment Admin
---
description: Endpoint Attachment is a regional resource which creates PSC connection
endpoint for the given PSC Service Attachment. This role grants Read-only access
to Connectors Endpoint Attachment resources
etag: AA==
name: roles/connectors.endpointAttachmentViewer
stage: GA
title: Connectors Endpoint Attachment Viewer
---
description: Event Subscription is a regional resource which creates subscriptions
on events for a given connection within the given target project. This role grants
Admin access to Connectors Subscription resources
etag: AA==
name: roles/connectors.eventSubscriptionAdmin
stage: GA
title: Connectors Event Subscriptions Admin
---
description: Event Subscription is a regional resource which creates subscriptions
on events for a given connection within the given target project. This role grants
Read-only access to Event Subscription resources.
etag: AA==
name: roles/connectors.eventSubscriptionViewer
stage: GA
title: Connectors Event Subscriptions Viewer
---
description: Full Access to invoke all operations on Connections.
etag: AA==
name: roles/connectors.invoker
stage: GA
title: Connector Invoker
---
description: Full Access to listen events by connections.
etag: AA==
name: roles/connectors.listener
stage: GA
title: Connector Event Listener
---
description: Managed Zone is a global resource which creates Cloud DNS Peering Zone
with the given target project. This role grants Admin access to Connectors Managed
Zone resources
etag: AA==
name: roles/connectors.managedZoneAdmin
stage: GA
title: Connectors Managed Zone Admin
---
description: Managed Zone is a global resource which creates Cloud DNS Peering Zone
with the given target project. This role grants Read-only access to Connectors Managed
Zone resources.
etag: AA==
name: roles/connectors.managedZoneViewer
stage: GA
title: Connectors Managed Zone Viewer
---
description: Grants Connectors Platform service account to manage customer resources
etag: AA==
name: roles/connectors.serviceAgent
stage: GA
title: Connectors Platform Service Agent
---
description: Read-only access to Connectors all resources.
etag: AA==
name: roles/connectors.viewer
stage: GA
title: Connectors Viewer
---
description: Allows managing entitlements and enabling, disabling, and inspecting
service states for a consumer project
etag: AA==
name: roles/consumerprocurement.entitlementManager
stage: GA
title: Consumer Procurement Entitlement Manager
---
description: Allows inspecting entitlements and service states for a consumer project
etag: AA==
name: roles/consumerprocurement.entitlementViewer
stage: GA
title: Consumer Procurement Entitlement Viewer
---
description: Allows viewing key events for an offer
etag: AA==
name: roles/consumerprocurement.eventsViewer
stage: GA
title: Consumer Procurement Events Viewer
---
description: Allows managing purchases
etag: AA==
name: roles/consumerprocurement.orderAdmin
stage: GA
title: Consumer Procurement Order Administrator
---
description: Allows inspecting purchases
etag: AA==
name: roles/consumerprocurement.orderViewer
stage: GA
title: Consumer Procurement Order Viewer
---
description: Allows managing purchases, consents at both billing account and project
level.
etag: AA==
name: roles/consumerprocurement.procurementAdmin
stage: GA
title: Consumer Procurement Administrator
---
description: Allows inspecting purchases, consents and entitlements and service states
for a consumer project.
etag: AA==
name: roles/consumerprocurement.procurementViewer
stage: GA
title: Consumer Procurement Viewer
---
description: Full access to Contact Center AI Platform resources.
etag: AA==
name: roles/contactcenteraiplatform.admin
stage: GA
title: Contact Center AI Platform Admin
---
description: Readonly access to Contact Center AI Platform resources.
etag: AA==
name: roles/contactcenteraiplatform.viewer
stage: GA
title: Contact Center AI Platform Viewer
---
description: Grants read and write access to all Contact Center AI Insights resources.
etag: AA==
name: roles/contactcenterinsights.editor
stage: GA
title: Contact Center AI Insights editor
---
description: Allows Contact Center AI to read and write APIs including BigQuery, Dialogflow,
and Storage.
etag: AA==
name: roles/contactcenterinsights.serviceAgent
stage: GA
title: Contact Center AI Insights Service Agent
---
description: Grants read access to all Contact Center AI Insights resources.
etag: AA==
name: roles/contactcenterinsights.viewer
stage: GA
title: Contact Center AI Insights viewer
---
description: Full management of Kubernetes Clusters and their Kubernetes API objects.
etag: AA==
name: roles/container.admin
stage: GA
title: Kubernetes Engine Admin
---
description: Management of Kubernetes Clusters.
etag: AA==
name: roles/container.clusterAdmin
stage: GA
title: Kubernetes Engine Cluster Admin
---
description: Get and list access to GKE Clusters.
etag: AA==
name: roles/container.clusterViewer
stage: GA
title: Kubernetes Engine Cluster Viewer
---
description: Full access to Kubernetes API objects inside Kubernetes Clusters.
etag: AA==
name: roles/container.developer
stage: GA
title: Kubernetes Engine Developer
---
description: Allows the Kubernetes Engine service account in the host project to configure
shared network resources for cluster management. Also gives access to inspect the
firewall rules in the host project, and configure Cloud DNS resources.
etag: AA==
name: roles/container.hostServiceAgentUser
stage: GA
title: Kubernetes Engine Host Service Agent User
---
description: Minimal set of permission required by a GKE node to support standard
capabilities such as logging and monitoring export, and image pulls.
etag: AA==
name: roles/container.nodeServiceAgent
stage: GA
title: Kubernetes Engine Node Service Agent
---
description: Gives Kubernetes Engine account access to manage cluster resources. Includes
access to service accounts.
etag: AA==
name: roles/container.serviceAgent
stage: GA
title: Kubernetes Engine Service Agent
---
description: Read-only access to Kubernetes Engine resources.
etag: AA==
name: roles/container.viewer
stage: GA
title: Kubernetes Engine Viewer
---
description: Gives Container Analysis API the access it needs to function
etag: AA==
name: roles/containeranalysis.ServiceAgent
stage: GA
title: Container Analysis Service Agent
---
description: Access to all Container Analysis resources.
etag: AA==
name: roles/containeranalysis.admin
stage: GA
title: Container Analysis Admin
---
description: Can attach Container Analysis Occurrences to Notes.
etag: AA==
name: roles/containeranalysis.notes.attacher
stage: GA
title: Container Analysis Notes Attacher
---
description: Can edit Container Analysis Notes.
etag: AA==
name: roles/containeranalysis.notes.editor
stage: GA
title: Container Analysis Notes Editor
---
description: Can view all Container Analysis Occurrences attached to a Note.
etag: AA==
name: roles/containeranalysis.notes.occurrences.viewer
stage: GA
title: Container Analysis Occurrences for Notes Viewer
---
description: Can view Container Analysis Notes.
etag: AA==
name: roles/containeranalysis.notes.viewer
stage: GA
title: Container Analysis Notes Viewer
---
description: Can edit Container Analysis Occurrences.
etag: AA==
name: roles/containeranalysis.occurrences.editor
stage: GA
title: Container Analysis Occurrences Editor
---
description: Can view Container Analysis Occurrences.
etag: AA==
name: roles/containeranalysis.occurrences.viewer
stage: GA
title: Container Analysis Occurrences Viewer
---
description: Access for Container Registry
etag: AA==
name: roles/containerregistry.ServiceAgent
stage: GA
title: Container Registry Service Agent
---
description: Gives Container Scanner the access it needs to analyzecontainers for
vulnerabilities and create occurrences using the Container Analysis API
etag: AA==
name: roles/containerscanning.ServiceAgent
stage: GA
title: Container Scanner Service Agent
---
description: Readonly access to GKE Security Posture resources.
etag: AA==
name: roles/containersecurity.viewer
stage: BETA
title: GKE Security Posture Viewer
---
description: Gives Container Threat Detection service account access to enable/disable
Container Threat Detection and manage the Container Threat Detection Agent on Google
Kubernetes Engine clusters.
etag: AA==
name: roles/containerthreatdetection.serviceAgent
stage: GA
title: Container Threat Detection Service Agent
---
description: Grants full access to all the resources in Content Warehouse
etag: AA==
name: roles/contentwarehouse.admin
stage: GA
title: Content Warehouse Admin
---
description: Grants full access to the document resource in Content Warehouse
etag: AA==
name: roles/contentwarehouse.documentAdmin
stage: GA
title: Content Warehouse Document Admin
---
description: Grants access to create document in Content Warehouse
etag: AA==
name: roles/contentwarehouse.documentCreator
stage: GA
title: Content Warehouse document creator
---
description: Grants access to update document resource in Content Warehouse
etag: AA==
name: roles/contentwarehouse.documentEditor
stage: GA
title: Content Warehouse Document Editor
---
description: Grants access to view the document schemas in Content Warehouse
etag: AA==
name: roles/contentwarehouse.documentSchemaViewer
stage: GA
title: Content Warehouse document schema viewer
---
description: Grants access to view all the resources in Content Warehouse
etag: AA==
name: roles/contentwarehouse.documentViewer
stage: GA
title: Content Warehouse Viewer
---
description: Gives the Content Warehouse service account to manage customer resources
etag: AA==
name: roles/contentwarehouse.serviceAgent
stage: GA
title: Content Warehouse Service Agent
---
description: Full access to all DataCatalog resources
etag: AA==
name: roles/datacatalog.admin
stage: GA
title: Data Catalog Admin
---
description: Manage taxonomies
etag: AA==
name: roles/datacatalog.categoryAdmin
stage: GA
title: Policy Tag Admin
---
description: Read access to sub-resources tagged by a policy tag, for example, BigQuery
columns
etag: AA==
name: roles/datacatalog.categoryFineGrainedReader
stage: GA
title: Fine-Grained Reader
---
description: Can update overview and data steward fields
etag: AA==
name: roles/datacatalog.dataSteward
stage: BETA
title: DataCatalog Data Steward
---
description: Can create new entryGroups
etag: AA==
name: roles/datacatalog.entryGroupCreator
stage: GA
title: DataCatalog EntryGroup Creator
---
description: Full access to entryGroups
etag: AA==
name: roles/datacatalog.entryGroupOwner
stage: GA
title: DataCatalog EntryGroup Owner
---
description: Full access to entries
etag: AA==
name: roles/datacatalog.entryOwner
stage: GA
title: DataCatalog Entry Owner
---
description: Read access to entries
etag: AA==
name: roles/datacatalog.entryViewer
stage: GA
title: DataCatalog Entry Viewer
---
description: Full access to glossaries
etag: AA==
name: roles/datacatalog.glossaryOwner
stage: BETA
title: DataCatalog Glossary Owner
---
description: Can view glossaries and associate terms to entries
etag: AA==
name: roles/datacatalog.glossaryUser
stage: BETA
title: DataCatalog Glossary User
---
description: Can search all metadata for a project/org in DataCatalog
etag: AA==
name: roles/datacatalog.searchAdmin
stage: BETA
title: DataCatalog Search Admin
---
description: Gives permission to modify tags on a GCP assets (BigQuery, Pub/Sub etc).
etag: AA==
name: roles/datacatalog.tagEditor
stage: GA
title: Data Catalog Tag Editor
---
description: Access to create new tag templates
etag: AA==
name: roles/datacatalog.tagTemplateCreator
stage: GA
title: Data Catalog TagTemplate Creator
---
description: Full acess to tag templates
etag: AA==
name: roles/datacatalog.tagTemplateOwner
stage: GA
title: Data Catalog TagTemplate Owner
---
description: Access to use templates to tag resources
etag: AA==
name: roles/datacatalog.tagTemplateUser
stage: GA
title: Data Catalog TagTemplate User
---
description: Read access to templates and tags created using the templates
etag: AA==
name: roles/datacatalog.tagTemplateViewer
stage: GA
title: Data Catalog TagTemplate Viewer
---
description: Grants metadata read permissions to cataloged GCP assets (BigQuery, Pub/Sub
etc)
etag: AA==
name: roles/datacatalog.viewer
stage: GA
title: Data Catalog Viewer
---
description: Full access to Data Connectors.
etag: AA==
name: roles/dataconnectors.connectorAdmin
stage: BETA
title: Connector Admin
---
description: Access to use Data Connectors.
etag: AA==
name: roles/dataconnectors.connectorUser
stage: BETA
title: Connector User
---
description: Gives Data Connectors service agent permission to access the virtual
private cloud
etag: AA==
name: roles/dataconnectors.serviceAgent
stage: GA
title: Data Connectors Service Agent
---
description: Minimal role for creating and managing dataflow jobs.
etag: AA==
name: roles/dataflow.admin
stage: GA
title: Dataflow Admin
---
description: Full operational access to Dataflow jobs.
etag: AA==
name: roles/dataflow.developer
stage: GA
title: Dataflow Developer
---
description: Gives Cloud Dataflow service account access to managed resources. Includes
access to service accounts.
etag: AA==
name: roles/dataflow.serviceAgent
stage: GA
title: Cloud Dataflow Service Agent
---
description: Read only access to Dataflow jobs.
etag: AA==
name: roles/dataflow.viewer
stage: GA
title: Dataflow Viewer
---
description: Worker access to Dataflow. Intended for service accounts.
etag: AA==
name: roles/dataflow.worker
stage: GA
title: Dataflow Worker
---
description: Full access to all Dataform resources.
etag: AA==
name: roles/dataform.admin
stage: GA
title: Dataform Admin
---
description: Access only to private and shared code resources. The permissions in
the Code Creator let you create and list code in Dataform, and access only the code
that you created and code that was explicitly shared with you.
etag: AA==
name: roles/dataform.codeCreator
stage: BETA
title: Code Creator
---
description: Edit access code resources.
etag: AA==
name: roles/dataform.codeEditor
stage: BETA
title: Code Editor
---
description: Full access to code resources.
etag: AA==
name: roles/dataform.codeOwner
stage: BETA
title: Code Owner
---
description: Read-only access to all code resources.
etag: AA==
name: roles/dataform.codeViewer
stage: BETA
title: Code Viewer
---
description: Edit access to Workspaces and Read-only access to Repositories.
etag: AA==
name: roles/dataform.editor
stage: GA
title: Dataform Editor
---
description: Gives permission for the Dataform API to access a secret from Secret
Manager
etag: AA==
name: roles/dataform.serviceAgent
stage: GA
title: Dataform Service Agent
---
description: Read-only access to all Dataform resources.
etag: AA==
name: roles/dataform.viewer
stage: GA
title: Dataform Viewer
---
description: Read-only access to Cloud Data Fusion Instances. Use it on instance level
along with the namespace grants to provide access to the specific namespace.
etag: AA==
name: roles/datafusion.accessor
stage: BETA
title: Cloud Data Fusion Accessor
---
description: Full access to Cloud Data Fusion Instances, Namespaces and related resources.
etag: AA==
name: roles/datafusion.admin
stage: GA
title: Cloud Data Fusion Admin
---
description: Access Cloud Data Fusion Instances, develop and run pipelines.
etag: AA==
name: roles/datafusion.developer
stage: BETA
title: Cloud Data Fusion Developer
---
description: Access Cloud Data Fusion Instances, operate namespaces and related resources.
etag: AA==
name: roles/datafusion.operator
stage: BETA
title: Cloud Data Fusion Operator
---
description: Access to Cloud Data Fusion runtime resources.
etag: AA==
name: roles/datafusion.runner
stage: GA
title: Cloud Data Fusion Runner
---
description: Gives Cloud Data Fusion service account access to Service Networking,
Cloud Dataproc, Cloud Storage, BigQuery, Cloud Spanner, and Cloud Bigtable resources.
etag: AA==
name: roles/datafusion.serviceAgent
stage: GA
title: Cloud Data Fusion API Service Agent
---
description: Read-only access to Cloud Data Fusion Instances, Namespaces and related
resources.
etag: AA==
name: roles/datafusion.viewer
stage: GA
title: Cloud Data Fusion Viewer
---
description: Full access to all Data Labeling resources
etag: AA==
name: roles/datalabeling.admin
stage: BETA
title: Data Labeling Service Admin
---
description: Editor of all Data Labeling resources
etag: AA==
name: roles/datalabeling.editor
stage: BETA
title: Data Labeling Service Editor
---
description: Gives Data Labeling service account read/write access to Cloud Storage,
read/write BigQuery, update CMLE model versions, editor access to Annotation service
and AutoML service.
etag: AA==
name: roles/datalabeling.serviceAgent
stage: GA
title: Data Labeling Service Agent
---
description: Viewer of all Data Labeling resources
etag: AA==
name: roles/datalabeling.viewer
stage: BETA
title: Data Labeling Service Viewer
---
description: Grants full access to all resources in Data Lineage API
etag: AA==
name: roles/datalineage.admin
stage: GA
title: Data Lineage Administrator
---
description: Grants edit access to all resources in Data Lineage API
etag: AA==
name: roles/datalineage.editor
stage: GA
title: Data Lineage Editor
---
description: Grants access to creating all resources in Data Lineage API
etag: AA==
name: roles/datalineage.producer
stage: GA
title: Data Lineage Events Producer
---
description: Grants read access to all resources in Data Lineage API
etag: AA==
name: roles/datalineage.viewer
stage: GA
title: Data Lineage Viewer
---
description: Full access to all resources of Database Migration.
etag: AA==
name: roles/datamigration.admin
stage: GA
title: Database Migration Admin
---
description: Gives Cloud Database Migration service account access to Cloud SQL resources.
etag: AA==
name: roles/datamigration.serviceAgent
stage: GA
title: Database Migration Service Agent
---
description: Administrator of Data pipelines resources
etag: AA==
name: roles/datapipelines.admin
stage: GA
title: Data pipelines Admin
---
description: Invoker of Data pipelines jobs
etag: AA==
name: roles/datapipelines.invoker
stage: GA
title: Data pipelines Invoker
---
description: Gives Datapipelines service permissions to create Dataflow & Cloud Scheduler
jobs in the user project.
etag: AA==
name: roles/datapipelines.serviceAgent
stage: GA
title: Datapipelines Service Agent
---
description: Viewer of Data pipelines resources
etag: AA==
name: roles/datapipelines.viewer
stage: GA
title: Data pipelines Viewer
---
description: Full access to all Dataplex resources.
etag: AA==
name: roles/dataplex.admin
stage: GA
title: Dataplex Administrator
---
description: Full access on DataAttribute Bindig resources.
etag: AA==
name: roles/dataplex.bindingAdmin
stage: GA
title: Dataplex Binding Administrator
---
description: Owner access to data. To be granted to Dataplex resources Lake, Zone
or Asset only.
etag: AA==
name: roles/dataplex.dataOwner
stage: GA
title: Dataplex Data Owner
---
description: Read only access to data. To be granted to Dataplex resources Lake, Zone
or Asset only.
etag: AA==
name: roles/dataplex.dataReader
stage: GA
title: Dataplex Data Reader
---
description: Full access to DataScan resources.
etag: AA==
name: roles/dataplex.dataScanAdmin
stage: GA
title: Dataplex DataScan Administrator
---
description: Access to create new DataScan resources.
etag: AA==
name: roles/dataplex.dataScanCreator
stage: GA
title: Dataplex DataScan Creator
---
description: Read access to DataScan resources and additional contents.
etag: AA==
name: roles/dataplex.dataScanDataViewer
stage: GA
title: Dataplex DataScan DataViewer
---
description: Write access to DataScan resources.
etag: AA==
name: roles/dataplex.dataScanEditor
stage: GA
title: Dataplex DataScan Editor
---
description: Read access to DataScan resources.
etag: AA==
name: roles/dataplex.dataScanViewer
stage: GA
title: Dataplex DataScan Viewer
---
description: Write access to data. To be granted to Dataplex resources Lake, Zone
or Asset only.
etag: AA==
name: roles/dataplex.dataWriter
stage: GA
title: Dataplex Data Writer
---
description: Allows running data analytics workloads in a lake.
etag: AA==
name: roles/dataplex.developer
stage: GA
title: Dataplex Developer
---
description: Write access to Dataplex resources.
etag: AA==
name: roles/dataplex.editor
stage: GA
title: Dataplex Editor
---
description: Read only access to metadata.
etag: AA==
name: roles/dataplex.metadataReader
stage: GA
title: Dataplex Metadata Reader
---
description: Write and Read access to metadata.
etag: AA==
name: roles/dataplex.metadataWriter
stage: GA
title: Dataplex Metadata Writer
---
description: Permissions configure ResourceAccess and DataAccess Specs on Data Attributes.
etag: AA==
name: roles/dataplex.securityAdmin
stage: GA
title: Dataplex Security Administrator
---
description: Gives the Dataplex service account access to project resources. This
access will be used in data discovery, data management and data workload management.
etag: AA==
name: roles/dataplex.serviceAgent
stage: GA
title: Cloud Dataplex Service Agent
---
description: Owner access to data. Should not be used directly. This role is granted
by Dataplex to managed resources like GCS buckets, BigQuery datasets etc.
etag: AA==
name: roles/dataplex.storageDataOwner
stage: GA
title: Dataplex Storage Data Owner
---
description: Read only access to data. Should not be used directly. This role is granted
by Dataplex to managed resources like GCS buckets, BigQuery datasets etc.
etag: AA==
name: roles/dataplex.storageDataReader
stage: GA
title: Dataplex Storage Data Reader
---
description: Write access to data. Should not be used directly. This role is granted
by Dataplex to managed resources like GCS buckets, BigQuery datasets etc.
etag: AA==
name: roles/dataplex.storageDataWriter
stage: GA
title: Dataplex Storage Data Writer
---
description: Full access to DataTaxonomy, DataAttribute resources.
etag: AA==
name: roles/dataplex.taxonomyAdmin
stage: GA
title: Dataplex Taxonomy Administrator
---
description: Read access on DataTaxonomy, DataAttribute resources.
etag: AA==
name: roles/dataplex.taxonomyViewer
stage: GA
title: Dataplex Taxonomy Viewer
---
description: Read access to Dataplex resources.
etag: AA==
name: roles/dataplex.viewer
stage: GA
title: Dataplex Viewer
---
description: Use of Dataprep.
etag: AA==
name: roles/dataprep.projects.user
stage: BETA
title: Dataprep User
---
description: Dataprep service identity. Includes access to service accounts.
etag: AA==
name: roles/dataprep.serviceAgent
stage: GA
title: Dataprep Service Agent
---
description: Full control of Dataproc resources.
etag: AA==
name: roles/dataproc.admin
stage: GA
title: Dataproc Administrator
---
description: Full control of Dataproc resources. Allows viewing all networks.
etag: AA==
name: roles/dataproc.editor
stage: GA
title: Dataproc Editor
---
description: Allows management of Dataproc resources. Intended for service accounts
running Dataproc Hub instances.
etag: AA==
name: roles/dataproc.hubAgent
stage: GA
title: Dataproc Hub Agent
---
description: Gives Dataproc Service Account access to service accounts, compute resources,
storage resources, and kubernetes resources. Includes access to service accounts.
etag: AA==
name: roles/dataproc.serviceAgent
stage: GA
title: Dataproc Service Agent
---
description: Read-only access to Dataproc resources.
etag: AA==
name: roles/dataproc.viewer
stage: GA
title: Dataproc Viewer
---
description: Worker access to Dataproc. Intended for service accounts.
etag: AA==
name: roles/dataproc.worker
stage: GA
title: Dataproc Worker
---
description: Data processing controls admin who can fully manage data processing controls
settings and view all datasource data.
etag: AA==
name: roles/dataprocessing.admin
stage: GA
title: Data Processing Controls Resource Admin
---
description: Data processing controls data source manager who can get, list, and update
the underlying data.
etag: AA==
name: roles/dataprocessing.dataSourceManager
stage: GA
title: Data Processing Controls Data Source Manager
---
description: Manage backup schedules in Cloud Datastore.
etag: AA==
name: roles/datastore.backupSchedulesAdmin
stage: GA
title: Cloud Datastore Backup Schedules Admin
---
description: Read access to backup schedules in Cloud Datastore.
etag: AA==
name: roles/datastore.backupSchedulesViewer
stage: GA
title: Cloud Datastore Backup Schedules Viewer
---
description: Read/Write access to metadata about backups in Cloud Datastore but restore
is not allowed.
etag: AA==
name: roles/datastore.backupsAdmin
stage: GA
title: Cloud Datastore Backups Admin
---
description: Read access to metadata about backups in Cloud Datastore.
etag: AA==
name: roles/datastore.backupsViewer
stage: GA
title: Cloud Datastore Backups Viewer
---
description: Full access to manage imports and exports.
etag: AA==
name: roles/datastore.importExportAdmin
stage: GA
title: Cloud Datastore Import Export Admin
---
description: Full access to manage index definitions.
etag: AA==
name: roles/datastore.indexAdmin
stage: GA
title: Cloud Datastore Index Admin
---
description: Full access to Key Visualizer scans.
etag: AA==
name: roles/datastore.keyVisualizerViewer
stage: GA
title: Cloud Datastore Key Visualizer Viewer
---
description: Full access to Cloud Datastore.
etag: AA==
name: roles/datastore.owner
stage: GA
title: Cloud Datastore Owner
---
description: Restore into Cloud Datastore Databases from Cloud Datastore Backups.
etag: AA==
name: roles/datastore.restoreAdmin
stage: GA
title: Cloud Datastore Restore Admin
---
description: Provides read/write access to data in a Cloud Datastore database. Intended
for application developers and service accounts.
etag: AA==
name: roles/datastore.user
stage: GA
title: Cloud Datastore User
---
description: Read access to all Cloud Datastore resources.
etag: AA==
name: roles/datastore.viewer
stage: GA
title: Cloud Datastore Viewer
---
description: Full access to all Datastream resources.
etag: AA==
name: roles/datastream.admin
stage: GA
title: Datastream Admin
---
description: Grants Cloud Datastream permissions to write data in the user project.
etag: AA==
name: roles/datastream.serviceAgent
stage: GA
title: Datastream Service Agent
---
description: Read-only access to all Datastream resources.
etag: AA==
name: roles/datastream.viewer
stage: GA
title: Datastream Viewer
---
description: Data Studio Admin
etag: AA==
name: roles/datastudio.admin
stage: BETA
title: Data Studio Admin
---
description: Content Manager of a Data Studio resource
etag: AA==
name: roles/datastudio.contentManager
stage: BETA
title: Data Studio Workspace Content Manager
---
description: Contributor of a Data Studio resource
etag: AA==
name: roles/datastudio.contributor
stage: BETA
title: Data Studio Workspace Contributor
---
description: Editor of a Data Studio resource
etag: AA==
name: roles/datastudio.editor
stage: BETA
title: Data Studio Asset Editor
---
description: Manager of a Data Studio resource
etag: AA==
name: roles/datastudio.manager
stage: BETA
title: Data Studio Workspace Manager
---
description: Grants Data Studio Service Account access to manage resources.
etag: AA==
name: roles/datastudio.serviceAgent
stage: GA
title: Data Studio Service Agent
---
description: Viewer of a Data Studio resource
etag: AA==
name: roles/datastudio.viewer
stage: BETA
title: Data Studio Asset Viewer
---
description: This role is managed by Dell EMC, not Google.
etag: AA==
name: roles/dellemccloudonefs.admin
stage: BETA
title: Dell EMC Cloud OneFS Admin
---
description: This role is managed by Dell EMC, not Google.
etag: AA==
name: roles/dellemccloudonefs.user
stage: BETA
title: Dell EMC Cloud OneFS User
---
description: This role is managed by Dell EMC, not Google.
etag: AA==
name: roles/dellemccloudonefs.viewer
stage: BETA
title: Dell EMC Cloud OneFS Viewer
---
description: Read and Write access to all Deployment Manager resources.
etag: AA==
name: roles/deploymentmanager.editor
stage: GA
title: Deployment Manager Editor
---
description: Read and Write access to all Type Registry resources.
etag: AA==
name: roles/deploymentmanager.typeEditor
stage: GA
title: Deployment Manager Type Editor
---
description: Read-only access to all Type Registry resources.
etag: AA==
name: roles/deploymentmanager.typeViewer
stage: GA
title: Deployment Manager Type Viewer
---
description: Read-only access to all Deployment Manager resources.
etag: AA==
name: roles/deploymentmanager.viewer
stage: GA
title: Deployment Manager Viewer
---
description: An admin has access to all resources and can perform all administrative
actions in an AAM project.
etag: AA==
name: roles/dialogflow.aamAdmin
stage: GA
title: CX Premium Admin
---
description: A Conversational Architect can label conversational data, approve taxonomy
changes and design virtual agents for a customer's use cases.
etag: AA==
name: roles/dialogflow.aamConversationalArchitect
stage: GA
title: CX Premium Conversational Architect
---
description: A Dialog Designer can label conversational data and propose taxonomy
changes for virtual agent modeling.
etag: AA==
name: roles/dialogflow.aamDialogDesigner
stage: GA
title: CX Premium Dialog Designer
---
description: A Dialog Designer Lead can label conversational data and approve taxonomy
changes for virtual agent modeling.
etag: AA==
name: roles/dialogflow.aamLeadDialogDesigner
stage: GA
title: CX Premium Lead Dialog Designer
---
description: A user can view the taxonomy and data reports in an AAM project.
etag: AA==
name: roles/dialogflow.aamViewer
stage: GA
title: CX Premium Viewer
---
description: Can query for intent; read & write session properties; read & write agent
properties.
etag: AA==
name: roles/dialogflow.admin
stage: GA
title: Dialogflow API Admin
---
description: Can create and handle live conversations using Agent Assist features.
etag: AA==
name: roles/dialogflow.agentAssistClient
stage: GA
title: Dialogflow Agent Assist Client
---
description: Can call all methods on sessions and conversations resources as well
as their descendants.
etag: AA==
name: roles/dialogflow.client
stage: GA
title: Dialogflow API Client
---
description: Can edit agent in Dialogflow Console
etag: AA==
name: roles/dialogflow.consoleAgentEditor
stage: GA
title: Dialogflow Console Agent Editor
---
description: Can perform query of dialogflow suggestions in the simulator in web console.
etag: AA==
name: roles/dialogflow.consoleSimulatorUser
stage: GA
title: Dialogflow Console Simulator User
---
description: Can edit allowlist for smart messaging associated with conversation model
in the agent assist console
etag: AA==
name: roles/dialogflow.consoleSmartMessagingAllowlistEditor
stage: GA
title: Dialogflow Console Smart Messaging Allowlist Editor
---
description: Can manage all the resources related to Dialogflow Conversations.
etag: AA==
name: roles/dialogflow.conversationManager
stage: GA
title: Dialogflow Conversation Manager
---
description: Can read & write entity types.
etag: AA==
name: roles/dialogflow.entityTypeAdmin
stage: GA
title: Dialogflow Entity Type Admin
---
description: Can read & update environment and its sub-resources.
etag: AA==
name: roles/dialogflow.environmentEditor
stage: GA
title: Dialogflow Environment editor
---
description: Can read & update flow and its sub-resources.
etag: AA==
name: roles/dialogflow.flowEditor
stage: GA
title: Dialogflow Flow editor
---
description: Can add, remove, enable and disable Dialogflow integrations.
etag: AA==
name: roles/dialogflow.integrationManager
stage: GA
title: Dialogflow Integration Manager
---
description: Can read & write intents.
etag: AA==
name: roles/dialogflow.intentAdmin
stage: GA
title: Dialogflow Intent Admin
---
description: Can read agent and session properties; cannot query for intent.
etag: AA==
name: roles/dialogflow.reader
stage: GA
title: Dialogflow API Reader
---
description: Gives Dialogflow Service Account access to resources on behalf of user
project for Integrations (Facebook Messenger, Slack, Telephony, etc.), BigQuery,
Discovery Engine, and Vertex.
etag: AA==
name: roles/dialogflow.serviceAgent
stage: GA
title: Dialogflow Service Agent
---
description: Can read & write test cases.
etag: AA==
name: roles/dialogflow.testCaseAdmin
stage: GA
title: Dialogflow Test Case Admin
---
description: Can read & write webhooks.
etag: AA==
name: roles/dialogflow.webhookAdmin
stage: GA
title: Dialogflow Webhook Admin
---
description: Grants full access to all discoveryengine resources.
etag: AA==
name: roles/discoveryengine.admin
stage: GA
title: Discovery Engine Admin
---
description: Grants read and write access to all discovery engine resources.
etag: AA==
name: roles/discoveryengine.editor
stage: GA
title: Discovery Engine Editor
---
description: Discovery Engine service uploads documents and user events from Cloud
Storage and BigQuery, reports results to the customer Cloud Storage bucket, writes
logs to customer projects using Cloud Logging, and writes and reads metrics for
customer using Cloud Monitoring.
etag: AA==
name: roles/discoveryengine.serviceAgent
stage: GA
title: Discovery Engine Service Agent
---
description: Grants read access to all discovery engine resources.
etag: AA==
name: roles/discoveryengine.viewer
stage: GA
title: Discovery Engine Viewer
---
description: Administer DLP including jobs and templates.
etag: AA==
name: roles/dlp.admin
stage: GA
title: DLP Administrator
---
description: Edit DLP analyze risk templates.
etag: AA==
name: roles/dlp.analyzeRiskTemplatesEditor
stage: GA
title: DLP Analyze Risk Templates Editor
---
description: Read DLP analyze risk templates.
etag: AA==
name: roles/dlp.analyzeRiskTemplatesReader
stage: GA
title: DLP Analyze Risk Templates Reader
---
description: Read DLP column profiles.
etag: AA==
name: roles/dlp.columnDataProfilesReader
stage: GA
title: DLP Column Data Profiles Reader
---
description: Manage DLP Connections.
etag: AA==
name: roles/dlp.connectionsAdmin
stage: GA
title: DLP Connections Admin
---
description: View DLP Connections.
etag: AA==
name: roles/dlp.connectionsReader
stage: GA
title: DLP Connections Viewer
---
description: Manage DLP profiles.
etag: AA==
name: roles/dlp.dataProfilesAdmin
stage: GA
title: DLP Data Profiles Admin
---
description: Read DLP profiles.
etag: AA==
name: roles/dlp.dataProfilesReader
stage: GA
title: DLP Data Profiles Reader
---
description: Edit DLP de-identify templates.
etag: AA==
name: roles/dlp.deidentifyTemplatesEditor
stage: GA
title: DLP De-identify Templates Editor
---
description: Read DLP de-identify templates.
etag: AA==
name: roles/dlp.deidentifyTemplatesReader
stage: GA
title: DLP De-identify Templates Reader
---
description: Manage DLP Cost Estimates.
etag: AA==
name: roles/dlp.estimatesAdmin
stage: GA
title: DLP Cost Estimation
---
description: Read DLP stored findings.
etag: AA==
name: roles/dlp.inspectFindingsReader
stage: GA
title: DLP Inspect Findings Reader
---
description: Edit DLP inspect templates.
etag: AA==
name: roles/dlp.inspectTemplatesEditor
stage: GA
title: DLP Inspect Templates Editor
---
description: Read DLP inspect templates.
etag: AA==
name: roles/dlp.inspectTemplatesReader
stage: GA
title: DLP Inspect Templates Reader
---
description: Edit job triggers configurations.
etag: AA==
name: roles/dlp.jobTriggersEditor
stage: GA
title: DLP Job Triggers Editor
---
description: Read job triggers.
etag: AA==
name: roles/dlp.jobTriggersReader
stage: GA
title: DLP Job Triggers Reader
---
description: Edit and create jobs
etag: AA==
name: roles/dlp.jobsEditor
stage: GA
title: DLP Jobs Editor
---
description: Read jobs
etag: AA==
name: roles/dlp.jobsReader
stage: GA
title: DLP Jobs Reader
---
description: Permissions needed by the DLP service account to generate data profiles
within an organization or folder.
etag: AA==
name: roles/dlp.orgdriver
stage: GA
title: DLP Organization Data Profiles Driver
---
description: Read DLP project profiles.
etag: AA==
name: roles/dlp.projectDataProfilesReader
stage: GA
title: DLP Project Data Profiles Reader
---
description: Permissions needed by the DLP service account to generate data profiles
within a project.
etag: AA==
name: roles/dlp.projectdriver
stage: GA
title: DLP Project Data Profiles Driver
---
description: Read DLP entities, such as jobs and templates.
etag: AA==
name: roles/dlp.reader
stage: GA
title: DLP Reader
---
description: Gives Cloud DLP service agent permissions for BigQuery, Cloud Storage,
Datastore, Pub/Sub and Cloud KMS.
etag: AA==
name: roles/dlp.serviceAgent
stage: GA
title: DLP API Service Agent
---
description: Edit DLP stored info types.
etag: AA==
name: roles/dlp.storedInfoTypesEditor
stage: GA
title: DLP Stored InfoTypes Editor
---
description: Read DLP stored info types.
etag: AA==
name: roles/dlp.storedInfoTypesReader
stage: GA
title: DLP Stored InfoTypes Reader
---
description: Manage DLP subscriptions.
etag: AA==
name: roles/dlp.subscriptionsAdmin
stage: GA
title: DLP Subscription Admin
---
description: View DLP subscriptions.
etag: AA==
name: roles/dlp.subscriptionsReader
stage: GA
title: DLP Subscription Viewer
---
description: Manage DLP table profiles.
etag: AA==
name: roles/dlp.tableDataProfilesAdmin
stage: GA
title: DLP Table Data Profiles Admin
---
description: Read DLP table profiles.
etag: AA==
name: roles/dlp.tableDataProfilesReader
stage: GA
title: DLP Table Data Profiles Reader
---
description: Inspect, Redact, and De-identify Content
etag: AA==
name: roles/dlp.user
stage: GA
title: DLP User
---
description: Full read-write access to DNS resources.
etag: AA==
name: roles/dns.admin
stage: GA
title: DNS Administrator
---
description: Access to target networks with DNS peering zones
etag: AA==
name: roles/dns.peer
stage: GA
title: DNS Peer
---
description: Read-only access to DNS resources.
etag: AA==
name: roles/dns.reader
stage: GA
title: DNS Reader
---
description: Grants full access to all resources in Document AI
etag: AA==
name: roles/documentai.admin
stage: BETA
title: Document AI Administrator
---
description: Grants access to process documents in Document AI
etag: AA==
name: roles/documentai.apiUser
stage: BETA
title: Document AI API User
---
description: Grants access to use all resources in Document AI
etag: AA==
name: roles/documentai.editor
stage: BETA
title: Document AI Editor
---
description: Grants access to view all resources and process documents in Document
AI
etag: AA==
name: roles/documentai.viewer
stage: BETA
title: Document AI Viewer
---
description: Gives DocumentAI Core Service Account access to consumer resources.
etag: AA==
name: roles/documentaicore.serviceAgent
stage: GA
title: DocumentAI Core Service Agent
---
description: Full access to Cloud Domains Registrations and related resources.
etag: AA==
name: roles/domains.admin
stage: GA
title: Cloud Domains Admin
---
description: Read-only access to Cloud Domains Registrations and related resources.
etag: AA==
name: roles/domains.viewer
stage: GA
title: Cloud Domains Viewer
---
description: Full access to all Earth Engine resource features
etag: AA==
name: roles/earthengine.admin
stage: BETA
title: Earth Engine Resource Admin
---
description: Publisher of Earth Engine Apps
etag: AA==
name: roles/earthengine.appsPublisher
stage: BETA
title: Earth Engine Apps Publisher
---
description: Viewer of all Earth Engine resources
etag: AA==
name: roles/earthengine.viewer
stage: BETA
title: Earth Engine Resource Viewer
---
description: Writer of all Earth Engine resources
etag: AA==
name: roles/earthengine.writer
stage: BETA
title: Earth Engine Resource Writer
---
description: Full access to Edge Container all resources.
etag: AA==
name: roles/edgecontainer.admin
stage: GA
title: Edge Container Admin
---
description: Grants the Edge Container Cluster Service Account access to manage resources.
etag: AA==
name: roles/edgecontainer.clusterServiceAgent
stage: GA
title: Edge Container Cluster Service Agent
---
description: Access to use Edge Container Machine resources.
etag: AA==
name: roles/edgecontainer.machineUser
stage: GA
title: Edge Container Machine User
---
description: Access to get Edge Container cluster offline credentials
etag: AA==
name: roles/edgecontainer.offlineCredentialUser
stage: GA
title: Edge Container Cluster offline Credential User
---
description: Grants the Edge Container Service Account access to manage resources.
etag: AA==
name: roles/edgecontainer.serviceAgent
stage: GA
title: Edge Container Service Agent
---
description: Read-only access to Edge Container all resources.
etag: AA==
name: roles/edgecontainer.viewer
stage: GA
title: Edge Container Viewer
---
description: Full access to Edge Network all resources.
etag: AA==
name: roles/edgenetwork.admin
stage: GA
title: Edge Network Admin
---
description: Read-only access to Edge Network all resources.
etag: AA==
name: roles/edgenetwork.viewer
stage: GA
title: Edge Network Viewer
---
description: View, create, update, and delete most Google Cloud resources. See the
list of included permissions.
etag: AA==
name: roles/editor
stage: GA
title: Editor
---
description: Gives the Cloud Endpoints service account access to Endpoints services
and the ability to act as a service controller.
etag: AA==
name: roles/endpoints.serviceAgent
stage: GA
title: Cloud Endpoints Service Agent
---
description: Can access information about Endpoints services for consumer portal management,
and can read Source Repositories for consumer portal custom content.
etag: AA==
name: roles/endpointsportal.serviceAgent
stage: GA
title: Endpoints Portal Service Agent
---
description: Administrator of Enterprise Knowledge Graph resources
etag: AA==
name: roles/enterpriseknowledgegraph.admin
stage: BETA
title: Enterprise Knowledge Graph Admin
---
description: Editor of Enterprise Knowledge Graph resources
etag: AA==
name: roles/enterpriseknowledgegraph.editor
stage: BETA
title: Enterprise Knowledge Graph Editor
---
description: Gives Enterprise Knowledge Graph Service Account access to consumer resources.
etag: AA==
name: roles/enterpriseknowledgegraph.serviceAgent
stage: GA
title: Enterprise Knowledge Graph Service Agent
---
description: Viewer of Enterprise Knowledge Graph resources
etag: AA==
name: roles/enterpriseknowledgegraph.viewer
stage: BETA
title: Enterprise Knowledge Graph Viewer
---
description: Full access to Enterprise Purchasing resources.
etag: AA==
name: roles/enterprisepurchasing.admin
stage: BETA
title: Enterprise Purchasing Admin
---
description: Edit access to Enterprise Purchasing resources.
etag: AA==
name: roles/enterprisepurchasing.editor
stage: BETA
title: Enterprise Purchasing Editor
---
description: Readonly access to Enterprise Purchasing resources.
etag: AA==
name: roles/enterprisepurchasing.viewer
stage: BETA
title: Enterprise Purchasing Viewer
---
description: Administrative access to Error Reporting.
etag: AA==
name: roles/errorreporting.admin
stage: BETA
title: Error Reporting Admin
---
description: User access to Error Reporting. Can list all errors and update their
metadata. Can delete error events.
etag: AA==
name: roles/errorreporting.user
stage: BETA
title: Error Reporting User
---
description: Read-only access to all Error Reporting data.
etag: AA==
name: roles/errorreporting.viewer
stage: BETA
title: Error Reporting Viewer
---
description: Can send error events to Error Reporting. Intended for service accounts.
etag: AA==
name: roles/errorreporting.writer
stage: BETA
title: Error Reporting Writer
---
description: Full access to all essential contacts
etag: AA==
name: roles/essentialcontacts.admin
stage: GA
title: Essential Contacts Admin
---
description: Viewer for all essential contacts
etag: AA==
name: roles/essentialcontacts.viewer
stage: GA
title: Essential Contacts Viewer
---
description: Full control over all Eventarc resources.
etag: AA==
name: roles/eventarc.admin
stage: GA
title: Eventarc Admin
---
description: Can publish events to Eventarc Channel Connections.
etag: AA==
name: roles/eventarc.connectionPublisher
stage: BETA
title: Eventarc Connection Publisher
---
description: Access to read and write Eventarc resources.
etag: AA==
name: roles/eventarc.developer
stage: GA
title: Eventarc Developer
---
description: Can receive events from all event providers.
etag: AA==
name: roles/eventarc.eventReceiver
stage: GA
title: Eventarc Event Receiver
---
description: Can publish events to Eventarc channels.
etag: AA==
name: roles/eventarc.publisher
stage: BETA
title: Eventarc Publisher
---
description: Gives Eventarc service account access to managed resources.
etag: AA==
name: roles/eventarc.serviceAgent
stage: GA
title: Eventarc Service Agent
---
description: Can view the state of all Eventarc resources, including IAM policies.
etag: AA==
name: roles/eventarc.viewer
stage: GA
title: Eventarc Viewer
---
description: Read-write access to Filestore instances and related resources.
etag: AA==
name: roles/file.editor
stage: BETA
title: Cloud Filestore Editor
---
description: Gives Cloud Filestore service account access to managed resources.
etag: AA==
name: roles/file.serviceAgent
stage: GA
title: Cloud Filestore Service Agent
---
description: Read-only access to Filestore instances and related resources.
etag: AA==
name: roles/file.viewer
stage: BETA
title: Cloud Filestore Viewer
---
description: Full access to all Financial Services API resources.
etag: AA==
name: roles/financialservices.admin
stage: GA
title: Financial Services Admin
---
description: View access to all Financial Services API resources.
etag: AA==
name: roles/financialservices.viewer
stage: GA
title: Financial Services Viewer
---
description: Full access to Firebase products.
etag: AA==
name: roles/firebase.admin
stage: GA
title: Firebase Admin
---
description: Full access to Google Analytics for Firebase.
etag: AA==
name: roles/firebase.analyticsAdmin
stage: GA
title: Firebase Analytics Admin
---
description: Read access to Google Analytics for Firebase.
etag: AA==
name: roles/firebase.analyticsViewer
stage: GA
title: Firebase Analytics Viewer
---
description: Read and write access to Firebase App Distribution with the Admin SDK
etag: AA==
name: roles/firebase.appDistributionSdkServiceAgent
stage: GA
title: Firebase App Distribution Admin SDK Service Agent
---
description: Full access to Firebase Develop products and Analytics.
etag: AA==
name: roles/firebase.developAdmin
stage: GA
title: Firebase Develop Admin
---
description: Read access to Firebase Develop products and Analytics.
etag: AA==
name: roles/firebase.developViewer
stage: GA
title: Firebase Develop Viewer
---
description: Full access to Firebase Grow products and Analytics.
etag: AA==
name: roles/firebase.growthAdmin
stage: GA
title: Firebase Grow Admin
---
description: Read access to Firebase Grow products and Analytics.
etag: AA==
name: roles/firebase.growthViewer
stage: GA
title: Firebase Grow Viewer
---
description: Access to create new service agents for Firebase projects; assign roles
to service agents; provision GCP resources as required by Firebase services.
etag: AA==
name: roles/firebase.managementServiceAgent
stage: GA
title: Firebase Service Management Service Agent
---
description: Full access to Firebase Quality products and Analytics.
etag: AA==
name: roles/firebase.qualityAdmin
stage: GA
title: Firebase Quality Admin
---
description: Read access to Firebase Quality products and Analytics.
etag: AA==
name: roles/firebase.qualityViewer
stage: GA
title: Firebase Quality Viewer
---
description: Read and write access to Firebase products available in the Admin SDK
etag: AA==
name: roles/firebase.sdkAdminServiceAgent
stage: GA
title: Firebase Admin SDK Administrator Service Agent
---
description: Access to provision apps with the Admin SDK.
etag: AA==
name: roles/firebase.sdkProvisioningServiceAgent
stage: GA
title: Firebase SDK Provisioning Service Agent
---
description: Read-only access to Firebase products.
etag: AA==
name: roles/firebase.viewer
stage: GA
title: Firebase Viewer
---
description: Full read/write access to Firebase A/B Testing resources.
etag: AA==
name: roles/firebaseabt.admin
stage: BETA
title: Firebase A/B Testing Admin
---
description: Read-only access to Firebase A/B Testing resources.
etag: AA==
name: roles/firebaseabt.viewer
stage: BETA
title: Firebase A/B Testing Viewer
---
description: Full management of Firebase App Check.
etag: AA==
name: roles/firebaseappcheck.admin
stage: GA
title: Firebase App Check Admin
---
description: Grants Firebase App Check Service Account access to consumer app attestation
resources, such as reCAPTCHA Enterprise and Play Integrity API.
etag: AA==
name: roles/firebaseappcheck.serviceAgent
stage: GA
title: Firebase App Check Service Agent
---
description: Access to token verification capabilities for Firebase App Check.
etag: AA==
name: roles/firebaseappcheck.tokenVerifier
stage: GA
title: Firebase App Check Token Verifier
---
description: Read-only access for Firebase App Check.
etag: AA==
name: roles/firebaseappcheck.viewer
stage: GA
title: Firebase App Check Viewer
---
description: Full read/write access to Firebase App Distribution resources.
etag: AA==
name: roles/firebaseappdistro.admin
stage: GA
title: Firebase App Distribution Admin
---
description: Read-only access to Firebase App Distribution resources.
etag: AA==
name: roles/firebaseappdistro.viewer
stage: GA
title: Firebase App Distribution Viewer
---
description: Full read/write access to Firebase Authentication resources.
etag: AA==
name: roles/firebaseauth.admin
stage: GA
title: Firebase Authentication Admin
---
description: Read-only access to Firebase Authentication resources.
etag: AA==
name: roles/firebaseauth.viewer
stage: GA
title: Firebase Authentication Viewer
---
description: Full read/write access to Firebase Cloud Messaging API resources.
etag: AA==
name: roles/firebasecloudmessaging.admin
stage: BETA
title: Firebase Cloud Messaging API Admin
---
description: Full read/write access to symbol mapping file resources for Firebase
Crash Reporting.
etag: AA==
name: roles/firebasecrash.symbolMappingsAdmin
stage: GA
title: Firebase Crash Symbol Uploader
---
description: Full read/write access to Firebase Crashlytics resources.
etag: AA==
name: roles/firebasecrashlytics.admin
stage: GA
title: Firebase Crashlytics Admin
---
description: Read-only access to Firebase Crashlytics resources.
etag: AA==
name: roles/firebasecrashlytics.viewer
stage: GA
title: Firebase Crashlytics Viewer
---
description: Full read/write access to Firebase Realtime Database resources.
etag: AA==
name: roles/firebasedatabase.admin
stage: GA
title: Firebase Realtime Database Admin
---
description: Access to publish triggers
etag: AA==
name: roles/firebasedatabase.serviceAgent
stage: GA
title: Firebase Realtime Database Service Agent
---
description: Read-only access to Firebase Realtime Database resources.
etag: AA==
name: roles/firebasedatabase.viewer
stage: GA
title: Firebase Realtime Database Viewer
---
description: Full read/write access to Firebase Dynamic Links resources.
etag: AA==
name: roles/firebasedynamiclinks.admin
stage: GA
title: Firebase Dynamic Links Admin
---
description: Read-only access to Firebase Dynamic Links resources.
etag: AA==
name: roles/firebasedynamiclinks.viewer
stage: GA
title: Firebase Dynamic Links Viewer
---
description: View, create, and delete Firebase Extensions Instances and Extensions
Versions, and update Extensions Instances
etag: AA==
name: roles/firebaseextensions.developer
stage: BETA
title: Firebase Extensions Developer
---
description: Viewer of Firebase Extensions Instances
etag: AA==
name: roles/firebaseextensions.viewer
stage: BETA
title: Firebase Extensions Viewer
---
description: Fully manage Firebase Extensions
etag: AA==
name: roles/firebaseextensionspublisher.extensionsAdmin
stage: BETA
title: Firebase Extensions Publisher - Extensions Admin
---
description: View Firebase Extensions
etag: AA==
name: roles/firebaseextensionspublisher.extensionsViewer
stage: BETA
title: Firebase Extensions Publisher - Extensions Viewer
---
description: Full read/write access to Firebase Hosting resources.
etag: AA==
name: roles/firebasehosting.admin
stage: GA
title: Firebase Hosting Admin
---
description: Read-only access to Firebase Hosting resources.
etag: AA==
name: roles/firebasehosting.viewer
stage: GA
title: Firebase Hosting Viewer
---
description: Full read/write access to Firebase In-App Messaging resources.
etag: AA==
name: roles/firebaseinappmessaging.admin
stage: BETA
title: Firebase In-App Messaging Admin
---
description: Read-only access to Firebase In-App Messaging resources.
etag: AA==
name: roles/firebaseinappmessaging.viewer
stage: BETA
title: Firebase In-App Messaging Viewer
---
description: Full management of Firebase Messaging Campaigns.
etag: AA==
name: roles/firebasemessagingcampaigns.admin
stage: BETA
title: Firebase Messaging Campaigns Admin
---
description: Read-only access for Firebase Messaging Campaigns.
etag: AA==
name: roles/firebasemessagingcampaigns.viewer
stage: BETA
title: Firebase Messaging Campaigns Viewer
---
description: Full read/write access to Firebase ML Kit resources.
etag: AA==
name: roles/firebaseml.admin
stage: BETA
title: Firebase ML Kit Admin
---
description: Read-only access to Firebase ML Kit resources.
etag: AA==
name: roles/firebaseml.viewer
stage: BETA
title: Firebase ML Kit Viewer
---
description: Grants Firebase Extensions API Service Account access to manage resources.
etag: AA==
name: roles/firebasemods.serviceAgent
stage: GA
title: Firebase Extensions API Service Agent
---
description: Full read/write access to Firebase Cloud Messaging resources.
etag: AA==
name: roles/firebasenotifications.admin
stage: GA
title: Firebase Cloud Messaging Admin
---
description: Read-only access to Firebase Cloud Messaging resources.
etag: AA==
name: roles/firebasenotifications.viewer
stage: GA
title: Firebase Cloud Messaging Viewer
---
description: Full access to firebaseperformance resources.
etag: AA==
name: roles/firebaseperformance.admin
stage: GA
title: Firebase Performance Reporting Admin
---
description: Read-only access to firebaseperformance resources.
etag: AA==
name: roles/firebaseperformance.viewer
stage: GA
title: Firebase Performance Reporting Viewer
---
description: Full management of Firebase Rules.
etag: AA==
name: roles/firebaserules.admin
stage: GA
title: Firebase Rules Admin
---
description: Grants Firebase Security Rules access to Firestore for providing cross-service
Rules.
etag: AA==
name: roles/firebaserules.firestoreServiceAgent
stage: GA
title: Firebase Rules Firestore Service Agent
---
description: Read/write/list access for Datastore entities and Cloud Storage objects,
as well as get/list/publish access for PubSub topics.
etag: AA==
name: roles/firebaserules.system
stage: GA
title: Firebase Rules System
---
description: Read-only access on all resources with the ability to test Rulesets.
etag: AA==
name: roles/firebaserules.viewer
stage: GA
title: Firebase Rules Viewer
---
description: Full management of Cloud Storage for Firebase.
etag: AA==
name: roles/firebasestorage.admin
stage: BETA
title: Cloud Storage for Firebase Admin
---
description: Access to Cloud Storage for Firebase through API and SDK.
etag: AA==
name: roles/firebasestorage.serviceAgent
stage: GA
title: Cloud Storage for Firebase Service Agent
---
description: Read-only access for Cloud Storage for Firebase.
etag: AA==
name: roles/firebasestorage.viewer
stage: BETA
title: Cloud Storage for Firebase Viewer
---
description: Gives Firestore service account access to managed resources.
etag: AA==
name: roles/firestore.serviceAgent
stage: GA
title: Firestore Service Agent
---
description: Gives Cloud Firewall Insights service agent permissions to retrieve Firewall,
VM and route resources on user behalf.
etag: AA==
name: roles/firewallinsights.serviceAgent
stage: GA
title: Cloud Firewall Insights Service Agent
---
description: Limited read access to Fleet Engine resources
etag: AA==
name: roles/fleetengine.consumerSdkUser
stage: GA
title: Fleet Engine Consumer SDK User
---
description: Full access to Fleet Engine Delivery resources.
etag: AA==
name: roles/fleetengine.deliveryAdmin
stage: GA
title: Fleet Engine Delivery Admin
---
description: Limited read access to Fleet Engine Delivery resources
etag: AA==
name: roles/fleetengine.deliveryConsumer
stage: GA
title: Fleet Engine Delivery Consumer User
---
description: Grants read access to all Fleet Engine Delivery resources
etag: AA==
name: roles/fleetengine.deliveryFleetReader
stage: GA
title: Fleet Engine Delivery Fleet Reader User
---
description: Full access to Fleet Engine DeliveryVehicles and Tasks resources.
etag: AA==
name: roles/fleetengine.deliverySuperUser
stage: GA
title: Fleet Engine Delivery Super User
---
description: Read and write access to Fleet Engine Delivery resources
etag: AA==
name: roles/fleetengine.deliveryTrustedDriver
stage: GA
title: Fleet Engine Delivery Trusted Driver User
---
description: Limited write access to Fleet Engine Delivery Vehicle resources
etag: AA==
name: roles/fleetengine.deliveryUntrustedDriver
stage: GA
title: Fleet Engine Delivery Untrusted Driver User
---
description: Read and limited update access to Fleet Engine resources
etag: AA==
name: roles/fleetengine.driverSdkUser
stage: GA
title: Fleet Engine Driver SDK User
---
description: Full access to Vehicle and Trip resources.
etag: AA==
name: roles/fleetengine.ondemandAdmin
stage: GA
title: Fleet Engine On-Demand Admin
---
description: Grants the FleetEngine Service Account access to manage resources.
etag: AA==
name: roles/fleetengine.serviceAgent
stage: GA
title: FleetEngine Service Agent
---
description: Full access to all Fleet Engine resources.
etag: AA==
name: roles/fleetengine.serviceSuperUser
stage: GA
title: Fleet Engine Service Super User
---
description: Gives Game Services Service Account access to GCP resources.
etag: AA==
name: roles/gameservices.serviceAgent
stage: GA
title: Game Services Service Agent
---
description: Full access to GDC Hardware Management resources.
etag: AA==
name: roles/gdchardwaremanagement.admin
stage: BETA
title: GDC Hardware Management Admin
---
description: Create, read, and update access to GDC Hardware Management resources
that support those operations. Also grants delete access to HardwareGroup resource.
etag: AA==
name: roles/gdchardwaremanagement.operator
stage: BETA
title: GDC Hardware Management Operator
---
description: Readonly access to GDC Hardware Management resources.
etag: AA==
name: roles/gdchardwaremanagement.reader
stage: BETA
title: GDC Hardware Management Reader
---
description: Full access to genomics datasets and operations.
etag: AA==
name: roles/genomics.admin
stage: GA
title: Genomics Admin
---
description: Access to read and edit genomics datasets and operations.
etag: AA==
name: roles/genomics.editor
stage: GA
title: Genomics Editor
---
description: Full access to operate on genomics pipelines.
etag: AA==
name: roles/genomics.pipelinesRunner
stage: GA
title: Genomics Pipelines Runner
---
description: Gives Genomics Service Account access to compute resources. Includes
access to service accounts.
etag: AA==
name: roles/genomics.serviceAgent
stage: GA
title: Genomics Service Agent
---
description: Access to view genomics datasets and operations.
etag: AA==
name: roles/genomics.viewer
stage: GA
title: Genomics Viewer
---
description: Full access to all Backup for GKE resources.
etag: AA==
name: roles/gkebackup.admin
stage: GA
title: Backup for GKE Admin
---
description: Allows administrators to manage all BackupPlan and Backup resources.
etag: AA==
name: roles/gkebackup.backupAdmin
stage: GA
title: Backup for GKE Backup Admin
---
description: Allows administrators to manage Backup resources for specific BackupPlans
etag: AA==
name: roles/gkebackup.delegatedBackupAdmin
stage: GA
title: Backup for GKE Delegated Backup Admin
---
description: Allows administrators to manage Restore resources for specific RestorePlans
etag: AA==
name: roles/gkebackup.delegatedRestoreAdmin
stage: GA
title: Backup for GKE Delegated Restore Admin
---
description: Allows administrators to manage all RestorePlan and Restore resources.
etag: AA==
name: roles/gkebackup.restoreAdmin
stage: GA
title: Backup for GKE Restore Admin
---
description: Grants the Backup for GKE Service Account access to managed resources.
etag: AA==
name: roles/gkebackup.serviceAgent
stage: GA
title: Backup for GKE Service Agent
---
description: Read-only access to all Backup for GKE resources.
etag: AA==
name: roles/gkebackup.viewer
stage: GA
title: Backup for GKE Viewer
---
description: Gives the Warp Run service agent access to Cloud Platform resources.
etag: AA==
name: roles/gkedataplanemanagement.warpRunServiceAgent
stage: GA
title: Warp Run Service Agent
---
description: Full access to Fleet resources.
etag: AA==
name: roles/gkehub.admin
stage: GA
title: Fleet Admin (formerly GKE Hub Admin)
---
description: Ability to set up GKE Connect between external clusters and Google.
etag: AA==
name: roles/gkehub.connect
stage: GA
title: GKE Connect Agent
---
description: Gives the GKE Hub service agent permission to manage the project for
cross-project fleet registration.
etag: AA==
name: roles/gkehub.crossProjectServiceAgent
stage: GA
title: GKE Hub Cross Project Service Agent
---
description: Edit access to Fleet resources.
etag: AA==
name: roles/gkehub.editor
stage: GA
title: Fleet Editor (formerly GKE Hub Editor)
---
description: Full access to Connect Gateway.
etag: AA==
name: roles/gkehub.gatewayAdmin
stage: GA
title: Connect Gateway Admin
---
description: Edit access to Connect Gateway.
etag: AA==
name: roles/gkehub.gatewayEditor
stage: GA
title: Connect Gateway Editor
---
description: Read-only access to Connect Gateway.
etag: AA==
name: roles/gkehub.gatewayReader
stage: GA
title: Connect Gateway Reader
---
description: Gives the GKE Hub service agent access to Cloud Platform resources.
etag: AA==
name: roles/gkehub.serviceAgent
stage: GA
title: GKE Hub Service Agent
---
description: Read-only access to Fleets and related resources.
etag: AA==
name: roles/gkehub.viewer
stage: GA
title: Fleet Viewer (formerly GKE Hub Viewer)
---
description: Admin access to Anthos Multi-cloud resources.
etag: AA==
name: roles/gkemulticloud.admin
stage: GA
title: Anthos Multi-cloud Admin
---
description: Grants the Anthos Multi-Cloud Container Service Account access to manage
resources.
etag: AA==
name: roles/gkemulticloud.containerServiceAgent
stage: GA
title: Anthos Multi-Cloud Container Service Agent
---
description: Grants the Anthos Multi-Cloud Control Plane Machine Service Account access
to manage resources.
etag: AA==
name: roles/gkemulticloud.controlPlaneMachineServiceAgent
stage: GA
title: Anthos Multi-Cloud Control Plane Machine Service Agent
---
description: Grants the Anthos Multi-Cloud Node Pool Machine Service Account access
to manage resources.
etag: AA==
name: roles/gkemulticloud.nodePoolMachineServiceAgent
stage: GA
title: Anthos Multi-Cloud Node Pool Machine Service Agent
---
description: Grants the Anthos Multi-Cloud Service Account access to manage resources.
etag: AA==
name: roles/gkemulticloud.serviceAgent
stage: GA
title: Anthos Multi-Cloud Service Agent
---
description: Grant access to write cluster telemetry data such as logs, metrics, and
resource metadata.
etag: AA==
name: roles/gkemulticloud.telemetryWriter
stage: GA
title: Anthos Multi-cloud Telemetry Writer
---
description: Viewer access to Anthos Multi-cloud resources.
etag: AA==
name: roles/gkemulticloud.viewer
stage: GA
title: Anthos Multi-cloud Viewer
---
description: Full access to GKE on-prem all resources.
etag: AA==
name: roles/gkeonprem.admin
stage: GA
title: GKE on-prem Admin
---
description: Gives the GKE On-Prem service agent access to Cloud Platform resources.
etag: AA==
name: roles/gkeonprem.serviceAgent
stage: GA
title: GKE On-Prem Service Agent
---
description: Read-only access to GKE on-prem all resources.
etag: AA==
name: roles/gkeonprem.viewer
stage: GA
title: GKE on-prem Viewer
---
description: Full access to Google Workspace Add-ons resources
etag: AA==
name: roles/gsuiteaddons.developer
stage: GA
title: Google Workspace Add-ons Developer
---
description: Read-only access to Google Workspace Add-ons resources
etag: AA==
name: roles/gsuiteaddons.reader
stage: GA
title: Google Workspace Add-ons Reader
---
description: Testing execution access to Google Workspace Add-ons resources
etag: AA==
name: roles/gsuiteaddons.tester
stage: GA
title: Google Workspace Add-ons Tester
---
description: Create, delete, update, read and list annotations.
etag: AA==
name: roles/healthcare.annotationEditor
stage: GA
title: Healthcare Annotation Editor
---
description: Read and list annotations in an Annotation store.
etag: AA==
name: roles/healthcare.annotationReader
stage: GA
title: Healthcare Annotation Reader
---
description: Administer Annotation stores.
etag: AA==
name: roles/healthcare.annotationStoreAdmin
stage: GA
title: Healthcare Annotation Administrator
---
description: List Annotation Stores in a dataset.
etag: AA==
name: roles/healthcare.annotationStoreViewer
stage: GA
title: Healthcare Annotation Store Viewer
---
description: Edit AttributeDefinition objects.
etag: AA==
name: roles/healthcare.attributeDefinitionEditor
stage: GA
title: Healthcare Attribute Definition Editor
---
description: Read AttributeDefinition objects in a consent store.
etag: AA==
name: roles/healthcare.attributeDefinitionReader
stage: GA
title: Healthcare Attribute Definition Reader
---
description: Administer ConsentArtifact objects.
etag: AA==
name: roles/healthcare.consentArtifactAdmin
stage: GA
title: Healthcare Consent Artifact Administrator
---
description: Edit ConsentArtifact objects.
etag: AA==
name: roles/healthcare.consentArtifactEditor
stage: GA
title: Healthcare Consent Artifact Editor
---
description: Read ConsentArtifact objects in a consent store.
etag: AA==
name: roles/healthcare.consentArtifactReader
stage: GA
title: Healthcare Consent Artifact Reader
---
description: Edit Consent objects.
etag: AA==
name: roles/healthcare.consentEditor
stage: GA
title: Healthcare Consent Editor
---
description: Read Consent objects in a consent store.
etag: AA==
name: roles/healthcare.consentReader
stage: GA
title: Healthcare Consent Reader
---
description: Administer Consent stores.
etag: AA==
name: roles/healthcare.consentStoreAdmin
stage: GA
title: Healthcare Consent Store Administrator
---
description: List Consent Stores in a dataset.
etag: AA==
name: roles/healthcare.consentStoreViewer
stage: GA
title: Healthcare Consent Store Viewer
---
description: Administer Healthcare Datasets.
etag: AA==
name: roles/healthcare.datasetAdmin
stage: GA
title: Healthcare Dataset Administrator
---
description: List the Healthcare Datasets in a project.
etag: AA==
name: roles/healthcare.datasetViewer
stage: GA
title: Healthcare Dataset Viewer
---
description: Edit DICOM images individually and in bulk.
etag: AA==
name: roles/healthcare.dicomEditor
stage: GA
title: Healthcare DICOM Editor
---
description: Administer DICOM stores.
etag: AA==
name: roles/healthcare.dicomStoreAdmin
stage: GA
title: Healthcare DICOM Store Administrator
---
description: List DICOM Stores in a dataset.
etag: AA==
name: roles/healthcare.dicomStoreViewer
stage: GA
title: Healthcare DICOM Store Viewer
---
description: Retrieve DICOM images from a DICOM store.
etag: AA==
name: roles/healthcare.dicomViewer
stage: GA
title: Healthcare DICOM Viewer
---
description: Create, delete, update, read and search FHIR resources.
etag: AA==
name: roles/healthcare.fhirResourceEditor
stage: GA
title: Healthcare FHIR Resource Editor
---
description: Read and search FHIR resources.
etag: AA==
name: roles/healthcare.fhirResourceReader
stage: GA
title: Healthcare FHIR Resource Reader
---
description: Administer FHIR resource stores.
etag: AA==
name: roles/healthcare.fhirStoreAdmin
stage: GA
title: Healthcare FHIR Store Administrator
---
description: List FHIR Stores in a dataset.
etag: AA==
name: roles/healthcare.fhirStoreViewer
stage: GA
title: Healthcare FHIR Store Viewer
---
description: List and read HL7v2 messages, update message labels, and publish new
messages.
etag: AA==
name: roles/healthcare.hl7V2Consumer
stage: GA
title: Healthcare HL7v2 Message Consumer
---
description: Read, write, and delete access to HL7v2 messages.
etag: AA==
name: roles/healthcare.hl7V2Editor
stage: GA
title: Healthcare HL7v2 Message Editor
---
description: Ingest HL7v2 messages received from a source network.
etag: AA==
name: roles/healthcare.hl7V2Ingest
stage: GA
title: Healthcare HL7v2 Message Ingest
---
description: Administer HL7v2 Stores.
etag: AA==
name: roles/healthcare.hl7V2StoreAdmin
stage: GA
title: Healthcare HL7v2 Store Administrator
---
description: View HL7v2 Stores in a dataset.
etag: AA==
name: roles/healthcare.hl7V2StoreViewer
stage: GA
title: Healthcare HL7v2 Store Viewer
---
description: Extract and analyze medical entities from a given text.
etag: AA==
name: roles/healthcare.nlpServiceViewer
stage: BETA
title: Healthcare NLP Service Viewer
---
description: Gives the Healthcare Service Account access to networks,Kubernetes engine,
and pubsub resources.
etag: AA==
name: roles/healthcare.serviceAgent
stage: GA
title: Healthcare Service Agent
---
description: Edit UserDataMapping objects.
etag: AA==
name: roles/healthcare.userDataMappingEditor
stage: GA
title: Healthcare User Data Mapping Editor
---
description: Read UserDataMapping objects in a consent store.
etag: AA==
name: roles/healthcare.userDataMappingReader
stage: GA
title: Healthcare User Data Mapping Reader
---
description: Deny admin role, with permissions to read and modify deny policies
etag: AA==
name: roles/iam.denyAdmin
stage: GA
title: Deny Admin
---
description: Deny Reviewer role, with permissions to read deny policies
etag: AA==
name: roles/iam.denyReviewer
stage: GA
title: Deny Reviewer
---
description: Access to administer all custom roles in the organization and the projects
below it.
etag: AA==
name: roles/iam.organizationRoleAdmin
stage: GA
title: Organization Role Administrator
---
description: Read access to all custom roles in the organization and the projects
below it.
etag: AA==
name: roles/iam.organizationRoleViewer
stage: GA
title: Organization Role Viewer
---
description: Access to administer all custom roles in the project.
etag: AA==
name: roles/iam.roleAdmin
stage: GA
title: Role Administrator
---
description: Read access to all custom roles in the project.
etag: AA==
name: roles/iam.roleViewer
stage: GA
title: Role Viewer
---
description: Security admin role, with permissions to get and set any IAM policy.
etag: AA==
name: roles/iam.securityAdmin
stage: GA
title: Security Admin
---
description: Security reviewer role, with permissions to get any IAM policy.
etag: AA==
name: roles/iam.securityReviewer
stage: GA
title: Security Reviewer
---
description: Create and manage service accounts.
etag: AA==
name: roles/iam.serviceAccountAdmin
stage: GA
title: Service Account Admin
---
description: Access to create service accounts.
etag: AA==
name: roles/iam.serviceAccountCreator
stage: GA
title: Create Service Accounts
---
description: Access to delete service accounts.
etag: AA==
name: roles/iam.serviceAccountDeleter
stage: GA
title: Delete Service Accounts
---
description: Create and manage (and rotate) service account keys.
etag: AA==
name: roles/iam.serviceAccountKeyAdmin
stage: GA
title: Service Account Key Admin
---
description: Create OpenID Connect (OIDC) identity tokens
etag: AA==
name: roles/iam.serviceAccountOpenIdTokenCreator
stage: GA
title: Service Account OpenID Connect Identity Token Creator
---
description: Impersonate service accounts (create OAuth2 access tokens, sign blobs
or JWTs, etc).
etag: AA==
name: roles/iam.serviceAccountTokenCreator
stage: GA
title: Service Account Token Creator
---
description: Run operations as the service account.
etag: AA==
name: roles/iam.serviceAccountUser
stage: GA
title: Service Account User
---
description: Read access to service accounts, metadata, and keys.
etag: AA==
name: roles/iam.serviceAccountViewer
stage: GA
title: View Service Accounts
---
description: Full rights to create and manage all workforce pools in the org, along
with the ability to delegate permissions to other admins.
etag: AA==
name: roles/iam.workforcePoolAdmin
stage: GA
title: IAM Workforce Pool Admin
---
description: Rights to edit a particular instance of a workforce pool.
etag: AA==
name: roles/iam.workforcePoolEditor
stage: GA
title: IAM Workforce Pool Editor
---
description: Rights to read workforce pool.
etag: AA==
name: roles/iam.workforcePoolViewer
stage: GA
title: IAM Workforce Pool Viewer
---
description: Full rights to create and manage workload identity pools.
etag: AA==
name: roles/iam.workloadIdentityPoolAdmin
stage: BETA
title: IAM Workload Identity Pool Admin
---
description: Read access to workload identity pools.
etag: AA==
name: roles/iam.workloadIdentityPoolViewer
stage: BETA
title: IAM Workload Identity Pool Viewer
---
description: Impersonate service accounts from federated workloads.
etag: AA==
name: roles/iam.workloadIdentityUser
stage: GA
title: Workload Identity User
---
description: Administrator of IAP Permissions
etag: AA==
name: roles/iap.admin
stage: GA
title: IAP Policy Admin
---
description: Access HTTPS resources which use Identity-Aware Proxy
etag: AA==
name: roles/iap.httpsResourceAccessor
stage: GA
title: IAP-secured Web App User
---
description: Remediate IAP resource
etag: AA==
name: roles/iap.remediatorUser
stage: BETA
title: IAP-secured Resource Remediator User
---
description: Administrator of IAP Settings.
etag: AA==
name: roles/iap.settingsAdmin
stage: GA
title: IAP Settings Admin
---
description: Edit Tunnel Destination Group resources which use Identity-Aware Proxy
etag: AA==
name: roles/iap.tunnelDestGroupEditor
stage: GA
title: IAP-secured Tunnel Destination Group Editor
---
description: View Tunnel Destination Group resources which use Identity-Aware Proxy
etag: AA==
name: roles/iap.tunnelDestGroupViewer
stage: GA
title: IAP-secured Tunnel Destination Group Viewer
---
description: Access Tunnel resources which use Identity-Aware Proxy
etag: AA==
name: roles/iap.tunnelResourceAccessor
stage: GA
title: IAP-secured Tunnel User
---
description: Full access to Identity Platform resources.
etag: AA==
name: roles/identityplatform.admin
stage: BETA
title: Identity Platform Admin
---
description: Read access to Identity Platform resources.
etag: AA==
name: roles/identityplatform.viewer
stage: BETA
title: Identity Platform Viewer
---
description: Full access to Identity Toolkit resources.
etag: AA==
name: roles/identitytoolkit.admin
stage: GA
title: Identity Toolkit Admin
---
description: Gives Identity Platform service account access to customer project resources.
etag: AA==
name: roles/identitytoolkit.serviceAgent
stage: GA
title: Identity Platform Service Agent
---
description: Read access to Identity Toolkit resources.
etag: AA==
name: roles/identitytoolkit.viewer
stage: GA
title: Identity Toolkit Viewer
---
description: Full access to Cloud IDS all resources.
etag: AA==
name: roles/ids.admin
stage: BETA
title: Cloud IDS Admin
---
description: Read-only access to Cloud IDS all resources.
etag: AA==
name: roles/ids.viewer
stage: BETA
title: Cloud IDS Viewer
---
description: A user that has full access to all Apigee integrations.
etag: AA==
name: roles/integrations.apigeeIntegrationAdminRole
stage: GA
title: Apigee Integration Admin
---
description: A developer that can deploy/undeploy Apigee integrations to the integration
runtime.
etag: AA==
name: roles/integrations.apigeeIntegrationDeployerRole
stage: GA
title: Apigee Integration Deployer
---
description: A developer that can list, create and update Apigee integrations.
etag: AA==
name: roles/integrations.apigeeIntegrationEditorRole
stage: GA
title: Apigee Integration Editor
---
description: A role that can invoke Apigee integrations.
etag: AA==
name: roles/integrations.apigeeIntegrationInvokerRole
stage: GA
title: Apigee Integration Invoker
---
description: A developer that can list and view Apigee integrations.
etag: AA==
name: roles/integrations.apigeeIntegrationsViewer
stage: GA
title: Apigee Integration Viewer
---
description: A role that can approve / reject Apigee integrations that contain a suspension/wait
task.
etag: AA==
name: roles/integrations.apigeeSuspensionResolver
stage: GA
title: Apigee Integration Approver
---
description: A developer that can list and view Certificates.
etag: AA==
name: roles/integrations.certificateViewer
stage: GA
title: Certificate Viewer
---
description: A user that has full access (CRUD) to all integrations.
etag: AA==
name: roles/integrations.integrationAdmin
stage: GA
title: Application Integration Admin
---
description: A developer that can deploy/undeploy integrations to the integration
runtime.
etag: AA==
name: roles/integrations.integrationDeployer
stage: GA
title: Application Integration Deployer
---
description: A developer that can list, create and update integrations.
etag: AA==
name: roles/integrations.integrationEditor
stage: GA
title: Application Integration Editor
---
description: A role that can invoke integrations.
etag: AA==
name: roles/integrations.integrationInvoker
stage: GA
title: Application Integration Invoker
---
description: A developer that can list and view integrations.
etag: AA==
name: roles/integrations.integrationViewer
stage: GA
title: Application Integration Viewer
---
description: A user that has full access to all Security integrations.
etag: AA==
name: roles/integrations.securityIntegrationAdmin
stage: BETA
title: Security Integration Admin
---
description: Service agent that grants access to execute an integration.
etag: AA==
name: roles/integrations.serviceAgent
stage: GA
title: Application Integration Service Agent
---
description: A user that has full access (CRUD) to all SFDC instances.
etag: AA==
name: roles/integrations.sfdcInstanceAdmin
stage: GA
title: Application Integration SFDC Instance Admin
---
description: A developer that can list, create and update integrations.
etag: AA==
name: roles/integrations.sfdcInstanceEditor
stage: GA
title: Application Integration SFDC Instance Editor
---
description: A developer that can list and view SFDC instances.
etag: AA==
name: roles/integrations.sfdcInstanceViewer
stage: GA
title: Application Integration SFDC Instance Viewer
---
description: A role that can resolve suspended integrations.
etag: AA==
name: roles/integrations.suspensionResolver
stage: GA
title: Application Integration Approver
---
description: This role can perform all account manager related operations
etag: AA==
name: roles/issuerswitch.accountManagerAdmin
stage: BETA
title: Issuerswitch Account Manager Admin
---
description: This role can perform all account manager transactions related operations
etag: AA==
name: roles/issuerswitch.accountManagerTransactionsAdmin
stage: BETA
title: Issuerswitch Account Manager Transactions Admin
---
description: This role can view all account manager transactions
etag: AA==
name: roles/issuerswitch.accountManagerTransactionsViewer
stage: BETA
title: Issuerswitch Account Manager Transactions Viewer
---
description: Access to all issuer switch roles
etag: AA==
name: roles/issuerswitch.admin
stage: BETA
title: Issuerswitch Admin
---
description: Full access to issuer switch participants
etag: AA==
name: roles/issuerswitch.issuerParticipantsAdmin
stage: BETA
title: Issuerswitch Participants Admin
---
description: Full access to issuer switch resolutions
etag: AA==
name: roles/issuerswitch.resolutionsAdmin
stage: BETA
title: Issuerswitch Resolutions Admin
---
description: Full access to issuer switch rules
etag: AA==
name: roles/issuerswitch.rulesAdmin
stage: BETA
title: Issuerswitch Rules Admin
---
description: This role can view rules and related metadata.
etag: AA==
name: roles/issuerswitch.rulesViewer
stage: BETA
title: Issuerswitch Rules Viewer
---
description: This role can view all transactions
etag: AA==
name: roles/issuerswitch.transactionsViewer
stage: BETA
title: Issuerswitch Transactions Viewer
---
description: Full access to all Config Controller resources.
etag: AA==
name: roles/krmapihosting.admin
stage: GA
title: Config Controller Admin
---
description: Grants permissions to resources managed by AnthosApiEndpoint.
etag: AA==
name: roles/krmapihosting.anthosApiEndpointServiceAgent
stage: GA
title: KRM API Hosting AnthosApiEndpoint Service Agent
---
description: Gives KRM API Hosting service account access to managed resource.
etag: AA==
name: roles/krmapihosting.serviceAgent
stage: GA
title: KRM API Hosting Service Agent
---
description: Read-only access to all Config Controller resources.
etag: AA==
name: roles/krmapihosting.viewer
stage: GA
title: Config Controller Viewer
---
description: Publisher of Kubernetes clusters metadata
etag: AA==
name: roles/kubernetesmetadata.publisher
stage: BETA
title: Metadata Publisher
---
description: Service account role used to setup authentication for the control plane
used by KubeRun Events.
etag: AA==
name: roles/kuberun.eventsControlPlaneServiceAgent
stage: GA
title: KubeRun Events Control Plane Service Agent
---
description: Service account role used to setup authentication for the data plane
used by KubeRun Events.
etag: AA==
name: roles/kuberun.eventsDataPlaneServiceAgent
stage: GA
title: KubeRun Events Data Plane Service Agent
---
description: Full control of Cloud Life Sciences resources.
etag: AA==
name: roles/lifesciences.admin
stage: BETA
title: Cloud Life Sciences Admin
---
description: Access to read and edit Cloud Life Sciences resources.
etag: AA==
name: roles/lifesciences.editor
stage: BETA
title: Cloud Life Sciences Editor
---
description: Gives Cloud Life Sciences Service Account access to compute resources.
Includes access to service accounts.
etag: AA==
name: roles/lifesciences.serviceAgent
stage: GA
title: Cloud Life Sciences Service Agent
---
description: Access to read Cloud Life Sciences resources.
etag: AA==
name: roles/lifesciences.viewer
stage: BETA
title: Cloud Life Sciences Viewer
---
description: Full access to operate on Cloud Life Sciences workflows.
etag: AA==
name: roles/lifesciences.workflowsRunner
stage: BETA
title: Cloud Life Sciences Workflows Runner
---
description: Full access to Live Stream resources.
etag: AA==
name: roles/livestream.editor
stage: GA
title: Live Stream Editor
---
description: Uploads media files to customer GCS buckets.
etag: AA==
name: roles/livestream.serviceAgent
stage: GA
title: Live Stream Service Agent
---
description: Read access to Live Stream resources.
etag: AA==
name: roles/livestream.viewer
stage: GA
title: Live Stream Viewer
---
description: Access to all logging permissions, and dependent permissions.
etag: AA==
name: roles/logging.admin
stage: GA
title: Logging Admin
---
description: Ability to write logs to a log bucket.
etag: AA==
name: roles/logging.bucketWriter
stage: GA
title: Logs Bucket Writer
---
description: Access to configure log exporting and metrics.
etag: AA==
name: roles/logging.configWriter
stage: GA
title: Logs Configuration Writer
---
description: Ability to read restricted fields in a log bucket.
etag: AA==
name: roles/logging.fieldAccessor
stage: GA
title: Log Field Accessor
---
description: Ability to see links for a bucket.
etag: AA==
name: roles/logging.linkViewer
stage: GA
title: Log Link Accessor
---
description: Access to write logs.
etag: AA==
name: roles/logging.logWriter
stage: GA
title: Logs Writer
---
description: Access to view all logs, including logs with private contents.
etag: AA==
name: roles/logging.privateLogViewer
stage: GA
title: Private Logs Viewer
---
description: Grants a Cloud Logging Service Account the ability to create and link
datasets.
etag: AA==
name: roles/logging.serviceAgent
stage: GA
title: Cloud Logging Service Agent
---
description: Ability to read logs in a view.
etag: AA==
name: roles/logging.viewAccessor
stage: GA
title: Logs View Accessor
---
description: Access to view logs, except for logs with private contents.
etag: AA==
name: roles/logging.viewer
stage: GA
title: Logs Viewer
---
description: Full access to all Looker resources.
etag: AA==
name: roles/looker.admin
stage: GA
title: Looker Admin
---
description: Access to log in to a Looker instance.
etag: AA==
name: roles/looker.instanceUser
stage: GA
title: Looker Instance User
---
description: Gives the Looker service account permission to manage customer resources
etag: AA==
name: roles/looker.serviceAgent
stage: GA
title: Looker Service Agent
---
description: Read-only access to all Looker resources.
etag: AA==
name: roles/looker.viewer
stage: GA
title: Looker Viewer
---
description: Looker Studio Pro Manager
etag: AA==
name: roles/lookerstudio.proManager
stage: BETA
title: Looker Studio Pro Manager
---
description: Full access to Google Cloud Managed Identities Domains and related resources.
Intended to be granted on a project-level.
etag: AA==
name: roles/managedidentities.admin
stage: GA
title: Google Cloud Managed Identities Admin
---
description: Full access to Google Cloud Managed Identities Backup and related resources.
Intended to be granted on a project-level
etag: AA==
name: roles/managedidentities.backupAdmin
stage: GA
title: Google Cloud Managed Identities Backup Admin
---
description: Read-only access to Google Cloud Managed Identities Backup and related
resources.
etag: AA==
name: roles/managedidentities.backupViewer
stage: GA
title: Google Cloud Managed Identities Backup Viewer
---
description: Read-Update-Delete to Google Cloud Managed Identities Domains and related
resources. Intended to be granted on a resource (domain) level.
etag: AA==
name: roles/managedidentities.domainAdmin
stage: GA
title: Google Cloud Managed Identities Domain Admin
---
description: Access to domain join VMs with Cloud AD
etag: AA==
name: roles/managedidentities.domainJoin
stage: BETA
title: Google Cloud Managed Identities Domain Join
---
description: Full access to Google Cloud Managed Identities Domains and related resources.
Intended to be granted on a project-level
etag: AA==
name: roles/managedidentities.peeringAdmin
stage: GA
title: Google Cloud Managed Identities Peering Admin
---
description: Read-only access to Google Cloud Managed Identities Peering and related
resources.
etag: AA==
name: roles/managedidentities.peeringViewer
stage: GA
title: Google Cloud Managed Identities Peering Viewer
---
description: Gives Managed Identities service account access to managed resources.
etag: AA==
name: roles/managedidentities.serviceAgent
stage: GA
title: Cloud Managed Identities Service Agent
---
description: Read-only access to Google Cloud Managed Identities Domains and related
resources.
etag: AA==
name: roles/managedidentities.viewer
stage: GA
title: Google Cloud Managed Identities Viewer
---
description: Access to write Attack Surface Management
etag: AA==
name: roles/mandiant.attackSurfaceManagementEditor
stage: BETA
title: Mandiant Attack Surface Management Editor
---
description: Access to read Attack Surface Management
etag: AA==
name: roles/mandiant.attackSurfaceManagementViewer
stage: BETA
title: Mandiant Attack Surface Management Viewer
---
description: Access to write Digital Threat Monitoring
etag: AA==
name: roles/mandiant.digitalThreatMonitoringEditor
stage: BETA
title: Mandiant Digital Threat Monitoring Editor
---
description: Access to read Digital Threat Monitoring
etag: AA==
name: roles/mandiant.digitalThreatMonitoringViewer
stage: BETA
title: Mandiant Digital Threat Monitoring Viewer
---
description: Access to write Expertise On Demand
etag: AA==
name: roles/mandiant.expertiseOnDemandEditor
stage: BETA
title: Mandiant Expertise On Demand Editor
---
description: Access to read Expertise On Demand
etag: AA==
name: roles/mandiant.expertiseOnDemandViewer
stage: BETA
title: Mandiant Expertise On Demand Viewer
---
description: Access to write Threat Intel
etag: AA==
name: roles/mandiant.threatIntelEditor
stage: BETA
title: Mandiant Threat Intel Editor
---
description: Access to read Threat Intel
etag: AA==
name: roles/mandiant.threatIntelViewer
stage: BETA
title: Mandiant Threat Intel Viewer
---
description: Access to write Validation
etag: AA==
name: roles/mandiant.validationEditor
stage: BETA
title: Mandiant Validation Editor
---
description: Access to read Validation
etag: AA==
name: roles/mandiant.validationViewer
stage: BETA
title: Mandiant Validation Viewer
---
description: Grants permission to read and write everything
etag: AA==
name: roles/mapsadmin.admin
stage: GA
title: Maps API Admin
---
description: Grants permission to read everything
etag: AA==
name: roles/mapsadmin.viewer
stage: GA
title: Maps API Viewer
---
description: Grants read-only access to all of the Maps Analytics resources.
etag: AA==
name: roles/mapsanalytics.viewer
stage: BETA
title: Maps Analytics Viewer
---
description: Grants read and write access to all the Maps Platform Datasets API resources
etag: AA==
name: roles/mapsplatformdatasets.admin
stage: BETA
title: Maps Platform Datasets Admin
---
description: Grants readonly access to all the Maps Platform Datasets API resources
etag: AA==
name: roles/mapsplatformdatasets.viewer
stage: BETA
title: Maps Platform Datasets Viewer
---
description: Full access to Marketplace Solutions resources.
etag: AA==
name: roles/marketplacesolutions.admin
stage: BETA
title: Marketplace Solutions Admin
---
description: Edit access to Marketplace Solutions resources.
etag: AA==
name: roles/marketplacesolutions.editor
stage: BETA
title: Marketplace Solutions Editor
---
description: Readonly access to Marketplace Solutions resources.
etag: AA==
name: roles/marketplacesolutions.viewer
stage: BETA
title: Marketplace Solutions Viewer
---
description: Downloads and uploads media files from and to customer GCS buckets.
etag: AA==
name: roles/mediaasset.serviceAgent
stage: GA
title: Media Asset Service Agent
---
description: Full access to Memcached instances and related resources.
etag: AA==
name: roles/memcache.admin
stage: GA
title: Cloud Memorystore Memcached Admin
---
description: Read-Write access to Memcached instances and related resources.
etag: AA==
name: roles/memcache.editor
stage: GA
title: Cloud Memorystore Memcached Editor
---
description: Gives Cloud Memorystore Memcached service account access to managed resource
etag: AA==
name: roles/memcache.serviceAgent
stage: GA
title: Cloud Memorystore Memcached Service Agent
---
description: Read-only access to Memcached instances and related resources.
etag: AA==
name: roles/memcache.viewer
stage: GA
title: Cloud Memorystore Memcached Viewer
---
description: Full access to all mesh configuration resources
etag: AA==
name: roles/meshconfig.admin
stage: BETA
title: Mesh Config Admin
---
description: Apply mesh configuration
etag: AA==
name: roles/meshconfig.serviceAgent
stage: GA
title: Mesh Config Service Agent
---
description: Read access to mesh configuration
etag: AA==
name: roles/meshconfig.viewer
stage: BETA
title: Mesh Config Viewer
---
description: Anthos Service Mesh Managed Control Plane Agent
etag: AA==
name: roles/meshcontrolplane.serviceAgent
stage: GA
title: Mesh Managed Control Plane Service Agent
---
description: Run user-space Istio components
etag: AA==
name: roles/meshdataplane.serviceAgent
stage: GA
title: Mesh Data Plane Service Agent
---
description: Full access to all Dataproc Metastore resources.
etag: AA==
name: roles/metastore.admin
stage: GA
title: Dataproc Metastore Admin
---
description: Read and write access to all Dataproc Metastore resources.
etag: AA==
name: roles/metastore.editor
stage: GA
title: Dataproc Metastore Editor
---
description: Access to the Metastore Federation resource.
etag: AA==
name: roles/metastore.federationAccessor
stage: GA
title: Metastore Federation Accessor
---
description: Access to read and modify the metadata of databases and tables under
those databases.
etag: AA==
name: roles/metastore.metadataEditor
stage: GA
title: Dataproc Metastore Metadata Editor
---
description: Access to mutate metadata from a Dataproc Metastore service's underlying
metadata store.
etag: AA==
name: roles/metastore.metadataMutateAdmin
stage: GA
title: Dataproc Metastore Metadata Mutate Admin
---
description: Read-only access to Dataproc Metastore resources with additional metadata
operations permission.
etag: AA==
name: roles/metastore.metadataOperator
stage: GA
title: Dataproc Metastore Metadata Operator
---
description: Full access to the metadata of databases and tables under those databases.
etag: AA==
name: roles/metastore.metadataOwner
stage: GA
title: Dataproc Metastore Data Owner
---
description: "Access to query metadata from a Dataproc Metastore service's underlying\
\ metadata store. "
etag: AA==
name: roles/metastore.metadataQueryAdmin
stage: GA
title: Dataproc Metastore Metadata Query Admin
---
description: Access to the Dataproc Metastore gRPC endpoint
etag: AA==
name: roles/metastore.metadataUser
stage: GA
title: Dataproc Metastore Metadata User
---
description: Access to read the metadata of databases and tables under those databases
etag: AA==
name: roles/metastore.metadataViewer
stage: GA
title: Dataproc Metastore Metadata Viewer
---
description: Gives the Dataproc Metastore service account access to managed resources.
etag: AA==
name: roles/metastore.serviceAgent
stage: GA
title: Dataproc Metastore Service Agent
---
description: Read-only access to all Dataproc Metastore resources.
etag: AA==
name: roles/metastore.user
stage: GA
title: Dataproc Metastore Viewer
---
description: Full access to Migration Center all resources.
etag: AA==
name: roles/migrationcenter.admin
stage: BETA
title: Migration Center Admin
---
description: Gives Migration Center Service Account access to objects storedin object
store and Cloud Migration products.
etag: AA==
name: roles/migrationcenter.serviceAgent
stage: GA
title: Migration Center Service Agent
---
description: Read-only access to Migration Center all resources.
etag: AA==
name: roles/migrationcenter.viewer
stage: BETA
title: Migration Center Viewer
---
description: Full access to AI Platform.
etag: AA==
name: roles/ml.admin
stage: GA
title: AI Platform Admin
---
description: Access to create training and prediction jobs, models and versions, send
online prediction requests.
etag: AA==
name: roles/ml.developer
stage: GA
title: AI Platform Developer
---
description: Full access to the job.
etag: AA==
name: roles/ml.jobOwner
stage: GA
title: AI Platform Job Owner
---
description: Full access to the model and its versions.
etag: AA==
name: roles/ml.modelOwner
stage: GA
title: AI Platform Model Owner
---
description: Permissions to read the model and its versions, and use them for prediction.
etag: AA==
name: roles/ml.modelUser
stage: GA
title: AI Platform Model User
---
description: Full access to the operation.
etag: AA==
name: roles/ml.operationOwner
stage: GA
title: AI Platform Operation Owner
---
description: AI Platform service agent can act as log writer, Cloud Storage admin,
Artifact Registry Reader, BigQuery writer, and service account access token creator.
etag: AA==
name: roles/ml.serviceAgent
stage: GA
title: AI Platform Service Agent
---
description: Read-only access to AI Platform resources.
etag: AA==
name: roles/ml.viewer
stage: GA
title: AI Platform Viewer
---
description: All current and future monitoring permissions.
etag: AA==
name: roles/monitoring.admin
stage: GA
title: Monitoring Admin
---
description: Read/write access to alerting policies.
etag: AA==
name: roles/monitoring.alertPolicyEditor
stage: GA
title: Monitoring AlertPolicy Editor
---
description: Read-only access to alerting policies.
etag: AA==
name: roles/monitoring.alertPolicyViewer
stage: GA
title: Monitoring AlertPolicy Viewer
---
description: Read/write access to incidents from Cloud Console.
etag: AA==
name: roles/monitoring.cloudConsoleIncidentEditor
stage: BETA
title: Monitoring Cloud Console Incident Editor
---
description: Read access to incidents from Cloud Console.
etag: AA==
name: roles/monitoring.cloudConsoleIncidentViewer
stage: BETA
title: Monitoring Cloud Console Incident Viewer
---
description: Read/write access to dashboard configurations.
etag: AA==
name: roles/monitoring.dashboardEditor
stage: GA
title: Monitoring Dashboard Configuration Editor
---
description: Read-only access to dashboard configurations.
etag: AA==
name: roles/monitoring.dashboardViewer
stage: GA
title: Monitoring Dashboard Configuration Viewer
---
description: Read/write access to all monitoring data and configuration.
etag: AA==
name: roles/monitoring.editor
stage: GA
title: Monitoring Editor
---
description: Write-only access to metrics. This provides exactly the permissions
needed by the Stackdriver agent and other systems that send metrics.
etag: AA==
name: roles/monitoring.metricWriter
stage: GA
title: Monitoring Metric Writer
---
description: Access to add and remove monitored projects from metrics scopes.
etag: AA==
name: roles/monitoring.metricsScopesAdmin
stage: BETA
title: Monitoring Metrics Scopes Admin
---
description: Read-only access to metrics scopes and their monitored projects.
etag: AA==
name: roles/monitoring.metricsScopesViewer
stage: BETA
title: Monitoring Metrics Scopes Viewer
---
description: Read/write access to notification channels.
etag: AA==
name: roles/monitoring.notificationChannelEditor
stage: BETA
title: Monitoring NotificationChannel Editor
---
description: Read-only access to notification channels.
etag: AA==
name: roles/monitoring.notificationChannelViewer
stage: BETA
title: Monitoring NotificationChannel Viewer
---
description: Grants Cloud Monitoring and Cloud Alerting permission to access consumer
resources and track usage.
etag: AA==
name: roles/monitoring.notificationServiceAgent
stage: GA
title: Monitoring Service Agent
---
description: Read/write access to services.
etag: AA==
name: roles/monitoring.servicesEditor
stage: GA
title: Monitoring Services Editor
---
description: Read-only access to services.
etag: AA==
name: roles/monitoring.servicesViewer
stage: GA
title: Monitoring Services Viewer
---
etag: AA==
name: roles/monitoring.snoozeEditor
stage: GA
title: Monitoring Snooze Editor
---
etag: AA==
name: roles/monitoring.snoozeViewer
stage: GA
title: Monitoring Snooze Viewer
---
description: Read/write access to uptime check configurations.
etag: AA==
name: roles/monitoring.uptimeCheckConfigEditor
stage: BETA
title: Monitoring Uptime Check Configuration Editor
---
description: Read-only access to uptime check configurations.
etag: AA==
name: roles/monitoring.uptimeCheckConfigViewer
stage: BETA
title: Monitoring Uptime Check Configuration Viewer
---
description: Read-only access to get and list information about all monitoring data
and configuration.
etag: AA==
name: roles/monitoring.viewer
stage: GA
title: Monitoring Viewer
---
description: Gives the Multi Cluster Ingress service agent access to CloudPlatform
resources.
etag: AA==
name: roles/multiclusteringress.serviceAgent
stage: GA
title: Multi Cluster Ingress Service Agent
---
description: Gives the Multi-cluster metering service agent access to CloudPlatform
resources.
etag: AA==
name: roles/multiclustermetering.serviceAgent
stage: GA
title: Multi-cluster metering Service Agent
---
description: Gives the Multi-Cluster Service Discovery service access to Cloud Platform
resources.
etag: AA==
name: roles/multiclusterservicediscovery.serviceAgent
stage: GA
title: Multi-Cluster Service Discovery Service Agent
---
description: Admin access to Google Home Developer Console resources
etag: AA==
name: roles/nestconsole.homeDeveloperAdmin
stage: GA
title: Google Home Developer Console Admin
---
description: Read-Write access to Google Home Developer Console resources
etag: AA==
name: roles/nestconsole.homeDeveloperEditor
stage: GA
title: Google Home Developer Console Editor
---
description: Read-only access to Google Home Developer Console resources
etag: AA==
name: roles/nestconsole.homeDeveloperViewer
stage: GA
title: Google Home Developer Console Reader
---
description: Full access to Google Cloud NetApp Volumes resources.
etag: AA==
name: roles/netapp.admin
stage: BETA
title: Google Cloud NetApp Volumes Admin
---
description: Readonly access to Google Cloud NetApp Volumes resources.
etag: AA==
name: roles/netapp.viewer
stage: BETA
title: Google Cloud NetApp Volumes Viewer
---
description: This role is managed by NetApp, not Google.
etag: AA==
name: roles/netappcloudvolumes.admin
stage: BETA
title: NetApp Cloud Volumes Admin
---
description: This role is managed by NetApp, not Google.
etag: AA==
name: roles/netappcloudvolumes.viewer
stage: BETA
title: NetApp Cloud Volumes Viewer
---
description: Gives Network Actions service account access to read required resources.
etag: AA==
name: roles/networkactions.serviceAgent
stage: GA
title: Network Actions Service Agent
---
description: Service Automation Consumer Network Admin is responsible for setting
up ServiceConnectionPolicies.
etag: AA==
name: roles/networkconnectivity.consumerNetworkAdmin
stage: GA
title: Service Automation Consumer Network Admin
---
description: Enables use access on group resources
etag: AA==
name: roles/networkconnectivity.groupUser
stage: GA
title: Group User
---
description: Enables full access to hub and spoke resources
etag: AA==
name: roles/networkconnectivity.hubAdmin
stage: GA
title: Hub & Spoke Admin
---
description: Enables read-only access to hub and spoke resources
etag: AA==
name: roles/networkconnectivity.hubViewer
stage: GA
title: Hub & Spoke Viewer
---
description: Full access to all Regional Endpoint resources.
etag: AA==
name: roles/networkconnectivity.regionalEndpointAdmin
stage: BETA
title: Regional Endpoint Admin
---
description: Read-only access to all Regional Endpoint resources.
etag: AA==
name: roles/networkconnectivity.regionalEndpointViewer
stage: BETA
title: Regional Endpoint Viewer
---
description: Grants the Network Connectivity API authority to read some networking
resources. It does not mutate these resources.
etag: AA==
name: roles/networkconnectivity.serviceAgent
stage: GA
title: Network Connectivity Service Agent
---
description: Service Class User uses a ServiceClass
etag: AA==
name: roles/networkconnectivity.serviceClassUser
stage: GA
title: Service Class User
---
description: Service Automation Producer Admin uses information from a consumer request
to manage ServiceClasses and ServiceConnectionMaps
etag: AA==
name: roles/networkconnectivity.serviceProducerAdmin
stage: GA
title: Service Automation Service Producer Admin
---
description: Enables full access to spoke resources and read-only access to hub resources
etag: AA==
name: roles/networkconnectivity.spokeAdmin
stage: GA
title: Spoke Admin
---
description: Full access to Network Management resources.
etag: AA==
name: roles/networkmanagement.admin
stage: GA
title: Network Management Admin
---
description: Grants the GCP Network Management API the authority to complete analysis
based on network configurations from Compute Engine and Container Engine.
etag: AA==
name: roles/networkmanagement.serviceAgent
stage: GA
title: GCP Network Management Service Agent
---
description: Read-only access to Network Management resources.
etag: AA==
name: roles/networkmanagement.viewer
stage: GA
title: Network Management Viewer
---
description: Full access to Notebooks all resources.
etag: AA==
name: roles/notebooks.admin
stage: GA
title: Notebooks Admin
---
description: Full access to Notebooks all resources through compute API.
etag: AA==
name: roles/notebooks.legacyAdmin
stage: GA
title: Notebooks Legacy Admin
---
description: Read-only access to Notebooks all resources through compute API.
etag: AA==
name: roles/notebooks.legacyViewer
stage: GA
title: Notebooks Legacy Viewer
---
description: Restricted access for running scheduled Notebooks.
etag: AA==
name: roles/notebooks.runner
stage: GA
title: Notebooks Runner
---
description: Provide access for notebooks service agent to manage notebook instances
in user projects
etag: AA==
name: roles/notebooks.serviceAgent
stage: GA
title: AI Platform Notebooks Service Agent
---
description: Read-only access to Notebooks all resources.
etag: AA==
name: roles/notebooks.viewer
stage: GA
title: Notebooks Viewer
---
description: Read/write access to OAuth config resources
etag: AA==
name: roles/oauthconfig.editor
stage: BETA
title: OAuth Config Editor
---
description: Read-only access to OAuth config resources
etag: AA==
name: roles/oauthconfig.viewer
stage: BETA
title: OAuth Config Viewer
---
description: All permissions for On-Demand Scanning
etag: AA==
name: roles/ondemandscanning.admin
stage: BETA
title: On-Demand Scanning Admin
---
description: Gives the On-Demand Scanning API the access it needs to function.
etag: AA==
name: roles/ondemandscanning.serviceAgent
stage: GA
title: On-Demand Scanning Service Agent
---
description: Read-only access to resource metadata.
etag: AA==
name: roles/opsconfigmonitoring.resourceMetadata.viewer
stage: BETA
title: Ops Config Monitoring Resource Metadata Viewer
---
description: Write-only access to resource metadata. This provides exactly the permissions
needed by the Ops Config Monitoring metadata agent and other systems that send metadata.
etag: AA==
name: roles/opsconfigmonitoring.resourceMetadata.writer
stage: BETA
title: Ops Config Monitoring Resource Metadata Writer
---
description: The permission to set Organization Policies on resources.
etag: AA==
name: roles/orgpolicy.policyAdmin
stage: GA
title: Organization Policy Administrator
---
description: Access to view Organization Policies on resources.
etag: AA==
name: roles/orgpolicy.policyViewer
stage: GA
title: Organization Policy Viewer
---
description: Full admin access to GuestPolicies
etag: AA==
name: roles/osconfig.guestPolicyAdmin
stage: BETA
title: GuestPolicy Admin
---
description: Editor of GuestPolicy resources
etag: AA==
name: roles/osconfig.guestPolicyEditor
stage: BETA
title: GuestPolicy Editor
---
description: Viewer of GuestPolicy resources
etag: AA==
name: roles/osconfig.guestPolicyViewer
stage: BETA
title: GuestPolicy Viewer
---
description: Viewer of OS Policies Compliance of VM instances
etag: AA==
name: roles/osconfig.instanceOSPoliciesComplianceViewer
stage: BETA
title: InstanceOSPoliciesCompliance Viewer
---
description: Viewer of OS Inventories
etag: AA==
name: roles/osconfig.inventoryViewer
stage: GA
title: OS Inventory Viewer
---
description: Full admin access to OS Policy Assignments
etag: AA==
name: roles/osconfig.osPolicyAssignmentAdmin
stage: GA
title: OSPolicyAssignment Admin
---
description: Editor of OS Policy Assignments
etag: AA==
name: roles/osconfig.osPolicyAssignmentEditor
stage: GA
title: OSPolicyAssignment Editor
---
description: Viewer of OS policy assignment reports for VM instances
etag: AA==
name: roles/osconfig.osPolicyAssignmentReportViewer
stage: GA
title: OSPolicyAssignmentReport Viewer
---
description: Viewer of OS Policy Assignments
etag: AA==
name: roles/osconfig.osPolicyAssignmentViewer
stage: GA
title: OSPolicyAssignment Viewer
---
description: Full admin access to PatchDeployments
etag: AA==
name: roles/osconfig.patchDeploymentAdmin
stage: GA
title: PatchDeployment Admin
---
description: Viewer of PatchDeployment resources
etag: AA==
name: roles/osconfig.patchDeploymentViewer
stage: GA
title: PatchDeployment Viewer
---
description: Access to execute Patch Jobs.
etag: AA==
name: roles/osconfig.patchJobExecutor
stage: GA
title: Patch Job Executor
---
description: Get and list Patch Jobs.
etag: AA==
name: roles/osconfig.patchJobViewer
stage: GA
title: Patch Job Viewer
---
description: Grants OS Config Service Account access to Google Compute Engine instances.
etag: AA==
name: roles/osconfig.serviceAgent
stage: GA
title: Cloud OS Config Service Agent
---
description: Provides read-only access to VM Manager Upgrade Reports
etag: AA==
name: roles/osconfig.upgradeReportViewer
stage: BETA
title: Upgrade Report Viewer
---
description: Viewer of OS VulnerabilityReports
etag: AA==
name: roles/osconfig.vulnerabilityReportViewer
stage: GA
title: OS VulnerabilityReport Viewer
---
description: Full access to most Google Cloud resources. See the list of included
permissions.
etag: AA==
name: roles/owner
stage: GA
title: Owner
---
description: Gives the Parallelstore service agent ability to access customer resources.
etag: AA==
name: roles/parallelstore.serviceAgent
stage: GA
title: Parallelstore Service Agent
---
description: Full access to all Payments Reseller resources, including subscriptions,
products and promotions
etag: AA==
name: roles/paymentsresellersubscription.partnerAdmin
stage: BETA
title: Payments Reseller Admin
---
description: Read access to all Payments Reseller resources, including subscriptions,
products and promotions
etag: AA==
name: roles/paymentsresellersubscription.partnerViewer
stage: BETA
title: Payments Reseller Viewer
---
description: Read access to Payments Reseller Product resource
etag: AA==
name: roles/paymentsresellersubscription.productViewer
stage: BETA
title: Payments Reseller Products Viewer
---
description: Read access to Payments Reseller Promotion resource
etag: AA==
name: roles/paymentsresellersubscription.promotionViewer
stage: BETA
title: Payments Reseller Promotions Viewer
---
description: Write access to Payments Reseller Subscription resource
etag: AA==
name: roles/paymentsresellersubscription.subscriptionEditor
stage: BETA
title: Payments Reseller Subscriptions Editor
---
description: Read access to Payments Reseller Subscription resource
etag: AA==
name: roles/paymentsresellersubscription.subscriptionViewer
stage: BETA
title: Payments Reseller Subscriptions Viewer
---
description: Viewer user that can read all activity analysis.
etag: AA==
name: roles/policyanalyzer.activityAnalysisViewer
stage: BETA
title: Activity Analysis Viewer
---
description: Grants the ability to enable and disable the usage of the policy remediator
for the organization
etag: AA==
name: roles/policyremediatormanager.policyRemediatorAdmin
stage: BETA
title: Policy Remediator Admin
---
description: Grants the ability to read/view the state of the policy remediator for
the organization
etag: AA==
name: roles/policyremediatormanager.policyRemediatorReader
stage: BETA
title: Policy Remediator Reader
---
description: Admin user that can run and access replays.
etag: AA==
name: roles/policysimulator.admin
stage: BETA
title: Simulator Admin
---
description: OrgPolicy Admin that can run and access simulations.
etag: AA==
name: roles/policysimulator.orgPolicyAdmin
stage: BETA
title: OrgPolicy Simulator Admin
---
description: Full access to all CA Service resources.
etag: AA==
name: roles/privateca.admin
stage: GA
title: CA Service Admin
---
description: Read-only access to all CA Service resources.
etag: AA==
name: roles/privateca.auditor
stage: GA
title: CA Service Auditor
---
description: Create and manage CAs, revoke certificates, create certificates templates,
and read-only access for CA Service resources.
etag: AA==
name: roles/privateca.caManager
stage: GA
title: CA Service Operation Manager
---
description: Create certificates and read-only access for CA Service resources.
etag: AA==
name: roles/privateca.certificateManager
stage: GA
title: CA Service Certificate Manager
---
description: Request certificates from CA Service.
etag: AA==
name: roles/privateca.certificateRequester
stage: GA
title: CA Service Certificate Requester
---
description: Read CA Pools in CA Service.
etag: AA==
name: roles/privateca.poolReader
stage: GA
title: CA Service Pool Reader
---
description: Read, list and use certificate templates.
etag: AA==
name: roles/privateca.templateUser
stage: GA
title: CA Service Certificate Template User
---
description: Request certificates from CA Service with caller's identity.
etag: AA==
name: roles/privateca.workloadCertificateRequester
stage: GA
title: CA Service Workload Certificate Requester
---
description: Gives privileged access manager service account access to modify IAM
policies on GCP folders
etag: AA==
name: roles/privilegedaccessmanager.folderServiceAgent
stage: GA
title: Privileged Access Manager Folder Service Agent
---
description: Gives privileged access manager service account access to modify IAM
policies on GCP organizations
etag: AA==
name: roles/privilegedaccessmanager.organizationServiceAgent
stage: GA
title: Privileged Access Manager Organization Service Agent
---
description: Gives privileged access manager service account access to modify IAM
policies on GCP projects
etag: AA==
name: roles/privilegedaccessmanager.projectServiceAgent
stage: GA
title: Privileged Access Manager Project Service Agent
---
description: Can create and delete attachments; can list and get a project's beacons;
can list a project's namespaces.
etag: AA==
name: roles/proximitybeacon.attachmentEditor
stage: GA
title: Beacon Attachment Editor
---
description: Grants necessary permissions to use beacons to create attachments in
namespaces not owned by this project.
etag: AA==
name: roles/proximitybeacon.attachmentPublisher
stage: GA
title: Beacon Attachment Publisher
---
description: Can view all attachments under a namespace; no beacon or namespace permissions.
etag: AA==
name: roles/proximitybeacon.attachmentViewer
stage: GA
title: Beacon Attachment Viewer
---
description: Necessary access to register, modify, and view beacons; no attachment
or namespace permissions.
etag: AA==
name: roles/proximitybeacon.beaconEditor
stage: GA
title: Beacon Editor
---
description: This role can create a new externalAccountKey resource.
etag: AA==
name: roles/publicca.externalAccountKeyCreator
stage: BETA
title: External Account Key Creator
---
description: Full access to topics, subscriptions, and snapshots.
etag: AA==
name: roles/pubsub.admin
stage: GA
title: Pub/Sub Admin
---
description: Modify topics and subscriptions, publish and consume messages.
etag: AA==
name: roles/pubsub.editor
stage: GA
title: Pub/Sub Editor
---
description: Publish messages to a topic.
etag: AA==
name: roles/pubsub.publisher
stage: GA
title: Pub/Sub Publisher
---
description: Grants Cloud Pub/Sub Service Account access to manage resources.
etag: AA==
name: roles/pubsub.serviceAgent
stage: GA
title: Cloud Pub/Sub Service Agent
---
description: Consume messages from a subscription, attach subscriptions to a topic,
and seek to a snapshot.
etag: AA==
name: roles/pubsub.subscriber
stage: GA
title: Pub/Sub Subscriber
---
description: View topics, subscriptions, and snapshots.
etag: AA==
name: roles/pubsub.viewer
stage: GA
title: Pub/Sub Viewer
---
description: Full access to topics, subscriptions and reservations.
etag: AA==
name: roles/pubsublite.admin
stage: GA
title: Pub/Sub Lite Admin
---
description: Modify topics, subscriptions and reservations, publish and consume messages.
etag: AA==
name: roles/pubsublite.editor
stage: GA
title: Pub/Sub Lite Editor
---
description: Publish messages to a topic.
etag: AA==
name: roles/pubsublite.publisher
stage: GA
title: Pub/Sub Lite Publisher
---
description: Grants Pub/Sub Lite Service Agent access to project resources.
etag: AA==
name: roles/pubsublite.serviceAgent
stage: GA
title: Pub/Sub Lite Service Agent
---
description: Subscribe to and read messages from a topic.
etag: AA==
name: roles/pubsublite.subscriber
stage: GA
title: Pub/Sub Lite Subscriber
---
description: View topics, subscriptions and reservations.
etag: AA==
name: roles/pubsublite.viewer
stage: GA
title: Pub/Sub Lite Viewer
---
description: Gives RMA service account access to MC resources.
etag: AA==
name: roles/rapidmigrationassessment.serviceAgent
stage: GA
title: RMA Service Agent
---
description: Full access to publication reader resources
etag: AA==
name: roles/readerrevenuesubscriptionlinking.admin
stage: GA
title: Subscription Linking Admin
---
description: This role can view all publication reader entitlements
etag: AA==
name: roles/readerrevenuesubscriptionlinking.entitlementsViewer
stage: GA
title: Subscription Linking Entitlements Viewer
---
description: This role can view all publication reader resources
etag: AA==
name: roles/readerrevenuesubscriptionlinking.viewer
stage: GA
title: Subscription Linking Viewer
---
description: Access to view and modify reCAPTCHA Enterprise keys
etag: AA==
name: roles/recaptchaenterprise.admin
stage: BETA
title: reCAPTCHA Enterprise Admin
---
description: Access to create and annotate reCAPTCHA Enterprise assessments
etag: AA==
name: roles/recaptchaenterprise.agent
stage: BETA
title: reCAPTCHA Enterprise Agent
---
description: Access to view reCAPTCHA Enterprise keys and metrics
etag: AA==
name: roles/recaptchaenterprise.viewer
stage: BETA
title: reCAPTCHA Enterprise Viewer
---
description: Admin of BigQuery Capacity Commitments insights and recommendations.
etag: AA==
name: roles/recommender.bigQueryCapacityCommitmentsAdmin
stage: BETA
title: BigQuery Slot Recommender Admin
---
description: Billing Account Admin of BigQuery Capacity Commitments insights and recommendations.
etag: AA==
name: roles/recommender.bigQueryCapacityCommitmentsBillingAccountAdmin
stage: BETA
title: BigQuery Recommender Billing Account Admin
---
description: Billing Account Viewer of BigQuery Capacity Commitments insights and
recommendations.
etag: AA==
name: roles/recommender.bigQueryCapacityCommitmentsBillingAccountViewer
stage: BETA
title: BigQuery Recommender Billing Account Viewer
---
description: Project Admin of BigQuery Capacity Commitments insights and recommendations.
etag: AA==
name: roles/recommender.bigQueryCapacityCommitmentsProjectAdmin
stage: BETA
title: BigQuery Recommender Project Admin
---
description: Project Viewer of BigQuery Capacity Commitments insights and recommendations.
etag: AA==
name: roles/recommender.bigQueryCapacityCommitmentsProjectViewer
stage: BETA
title: BigQuery Recommender Project Viewer
---
description: Viewer of BigQuery Capacity Commitments insights and recommendations.
etag: AA==
name: roles/recommender.bigQueryCapacityCommitmentsViewer
stage: BETA
title: BigQuery Slot Recommender Viewer
---
description: Admin of BigQuery Partitioning Clustering recommendations.
etag: AA==
name: roles/recommender.bigqueryPartitionClusterAdmin
stage: BETA
title: BigQuery Partitioning Clustering Recommender Admin
---
description: Viewer of BigQuery Partitioning Clustering recommendations.
etag: AA==
name: roles/recommender.bigqueryPartitionClusterViewer
stage: BETA
title: BigQuery Partitioning Clustering Recommender Viewer
---
description: Admin of Billing Account Usage Commitment Recommender.
etag: AA==
name: roles/recommender.billingAccountCudAdmin
stage: BETA
title: Billing Account Usage Commitment Recommender Admin
---
description: Viewer of Billing Account Usage Commitment Recommender.
etag: AA==
name: roles/recommender.billingAccountCudViewer
stage: BETA
title: Billing Account Usage Commitment Recommender Viewer
---
description: Admin of all Cloud Asset insights.
etag: AA==
name: roles/recommender.cloudAssetInsightsAdmin
stage: GA
title: Cloud Asset Insights Admin
---
description: Viewer of all Cloud Asset insights.
etag: AA==
name: roles/recommender.cloudAssetInsightsViewer
stage: GA
title: Cloud Asset Insights Viewer
---
description: Admin of Cloud Cost General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudCostRecommendationAdmin
stage: BETA
title: Cloud Cost General Recommendations Recommender Admin
---
description: Viewer of Cloud Cost General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudCostRecommendationViewer
stage: BETA
title: Cloud Cost General Recommendations Recommender Viewer
---
description: Admin of Cloud Deprecation General Recommender Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudDeprecationRecommendationAdmin
stage: BETA
title: Cloud Deprecation General Recommender Admin
---
description: Viewer of Cloud Deprecation General Recommender Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudDeprecationRecommendationViewer
stage: BETA
title: Cloud Deprecation General Recommender Viewer
---
description: Admin of Cloud Manageability General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudManageabilityRecommendationAdmin
stage: BETA
title: Cloud Manageability General Recommendations Recommender Admin
---
description: Viewer of Cloud Manageability General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudManageabilityRecommendationViewer
stage: BETA
title: Cloud Manageability General Recommendations Recommender Viewer
---
description: Admin of Cloud Performance General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudPerformanceRecommendationAdmin
stage: BETA
title: Cloud Performance General Recommendations Recommender Admin
---
description: Viewer of Cloud Performance General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudPerformanceRecommendationViewer
stage: BETA
title: Cloud Performance General Recommendations Recommender Viewer
---
description: Admin of Cloud Reliability General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudReliabilityRecommendationAdmin
stage: BETA
title: Cloud Reliability General Recommendations Recommender Admin
---
description: Viewer of Cloud Reliability General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudReliabilityRecommendationViewer
stage: BETA
title: Cloud Reliability General Recommendations Recommender Viewer
---
description: Admin of Cloud Security General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudSecurityRecommendationAdmin
stage: BETA
title: Cloud Security General Recommendations Recommender Admin
---
description: Viewer of Cloud Security General Recommendations Insights and Recommendations.
etag: AA==
name: roles/recommender.cloudSecurityRecommendationViewer
stage: BETA
title: Cloud Security General Recommendations Recommender Viewer
---
description: Admin of Cloud SQL insights and recommendations.
etag: AA==
name: roles/recommender.cloudsqlAdmin
stage: BETA
title: Cloud SQL Recommender Admin
---
description: Viewer of Cloud SQL insights and recommendations.
etag: AA==
name: roles/recommender.cloudsqlViewer
stage: BETA
title: Cloud SQL Recommender Viewer
---
description: Admin of compute recommendations.
etag: AA==
name: roles/recommender.computeAdmin
stage: GA
title: Compute Recommender Admin
---
description: Viewer of compute recommendations.
etag: AA==
name: roles/recommender.computeViewer
stage: GA
title: Compute Recommender Viewer
---
description: Admin of GKE Diagnosis Insights and Recommendations.
etag: AA==
name: roles/recommender.containerDiagnosisAdmin
stage: GA
title: GKE Diagnosis Recommender Admin
---
description: Viewer of GKE Diagnosis Insights and Recommendations.
etag: AA==
name: roles/recommender.containerDiagnosisViewer
stage: GA
title: GKE Diagnosis Recommender Viewer
---
description: Admin of Diagnostics recommendations.
etag: AA==
name: roles/recommender.dataflowDiagnosticsAdmin
stage: GA
title: Dataflow Diagnostics Admin
---
description: Viewer of Diagnostics recommendations.
etag: AA==
name: roles/recommender.dataflowDiagnosticsViewer
stage: GA
title: Dataflow Diagnostics Viewer
---
description: Admin of Error Reporting Insights and Recommendations.
etag: AA==
name: roles/recommender.errorReportingAdmin
stage: GA
title: Error Reporting Recommender Admin
---
description: Viewer of Error Reporting Insights and Recommendations.
etag: AA==
name: roles/recommender.errorReportingViewer
stage: GA
title: Error Reporting Recommender Viewer
---
description: Exporter of Recommendations
etag: AA==
name: roles/recommender.exporter
stage: GA
title: Recommendations Exporter
---
description: Admin of Firewall insights and recommendations.
etag: AA==
name: roles/recommender.firewallAdmin
stage: GA
title: Firewall Recommender Admin
---
description: Viewer of Firewall insights and recommendations.
etag: AA==
name: roles/recommender.firewallViewer
stage: GA
title: Firewall Recommender Viewer
---
description: Admin of all Google Maps Platform insights and recommendations.
etag: AA==
name: roles/recommender.gmpAdmin
stage: GA
title: Google Maps Platform Insights/Recommendations Admin
---
description: Viewer of all Google Maps Platform insights and recommendations.
etag: AA==
name: roles/recommender.gmpViewer
stage: GA
title: Google Maps Platform Insights/Recommendations Viewer
---
description: Admin of IAM recommendations.
etag: AA==
name: roles/recommender.iamAdmin
stage: GA
title: IAM Recommender Admin
---
description: Viewer of IAM recommendations.
etag: AA==
name: roles/recommender.iamViewer
stage: GA
title: IAM Recommender Viewer
---
description: Admin of IAM Policy Change Risk Insights and Recommendations.
etag: AA==
name: roles/recommender.iampolicychangeriskAdmin
stage: BETA
title: IAM Policy Change Risk Recommender Admin
---
description: Viewer of IAM Policy Change Risk Insights and Recommendations.
etag: AA==
name: roles/recommender.iampolicychangeriskViewer
stage: BETA
title: IAM Policy Change Risk Recommender Viewer
---
description: Admin of Network Analyzer Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerAdmin
stage: GA
title: Network Analyzer Recommender Admin
---
description: Admin of Network Analyzer Cloud SQL Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerCloudSqlAdmin
stage: GA
title: Network Analyzer Cloud SQL Recommender Admin
---
description: Viewer of Network Analyzer Cloud SQL Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerCloudSqlViewer
stage: GA
title: Network Analyzer Cloud SQL Recommender Viewer
---
description: Admin of Network Analyzer Dynamic Route Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerDynamicRouteAdmin
stage: GA
title: Network Analyzer Dynamic Route Recommender Admin
---
description: Viewer of Network Analyzer Dynamic Route Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerDynamicRouteViewer
stage: GA
title: Network Analyzer Dynamic Route Recommender Viewer
---
description: Admin of Network Analyzer GKE Connectivity Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerGkeConnectivityAdmin
stage: GA
title: Network Analyzer GKE Connectivity Recommender Admin
---
description: Viewer of Network Analyzer GKE Connectivity Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerGkeConnectivityViewer
stage: GA
title: Network Analyzer GKE Connectivity Recommender Viewer
---
description: Admin of Network Analyzer GKE IP Address Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerGkeIpAddressAdmin
stage: GA
title: Network Analyzer GKE IP Address Recommender Admin
---
description: Viewer of Network Analyzer GKE IP Address Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerGkeIpAddressViewer
stage: GA
title: Network Analyzer GKE IP Address Recommender Viewer
---
description: Admin of Network Analyzer GKE Service Account Insights Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerGkeServiceAccountAdmin
stage: GA
title: Network Analyzer GKE Service Account Insights Recommender Admin
---
description: Viewer of Network Analyzer GKE Service Account Insights Insights and
Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerGkeServiceAccountViewer
stage: GA
title: Network Analyzer GKE Service Account Insights Recommender Viewer
---
description: Admin of Network Analyzer IP Address Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerIpAddressAdmin
stage: GA
title: Network Analyzer IP Address Recommender Admin
---
description: Viewer of Network Analyzer IP Address Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerIpAddressViewer
stage: GA
title: Network Analyzer IP Address Recommender Viewer
---
description: Admin of Network Analyzer Load Balancer Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerLoadBalancerAdmin
stage: GA
title: Network Analyzer Load Balancer Recommender Admin
---
description: Viewer of Network Analyzer Load Balancer Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerLoadBalancerViewer
stage: GA
title: Network Analyzer Load Balancer Recommender Viewer
---
description: Viewer of Network Analyzer Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerViewer
stage: GA
title: Network Analyzer Recommender Viewer
---
description: Admin of Network Analyzer VPC Connectivity Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerVpcConnectivityAdmin
stage: GA
title: Network Analyzer VPC Connectivity Recommender Admin
---
description: Viewer of Network Analyzer VPC Connectivity Insights and Recommendations.
etag: AA==
name: roles/recommender.networkAnalyzerVpcConnectivityViewer
stage: GA
title: Network Analyzer VPC Connectivity Recommender Viewer
---
description: Admin of all Product Suggestion insights and recommendations.
etag: AA==
name: roles/recommender.productSuggestionAdmin
stage: BETA
title: Product Suggestion Recommenders Admin
---
description: Viewer of all Product Suggestion insights and recommendations.
etag: AA==
name: roles/recommender.productSuggestionViewer
stage: BETA
title: Product Suggestion Recommenders Viewer
---
description: Admin of Project Usage Commitment Recommender.
etag: AA==
name: roles/recommender.projectCudAdmin
stage: BETA
title: Project Usage Commitment Recommender Admin
---
description: Viewer of Project Usage Commitment Recommender.
etag: AA==
name: roles/recommender.projectCudViewer
stage: BETA
title: Project Usage Commitment Recommender Viewer
---
description: Admin of Project Utilization insights and recommendations.
etag: AA==
name: roles/recommender.projectUtilAdmin
stage: GA
title: Project Utilization Recommender Admin
---
description: Viewer of Project Utilization insights and recommendations.
etag: AA==
name: roles/recommender.projectUtilViewer
stage: GA
title: Project Utilization Recommender Viewer
---
description: Admin of Service Limit insights and recommendations.
etag: AA==
name: roles/recommender.serviceLimitAdmin
stage: BETA
title: Service Limit Recommender Admin
---
description: Viewer of Service Limit insights and recommendations.
etag: AA==
name: roles/recommender.serviceLimitViewer
stage: BETA
title: Service Limit Recommender Viewer
---
description: Admin of Service Account Change Risk Insights and Recommendations.
etag: AA==
name: roles/recommender.serviceaccntchangeriskAdmin
stage: BETA
title: Service Account Change Risk Recommender Admin
---
description: Viewer of Service Account Change Risk Insights and Recommendations.
etag: AA==
name: roles/recommender.serviceaccntchangeriskViewer
stage: BETA
title: Service Account Change Risk Recommender Viewer
---
description: Admin of Spend Based Commitment Recommender.
etag: AA==
name: roles/recommender.ucsAdmin
stage: BETA
title: Spend Based Commitment Recommender Admin
---
description: Viewer of Spend Based Commitment Recommender.
etag: AA==
name: roles/recommender.ucsViewer
stage: BETA
title: Spend Based Commitment Recommender Viewer
---
description: Enables Get and List operations.
etag: AA==
name: roles/recommender.viewer
stage: GA
title: Recommender Viewer
---
description: Full access to Redis instances and related resources.
etag: AA==
name: roles/redis.admin
stage: GA
title: Cloud Memorystore Redis Admin
---
description: Access to connecting to Redis Server db.
etag: AA==
name: roles/redis.dbConnectionUser
stage: BETA
title: Cloud Memorystore Redis Db Connection User
---
description: Read-Write access to Redis instances and related resources.
etag: AA==
name: roles/redis.editor
stage: GA
title: Cloud Memorystore Redis Editor
---
description: Gives Cloud Memorystore Redis service account access to managed resource
etag: AA==
name: roles/redis.serviceAgent
stage: GA
title: Cloud Memorystore Redis Service Agent
---
description: Read-only access to Redis instances and related resources.
etag: AA==
name: roles/redis.viewer
stage: GA
title: Cloud Memorystore Redis Viewer
---
description: This role is managed by Redis Labs, not Google.
etag: AA==
name: roles/redisenterprisecloud.admin
stage: BETA
title: Redis Enterprise Cloud Admin
---
description: This role is managed by Redis Labs, not Google.
etag: AA==
name: roles/redisenterprisecloud.viewer
stage: BETA
title: Redis Enterprise Cloud Viewer
---
description: Remote Build Execution Action Cache Writer
etag: AA==
name: roles/remotebuildexecution.actionCacheWriter
stage: BETA
title: Remote Build Execution Action Cache Writer
---
description: Remote Build Execution Artifact Admin
etag: AA==
name: roles/remotebuildexecution.artifactAdmin
stage: BETA
title: Remote Build Execution Artifact Admin
---
description: Remote Build Execution Artifact Creator
etag: AA==
name: roles/remotebuildexecution.artifactCreator
stage: BETA
title: Remote Build Execution Artifact Creator
---
description: Remote Build Execution Artifact Viewer
etag: AA==
name: roles/remotebuildexecution.artifactViewer
stage: BETA
title: Remote Build Execution Artifact Viewer
---
description: Remote Build Execution Configuration Admin
etag: AA==
name: roles/remotebuildexecution.configurationAdmin
stage: BETA
title: Remote Build Execution Configuration Admin
---
description: Remote Build Execution Configuration Viewer
etag: AA==
name: roles/remotebuildexecution.configurationViewer
stage: BETA
title: Remote Build Execution Configuration Viewer
---
description: Remote Build Execution Logstream Writer
etag: AA==
name: roles/remotebuildexecution.logstreamWriter
stage: BETA
title: Remote Build Execution Logstream Writer
---
description: Remote Build Execution Reservation Admin
etag: AA==
name: roles/remotebuildexecution.reservationAdmin
stage: BETA
title: Remote Build Execution Reservation Admin
---
description: Gives Remote Build Execution service account access to managed resources.
etag: AA==
name: roles/remotebuildexecution.serviceAgent
stage: GA
title: Remote Build Execution Service Agent
---
description: Remote Build Execution Worker
etag: AA==
name: roles/remotebuildexecution.worker
stage: BETA
title: Remote Build Execution Worker
---
description: Access and administer a folder and all of its sub-resources.
etag: AA==
name: roles/resourcemanager.folderAdmin
stage: GA
title: Folder Admin
---
description: Create folder and view all of its sub-resources.
etag: AA==
name: roles/resourcemanager.folderCreator
stage: GA
title: Folder Creator
---
description: Edit, delete, and undelete a folder and all of its child resources.
etag: AA==
name: roles/resourcemanager.folderEditor
stage: GA
title: Folder Editor
---
description: Access and administer a folder IAM policies.
etag: AA==
name: roles/resourcemanager.folderIamAdmin
stage: GA
title: Folder IAM Admin
---
description: Move a folder and all of its child resources.
etag: AA==
name: roles/resourcemanager.folderMover
stage: GA
title: Folder Mover
---
description: Access to view a folder and all of its child resources.
etag: AA==
name: roles/resourcemanager.folderViewer
stage: GA
title: Folder Viewer
---
description: Access to modify Liens on projects.
etag: AA==
name: roles/resourcemanager.lienModifier
stage: GA
title: Project Lien Modifier
---
description: Access to manage IAM policies and view organization policies for organizations,
folders, and projects.
etag: AA==
name: roles/resourcemanager.organizationAdmin
stage: GA
title: Organization Administrator
---
description: Access only to view an Organization.
etag: AA==
name: roles/resourcemanager.organizationViewer
stage: GA
title: Organization Viewer
---
description: Access to create new GCP projects.
etag: AA==
name: roles/resourcemanager.projectCreator
stage: GA
title: Project Creator
---
description: Access to delete GCP projects.
etag: AA==
name: roles/resourcemanager.projectDeleter
stage: GA
title: Project Deleter
---
description: Access and administer a project IAM policies.
etag: AA==
name: roles/resourcemanager.projectIamAdmin
stage: GA
title: Project IAM Admin
---
description: Access to update and move a project
etag: AA==
name: roles/resourcemanager.projectMover
stage: GA
title: Project Mover
---
description: Access to create, delete, update, and manage access to Tags
etag: AA==
name: roles/resourcemanager.tagAdmin
stage: GA
title: Tag Administrator
---
description: Access to create, delete and list TagHolds under a TagValue
etag: AA==
name: roles/resourcemanager.tagHoldAdmin
stage: GA
title: Tag Hold Administrator
---
description: Access to list Tags and manage their associations with resources
etag: AA==
name: roles/resourcemanager.tagUser
stage: GA
title: Tag User
---
description: Access to list Tags and their associations with resources
etag: AA==
name: roles/resourcemanager.tagViewer
stage: GA
title: Tag Viewer
---
description: Provides admin capabilities to set Resource Setting Values on resources.
etag: AA==
name: roles/resourcesettings.admin
stage: GA
title: Resource Settings Administrator
---
description: Provides capabilities to view Resource Settings and Resource Setting
Values on resources.
etag: AA==
name: roles/resourcesettings.viewer
stage: GA
title: Resource Settings Viewer
---
description: Full access to Retail api resources.
etag: AA==
name: roles/retail.admin
stage: GA
title: Retail Admin
---
description: Full access to Retail api resources except purge, rejoin, and setSponsorship.
etag: AA==
name: roles/retail.editor
stage: GA
title: Retail Editor
---
description: Retail service uploads product feeds and user events from Cloud Storage
and BigQuery, reports results to the customer Cloud Storage bucket, writes logs
to customer projects, and writes and reads Stackdriver metrics for customer projects.
etag: AA==
name: roles/retail.serviceAgent
stage: GA
title: Retail Service Agent
---
description: Grants access to read all resources in Retail.
etag: AA==
name: roles/retail.viewer
stage: GA
title: Retail Viewer
---
description: Read/write access to RISC config resources.
etag: AA==
name: roles/riscconfigs.admin
stage: BETA
title: RISC Configuration Admin
---
description: Read-only access to RISC config resources.
etag: AA==
name: roles/riscconfigs.viewer
stage: BETA
title: RISC Configuration Viewer
---
description: Grants all Risk Manager permissions
etag: AA==
name: roles/riskmanager.admin
stage: BETA
title: Risk Manager Admin
---
description: Access to edit Risk Manager resources
etag: AA==
name: roles/riskmanager.editor
stage: BETA
title: Risk Manager Editor
---
description: Access to review Risk Manager reports
etag: AA==
name: roles/riskmanager.reviewer
stage: BETA
title: Risk Manager Report Reviewer
---
description: Service agent that grants Risk Manager service access to fetch findings
for generating Reports
etag: AA==
name: roles/riskmanager.serviceAgent
stage: GA
title: Risk Manager Service Agent
---
description: Access to view Risk Manager resources
etag: AA==
name: roles/riskmanager.viewer
stage: BETA
title: Risk Manager Viewer
---
description: Full access to Rapid Migration Assessment all resources.
etag: AA==
name: roles/rma.admin
stage: GA
title: Rapid Migration Assessment Admin
---
description: Update and Read access to Rapid Migration Assessment all resources.
etag: AA==
name: roles/rma.runner
stage: GA
title: Rapid Migration Assessment Runner
---
description: Read-only access to Rapid Migration Assessment all resources.
etag: AA==
name: roles/rma.viewer
stage: GA
title: Rapid Migration Assessment Viewer
---
description: Full control over all Cloud Run resources.
etag: AA==
name: roles/run.admin
stage: GA
title: Cloud Run Admin
---
description: Read and write access to all Cloud Run resources.
etag: AA==
name: roles/run.developer
stage: GA
title: Cloud Run Developer
---
description: Can invoke a Cloud Run service.
etag: AA==
name: roles/run.invoker
stage: GA
title: Cloud Run Invoker
---
description: Gives Cloud Run service account access to managed resources.
etag: AA==
name: roles/run.serviceAgent
stage: GA
title: Cloud Run Service Agent
---
description: Can view the state of all Cloud Run resources, including IAM policies.
etag: AA==
name: roles/run.viewer
stage: GA
title: Cloud Run Viewer
---
description: Access to create and change Serverless Integrations and their configuration.
etag: AA==
name: roles/runapps.developer
stage: BETA
title: Serverless Integrations Developer
---
description: Access to deploy Serverless Integrations.
etag: AA==
name: roles/runapps.operator
stage: BETA
title: Serverless Integrations Operator
---
description: Gives Serverless Integrations Service Account access to customer project
resources.
etag: AA==
name: roles/runapps.serviceAgent
stage: GA
title: Serverless Integrations Service Agent
---
description: Readonly access to Serverless Integrations resources.
etag: AA==
name: roles/runapps.viewer
stage: BETA
title: Serverless Integrations Viewer
---
description: Full access to RuntimeConfig resources.
etag: AA==
name: roles/runtimeconfig.admin
stage: GA
title: Cloud RuntimeConfig Admin
---
description: Full access to administer Secret Manager resources.
etag: AA==
name: roles/secretmanager.admin
stage: GA
title: Secret Manager Admin
---
description: Allows accessing the payload of secrets.
etag: AA==
name: roles/secretmanager.secretAccessor
stage: GA
title: Secret Manager Secret Accessor
---
description: Allows adding versions to existing secrets.
etag: AA==
name: roles/secretmanager.secretVersionAdder
stage: GA
title: Secret Manager Secret Version Adder
---
description: Allows creating and managing versions of existing secrets.
etag: AA==
name: roles/secretmanager.secretVersionManager
stage: GA
title: Secret Manager Secret Version Manager
---
description: Allows viewing metadata of all Secret Manager resources
etag: AA==
name: roles/secretmanager.viewer
stage: GA
title: Secret Manager Viewer
---
description: Access to modify (remediate) resources in SLZ BQDW Blueprint at Organization.
etag: AA==
name: roles/securedlandingzone.bqdwOrgRemediator
stage: BETA
title: SLZ BQDW Blueprint Organization Level Remediator
---
description: Access to modify (remediate) resources in SLZ BQDW Blueprint at Project.
etag: AA==
name: roles/securedlandingzone.bqdwProjectRemediator
stage: BETA
title: SLZ BQDW Blueprint Project Level Remediator
---
description: This role can activate or suspend Overwatches
etag: AA==
name: roles/securedlandingzone.overwatchActivator
stage: BETA
title: Overwatch Activator
---
description: Full access to Overwatches
etag: AA==
name: roles/securedlandingzone.overwatchAdmin
stage: BETA
title: Overwatch Admin
---
description: This role can view all properties of Overwatches
etag: AA==
name: roles/securedlandingzone.overwatchViewer
stage: BETA
title: Overwatch Viewer
---
description: Grants Secured Landing Zone service account permissions to manage resources
in the customer project
etag: AA==
name: roles/securedlandingzone.serviceAgent
stage: GA
title: Secured Landing Zone Service Agent
---
description: Full access to all Secure Source Manager resources.
etag: AA==
name: roles/securesourcemanager.admin
stage: BETA
title: Secure Source Manager Admin
---
description: An instance accessor can access an instance, but not necessarily create
resources in the instance.
etag: AA==
name: roles/securesourcemanager.instanceAccessor
stage: BETA
title: Secure Source Manager Instance Accessor
---
description: Read-write access to all Secure Source Manager resources (full control
except for the ability to modify permissions).
etag: AA==
name: roles/securesourcemanager.instanceManager
stage: BETA
title: Secure Source Manager Instance Manager
---
description: Full control over Secure Source Manager instances, including listing,
creating, and deleting them. Also enables instance user management.
etag: AA==
name: roles/securesourcemanager.instanceOwner
stage: BETA
title: Secure Source Manager Instance Owner
---
description: An instance repository creator can connect to a Cloud Git instance via
IAP (HTTPS) and create repositories in the instance.
etag: AA==
name: roles/securesourcemanager.instanceRepositoryCreator
stage: BETA
title: Secure Source Manager Instance Repository Creator
---
description: A repoAdmin has the ability to CRUD a repository and its children as
well as assign users to a repository. They can also set, get, or check IAM policies
on the repository.
etag: AA==
name: roles/securesourcemanager.repoAdmin
stage: BETA
title: Secure Source Manager Repository Admin
---
description: A repoCreator has access to create repostiory in a project, the creator
will then become the repoAdmin on this repository.
etag: AA==
name: roles/securesourcemanager.repoCreator
stage: BETA
title: Secure Source Manager Repository Creator
---
description: A repoReader has read access to a particular repository, including its
child components. They cannot create repositories, and do not manage IAM policies
on the repository.
etag: AA==
name: roles/securesourcemanager.repoReader
stage: BETA
title: Secure Source Manager Repository Reader
---
description: A repoWriter has read/write access to a particular repository, including
its child components. They cannot create repositories, and do not manage IAM policies
on the repository.
etag: AA==
name: roles/securesourcemanager.repoWriter
stage: BETA
title: Secure Source Manager Repository Writer
---
description: An sshKeyUser can create SSH keys for themselves and list/delete SSH
keys they own.
etag: AA==
name: roles/securesourcemanager.sshKeyUser
stage: BETA
title: Secure Source Manager SSH Key User
---
description: Admin(super user) access to security center
etag: AA==
name: roles/securitycenter.admin
stage: GA
title: Security Center Admin
---
description: Admin Read-write access to security center
etag: AA==
name: roles/securitycenter.adminEditor
stage: GA
title: Security Center Admin Editor
---
description: Admin Read access to security center
etag: AA==
name: roles/securitycenter.adminViewer
stage: GA
title: Security Center Admin Viewer
---
description: Write access to asset security marks
etag: AA==
name: roles/securitycenter.assetSecurityMarksWriter
stage: GA
title: Security Center Asset Security Marks Writer
---
description: Run asset discovery access to assets
etag: AA==
name: roles/securitycenter.assetsDiscoveryRunner
stage: GA
title: Security Center Assets Discovery Runner
---
description: Read access to assets
etag: AA==
name: roles/securitycenter.assetsViewer
stage: GA
title: Security Center Assets Viewer
---
description: Read access to security center attack paths
etag: AA==
name: roles/securitycenter.attackPathsViewer
stage: GA
title: Security Center Attack Paths Reader
---
description: Security Center automation service agent can configure GCP resources
to enable security scanning.
etag: AA==
name: roles/securitycenter.automationServiceAgent
stage: GA
title: Security Center Automation Service Agent
---
description: Read-Write access to security center BigQuery Exports
etag: AA==
name: roles/securitycenter.bigQueryExportsEditor
stage: GA
title: Security Center BigQuery Exports Editor
---
description: Read access to security center BigQuery Exports
etag: AA==
name: roles/securitycenter.bigQueryExportsViewer
stage: GA
title: Security Center BigQuery Exports Viewer
---
description: Read access to security center compliance snapshots
etag: AA==
name: roles/securitycenter.complianceSnapshotsViewer
stage: BETA
title: Security Center Compliance Snapshots Viewer
---
description: Security Center Control service agent can monitor and configure GCP resources
and import security findings.
etag: AA==
name: roles/securitycenter.controlServiceAgent
stage: GA
title: Security Center Control Service Agent
---
description: Write access to security center external systems
etag: AA==
name: roles/securitycenter.externalSystemsEditor
stage: GA
title: Security Center External Systems Editor
---
description: Write access to finding security marks
etag: AA==
name: roles/securitycenter.findingSecurityMarksWriter
stage: GA
title: Security Center Finding Security Marks Writer
---
description: Ability to mute findings in bulk
etag: AA==
name: roles/securitycenter.findingsBulkMuteEditor
stage: GA
title: Security Center Findings Bulk Mute Editor
---
description: Read-write access to findings
etag: AA==
name: roles/securitycenter.findingsEditor
stage: GA
title: Security Center Findings Editor
---
description: Set mute access to findings
etag: AA==
name: roles/securitycenter.findingsMuteSetter
stage: GA
title: Security Center Findings Mute Setter
---
description: Set state access to findings
etag: AA==
name: roles/securitycenter.findingsStateSetter
stage: GA
title: Security Center Findings State Setter
---
description: Read access to findings
etag: AA==
name: roles/securitycenter.findingsViewer
stage: GA
title: Security Center Findings Viewer
---
description: Set workflow state access to findings
etag: AA==
name: roles/securitycenter.findingsWorkflowStateSetter
stage: BETA
title: Security Center Findings Workflow State Setter
---
description: Gives Security Center access to execute Integrations.
etag: AA==
name: roles/securitycenter.integrationExecutorServiceAgent
stage: GA
title: Security Center Integration Executor Service Agent
---
description: Read-Write access to security center mute configurations
etag: AA==
name: roles/securitycenter.muteConfigsEditor
stage: GA
title: Security Center Mute Configurations Editor
---
description: Read access to security center mute configurations
etag: AA==
name: roles/securitycenter.muteConfigsViewer
stage: GA
title: Security Center Mute Configurations Viewer
---
description: Write access to notification configurations
etag: AA==
name: roles/securitycenter.notificationConfigEditor
stage: GA
title: Security Center Notification Configurations Editor
---
description: Read access to notification configurations
etag: AA==
name: roles/securitycenter.notificationConfigViewer
stage: GA
title: Security Center Notification Configurations Viewer
---
description: Security Center service agent can publish notifications to Pub/Sub topics.
etag: AA==
name: roles/securitycenter.notificationServiceAgent
stage: GA
title: Security Center Notification Service Agent
---
description: Read-Write access to security center resource value configurations
etag: AA==
name: roles/securitycenter.resourceValueConfigsEditor
stage: GA
title: Security Center Resource Value Configurations Editor
---
description: Read access to security center resource value configurations
etag: AA==
name: roles/securitycenter.resourceValueConfigsViewer
stage: GA
title: Security Center Resource Value Configurations Viewer
---
description: Test access to Security Health Analytics Custom Modules
etag: AA==
name: roles/securitycenter.securityHealthAnalyticsCustomModulesTester
stage: GA
title: Security Health Analytics Custom Modules Tester
---
description: Security Health Analytics service agent can scan GCP resource metadata
to find security vulnerabilities.
etag: AA==
name: roles/securitycenter.securityHealthAnalyticsServiceAgent
stage: GA
title: Security Health Analytics Service Agent
---
description: Gives Playbook Runner permissions to execute all Google authored Playbooks.
This role will keep evolving as we add more playbooks
etag: AA==
name: roles/securitycenter.securityResponseServiceAgent
stage: GA
title: Google Cloud Security Response Service Agent
---
description: Security Center service agent can scan GCP resources and import security
scans.
etag: AA==
name: roles/securitycenter.serviceAgent
stage: GA
title: Security Center Service Agent
---
description: Admin(super user) access to security center settings
etag: AA==
name: roles/securitycenter.settingsAdmin
stage: GA
title: Security Center Settings Admin
---
description: Read-Write access to security center settings
etag: AA==
name: roles/securitycenter.settingsEditor
stage: GA
title: Security Center Settings Editor
---
description: Read access to security center settings
etag: AA==
name: roles/securitycenter.settingsViewer
stage: GA
title: Security Center Settings Viewer
---
description: Read access to security center simulations
etag: AA==
name: roles/securitycenter.simulationsViewer
stage: GA
title: Security Center Simulations Reader
---
description: Admin access to sources
etag: AA==
name: roles/securitycenter.sourcesAdmin
stage: GA
title: Security Center Sources Admin
---
description: Read-write access to sources
etag: AA==
name: roles/securitycenter.sourcesEditor
stage: GA
title: Security Center Sources Editor
---
description: Read access to sources
etag: AA==
name: roles/securitycenter.sourcesViewer
stage: GA
title: Security Center Sources Viewer
---
description: Read access to security center valued resources
etag: AA==
name: roles/securitycenter.valuedResourcesViewer
stage: GA
title: Security Center Valued Resources Reader
---
description: Full access to manage Cloud Security Command Center custom modules.
etag: AA==
name: roles/securitycentermanagement.customModulesEditor
stage: GA
title: Security Center Management Custom Modules Editor
---
description: Readonly access to Cloud Security Command Center custom modules.
etag: AA==
name: roles/securitycentermanagement.customModulesViewer
stage: GA
title: Security Center Management Custom Modules Viewer
---
description: Full access to manage Cloud Security Command Center ETD custom modules.
etag: AA==
name: roles/securitycentermanagement.etdCustomModulesEditor
stage: GA
title: Security Center Management Custom ETD Modules Editor
---
description: Readonly access to Cloud Security Command Center ETD custom modules.
etag: AA==
name: roles/securitycentermanagement.etdCustomModulesViewer
stage: GA
title: Security Center Management ETD Custom Modules Viewer
---
description: Full access to manage Cloud Security Command Center SHA custom modules.
etag: AA==
name: roles/securitycentermanagement.shaCustomModulesEditor
stage: GA
title: Security Center Management SHA Custom Modules Editor
---
description: Readonly access to Cloud Security Command Center SHA custom modules.
etag: AA==
name: roles/securitycentermanagement.shaCustomModulesViewer
stage: GA
title: Security Center Management SHA Custom Modules Viewer
---
description: Full access to Security Posture service APIs.
etag: AA==
name: roles/securityposture.admin
stage: GA
title: Security Posture Admin
---
description: Mutate and read permissions to the Posture Deployment resource.
etag: AA==
name: roles/securityposture.postureDeployer
stage: GA
title: Security Posture Deployer
---
description: Read only access to the Posture Deployment resource.
etag: AA==
name: roles/securityposture.postureDeploymentsViewer
stage: GA
title: Security Posture Deployments Viewer
---
description: Mutate and read permissions to the Posture resource.
etag: AA==
name: roles/securityposture.postureEditor
stage: GA
title: Security Posture Resource Editor
---
description: Read only access to the Posture resource.
etag: AA==
name: roles/securityposture.postureViewer
stage: GA
title: Security Posture Resource Viewer
---
description: Create access for Reports, e.g. IaC Validation Report.
etag: AA==
name: roles/securityposture.reportCreator
stage: GA
title: Security Posture Shift-Left Validator
---
description: Read only access to all the SecurityPosture Service resources.
etag: AA==
name: roles/securityposture.viewer
stage: GA
title: Security Posture Viewer
---
description: Gives Cloud Run service account access to managed resources.
etag: AA==
name: roles/serverless.serviceAgent
stage: GA
title: Cloud Run Service Agent
---
description: Full access to ServiceBroker resources.
etag: AA==
name: roles/servicebroker.admin
stage: DEPRECATED
title: Service Broker Admin
---
description: Operational access to the ServiceBroker resources.
etag: AA==
name: roles/servicebroker.operator
stage: DEPRECATED
title: Service Broker Operator
---
description: Administrate tenancy units
etag: AA==
name: roles/serviceconsumermanagement.tenancyUnitsAdmin
stage: BETA
title: Admin of Tenancy Units
---
description: View tenancy units
etag: AA==
name: roles/serviceconsumermanagement.tenancyUnitsViewer
stage: BETA
title: Viewer of Tenancy Units
---
description: Full control of all Service Directory resources and permissions.
etag: AA==
name: roles/servicedirectory.admin
stage: GA
title: Service Directory Admin
---
description: Edit Service Directory resources.
etag: AA==
name: roles/servicedirectory.editor
stage: GA
title: Service Directory Editor
---
description: Gives access to attach VPC Networks to Service Directory Endpoints
etag: AA==
name: roles/servicedirectory.networkAttacher
stage: GA
title: Service Directory Network Attacher
---
description: Gives access to VPC Networks via Service Directory
etag: AA==
name: roles/servicedirectory.pscAuthorizedService
stage: GA
title: Private Service Connect Authorized Service
---
description: Give the Service Directory service agent access to Cloud Platform resources.
etag: AA==
name: roles/servicedirectory.serviceAgent
stage: GA
title: Service Directory Service Agent
---
description: View Service Directory resources.
etag: AA==
name: roles/servicedirectory.viewer
stage: GA
title: Service Directory Viewer
---
description: Readonly access to Personalized Service Health resources.
etag: AA==
name: roles/servicehealth.viewer
stage: BETA
title: Personalized Service Health Viewer
---
description: Full control of Google Service Management resources.
etag: AA==
name: roles/servicemanagement.admin
stage: GA
title: Service Management Administrator
---
description: Access to update the service config and create rollouts.
etag: AA==
name: roles/servicemanagement.configEditor
stage: GA
title: Service Config Editor
---
description: Access to administer service quotas.
etag: AA==
name: roles/servicemanagement.quotaAdmin
stage: BETA
title: Quota Administrator
---
description: Access to view service quotas.
etag: AA==
name: roles/servicemanagement.quotaViewer
stage: BETA
title: Quota Viewer
---
description: Can report usage of a service during runtime.
etag: AA==
name: roles/servicemanagement.reporter
stage: GA
title: Service Reporter
---
description: Can enable the service.
etag: AA==
name: roles/servicemanagement.serviceConsumer
stage: GA
title: Service Consumer
---
description: Can check preconditions and report usage of a service during runtime.
etag: AA==
name: roles/servicemanagement.serviceController
stage: GA
title: Service Controller
---
description: Full control of service networking with projects.
etag: AA==
name: roles/servicenetworking.networksAdmin
stage: BETA
title: Service Networking Admin
---
description: Gives permission to manage network configuration, such as establishing
network peering, necessary for service producers
etag: AA==
name: roles/servicenetworking.serviceAgent
stage: GA
title: Service Networking Service Agent
---
description: Read-only access to Security Insights resources
etag: AA==
name: roles/servicesecurityinsights.securityInsightsViewer
stage: BETA
title: Security Insights Viewer
---
description: Ability to create, delete, update, get and list API keys for a project.
etag: AA==
name: roles/serviceusage.apiKeysAdmin
stage: GA
title: API Keys Admin
---
description: Ability to get and list API keys for a project.
etag: AA==
name: roles/serviceusage.apiKeysViewer
stage: GA
title: API Keys Viewer
---
description: Ability to enable, disable, and inspect service states, inspect operations,
and consume quota and billing for a consumer project.
etag: AA==
name: roles/serviceusage.serviceUsageAdmin
stage: GA
title: Service Usage Admin
---
description: Ability to inspect service states and operations, and consume quota and
billing for a consumer project.
etag: AA==
name: roles/serviceusage.serviceUsageConsumer
stage: GA
title: Service Usage Consumer
---
description: Ability to inspect service states and operations for a consumer project.
etag: AA==
name: roles/serviceusage.serviceUsageViewer
stage: GA
title: Service Usage Viewer
---
description: Admin access to repositories
etag: AA==
name: roles/source.admin
stage: GA
title: Source Repository Administrator
---
description: Read access to repositories
etag: AA==
name: roles/source.reader
stage: GA
title: Source Repository Reader
---
description: Read / Write access to repositories
etag: AA==
name: roles/source.writer
stage: GA
title: Source Repository Writer
---
description: Allow Cloud Source Repositories to integrate with other Cloud services.
etag: AA==
name: roles/sourcerepo.serviceAgent
stage: GA
title: Cloud Source Repositories Service Agent
---
description: Full control of Cloud Spanner resources.
etag: AA==
name: roles/spanner.admin
stage: GA
title: Cloud Spanner Admin
---
description: Administrator role to manage Cloud Spanner backups. Does not include
permissions to restore from Cloud Spanner backups.
etag: AA==
name: roles/spanner.backupAdmin
stage: GA
title: Cloud Spanner Backup Admin
---
description: Role with limited permissions to create and manage Cloud Spanner backups.
Does not have permission to modify backups.
etag: AA==
name: roles/spanner.backupWriter
stage: GA
title: Cloud Spanner Backup Writer
---
description: Full control of Cloud Spanner databases.
etag: AA==
name: roles/spanner.databaseAdmin
stage: GA
title: Cloud Spanner Database Admin
---
description: Access to read and/or query a Cloud Spanner database.
etag: AA==
name: roles/spanner.databaseReader
stage: GA
title: Cloud Spanner Database Reader
---
description: In conjunction with the IAM role Cloud Spanner Fine-grained Access User,
grants permissions to individual Spanner database roles. Add a condition for each
desired Spanner database role that includes the resource type of `spanner.googleapis.com/DatabaseRole`
and the resource name ending with `/<your Spanner database role>`.
etag: AA==
name: roles/spanner.databaseRoleUser
stage: GA
title: Cloud Spanner Database Role User
---
description: Access to read, query, write and view and change the schema of Cloud
Spanner databases
etag: AA==
name: roles/spanner.databaseUser
stage: GA
title: Cloud Spanner Database User
---
description: Grants permissions to use Spanner's fine-grained access control framework.
To grant access to specific database roles, also add the Cloud Spanner Database
Role User IAM role and its necessary conditions.
etag: AA==
name: roles/spanner.fineGrainedAccessUser
stage: GA
title: Cloud Spanner Fine-grained Access User
---
description: Administrator role to restore Cloud Spanner databases from Cloud Spanner
backups.
etag: AA==
name: roles/spanner.restoreAdmin
stage: GA
title: Cloud Spanner Restore Admin
---
description: Cloud Spanner API Service Agent
etag: AA==
name: roles/spanner.serviceAgent
stage: GA
title: Cloud Spanner API Service Agent
---
description: Viewer access to Cloud Spanner resources.
etag: AA==
name: roles/spanner.viewer
stage: GA
title: Cloud Spanner Viewer
---
description: Grants full access to all Speaker ID resources, including project settings.
etag: AA==
name: roles/speakerid.admin
stage: GA
title: Speaker ID Admin
---
description: Grants access to read and write all Speaker ID resources.
etag: AA==
name: roles/speakerid.editor
stage: GA
title: Speaker ID Editor
---
description: Grants read access to all Speaker ID resources, and allows verification.
etag: AA==
name: roles/speakerid.verifier
stage: GA
title: Speaker ID Verifier
---
description: Grants read access to all Speaker ID resources.
etag: AA==
name: roles/speakerid.viewer
stage: GA
title: Speaker ID Viewer
---
description: Grants full access to all resources in Speech-to-text
etag: AA==
name: roles/speech.admin
stage: GA
title: Cloud Speech Administrator
---
description: Grants access to the recognition APIs.
etag: AA==
name: roles/speech.client
stage: GA
title: Cloud Speech Client
---
description: Grants access to edit resources in Speech-to-text
etag: AA==
name: roles/speech.editor
stage: GA
title: Cloud Speech Editor
---
description: Gives Speech-to-Text service account access to GCS resources.
etag: AA==
name: roles/speech.serviceAgent
stage: GA
title: Cloud Speech-to-Text Service Agent
---
description: Read/write access to manage Stackdriver account structure.
etag: AA==
name: roles/stackdriver.accounts.editor
stage: GA
title: Stackdriver Accounts Editor
---
description: Read-only access to get and list information about Stackdriver account
structure.
etag: AA==
name: roles/stackdriver.accounts.viewer
stage: GA
title: Stackdriver Accounts Viewer
---
description: Write-only access to resource metadata. This provides exactly the permissions
needed by the Stackdriver metadata agent and other systems that send metadata.
etag: AA==
name: roles/stackdriver.resourceMetadata.writer
stage: BETA
title: Stackdriver Resource Metadata Writer
---
description: Grants full control of buckets and objects.
etag: AA==
name: roles/storage.admin
stage: GA
title: Storage Admin
---
description: Grants full control over folders and objects, including listing, creating,
viewing, and deleting objects.
etag: AA==
name: roles/storage.folderAdmin
stage: BETA
title: Storage Folder Admin
---
description: Grants full control over HMAC keys in a project.
etag: AA==
name: roles/storage.hmacKeyAdmin
stage: GA
title: Storage HMAC Key Admin
---
description: Grants read access to object metadata in inventory reports.
etag: AA==
name: roles/storage.insightsCollectorService
stage: GA
title: Storage Insights Collector Service
---
description: Grants permission to create, replace, and delete objects; list objects
in a bucket; create, delete, and list tag bindings; read object metadata when listing
(excluding IAM policies); and read and edit bucket metadata, including IAM policies.
etag: AA==
name: roles/storage.legacyBucketOwner
stage: GA
title: Storage Legacy Bucket Owner
---
description: Grants permission to list a bucket's contents and read bucket metadata,
excluding IAM policies. Also grants permission to read object metadata when listing
objects (excluding IAM policies).
etag: AA==
name: roles/storage.legacyBucketReader
stage: GA
title: Storage Legacy Bucket Reader
---
description: Grants permission to create, replace, and delete objects; list objects
in a bucket; read object metadata when listing (excluding IAM policies); and read
bucket metadata, excluding IAM policies.
etag: AA==
name: roles/storage.legacyBucketWriter
stage: GA
title: Storage Legacy Bucket Writer
---
description: Grants permission to view and edit objects and their metadata, including
ACLs.
etag: AA==
name: roles/storage.legacyObjectOwner
stage: GA
title: Storage Legacy Object Owner
---
description: Grants permission to view objects and their metadata, excluding ACLs.
etag: AA==
name: roles/storage.legacyObjectReader
stage: GA
title: Storage Legacy Object Reader
---
description: Grants full control over objects, including listing, creating, viewing,
and deleting objects.
etag: AA==
name: roles/storage.objectAdmin
stage: GA
title: Storage Object Admin
---
description: Allows users to create objects. Does not give permission to view, delete,
or replace objects.
etag: AA==
name: roles/storage.objectCreator
stage: GA
title: Storage Object Creator
---
description: Access to create, read, update and delete objects and multipart uploads
in GCS.
etag: AA==
name: roles/storage.objectUser
stage: GA
title: Storage Object User
---
description: Grants access to view objects and their metadata, excluding ACLs. Can
also list the objects in a bucket.
etag: AA==
name: roles/storage.objectViewer
stage: GA
title: Storage Object Viewer
---
description: Full access to Storage Insights resources.
etag: AA==
name: roles/storageinsights.admin
stage: GA
title: Storage Insights Admin
---
description: Data access to Storage Insights.
etag: AA==
name: roles/storageinsights.analyst
stage: GA
title: Storage Insights Analyst
---
description: Permissions for Insights to write reports into customer project
etag: AA==
name: roles/storageinsights.serviceAgent
stage: GA
title: StorageInsights Service Agent
---
description: Readonly access to Storage Insights resources.
etag: AA==
name: roles/storageinsights.viewer
stage: GA
title: Storage Insights Viewer
---
description: Create, update and manage transfer jobs and operations.
etag: AA==
name: roles/storagetransfer.admin
stage: GA
title: Storage Transfer Admin
---
description: Grants Storage Transfer Service Agent permissions required to run transfers
etag: AA==
name: roles/storagetransfer.serviceAgent
stage: GA
title: Storage Transfer Service Agent
---
description: Perform transfers from an agent.
etag: AA==
name: roles/storagetransfer.transferAgent
stage: GA
title: Storage Transfer Agent
---
description: Create and update storage transfer jobs and operations.
etag: AA==
name: roles/storagetransfer.user
stage: GA
title: Storage Transfer User
---
description: Read access to storage transfer jobs and operations.
etag: AA==
name: roles/storagetransfer.viewer
stage: GA
title: Storage Transfer Viewer
---
description: Full access to Stream all resources.
etag: AA==
name: roles/stream.admin
stage: GA
title: Stream Admin
---
description: Full access to all StreamContent resources.
etag: AA==
name: roles/stream.contentAdmin
stage: GA
title: Stream Content Admin
---
description: Read and build access to StreamContent resources.
etag: AA==
name: roles/stream.contentBuilder
stage: GA
title: Stream Content Builder
---
description: Full access to all StreamInstance resources and Read access to all StreamContent
resources.
etag: AA==
name: roles/stream.instanceAdmin
stage: GA
title: Stream Instance Admin
---
description: Gives Immersive Stream for XR access to the required resources.
etag: AA==
name: roles/stream.serviceAgent
stage: GA
title: Stream Service Agent
---
description: Read-only access to Stream all resources.
etag: AA==
name: roles/stream.viewer
stage: GA
title: Stream Viewer
---
description: Access DevTools for Subscribe with Google
etag: AA==
name: roles/subscribewithgoogledeveloper.developer
stage: BETA
title: Subscribe with Google Developer
---
description: Full access to Telco Automation resources.
etag: AA==
name: roles/telcoautomation.admin
stage: BETA
title: Telco Automation Admin
---
description: Ability to manage blueprints
etag: AA==
name: roles/telcoautomation.blueprintDesigner
stage: BETA
title: Telco Automation Blueprint Designer
---
description: Ability to manage deployments
etag: AA==
name: roles/telcoautomation.deploymentAdmin
stage: BETA
title: Telco Automation Deployment Admin
---
description: Ability to get status of deployments
etag: AA==
name: roles/telcoautomation.opsAdminTier1
stage: BETA
title: Telco Automation Tier 1 Operations Admin
---
description: Ability to manage deployments and their status
etag: AA==
name: roles/telcoautomation.opsAdminTier4
stage: BETA
title: Telco Automation Tier 4 Operations Admin
---
description: Ability to manage deployments
etag: AA==
name: roles/telcoautomation.serviceOrchestrator
stage: BETA
title: Telco Automation Service Orchestrator
---
description: Edit access to DataSets.
etag: AA==
name: roles/timeseriesinsights.datasetsEditor
stage: BETA
title: Timeseries Insights DataSet Editor
---
description: Full access to DataSets.
etag: AA==
name: roles/timeseriesinsights.datasetsOwner
stage: BETA
title: Timeseries Insights DataSet Owner
---
description: Read-only access (List and Query) to DataSets.
etag: AA==
name: roles/timeseriesinsights.datasetsViewer
stage: BETA
title: Timeseries Insights DataSet Viewer
---
description: Full access to TPU nodes and related resources.
etag: AA==
name: roles/tpu.admin
stage: GA
title: TPU Admin
---
description: Give Cloud TPUs service account access to managed resources
etag: AA==
name: roles/tpu.serviceAgent
stage: GA
title: Cloud TPU API Service Agent
---
description: Read-only access to TPU nodes and related resources.
etag: AA==
name: roles/tpu.viewer
stage: GA
title: TPU Viewer
---
description: Can use shared VPC network (XPN) for the TPU VMs.
etag: AA==
name: roles/tpu.xpnAgent
stage: GA
title: TPU Shared VPC Agent
---
description: Traffic Director Client to fetch service configurations and report metrics
etag: AA==
name: roles/trafficdirector.client
stage: BETA
title: Traffic Director Client
---
description: Full access to all transcoder resources.
etag: AA==
name: roles/transcoder.admin
stage: GA
title: Transcoder Admin
---
description: Downloads and uploads media files from and to customer GCS buckets. Publishes
status updates to customer Pub/Sub.
etag: AA==
name: roles/transcoder.serviceAgent
stage: GA
title: Transcoder Service Agent
---
description: Viewer of all transcoder resources.
etag: AA==
name: roles/transcoder.viewer
stage: GA
title: Transcoder Viewer
---
description: Full access to Transfer Appliance all resources.
etag: AA==
name: roles/transferappliance.admin
stage: BETA
title: Transfer Appliance Admin
---
description: Read-only access to Transfer Appliance all resources.
etag: AA==
name: roles/transferappliance.viewer
stage: BETA
title: Transfer Appliance Viewer
---
description: Admin of Translation Hub
etag: AA==
name: roles/translationhub.admin
stage: BETA
title: Translation Hub Admin
---
description: Portal user of Translation Hub
etag: AA==
name: roles/translationhub.portalUser
stage: BETA
title: Translation Hub Portal User
---
description: Full access to all video stitcher resources.
etag: AA==
name: roles/videostitcher.admin
stage: GA
title: Video Stitcher Admin
---
description: Full access to video stitcher sessions.
etag: AA==
name: roles/videostitcher.user
stage: GA
title: Video Stitcher User
---
description: Read-only access to video stitcher resources.
etag: AA==
name: roles/videostitcher.viewer
stage: GA
title: Video Stitcher Viewer
---
description: View most Google Cloud resources. See the list of included permissions.
etag: AA==
name: roles/viewer
stage: GA
title: Viewer
---
description: Full access to Vision AI all resources.
etag: AA==
name: roles/visionai.admin
stage: BETA
title: VisionAI Admin
---
description: Access to read and write Vision AI Analyses.
etag: AA==
name: roles/visionai.analysisEditor
stage: BETA
title: Vision AI Analysis Editor
---
description: Access to read Vision AI Analyses.
etag: AA==
name: roles/visionai.analysisViewer
stage: BETA
title: Vision AI Analysis Viewer
---
description: Grants access to edit media asset annotations into the Warehouse.
etag: AA==
name: roles/visionai.annotationEditor
stage: BETA
title: VisionAI Warehouse Annotation Editor
---
description: Grants access to view media asset annotations into the Warehouse.
etag: AA==
name: roles/visionai.annotationViewer
stage: BETA
title: VisionAI Warehouse Annotation Viewer
---
description: Access to read and write Vision AI Applications.
etag: AA==
name: roles/visionai.applicationEditor
stage: BETA
title: Vision AI Application Editor
---
description: Access to read Vision AI Applications.
etag: AA==
name: roles/visionai.applicationViewer
stage: BETA
title: Vision AI Application Viewer
---
description: Grants access to ingest media assets into the Warehouse.
etag: AA==
name: roles/visionai.assetCreator
stage: BETA
title: VisionAI Warehouse Asset Creator
---
description: Grants access to edit media assets into the Warehouse.
etag: AA==
name: roles/visionai.assetEditor
stage: BETA
title: VisionAI Warehouse Asset Editor
---
description: Grants access to view media assets into the Warehouse.
etag: AA==
name: roles/visionai.assetViewer
stage: BETA
title: VisionAI Warehouse Asset Viewer
---
description: Access to read and write Vision AI Cluster.
etag: AA==
name: roles/visionai.clusterEditor
stage: BETA
title: Vision AI Cluster Editor
---
description: Access to read Vision AI Clusters.
etag: AA==
name: roles/visionai.clusterViewer
stage: BETA
title: Vision AI Cluster Viewer
---
description: Full control to everything in a corpus including corpus access control.
etag: AA==
name: roles/visionai.corpusAdmin
stage: BETA
title: VisionAI Warehouse Corpus Administrator
---
description: Read-write access to everything in a corpus.
etag: AA==
name: roles/visionai.corpusEditor
stage: BETA
title: VisionAI Warehouse Corpus Editor
---
description: Grants access to view everything in a corpus.
etag: AA==
name: roles/visionai.corpusViewer
stage: BETA
title: VisionAI Warehouse Corpus Viewer
---
description: Grants access to create/update/delete everything in a corpus.
etag: AA==
name: roles/visionai.corpusWriter
stage: BETA
title: VisionAI Warehouse Corpus Writer
---
description: Edit access to Vision AI all resources.
etag: AA==
name: roles/visionai.editor
stage: BETA
title: VisionAI Editor
---
description: Access to read and write Vision AI Events.
etag: AA==
name: roles/visionai.eventEditor
stage: BETA
title: Vision AI Event Editor
---
description: Access to read Vision AI Events.
etag: AA==
name: roles/visionai.eventViewer
stage: BETA
title: Vision AI Event Viewer
---
description: Full control of all Media Warehouse resources and permissions.
etag: AA==
name: roles/visionai.indexEndpointAdmin
stage: BETA
title: VisionAI Warehouse IndexEndpoint Administrator
---
description: Read, write and create access to all index endpoints level resources.
etag: AA==
name: roles/visionai.indexEndpointEditor
stage: BETA
title: VisionAI Warehouse IndexEndpoint Editor
---
description: |
Grants access to view all index endpoint resources and be able to search on them. (ReadOnly)
etag: AA==
name: roles/visionai.indexEndpointViewer
stage: BETA
title: VisionAI Warehouse IndexEndpoint Viewer
---
description: |
Grants access to perform update, delete, deploy and undeploy operations on the index endpoint.
etag: AA==
name: roles/visionai.indexEndpointWriter
stage: BETA
title: VisionAI Warehouse IndexEndpoint Writer
---
description: Access to read and write Vision AI Operators.
etag: AA==
name: roles/visionai.operatorEditor
stage: BETA
title: Vision AI Operator Editor
---
description: Access to read Vision AI Operators.
etag: AA==
name: roles/visionai.operatorViewer
stage: BETA
title: Vision AI Operator Viewer
---
description: Access to read Vision AI Series.
etag: AA==
name: roles/visionai.packetReceiver
stage: BETA
title: Vision AI Packet Receiver
---
description: Packet sender to the series.
etag: AA==
name: roles/visionai.packetSender
stage: BETA
title: Vision AI Packet Sender
---
description: Access to read and write Vision AI Processors.
etag: AA==
name: roles/visionai.processorEditor
stage: BETA
title: Vision AI Processor Editor
---
description: Access to read Vision AI Processors.
etag: AA==
name: roles/visionai.processorViewer
stage: BETA
title: Vision AI Processor Viewer
---
description: Access to read and write Vision AI RetailCatalogs.
etag: AA==
name: roles/visionai.retailcatalogEditor
stage: BETA
title: Vision AI RetailCatalog Editor
---
description: Access to read Vision AI RetailCatalogs.
etag: AA==
name: roles/visionai.retailcatalogViewer
stage: BETA
title: Vision AI RetailCatalog Viewer
---
description: Access to read and write Vision AI RetailEndpoints.
etag: AA==
name: roles/visionai.retailendpointEditor
stage: BETA
title: Vision AI RetailEndpoint Editor
---
description: Access to read Vision AI RetailEndpoints.
etag: AA==
name: roles/visionai.retailendpointViewer
stage: BETA
title: Vision AI RetailEndpoint Viewer
---
description: Access to read and write Vision AI Series.
etag: AA==
name: roles/visionai.seriesEditor
stage: BETA
title: Vision AI Series Editor
---
description: Access to read Vision AI Series.
etag: AA==
name: roles/visionai.seriesViewer
stage: BETA
title: Vision AI Series Viewer
---
description: Grants Cloud Vision AI service account permissions to manage resources
in consumer project
etag: AA==
name: roles/visionai.serviceAgent
stage: GA
title: Cloud Vision AI Service Agent
---
description: Access to read and write Vision AI Streams.
etag: AA==
name: roles/visionai.streamEditor
stage: BETA
title: Vision AI Stream Editor
---
description: Access to read Vision AI Streams.
etag: AA==
name: roles/visionai.streamViewer
stage: BETA
title: Vision AI Stream Viewer
---
description: Access to read & write Vision AI UI Streams.
etag: AA==
name: roles/visionai.uiStreamEditor
stage: BETA
title: Vision AI UI Stream Editor
---
description: Access to read Vision AI UI Streams.
etag: AA==
name: roles/visionai.uiStreamViewer
stage: BETA
title: Vision AI UI Stream Viewer
---
description: View access to Vision AI all resources.
etag: AA==
name: roles/visionai.viewer
stage: BETA
title: VisionAI Viewer
---
description: Read and write access to all Visual Inspection AI resources except visualinspection.locations.reportUsageMetrics
etag: AA==
name: roles/visualinspection.editor
stage: GA
title: Visual Inspection AI Solution Editor
---
description: Grants Visual Inspection AI Service Agent admin roles for accessing/exporting
training data, pushing containers artifacts to GCR and ArtifactsRegistry, and Vertex
AI for storing data and running training jobs.
etag: AA==
name: roles/visualinspection.serviceAgent
stage: GA
title: Visual Inspection AI Service Agent
---
description: ReportUsageMetric access to Visual Inspection AI Service
etag: AA==
name: roles/visualinspection.usageMetricsReporter
stage: GA
title: Visual Inspection AI Usage Metrics Reporter
---
description: Read access to Visual Inspection AI resources
etag: AA==
name: roles/visualinspection.viewer
stage: GA
title: Visual Inspection AI Viewer
---
description: Ability to view and edit all VM Migration objects
etag: AA==
name: roles/vmmigration.admin
stage: BETA
title: VM Migration Administrator
---
description: Grants VM Migration Service Account access to create migrated VMs, disks
and images in the user project.
etag: AA==
name: roles/vmmigration.serviceAgent
stage: GA
title: VM Migration Service Agent
---
description: Ability to view all VM Migration objects
etag: AA==
name: roles/vmmigration.viewer
stage: BETA
title: VM Migration Viewer
---
description: Gives permission to manage network configuration, such as establishing
network peering, necessary for GCVE
etag: AA==
name: roles/vmwareengine.serviceAgent
stage: GA
title: VMware Engine Service Agent
---
description: Admin has full access to VMware Engine Service
etag: AA==
name: roles/vmwareengine.vmwareengineAdmin
stage: GA
title: VMware Engine Service Admin
---
description: Viewer has read-only access to VMware Engine Service
etag: AA==
name: roles/vmwareengine.vmwareengineViewer
stage: GA
title: VMware Engine Service Viewer
---
description: Full access to all Serverless VPC Access resources
etag: AA==
name: roles/vpcaccess.admin
stage: GA
title: Serverless VPC Access Admin
---
description: Can create and manage resources to support serverless application to
connect to virtual private cloud.
etag: AA==
name: roles/vpcaccess.serviceAgent
stage: GA
title: Serverless VPC Access Service Agent
---
description: User of Serverless VPC Access connectors
etag: AA==
name: roles/vpcaccess.user
stage: GA
title: Serverless VPC Access User
---
description: Viewer of all Serverless VPC Access resources
etag: AA==
name: roles/vpcaccess.viewer
stage: GA
title: Serverless VPC Access Viewer
---
description: Gives the Cloud Web Security Scanner service account access to compute
engine details and app engine details.
etag: AA==
name: roles/websecurityscanner.serviceAgent
stage: GA
title: Cloud Web Security Scanner Service Agent
---
description: Full access to workflows and related resources.
etag: AA==
name: roles/workflows.admin
stage: GA
title: Workflows Admin
---
description: Read and write access to workflows and related resources, including development
and debugging of workflows.
etag: AA==
name: roles/workflows.editor
stage: GA
title: Workflows Editor
---
description: Access to execute workflows and manage the executions using the API.
Does not provide access to develop and debug workflows.
etag: AA==
name: roles/workflows.invoker
stage: GA
title: Workflows Invoker
---
description: Gives Cloud Workflows service account access to managed resources.
etag: AA==
name: roles/workflows.serviceAgent
stage: GA
title: Cloud Workflows Service Agent
---
description: Read-only access to workflows and related resources.
etag: AA==
name: roles/workflows.viewer
stage: GA
title: Workflows Viewer
---
description: Full access to all Workload Certificate API resources.
etag: AA==
name: roles/workloadcertificate.admin
stage: BETA
title: Workload Certificate Admin
---
description: Full access to WorkloadRegistration resources.
etag: AA==
name: roles/workloadcertificate.registrationAdmin
stage: BETA
title: Workload Certificate Registration Admin
---
description: Read-only access to WorkloadRegistration resources.
etag: AA==
name: roles/workloadcertificate.registrationViewer
stage: BETA
title: Workload Certificate Registration Viewer
---
description: Gives the Workload Certificate service agent access to Cloud Platform
resources.
etag: AA==
name: roles/workloadcertificate.serviceAgent
stage: GA
title: Workload Certificate Service Agent
---
description: Read-only access to Workload Certificate all resources.
etag: AA==
name: roles/workloadcertificate.viewer
stage: BETA
title: Workload Certificate Viewer
---
description: Full access to Workload Manager all resources.
etag: AA==
name: roles/workloadmanager.admin
stage: BETA
title: Workload Manager Admin
---
description: Full access to Workload Manager deployment resources.
etag: AA==
name: roles/workloadmanager.deploymentAdmin
stage: BETA
title: Workload Manager Deployment Admin
---
description: Read-only access to Workload Manager deployment resources.
etag: AA==
name: roles/workloadmanager.deploymentViewer
stage: BETA
title: Workload Manager Deployment Viewer
---
description: Full access to Workload Manager evaluation resources.
etag: AA==
name: roles/workloadmanager.evaluationAdmin
stage: BETA
title: Workload Manager Evaluation Admin
---
description: Read-only access to Workload Manager evaluation resources.
etag: AA==
name: roles/workloadmanager.evaluationViewer
stage: BETA
title: Workload Manager Evaluation Viewer
---
description: The role used by Workload Manager application runners to read and update
workloads.
etag: AA==
name: roles/workloadmanager.evaluationWorker
stage: BETA
title: Workload Manager Evaluation Worker
---
description: Gives Workload Manager Service Agent access to CAI export functions and
Cloud Monitoring.
etag: AA==
name: roles/workloadmanager.serviceAgent
stage: GA
title: Workload Manager Service Agent
---
description: Read-only access to Workload Manager all resources.
etag: AA==
name: roles/workloadmanager.viewer
stage: BETA
title: Workload Manager Viewer
---
description: The role used by Workload Manager application runners to read and update
workloads.
etag: AA==
name: roles/workloadmanager.worker
stage: BETA
title: Workload Manager Worker
---
description: Grants CRUD access to all Workstation resources.
etag: AA==
name: roles/workstations.admin
stage: GA
title: Cloud Workstations Admin
---
description: Grants ability to connect a Workstation Cluster to a shared VPC network.
etag: AA==
name: roles/workstations.networkAdmin
stage: GA
title: Cloud Workstations Network Admin
---
description: Grants ability to view Cloud Workstations API operations.
etag: AA==
name: roles/workstations.operationViewer
stage: GA
title: Cloud Workstations Operation Viewer
---
description: Grants the Workstations Service Account access to manage resources in
consumer project.
etag: AA==
name: roles/workstations.serviceAgent
stage: GA
title: Workstations Service Agent
---
description: Grants runtime access to Workstation resources.
etag: AA==
name: roles/workstations.user
stage: GA
title: Cloud Workstations User
---
description: Grants ability to create Workstation resources.
etag: AA==
name: roles/workstations.workstationCreator
stage: GA
title: Cloud Workstations Creator
# gcloud iam roles describe roles/owner
description: Full access to most Google Cloud resources. See the list of included
permissions.
etag: AA==
includedPermissions:
- accessapproval.requests.approve
- accessapproval.requests.dismiss
- accessapproval.requests.get
- accessapproval.requests.invalidate
- accessapproval.requests.list
- accessapproval.serviceAccounts.get
- accessapproval.settings.delete
- accessapproval.settings.get
- accessapproval.settings.update
- accesscontextmanager.accessLevels.create
- accesscontextmanager.accessLevels.delete
- accesscontextmanager.accessLevels.get
- accesscontextmanager.accessLevels.list
- accesscontextmanager.accessLevels.replaceAll
- accesscontextmanager.accessLevels.update
- accesscontextmanager.accessPolicies.create
- accesscontextmanager.accessPolicies.delete
- accesscontextmanager.accessPolicies.get
- accesscontextmanager.accessPolicies.getIamPolicy
- accesscontextmanager.accessPolicies.list
- accesscontextmanager.accessPolicies.setIamPolicy
- accesscontextmanager.accessPolicies.update
- accesscontextmanager.accessZones.create
- accesscontextmanager.accessZones.delete
- accesscontextmanager.accessZones.get
- accesscontextmanager.accessZones.list
- accesscontextmanager.accessZones.update
- accesscontextmanager.authorizedOrgsDescs.create
- accesscontextmanager.authorizedOrgsDescs.delete
- accesscontextmanager.authorizedOrgsDescs.get
- accesscontextmanager.authorizedOrgsDescs.list
- accesscontextmanager.authorizedOrgsDescs.update
- accesscontextmanager.gcpUserAccessBindings.create
- accesscontextmanager.gcpUserAccessBindings.delete
- accesscontextmanager.gcpUserAccessBindings.get
- accesscontextmanager.gcpUserAccessBindings.list
- accesscontextmanager.gcpUserAccessBindings.update
- accesscontextmanager.policies.create
- accesscontextmanager.policies.delete
- accesscontextmanager.policies.get
- accesscontextmanager.policies.getIamPolicy
- accesscontextmanager.policies.list
- accesscontextmanager.policies.setIamPolicy
- accesscontextmanager.policies.update
- accesscontextmanager.servicePerimeters.commit
- accesscontextmanager.servicePerimeters.create
- accesscontextmanager.servicePerimeters.delete
- accesscontextmanager.servicePerimeters.get
- accesscontextmanager.servicePerimeters.list
- accesscontextmanager.servicePerimeters.replaceAll
- accesscontextmanager.servicePerimeters.update
- actions.agent.claimContentProvider
- actions.agent.get
- actions.agent.update
- actions.agentVersions.create
- actions.agentVersions.delete
- actions.agentVersions.deploy
- actions.agentVersions.get
- actions.agentVersions.list
- advisorynotifications.notifications.get
- advisorynotifications.notifications.list
- aiplatform.annotationSpecs.create
- aiplatform.annotationSpecs.delete
- aiplatform.annotationSpecs.get
- aiplatform.annotationSpecs.list
- aiplatform.annotationSpecs.update
- aiplatform.annotations.create
- aiplatform.annotations.delete
- aiplatform.annotations.get
- aiplatform.annotations.list
- aiplatform.annotations.update
- aiplatform.artifacts.create
- aiplatform.artifacts.delete
- aiplatform.artifacts.get
- aiplatform.artifacts.list
- aiplatform.artifacts.update
- aiplatform.batchPredictionJobs.cancel
- aiplatform.batchPredictionJobs.create
- aiplatform.batchPredictionJobs.delete
- aiplatform.batchPredictionJobs.get
- aiplatform.batchPredictionJobs.list
- aiplatform.contexts.addContextArtifactsAndExecutions
- aiplatform.contexts.addContextChildren
- aiplatform.contexts.create
- aiplatform.contexts.delete
- aiplatform.contexts.get
- aiplatform.contexts.list
- aiplatform.contexts.queryContextLineageSubgraph
- aiplatform.contexts.update
- aiplatform.customJobs.cancel
- aiplatform.customJobs.create
- aiplatform.customJobs.delete
- aiplatform.customJobs.get
- aiplatform.customJobs.list
- aiplatform.dataItems.create
- aiplatform.dataItems.delete
- aiplatform.dataItems.get
- aiplatform.dataItems.list
- aiplatform.dataItems.update
- aiplatform.dataLabelingJobs.cancel
- aiplatform.dataLabelingJobs.create
- aiplatform.dataLabelingJobs.delete
- aiplatform.dataLabelingJobs.get
- aiplatform.dataLabelingJobs.list
- aiplatform.datasets.create
- aiplatform.datasets.delete
- aiplatform.datasets.export
- aiplatform.datasets.get
- aiplatform.datasets.import
- aiplatform.datasets.list
- aiplatform.datasets.update
- aiplatform.deploymentResourcePools.create
- aiplatform.deploymentResourcePools.delete
- aiplatform.deploymentResourcePools.get
- aiplatform.deploymentResourcePools.list
- aiplatform.deploymentResourcePools.queryDeployedModels
- aiplatform.deploymentResourcePools.update
- aiplatform.edgeDeploymentJobs.create
- aiplatform.edgeDeploymentJobs.delete
- aiplatform.edgeDeploymentJobs.get
- aiplatform.edgeDeploymentJobs.list
- aiplatform.edgeDeviceDebugInfo.get
- aiplatform.edgeDevices.create
- aiplatform.edgeDevices.delete
- aiplatform.edgeDevices.get
- aiplatform.edgeDevices.list
- aiplatform.edgeDevices.update
- aiplatform.endpoints.create
- aiplatform.endpoints.delete
- aiplatform.endpoints.deploy
- aiplatform.endpoints.explain
- aiplatform.endpoints.get
- aiplatform.endpoints.list
- aiplatform.endpoints.predict
- aiplatform.endpoints.undeploy
- aiplatform.endpoints.update
- aiplatform.entityTypes.create
- aiplatform.entityTypes.delete
- aiplatform.entityTypes.deleteFeatureValues
- aiplatform.entityTypes.exportFeatureValues
- aiplatform.entityTypes.get
- aiplatform.entityTypes.getIamPolicy
- aiplatform.entityTypes.importFeatureValues
- aiplatform.entityTypes.list
- aiplatform.entityTypes.readFeatureValues
- aiplatform.entityTypes.setIamPolicy
- aiplatform.entityTypes.streamingReadFeatureValues
- aiplatform.entityTypes.update
- aiplatform.entityTypes.writeFeatureValues
- aiplatform.executions.addExecutionEvents
- aiplatform.executions.create
- aiplatform.executions.delete
- aiplatform.executions.get
- aiplatform.executions.list
- aiplatform.executions.queryExecutionInputsAndOutputs
- aiplatform.executions.update
- aiplatform.features.create
- aiplatform.features.delete
- aiplatform.features.get
- aiplatform.features.list
- aiplatform.features.update
- aiplatform.featurestores.batchReadFeatureValues
- aiplatform.featurestores.create
- aiplatform.featurestores.delete
- aiplatform.featurestores.exportFeatures
- aiplatform.featurestores.get
- aiplatform.featurestores.getIamPolicy
- aiplatform.featurestores.importFeatures
- aiplatform.featurestores.list
- aiplatform.featurestores.readFeatures
- aiplatform.featurestores.setIamPolicy
- aiplatform.featurestores.update
- aiplatform.featurestores.writeFeatures
- aiplatform.humanInTheLoops.cancel
- aiplatform.humanInTheLoops.create
- aiplatform.humanInTheLoops.delete
- aiplatform.humanInTheLoops.get
- aiplatform.humanInTheLoops.list
- aiplatform.humanInTheLoops.queryAnnotationStats
- aiplatform.humanInTheLoops.send
- aiplatform.humanInTheLoops.update
- aiplatform.hyperparameterTuningJobs.cancel
- aiplatform.hyperparameterTuningJobs.create
- aiplatform.hyperparameterTuningJobs.delete
- aiplatform.hyperparameterTuningJobs.get
- aiplatform.hyperparameterTuningJobs.list
- aiplatform.indexEndpoints.create
- aiplatform.indexEndpoints.delete
- aiplatform.indexEndpoints.deploy
- aiplatform.indexEndpoints.get
- aiplatform.indexEndpoints.list
- aiplatform.indexEndpoints.queryVectors
- aiplatform.indexEndpoints.undeploy
- aiplatform.indexEndpoints.update
- aiplatform.indexes.create
- aiplatform.indexes.delete
- aiplatform.indexes.get
- aiplatform.indexes.list
- aiplatform.indexes.update
- aiplatform.locations.get
- aiplatform.locations.list
- aiplatform.metadataSchemas.create
- aiplatform.metadataSchemas.delete
- aiplatform.metadataSchemas.get
- aiplatform.metadataSchemas.list
- aiplatform.metadataStores.create
- aiplatform.metadataStores.delete
- aiplatform.metadataStores.get
- aiplatform.metadataStores.list
- aiplatform.migratableResources.migrate
- aiplatform.migratableResources.search
- aiplatform.modelDeploymentMonitoringJobs.create
- aiplatform.modelDeploymentMonitoringJobs.delete
- aiplatform.modelDeploymentMonitoringJobs.get
- aiplatform.modelDeploymentMonitoringJobs.list
- aiplatform.modelDeploymentMonitoringJobs.pause
- aiplatform.modelDeploymentMonitoringJobs.resume
- aiplatform.modelDeploymentMonitoringJobs.searchStatsAnomalies
- aiplatform.modelDeploymentMonitoringJobs.update
- aiplatform.modelEvaluationSlices.get
- aiplatform.modelEvaluationSlices.list
- aiplatform.modelEvaluations.exportEvaluatedDataItems
- aiplatform.modelEvaluations.get
- aiplatform.modelEvaluations.list
- aiplatform.models.delete
- aiplatform.models.export
- aiplatform.models.get
- aiplatform.models.list
- aiplatform.models.update
- aiplatform.models.upload
- aiplatform.nasJobs.cancel
- aiplatform.nasJobs.create
- aiplatform.nasJobs.delete
- aiplatform.nasJobs.get
- aiplatform.nasJobs.list
- aiplatform.nasTrialDetails.get
- aiplatform.nasTrialDetails.list
- aiplatform.operations.list
- aiplatform.pipelineJobs.cancel
- aiplatform.pipelineJobs.create
- aiplatform.pipelineJobs.delete
- aiplatform.pipelineJobs.get
- aiplatform.pipelineJobs.list
- aiplatform.specialistPools.create
- aiplatform.specialistPools.delete
- aiplatform.specialistPools.get
- aiplatform.specialistPools.list
- aiplatform.specialistPools.update
- aiplatform.studies.create
- aiplatform.studies.delete
- aiplatform.studies.get
- aiplatform.studies.list
- aiplatform.studies.update
- aiplatform.tensorboardExperiments.create
- aiplatform.tensorboardExperiments.delete
- aiplatform.tensorboardExperiments.get
- aiplatform.tensorboardExperiments.list
- aiplatform.tensorboardExperiments.update
- aiplatform.tensorboardExperiments.write
- aiplatform.tensorboardRuns.batchCreate
- aiplatform.tensorboardRuns.create
- aiplatform.tensorboardRuns.delete
- aiplatform.tensorboardRuns.get
- aiplatform.tensorboardRuns.list
- aiplatform.tensorboardRuns.update
- aiplatform.tensorboardRuns.write
- aiplatform.tensorboardTimeSeries.batchCreate
- aiplatform.tensorboardTimeSeries.batchRead
- aiplatform.tensorboardTimeSeries.create
- aiplatform.tensorboardTimeSeries.delete
- aiplatform.tensorboardTimeSeries.get
- aiplatform.tensorboardTimeSeries.list
- aiplatform.tensorboardTimeSeries.read
- aiplatform.tensorboardTimeSeries.update
- aiplatform.tensorboards.create
- aiplatform.tensorboards.delete
- aiplatform.tensorboards.get
- aiplatform.tensorboards.list
- aiplatform.tensorboards.recordAccess
- aiplatform.tensorboards.update
- aiplatform.trainingPipelines.cancel
- aiplatform.trainingPipelines.create
- aiplatform.trainingPipelines.delete
- aiplatform.trainingPipelines.get
- aiplatform.trainingPipelines.list
- aiplatform.trials.create
- aiplatform.trials.delete
- aiplatform.trials.get
- aiplatform.trials.list
- aiplatform.trials.update
- alloydb.backups.create
- alloydb.backups.delete
- alloydb.backups.get
- alloydb.backups.list
- alloydb.backups.update
- alloydb.clusters.create
- alloydb.clusters.delete
- alloydb.clusters.generateClientCertificate
- alloydb.clusters.get
- alloydb.clusters.list
- alloydb.clusters.update
- alloydb.instances.connect
- alloydb.instances.create
- alloydb.instances.delete
- alloydb.instances.failover
- alloydb.instances.get
- alloydb.instances.injectFault
- alloydb.instances.list
- alloydb.instances.restart
- alloydb.instances.update
- alloydb.locations.get
- alloydb.locations.list
- alloydb.operations.cancel
- alloydb.operations.delete
- alloydb.operations.get
- alloydb.operations.list
- alloydb.supportedDatabaseFlags.get
- alloydb.supportedDatabaseFlags.list
- alloydb.users.create
- alloydb.users.delete
- alloydb.users.get
- alloydb.users.list
- alloydb.users.update
- analyticshub.dataExchanges.create
- analyticshub.dataExchanges.delete
- analyticshub.dataExchanges.get
- analyticshub.dataExchanges.getIamPolicy
- analyticshub.dataExchanges.list
- analyticshub.dataExchanges.setIamPolicy
- analyticshub.dataExchanges.update
- analyticshub.listings.create
- analyticshub.listings.delete
- analyticshub.listings.get
- analyticshub.listings.getIamPolicy
- analyticshub.listings.list
- analyticshub.listings.setIamPolicy
- analyticshub.listings.subscribe
- analyticshub.listings.update
- androidmanagement.enterprises.manage
- apigateway.apiconfigs.create
- apigateway.apiconfigs.delete
- apigateway.apiconfigs.get
- apigateway.apiconfigs.getIamPolicy
- apigateway.apiconfigs.list
- apigateway.apiconfigs.setIamPolicy
- apigateway.apiconfigs.update
- apigateway.apis.create
- apigateway.apis.delete
- apigateway.apis.get
- apigateway.apis.getIamPolicy
- apigateway.apis.list
- apigateway.apis.setIamPolicy
- apigateway.apis.update
- apigateway.gateways.create
- apigateway.gateways.delete
- apigateway.gateways.get
- apigateway.gateways.getIamPolicy
- apigateway.gateways.list
- apigateway.gateways.setIamPolicy
- apigateway.gateways.update
- apigateway.locations.get
- apigateway.locations.list
- apigateway.operations.cancel
- apigateway.operations.delete
- apigateway.operations.get
- apigateway.operations.list
- apigee.apiproductattributes.createOrUpdateAll
- apigee.apiproductattributes.delete
- apigee.apiproductattributes.get
- apigee.apiproductattributes.list
- apigee.apiproductattributes.update
- apigee.apiproducts.create
- apigee.apiproducts.delete
- apigee.apiproducts.get
- apigee.apiproducts.list
- apigee.apiproducts.update
- apigee.appgroupapps.create
- apigee.appgroupapps.delete
- apigee.appgroupapps.get
- apigee.appgroupapps.list
- apigee.appgroupapps.manage
- apigee.appgroups.create
- apigee.appgroups.delete
- apigee.appgroups.get
- apigee.appgroups.list
- apigee.appgroups.update
- apigee.appkeys.create
- apigee.appkeys.delete
- apigee.appkeys.get
- apigee.appkeys.manage
- apigee.apps.get
- apigee.apps.list
- apigee.archivedeployments.create
- apigee.archivedeployments.delete
- apigee.archivedeployments.download
- apigee.archivedeployments.get
- apigee.archivedeployments.list
- apigee.archivedeployments.update
- apigee.archivedeployments.upload
- apigee.caches.delete
- apigee.caches.list
- apigee.canaryevaluations.create
- apigee.canaryevaluations.get
- apigee.datacollectors.create
- apigee.datacollectors.delete
- apigee.datacollectors.get
- apigee.datacollectors.list
- apigee.datacollectors.update
- apigee.datalocation.get
- apigee.datastores.create
- apigee.datastores.delete
- apigee.datastores.get
- apigee.datastores.list
- apigee.datastores.update
- apigee.deployments.create
- apigee.deployments.delete
- apigee.deployments.get
- apigee.deployments.list
- apigee.deployments.update
- apigee.developerappattributes.createOrUpdateAll
- apigee.developerappattributes.delete
- apigee.developerappattributes.get
- apigee.developerappattributes.list
- apigee.developerappattributes.update
- apigee.developerapps.create
- apigee.developerapps.delete
- apigee.developerapps.get
- apigee.developerapps.list
- apigee.developerapps.manage
- apigee.developerattributes.createOrUpdateAll
- apigee.developerattributes.delete
- apigee.developerattributes.get
- apigee.developerattributes.list
- apigee.developerattributes.update
- apigee.developerbalances.adjust
- apigee.developerbalances.get
- apigee.developerbalances.update
- apigee.developermonetizationconfigs.get
- apigee.developermonetizationconfigs.update
- apigee.developers.create
- apigee.developers.delete
- apigee.developers.get
- apigee.developers.list
- apigee.developers.update
- apigee.developersubscriptions.create
- apigee.developersubscriptions.get
- apigee.developersubscriptions.list
- apigee.developersubscriptions.update
- apigee.endpointattachments.create
- apigee.endpointattachments.delete
- apigee.endpointattachments.get
- apigee.endpointattachments.list
- apigee.entitlements.get
- apigee.envgroupattachments.create
- apigee.envgroupattachments.delete
- apigee.envgroupattachments.get
- apigee.envgroupattachments.list
- apigee.envgroups.create
- apigee.envgroups.delete
- apigee.envgroups.get
- apigee.envgroups.list
- apigee.envgroups.update
- apigee.environments.create
- apigee.environments.delete
- apigee.environments.get
- apigee.environments.getDataLocation
- apigee.environments.getIamPolicy
- apigee.environments.getStats
- apigee.environments.list
- apigee.environments.manageRuntime
- apigee.environments.setIamPolicy
- apigee.environments.update
- apigee.exports.create
- apigee.exports.get
- apigee.exports.list
- apigee.flowhooks.attachSharedFlow
- apigee.flowhooks.detachSharedFlow
- apigee.flowhooks.getSharedFlow
- apigee.flowhooks.list
- apigee.hostqueries.create
- apigee.hostqueries.get
- apigee.hostqueries.list
- apigee.hostsecurityreports.create
- apigee.hostsecurityreports.get
- apigee.hostsecurityreports.list
- apigee.hoststats.get
- apigee.ingressconfigs.get
- apigee.instanceattachments.create
- apigee.instanceattachments.delete
- apigee.instanceattachments.get
- apigee.instanceattachments.list
- apigee.instances.create
- apigee.instances.delete
- apigee.instances.get
- apigee.instances.list
- apigee.instances.reportStatus
- apigee.instances.update
- apigee.keystorealiases.create
- apigee.keystorealiases.delete
- apigee.keystorealiases.exportCertificate
- apigee.keystorealiases.generateCSR
- apigee.keystorealiases.get
- apigee.keystorealiases.list
- apigee.keystorealiases.update
- apigee.keystores.create
- apigee.keystores.delete
- apigee.keystores.export
- apigee.keystores.get
- apigee.keystores.list
- apigee.keyvaluemapentries.create
- apigee.keyvaluemapentries.delete
- apigee.keyvaluemapentries.get
- apigee.keyvaluemapentries.list
- apigee.keyvaluemaps.create
- apigee.keyvaluemaps.delete
- apigee.keyvaluemaps.list
- apigee.maskconfigs.get
- apigee.maskconfigs.update
- apigee.nataddresses.activate
- apigee.nataddresses.create
- apigee.nataddresses.delete
- apigee.nataddresses.get
- apigee.nataddresses.list
- apigee.operations.get
- apigee.operations.list
- apigee.organizations.create
- apigee.organizations.delete
- apigee.organizations.get
- apigee.organizations.list
- apigee.organizations.update
- apigee.portals.create
- apigee.portals.delete
- apigee.portals.get
- apigee.portals.list
- apigee.portals.update
- apigee.projectorganizations.get
- apigee.projects.migrate
- apigee.projects.previewMigration
- apigee.projects.update
- apigee.proxies.create
- apigee.proxies.delete
- apigee.proxies.get
- apigee.proxies.list
- apigee.proxies.update
- apigee.proxyrevisions.delete
- apigee.proxyrevisions.deploy
- apigee.proxyrevisions.get
- apigee.proxyrevisions.list
- apigee.proxyrevisions.undeploy
- apigee.proxyrevisions.update
- apigee.queries.create
- apigee.queries.get
- apigee.queries.list
- apigee.rateplans.create
- apigee.rateplans.delete
- apigee.rateplans.get
- apigee.rateplans.list
- apigee.rateplans.update
- apigee.references.create
- apigee.references.delete
- apigee.references.get
- apigee.references.list
- apigee.references.update
- apigee.reports.create
- apigee.reports.delete
- apigee.reports.get
- apigee.reports.list
- apigee.reports.update
- apigee.resourcefiles.create
- apigee.resourcefiles.delete
- apigee.resourcefiles.get
- apigee.resourcefiles.list
- apigee.resourcefiles.update
- apigee.runtimeconfigs.get
- apigee.securityIncidents.get
- apigee.securityIncidents.list
- apigee.securityProfileEnvironments.computeScore
- apigee.securityProfileEnvironments.create
- apigee.securityProfileEnvironments.delete
- apigee.securityProfiles.get
- apigee.securityProfiles.list
- apigee.securityStats.queryTabularStats
- apigee.securityStats.queryTimeSeriesStats
- apigee.securityreports.create
- apigee.securityreports.get
- apigee.securityreports.list
- apigee.setupcontexts.get
- apigee.setupcontexts.update
- apigee.sharedflowrevisions.delete
- apigee.sharedflowrevisions.deploy
- apigee.sharedflowrevisions.get
- apigee.sharedflowrevisions.list
- apigee.sharedflowrevisions.undeploy
- apigee.sharedflowrevisions.update
- apigee.sharedflows.create
- apigee.sharedflows.delete
- apigee.sharedflows.get
- apigee.sharedflows.list
- apigee.targetservers.create
- apigee.targetservers.delete
- apigee.targetservers.get
- apigee.targetservers.list
- apigee.targetservers.update
- apigee.traceconfig.get
- apigee.traceconfig.update
- apigee.traceconfigoverrides.create
- apigee.traceconfigoverrides.delete
- apigee.traceconfigoverrides.get
- apigee.traceconfigoverrides.list
- apigee.traceconfigoverrides.update
- apigee.tracesessions.create
- apigee.tracesessions.delete
- apigee.tracesessions.get
- apigee.tracesessions.list
- apigeeconnect.connections.list
- apigeeconnect.endpoints.connect
- apigeeregistry.apis.create
- apigeeregistry.apis.delete
- apigeeregistry.apis.get
- apigeeregistry.apis.getIamPolicy
- apigeeregistry.apis.list
- apigeeregistry.apis.setIamPolicy
- apigeeregistry.apis.update
- apigeeregistry.artifacts.create
- apigeeregistry.artifacts.delete
- apigeeregistry.artifacts.get
- apigeeregistry.artifacts.getIamPolicy
- apigeeregistry.artifacts.list
- apigeeregistry.artifacts.setIamPolicy
- apigeeregistry.artifacts.update
- apigeeregistry.deployments.create
- apigeeregistry.deployments.delete
- apigeeregistry.deployments.get
- apigeeregistry.deployments.list
- apigeeregistry.deployments.update
- apigeeregistry.instances.get
- apigeeregistry.instances.update
- apigeeregistry.locations.get
- apigeeregistry.locations.list
- apigeeregistry.operations.cancel
- apigeeregistry.operations.delete
- apigeeregistry.operations.get
- apigeeregistry.operations.list
- apigeeregistry.specs.create
- apigeeregistry.specs.delete
- apigeeregistry.specs.get
- apigeeregistry.specs.getIamPolicy
- apigeeregistry.specs.list
- apigeeregistry.specs.setIamPolicy
- apigeeregistry.specs.update
- apigeeregistry.versions.create
- apigeeregistry.versions.delete
- apigeeregistry.versions.get
- apigeeregistry.versions.getIamPolicy
- apigeeregistry.versions.list
- apigeeregistry.versions.setIamPolicy
- apigeeregistry.versions.update
- apikeys.keys.create
- apikeys.keys.delete
- apikeys.keys.get
- apikeys.keys.getKeyString
- apikeys.keys.list
- apikeys.keys.lookup
- apikeys.keys.undelete
- apikeys.keys.update
- appengine.applications.create
- appengine.applications.get
- appengine.applications.update
- appengine.instances.delete
- appengine.instances.enableDebug
- appengine.instances.get
- appengine.instances.list
- appengine.memcache.addKey
- appengine.memcache.flush
- appengine.memcache.get
- appengine.memcache.getKey
- appengine.memcache.list
- appengine.memcache.update
- appengine.operations.get
- appengine.operations.list
- appengine.runtimes.actAsAdmin
- appengine.services.delete
- appengine.services.get
- appengine.services.list
- appengine.services.update
- appengine.versions.create
- appengine.versions.delete
- appengine.versions.get
- appengine.versions.getFileContents
- appengine.versions.list
- appengine.versions.update
- applianceactivation.rttCommands.approve
- applianceactivation.rttCommands.create
- applianceactivation.rttCommands.get
- applianceactivation.rttCommands.list
- applianceactivation.rttCommands.sendResult
- artifactregistry.aptartifacts.create
- artifactregistry.dockerimages.get
- artifactregistry.dockerimages.list
- artifactregistry.files.get
- artifactregistry.files.list
- artifactregistry.kfpartifacts.create
- artifactregistry.locations.get
- artifactregistry.locations.list
- artifactregistry.mavenartifacts.get
- artifactregistry.mavenartifacts.list
- artifactregistry.npmpackages.get
- artifactregistry.npmpackages.list
- artifactregistry.packages.delete
- artifactregistry.packages.get
- artifactregistry.packages.list
- artifactregistry.projectsettings.get
- artifactregistry.projectsettings.update
- artifactregistry.pythonpackages.get
- artifactregistry.pythonpackages.list
- artifactregistry.repositories.create
- artifactregistry.repositories.createOnPush
- artifactregistry.repositories.createTagBinding
- artifactregistry.repositories.delete
- artifactregistry.repositories.deleteArtifacts
- artifactregistry.repositories.deleteTagBinding
- artifactregistry.repositories.downloadArtifacts
- artifactregistry.repositories.get
- artifactregistry.repositories.getIamPolicy
- artifactregistry.repositories.list
- artifactregistry.repositories.listEffectiveTags
- artifactregistry.repositories.listTagBindings
- artifactregistry.repositories.readViaVirtualRepository
- artifactregistry.repositories.setIamPolicy
- artifactregistry.repositories.update
- artifactregistry.repositories.uploadArtifacts
- artifactregistry.tags.create
- artifactregistry.tags.delete
- artifactregistry.tags.get
- artifactregistry.tags.list
- artifactregistry.tags.update
- artifactregistry.versions.delete
- artifactregistry.versions.get
- artifactregistry.versions.list
- artifactregistry.yumartifacts.create
- assuredworkloads.operations.get
- assuredworkloads.operations.list
- assuredworkloads.violations.get
- assuredworkloads.violations.list
- assuredworkloads.violations.update
- assuredworkloads.workload.delete
- assuredworkloads.workload.get
- assuredworkloads.workload.list
- assuredworkloads.workload.update
- automl.annotationSpecs.create
- automl.annotationSpecs.delete
- automl.annotationSpecs.get
- automl.annotationSpecs.list
- automl.annotationSpecs.update
- automl.annotations.approve
- automl.annotations.create
- automl.annotations.list
- automl.annotations.manipulate
- automl.annotations.reject
- automl.columnSpecs.get
- automl.columnSpecs.list
- automl.columnSpecs.update
- automl.datasets.create
- automl.datasets.delete
- automl.datasets.export
- automl.datasets.get
- automl.datasets.getIamPolicy
- automl.datasets.import
- automl.datasets.list
- automl.datasets.setIamPolicy
- automl.datasets.update
- automl.examples.delete
- automl.examples.get
- automl.examples.list
- automl.examples.update
- automl.files.delete
- automl.files.list
- automl.humanAnnotationTasks.create
- automl.humanAnnotationTasks.delete
- automl.humanAnnotationTasks.get
- automl.humanAnnotationTasks.list
- automl.locations.get
- automl.locations.getIamPolicy
- automl.locations.list
- automl.locations.setIamPolicy
- automl.modelEvaluations.create
- automl.modelEvaluations.get
- automl.modelEvaluations.list
- automl.models.create
- automl.models.delete
- automl.models.deploy
- automl.models.export
- automl.models.get
- automl.models.getIamPolicy
- automl.models.list
- automl.models.predict
- automl.models.setIamPolicy
- automl.models.undeploy
- automl.operations.cancel
- automl.operations.delete
- automl.operations.get
- automl.operations.list
- automl.tableSpecs.get
- automl.tableSpecs.list
- automl.tableSpecs.update
- automlrecommendations.apiKeys.create
- automlrecommendations.apiKeys.delete
- automlrecommendations.apiKeys.list
- automlrecommendations.catalogItems.create
- automlrecommendations.catalogItems.delete
- automlrecommendations.catalogItems.get
- automlrecommendations.catalogItems.list
- automlrecommendations.catalogItems.update
- automlrecommendations.catalogs.getStats
- automlrecommendations.catalogs.list
- automlrecommendations.catalogs.update
- automlrecommendations.eventStores.getStats
- automlrecommendations.eventStores.list
- automlrecommendations.events.create
- automlrecommendations.events.get
- automlrecommendations.events.list
- automlrecommendations.events.purge
- automlrecommendations.events.rejoin
- automlrecommendations.placements.create
- automlrecommendations.placements.delete
- automlrecommendations.placements.getStats
- automlrecommendations.placements.list
- automlrecommendations.recommendations.create
- automlrecommendations.recommendations.delete
- automlrecommendations.recommendations.list
- automlrecommendations.recommendations.pause
- automlrecommendations.recommendations.resume
- automlrecommendations.recommendations.update
- autoscaling.sites.getIamPolicy
- autoscaling.sites.readRecommendations
- autoscaling.sites.setIamPolicy
- autoscaling.sites.writeMetrics
- autoscaling.sites.writeState
- backupdr.locations.get
- backupdr.locations.list
- backupdr.managementServers.access
- backupdr.managementServers.accessSensitiveData
- backupdr.managementServers.assignBackupPlans
- backupdr.managementServers.backupAccess
- backupdr.managementServers.create
- backupdr.managementServers.delete
- backupdr.managementServers.get
- backupdr.managementServers.getIamPolicy
- backupdr.managementServers.list
- backupdr.managementServers.manageApplications
- backupdr.managementServers.manageBackupPlans
- backupdr.managementServers.manageBackupServers
- backupdr.managementServers.manageBackups
- backupdr.managementServers.manageClones
- backupdr.managementServers.manageExpiration
- backupdr.managementServers.manageHosts
- backupdr.managementServers.manageInternalACL
- backupdr.managementServers.manageJobs
- backupdr.managementServers.manageLiveClones
- backupdr.managementServers.manageMigrations
- backupdr.managementServers.manageMirroring
- backupdr.managementServers.manageMounts
- backupdr.managementServers.manageRestores
- backupdr.managementServers.manageSensitiveData
- backupdr.managementServers.manageStorage
- backupdr.managementServers.manageSystem
- backupdr.managementServers.manageWorkflows
- backupdr.managementServers.refreshWorkflows
- backupdr.managementServers.runWorkflows
- backupdr.managementServers.setIamPolicy
- backupdr.managementServers.testFailOvers
- backupdr.managementServers.viewBackupPlans
- backupdr.managementServers.viewBackupServers
- backupdr.managementServers.viewReports
- backupdr.managementServers.viewStorage
- backupdr.managementServers.viewSystem
- backupdr.managementServers.viewWorkflows
- backupdr.operations.cancel
- backupdr.operations.delete
- backupdr.operations.get
- backupdr.operations.list
- baremetalsolution.instancequotas.list
- baremetalsolution.instances.attachNetwork
- baremetalsolution.instances.attachVolume
- baremetalsolution.instances.create
- baremetalsolution.instances.detachLun
- baremetalsolution.instances.detachNetwork
- baremetalsolution.instances.detachVolume
- baremetalsolution.instances.disableInteractiveSerialConsole
- baremetalsolution.instances.enableInteractiveSerialConsole
- baremetalsolution.instances.get
- baremetalsolution.instances.list
- baremetalsolution.instances.rename
- baremetalsolution.instances.reset
- baremetalsolution.instances.start
- baremetalsolution.instances.stop
- baremetalsolution.instances.update
- baremetalsolution.luns.create
- baremetalsolution.luns.delete
- baremetalsolution.luns.evict
- baremetalsolution.luns.get
- baremetalsolution.luns.list
- baremetalsolution.luns.update
- baremetalsolution.maintenanceevents.addProposal
- baremetalsolution.maintenanceevents.approve
- baremetalsolution.maintenanceevents.get
- baremetalsolution.maintenanceevents.list
- baremetalsolution.networkquotas.list
- baremetalsolution.networks.create
- baremetalsolution.networks.delete
- baremetalsolution.networks.get
- baremetalsolution.networks.list
- baremetalsolution.networks.rename
- baremetalsolution.networks.update
- baremetalsolution.nfsshares.create
- baremetalsolution.nfsshares.delete
- baremetalsolution.nfsshares.get
- baremetalsolution.nfsshares.list
- baremetalsolution.nfsshares.rename
- baremetalsolution.nfsshares.update
- baremetalsolution.operations.get
- baremetalsolution.procurements.create
- baremetalsolution.procurements.get
- baremetalsolution.procurements.list
- baremetalsolution.skus.list
- baremetalsolution.snapshotschedulepolicies.create
- baremetalsolution.snapshotschedulepolicies.delete
- baremetalsolution.snapshotschedulepolicies.get
- baremetalsolution.snapshotschedulepolicies.list
- baremetalsolution.snapshotschedulepolicies.update
- baremetalsolution.sshKeys.create
- baremetalsolution.sshKeys.delete
- baremetalsolution.sshKeys.list
- baremetalsolution.storageaggregatepools.list
- baremetalsolution.volumequotas.list
- baremetalsolution.volumes.create
- baremetalsolution.volumes.delete
- baremetalsolution.volumes.evict
- baremetalsolution.volumes.get
- baremetalsolution.volumes.list
- baremetalsolution.volumes.rename
- baremetalsolution.volumes.resize
- baremetalsolution.volumes.update
- baremetalsolution.volumesnapshots.create
- baremetalsolution.volumesnapshots.delete
- baremetalsolution.volumesnapshots.get
- baremetalsolution.volumesnapshots.list
- baremetalsolution.volumesnapshots.restore
- batch.jobs.create
- batch.jobs.delete
- batch.jobs.get
- batch.jobs.list
- batch.locations.get
- batch.locations.list
- batch.operations.get
- batch.operations.list
- batch.states.report
- batch.tasks.get
- batch.tasks.list
- beyondcorp.appConnections.create
- beyondcorp.appConnections.delete
- beyondcorp.appConnections.get
- beyondcorp.appConnections.getIamPolicy
- beyondcorp.appConnections.list
- beyondcorp.appConnections.setIamPolicy
- beyondcorp.appConnections.update
- beyondcorp.appConnectors.create
- beyondcorp.appConnectors.delete
- beyondcorp.appConnectors.get
- beyondcorp.appConnectors.getIamPolicy
- beyondcorp.appConnectors.list
- beyondcorp.appConnectors.reportStatus
- beyondcorp.appConnectors.setIamPolicy
- beyondcorp.appConnectors.update
- beyondcorp.appGateways.create
- beyondcorp.appGateways.delete
- beyondcorp.appGateways.get
- beyondcorp.appGateways.getIamPolicy
- beyondcorp.appGateways.list
- beyondcorp.appGateways.setIamPolicy
- beyondcorp.appGateways.update
- beyondcorp.clientConnectorServices.create
- beyondcorp.clientConnectorServices.delete
- beyondcorp.clientConnectorServices.get
- beyondcorp.clientConnectorServices.getIamPolicy
- beyondcorp.clientConnectorServices.list
- beyondcorp.clientConnectorServices.setIamPolicy
- beyondcorp.clientConnectorServices.update
- beyondcorp.clientGateways.create
- beyondcorp.clientGateways.delete
- beyondcorp.clientGateways.get
- beyondcorp.clientGateways.getIamPolicy
- beyondcorp.clientGateways.list
- beyondcorp.clientGateways.setIamPolicy
- beyondcorp.locations.get
- beyondcorp.locations.list
- beyondcorp.operations.cancel
- beyondcorp.operations.delete
- beyondcorp.operations.get
- beyondcorp.operations.list
- beyondcorp.subscriptions.create
- beyondcorp.subscriptions.get
- beyondcorp.subscriptions.list
- biglake.catalogs.create
- biglake.catalogs.delete
- biglake.catalogs.get
- biglake.catalogs.list
- biglake.databases.create
- biglake.databases.delete
- biglake.databases.get
- biglake.databases.list
- biglake.databases.update
- biglake.locks.check
- biglake.locks.create
- biglake.locks.delete
- biglake.locks.list
- biglake.tables.create
- biglake.tables.delete
- biglake.tables.get
- biglake.tables.list
- biglake.tables.lock
- biglake.tables.update
- bigquery.bireservations.get
- bigquery.bireservations.update
- bigquery.capacityCommitments.create
- bigquery.capacityCommitments.delete
- bigquery.capacityCommitments.get
- bigquery.capacityCommitments.list
- bigquery.capacityCommitments.update
- bigquery.config.get
- bigquery.config.update
- bigquery.connections.create
- bigquery.connections.delegate
- bigquery.connections.delete
- bigquery.connections.get
- bigquery.connections.getIamPolicy
- bigquery.connections.list
- bigquery.connections.setIamPolicy
- bigquery.connections.update
- bigquery.connections.updateTag
- bigquery.connections.use
- bigquery.dataPolicies.create
- bigquery.dataPolicies.delete
- bigquery.dataPolicies.get
- bigquery.dataPolicies.getIamPolicy
- bigquery.dataPolicies.list
- bigquery.dataPolicies.setIamPolicy
- bigquery.dataPolicies.update
- bigquery.datasets.create
- bigquery.datasets.createTagBinding
- bigquery.datasets.delete
- bigquery.datasets.deleteTagBinding
- bigquery.datasets.get
- bigquery.datasets.getIamPolicy
- bigquery.datasets.link
- bigquery.datasets.listEffectiveTags
- bigquery.datasets.listTagBindings
- bigquery.datasets.setIamPolicy
- bigquery.datasets.update
- bigquery.datasets.updateTag
- bigquery.jobs.create
- bigquery.jobs.delete
- bigquery.jobs.get
- bigquery.jobs.list
- bigquery.jobs.listAll
- bigquery.jobs.listExecutionMetadata
- bigquery.jobs.update
- bigquery.models.create
- bigquery.models.delete
- bigquery.models.export
- bigquery.models.getData
- bigquery.models.getMetadata
- bigquery.models.list
- bigquery.models.updateData
- bigquery.models.updateMetadata
- bigquery.models.updateTag
- bigquery.readsessions.create
- bigquery.readsessions.getData
- bigquery.readsessions.update
- bigquery.reservationAssignments.create
- bigquery.reservationAssignments.delete
- bigquery.reservationAssignments.list
- bigquery.reservationAssignments.search
- bigquery.reservations.create
- bigquery.reservations.delete
- bigquery.reservations.get
- bigquery.reservations.list
- bigquery.reservations.update
- bigquery.routines.create
- bigquery.routines.delete
- bigquery.routines.get
- bigquery.routines.list
- bigquery.routines.update
- bigquery.routines.updateTag
- bigquery.rowAccessPolicies.create
- bigquery.rowAccessPolicies.delete
- bigquery.rowAccessPolicies.getIamPolicy
- bigquery.rowAccessPolicies.list
- bigquery.rowAccessPolicies.setIamPolicy
- bigquery.rowAccessPolicies.update
- bigquery.savedqueries.create
- bigquery.savedqueries.delete
- bigquery.savedqueries.get
- bigquery.savedqueries.list
- bigquery.savedqueries.update
- bigquery.tables.createIndex
- bigquery.tables.createSnapshot
- bigquery.tables.deleteIndex
- bigquery.tables.deleteSnapshot
- bigquery.tables.getIamPolicy
- bigquery.tables.restoreSnapshot
- bigquery.tables.setIamPolicy
- bigquery.transfers.get
- bigquery.transfers.update
- bigquerymigration.locations.get
- bigquerymigration.locations.list
- bigquerymigration.subtaskTypes.executeTask
- bigquerymigration.subtasks.create
- bigquerymigration.subtasks.executeTask
- bigquerymigration.subtasks.get
- bigquerymigration.subtasks.list
- bigquerymigration.taskTypes.orchestrateTask
- bigquerymigration.translation.translate
- bigquerymigration.workflows.create
- bigquerymigration.workflows.delete
- bigquerymigration.workflows.get
- bigquerymigration.workflows.list
- bigquerymigration.workflows.orchestrateTask
- bigquerymigration.workflows.update
- bigtable.appProfiles.create
- bigtable.appProfiles.delete
- bigtable.appProfiles.get
- bigtable.appProfiles.list
- bigtable.appProfiles.update
- bigtable.backups.create
- bigtable.backups.delete
- bigtable.backups.get
- bigtable.backups.getIamPolicy
- bigtable.backups.list
- bigtable.backups.read
- bigtable.backups.restore
- bigtable.backups.setIamPolicy
- bigtable.backups.update
- bigtable.clusters.create
- bigtable.clusters.delete
- bigtable.clusters.get
- bigtable.clusters.list
- bigtable.clusters.update
- bigtable.hotTablets.list
- bigtable.instances.create
- bigtable.instances.createTagBinding
- bigtable.instances.delete
- bigtable.instances.deleteTagBinding
- bigtable.instances.get
- bigtable.instances.getIamPolicy
- bigtable.instances.list
- bigtable.instances.listEffectiveTags
- bigtable.instances.listTagBindings
- bigtable.instances.ping
- bigtable.instances.setIamPolicy
- bigtable.instances.update
- bigtable.keyvisualizer.get
- bigtable.keyvisualizer.list
- bigtable.locations.list
- bigtable.tables.checkConsistency
- bigtable.tables.create
- bigtable.tables.delete
- bigtable.tables.generateConsistencyToken
- bigtable.tables.get
- bigtable.tables.getIamPolicy
- bigtable.tables.list
- bigtable.tables.mutateRows
- bigtable.tables.readRows
- bigtable.tables.sampleRowKeys
- bigtable.tables.setIamPolicy
- bigtable.tables.undelete
- bigtable.tables.update
- billing.resourceCosts.get
- binaryauthorization.attestors.create
- binaryauthorization.attestors.delete
- binaryauthorization.attestors.get
- binaryauthorization.attestors.getIamPolicy
- binaryauthorization.attestors.list
- binaryauthorization.attestors.setIamPolicy
- binaryauthorization.attestors.update
- binaryauthorization.attestors.verifyImageAttested
- binaryauthorization.continuousValidationConfig.get
- binaryauthorization.continuousValidationConfig.getIamPolicy
- binaryauthorization.continuousValidationConfig.setIamPolicy
- binaryauthorization.continuousValidationConfig.update
- binaryauthorization.platformPolicies.create
- binaryauthorization.platformPolicies.delete
- binaryauthorization.platformPolicies.evaluatePolicy
- binaryauthorization.platformPolicies.get
- binaryauthorization.platformPolicies.list
- binaryauthorization.platformPolicies.replace
- binaryauthorization.policy.evaluatePolicy
- binaryauthorization.policy.get
- binaryauthorization.policy.getIamPolicy
- binaryauthorization.policy.setIamPolicy
- binaryauthorization.policy.update
- blockchainnodeengine.blockchainNodes.create
- blockchainnodeengine.blockchainNodes.delete
- blockchainnodeengine.blockchainNodes.get
- blockchainnodeengine.blockchainNodes.list
- blockchainnodeengine.blockchainNodes.update
- blockchainnodeengine.locations.get
- blockchainnodeengine.locations.list
- blockchainnodeengine.operations.cancel
- blockchainnodeengine.operations.delete
- blockchainnodeengine.operations.get
- blockchainnodeengine.operations.list
- carestudio.patients.get
- carestudio.patients.list
- certificatemanager.certissuanceconfigs.create
- certificatemanager.certissuanceconfigs.delete
- certificatemanager.certissuanceconfigs.get
- certificatemanager.certissuanceconfigs.list
- certificatemanager.certissuanceconfigs.update
- certificatemanager.certissuanceconfigs.use
- certificatemanager.certmapentries.create
- certificatemanager.certmapentries.delete
- certificatemanager.certmapentries.get
- certificatemanager.certmapentries.getIamPolicy
- certificatemanager.certmapentries.list
- certificatemanager.certmapentries.setIamPolicy
- certificatemanager.certmapentries.update
- certificatemanager.certmaps.create
- certificatemanager.certmaps.delete
- certificatemanager.certmaps.get
- certificatemanager.certmaps.getIamPolicy
- certificatemanager.certmaps.list
- certificatemanager.certmaps.setIamPolicy
- certificatemanager.certmaps.update
- certificatemanager.certmaps.use
- certificatemanager.certs.create
- certificatemanager.certs.delete
- certificatemanager.certs.get
- certificatemanager.certs.getIamPolicy
- certificatemanager.certs.list
- certificatemanager.certs.setIamPolicy
- certificatemanager.certs.update
- certificatemanager.certs.use
- certificatemanager.dnsauthorizations.create
- certificatemanager.dnsauthorizations.delete
- certificatemanager.dnsauthorizations.get
- certificatemanager.dnsauthorizations.getIamPolicy
- certificatemanager.dnsauthorizations.list
- certificatemanager.dnsauthorizations.setIamPolicy
- certificatemanager.dnsauthorizations.update
- certificatemanager.dnsauthorizations.use
- certificatemanager.locations.get
- certificatemanager.locations.list
- certificatemanager.operations.cancel
- certificatemanager.operations.delete
- certificatemanager.operations.get
- certificatemanager.operations.list
- certificatemanager.trustconfigs.create
- certificatemanager.trustconfigs.delete
- certificatemanager.trustconfigs.get
- certificatemanager.trustconfigs.list
- certificatemanager.trustconfigs.update
- certificatemanager.trustconfigs.use
- chat.bots.get
- chat.bots.update
- chronicle.collectors.create
- chronicle.collectors.delete
- chronicle.collectors.get
- chronicle.collectors.list
- chronicle.collectors.update
- chronicle.curatedRuleSetCategories.countAllCuratedRuleSetDetections
- chronicle.curatedRuleSetCategories.get
- chronicle.curatedRuleSetCategories.list
- chronicle.curatedRuleSetDeployments.batchUpdate
- chronicle.curatedRuleSetDeployments.get
- chronicle.curatedRuleSetDeployments.list
- chronicle.curatedRuleSetDeployments.update
- chronicle.curatedRuleSets.countCuratedRuleSetDetections
- chronicle.curatedRuleSets.get
- chronicle.curatedRuleSets.list
- chronicle.curatedRules.get
- chronicle.curatedRules.list
- chronicle.dashboards.copy
- chronicle.dashboards.create
- chronicle.dashboards.delete
- chronicle.dashboards.edit
- chronicle.dashboards.get
- chronicle.dashboards.list
- chronicle.dashboards.schedule
- chronicle.extensionValidationReports.get
- chronicle.extensionValidationReports.list
- chronicle.feedSourceTypeSchemas.list
- chronicle.feeds.create
- chronicle.feeds.delete
- chronicle.feeds.disable
- chronicle.feeds.enable
- chronicle.feeds.get
- chronicle.feeds.list
- chronicle.feeds.update
- chronicle.forwarders.create
- chronicle.forwarders.delete
- chronicle.forwarders.generate
- chronicle.forwarders.get
- chronicle.forwarders.list
- chronicle.forwarders.update
- chronicle.instances.get
- chronicle.instances.report
- chronicle.legacies.legacyGetCuratedRulesTrends
- chronicle.legacies.legacyGetRuleCounts
- chronicle.legacies.legacyGetRulesTrends
- chronicle.legacies.legacyUpdateFinding
- chronicle.logTypeSchemas.list
- chronicle.multitenantDirectories.get
- chronicle.operations.cancel
- chronicle.operations.delete
- chronicle.operations.get
- chronicle.operations.list
- chronicle.operations.wait
- chronicle.parserExtensions.activate
- chronicle.parserExtensions.create
- chronicle.parserExtensions.delete
- chronicle.parserExtensions.generateKeyValueMappings
- chronicle.parserExtensions.get
- chronicle.parserExtensions.legacySubmitParserExtension
- chronicle.parserExtensions.list
- chronicle.parserExtensions.removeSyslog
- chronicle.parsers.activate
- chronicle.parsers.activateReleaseCandidate
- chronicle.parsers.copyPrebuiltParser
- chronicle.parsers.create
- chronicle.parsers.deactivate
- chronicle.parsers.delete
- chronicle.parsers.get
- chronicle.parsers.list
- chronicle.parsers.runParser
- chronicle.parsingErrors.list
- chronicle.referenceLists.create
- chronicle.referenceLists.get
- chronicle.referenceLists.list
- chronicle.referenceLists.update
- chronicle.referenceLists.verifyReferenceList
- chronicle.retrohunts.create
- chronicle.retrohunts.get
- chronicle.retrohunts.list
- chronicle.ruleDeployments.get
- chronicle.ruleDeployments.list
- chronicle.ruleDeployments.update
- chronicle.ruleExecutionErrors.list
- chronicle.rules.create
- chronicle.rules.get
- chronicle.rules.list
- chronicle.rules.listRevisions
- chronicle.rules.update
- chronicle.rules.verifyRuleText
- chronicle.validationErrors.list
- chronicle.validationReports.get
- chroniclesm.gcpAssociations.create
- chroniclesm.gcpAssociations.delete
- chroniclesm.gcpAssociations.get
- chroniclesm.gcpSettings.get
- chroniclesm.gcpSettings.update
- clientauthconfig.brands.create
- clientauthconfig.brands.delete
- clientauthconfig.brands.get
- clientauthconfig.brands.list
- clientauthconfig.brands.update
- clientauthconfig.clients.create
- clientauthconfig.clients.createSecret
- clientauthconfig.clients.delete
- clientauthconfig.clients.get
- clientauthconfig.clients.getWithSecret
- clientauthconfig.clients.list
- clientauthconfig.clients.listWithSecrets
- clientauthconfig.clients.undelete
- clientauthconfig.clients.update
- cloud.locations.get
- cloud.locations.list
- cloudasset.assets.analyzeIamPolicy
- cloudasset.assets.analyzeMove
- cloudasset.assets.exportAccessLevel
- cloudasset.assets.exportAccessPolicy
- cloudasset.assets.exportAiplatformBatchPredictionJobs
- cloudasset.assets.exportAiplatformCustomJobs
- cloudasset.assets.exportAiplatformDataLabelingJobs
- cloudasset.assets.exportAiplatformDatasets
- cloudasset.assets.exportAiplatformEndpoints
- cloudasset.assets.exportAiplatformHyperparameterTuningJobs
- cloudasset.assets.exportAiplatformMetadataStores
- cloudasset.assets.exportAiplatformModelDeploymentMonitoringJobs
- cloudasset.assets.exportAiplatformModels
- cloudasset.assets.exportAiplatformPipelineJobs
- cloudasset.assets.exportAiplatformSpecialistPools
- cloudasset.assets.exportAiplatformTrainingPipelines
- cloudasset.assets.exportAllAccessPolicy
- cloudasset.assets.exportAnthosConnectedCluster
- cloudasset.assets.exportAnthosedgeCluster
- cloudasset.assets.exportApigatewayApi
- cloudasset.assets.exportApigatewayApiConfig
- cloudasset.assets.exportApigatewayGateway
- cloudasset.assets.exportApikeysKeys
- cloudasset.assets.exportAppengineApplications
- cloudasset.assets.exportAppengineServices
- cloudasset.assets.exportAppengineVersions
- cloudasset.assets.exportArtifactregistryDockerImages
- cloudasset.assets.exportArtifactregistryRepositories
- cloudasset.assets.exportAssuredWorkloadsWorkloads
- cloudasset.assets.exportBeyondCorpApiGateways
- cloudasset.assets.exportBeyondCorpAppConnections
- cloudasset.assets.exportBeyondCorpAppConnectors
- cloudasset.assets.exportBeyondCorpAppGateways
- cloudasset.assets.exportBeyondCorpClientConnectorServices
- cloudasset.assets.exportBeyondCorpClientGateways
- cloudasset.assets.exportBigqueryDatasets
- cloudasset.assets.exportBigqueryModels
- cloudasset.assets.exportBigqueryTables
- cloudasset.assets.exportBigtableAppProfile
- cloudasset.assets.exportBigtableBackup
- cloudasset.assets.exportBigtableCluster
- cloudasset.assets.exportBigtableInstance
- cloudasset.assets.exportBigtableTable
- cloudasset.assets.exportCloudAssetFeeds
- cloudasset.assets.exportCloudDeployDeliveryPipelines
- cloudasset.assets.exportCloudDeployReleases
- cloudasset.assets.exportCloudDeployRollouts
- cloudasset.assets.exportCloudDeployTargets
- cloudasset.assets.exportCloudDocumentAIEvaluation
- cloudasset.assets.exportCloudDocumentAIHumanReviewConfig
- cloudasset.assets.exportCloudDocumentAILabelerPool
- cloudasset.assets.exportCloudDocumentAIProcessor
- cloudasset.assets.exportCloudDocumentAIProcessorVersion
- cloudasset.assets.exportCloudbillingBillingAccounts
- cloudasset.assets.exportCloudbillingProjectBillingInfos
- cloudasset.assets.exportCloudfunctionsFunctions
- cloudasset.assets.exportCloudfunctionsGen2Functions
- cloudasset.assets.exportCloudkmsCryptoKeyVersions
- cloudasset.assets.exportCloudkmsCryptoKeys
- cloudasset.assets.exportCloudkmsEkmConnections
- cloudasset.assets.exportCloudkmsImportJobs
- cloudasset.assets.exportCloudkmsKeyRings
- cloudasset.assets.exportCloudmemcacheInstances
- cloudasset.assets.exportCloudresourcemanagerFolders
- cloudasset.assets.exportCloudresourcemanagerOrganizations
- cloudasset.assets.exportCloudresourcemanagerProjects
- cloudasset.assets.exportCloudresourcemanagerTagBindings
- cloudasset.assets.exportCloudresourcemanagerTagKeys
- cloudasset.assets.exportCloudresourcemanagerTagValues
- cloudasset.assets.exportComposerEnvironments
- cloudasset.assets.exportComputeAddress
- cloudasset.assets.exportComputeAutoscalers
- cloudasset.assets.exportComputeBackendBuckets
- cloudasset.assets.exportComputeBackendServices
- cloudasset.assets.exportComputeCommitments
- cloudasset.assets.exportComputeDisks
- cloudasset.assets.exportComputeExternalVpnGateways
- cloudasset.assets.exportComputeFirewallPolicies
- cloudasset.assets.exportComputeFirewalls
- cloudasset.assets.exportComputeForwardingRules
- cloudasset.assets.exportComputeGlobalAddress
- cloudasset.assets.exportComputeGlobalForwardingRules
- cloudasset.assets.exportComputeHealthChecks
- cloudasset.assets.exportComputeHttpHealthChecks
- cloudasset.assets.exportComputeHttpsHealthChecks
- cloudasset.assets.exportComputeImages
- cloudasset.assets.exportComputeInstanceGroupManagers
- cloudasset.assets.exportComputeInstanceGroups
- cloudasset.assets.exportComputeInstanceTemplates
- cloudasset.assets.exportComputeInstances
- cloudasset.assets.exportComputeInterconnect
- cloudasset.assets.exportComputeInterconnectAttachment
- cloudasset.assets.exportComputeLicenses
- cloudasset.assets.exportComputeNetworkEndpointGroups
- cloudasset.assets.exportComputeNetworks
- cloudasset.assets.exportComputeNodeGroups
- cloudasset.assets.exportComputeNodeTemplates
- cloudasset.assets.exportComputePacketMirrorings
- cloudasset.assets.exportComputeProjects
- cloudasset.assets.exportComputeRegionAutoscaler
- cloudasset.assets.exportComputeRegionBackendServices
- cloudasset.assets.exportComputeRegionDisk
- cloudasset.assets.exportComputeRegionInstanceGroup
- cloudasset.assets.exportComputeRegionInstanceGroupManager
- cloudasset.assets.exportComputeReservations
- cloudasset.assets.exportComputeResourcePolicies
- cloudasset.assets.exportComputeRouters
- cloudasset.assets.exportComputeRoutes
- cloudasset.assets.exportComputeSecurityPolicy
- cloudasset.assets.exportComputeServiceAttachments
- cloudasset.assets.exportComputeSnapshots
- cloudasset.assets.exportComputeSslCertificates
- cloudasset.assets.exportComputeSslPolicies
- cloudasset.assets.exportComputeSubnetworks
- cloudasset.assets.exportComputeTargetHttpProxies
- cloudasset.assets.exportComputeTargetHttpsProxies
- cloudasset.assets.exportComputeTargetInstances
- cloudasset.assets.exportComputeTargetPools
- cloudasset.assets.exportComputeTargetSslProxies
- cloudasset.assets.exportComputeTargetTcpProxies
- cloudasset.assets.exportComputeTargetVpnGateways
- cloudasset.assets.exportComputeUrlMaps
- cloudasset.assets.exportComputeVpnGateways
- cloudasset.assets.exportComputeVpnTunnels
- cloudasset.assets.exportConnectorsConnections
- cloudasset.assets.exportConnectorsConnectorVersions
- cloudasset.assets.exportConnectorsConnectors
- cloudasset.assets.exportConnectorsProviders
- cloudasset.assets.exportConnectorsRuntimeConfigs
- cloudasset.assets.exportContainerAppsDeployment
- cloudasset.assets.exportContainerAppsReplicaSets
- cloudasset.assets.exportContainerBatchJobs
- cloudasset.assets.exportContainerClusterrole
- cloudasset.assets.exportContainerClusterrolebinding
- cloudasset.assets.exportContainerClusters
- cloudasset.assets.exportContainerExtensionsIngresses
- cloudasset.assets.exportContainerJobs
- cloudasset.assets.exportContainerNamespace
- cloudasset.assets.exportContainerNetworkingIngresses
- cloudasset.assets.exportContainerNetworkingNetworkPolicies
- cloudasset.assets.exportContainerNode
- cloudasset.assets.exportContainerNodepool
- cloudasset.assets.exportContainerPod
- cloudasset.assets.exportContainerReplicaSets
- cloudasset.assets.exportContainerRole
- cloudasset.assets.exportContainerRolebinding
- cloudasset.assets.exportContainerServices
- cloudasset.assets.exportContainerregistryImage
- cloudasset.assets.exportDataMigrationConnectionProfiles
- cloudasset.assets.exportDataMigrationMigrationJobs
- cloudasset.assets.exportDataflowJobs
- cloudasset.assets.exportDatafusionInstance
- cloudasset.assets.exportDataplexAssets
- cloudasset.assets.exportDataplexLakes
- cloudasset.assets.exportDataplexTasks
- cloudasset.assets.exportDataplexZones
- cloudasset.assets.exportDataprocAutoscalingPolicies
- cloudasset.assets.exportDataprocBatches
- cloudasset.assets.exportDataprocClusters
- cloudasset.assets.exportDataprocJobs
- cloudasset.assets.exportDataprocSessions
- cloudasset.assets.exportDataprocWorkflowTemplates
- cloudasset.assets.exportDatastreamConnectionProfile
- cloudasset.assets.exportDatastreamPrivateConnection
- cloudasset.assets.exportDatastreamStream
- cloudasset.assets.exportDialogflowAgents
- cloudasset.assets.exportDialogflowConversationProfiles
- cloudasset.assets.exportDialogflowKnowledgeBases
- cloudasset.assets.exportDialogflowLocationSettings
- cloudasset.assets.exportDlpDeidentifyTemplates
- cloudasset.assets.exportDlpDlpJobs
- cloudasset.assets.exportDlpInspectTemplates
- cloudasset.assets.exportDlpJobTriggers
- cloudasset.assets.exportDlpStoredInfoTypes
- cloudasset.assets.exportDnsManagedZones
- cloudasset.assets.exportDnsPolicies
- cloudasset.assets.exportDomainsRegistrations
- cloudasset.assets.exportEventarcTriggers
- cloudasset.assets.exportFileBackups
- cloudasset.assets.exportFileInstances
- cloudasset.assets.exportFirebaseAppInfos
- cloudasset.assets.exportFirebaseProjects
- cloudasset.assets.exportFirestoreDatabases
- cloudasset.assets.exportGKEHubFeatures
- cloudasset.assets.exportGKEHubMemberships
- cloudasset.assets.exportGameservicesGameServerClusters
- cloudasset.assets.exportGameservicesGameServerConfigs
- cloudasset.assets.exportGameservicesGameServerDeployments
- cloudasset.assets.exportGameservicesRealms
- cloudasset.assets.exportGkeBackupBackupPlans
- cloudasset.assets.exportGkeBackupBackups
- cloudasset.assets.exportGkeBackupRestorePlans
- cloudasset.assets.exportGkeBackupRestores
- cloudasset.assets.exportGkeBackupVolumeBackups
- cloudasset.assets.exportGkeBackupVolumeRestores
- cloudasset.assets.exportHealthcareConsentStores
- cloudasset.assets.exportHealthcareDatasets
- cloudasset.assets.exportHealthcareDicomStores
- cloudasset.assets.exportHealthcareFhirStores
- cloudasset.assets.exportHealthcareHl7V2Stores
- cloudasset.assets.exportIamPolicy
- cloudasset.assets.exportIamRoles
- cloudasset.assets.exportIamServiceAccountKeys
- cloudasset.assets.exportIamServiceAccounts
- cloudasset.assets.exportIapTunnel
- cloudasset.assets.exportIapTunnelInstances
- cloudasset.assets.exportIapTunnelZones
- cloudasset.assets.exportIapWeb
- cloudasset.assets.exportIapWebServiceVersion
- cloudasset.assets.exportIapWebServices
- cloudasset.assets.exportIapWebType
- cloudasset.assets.exportIdsEndpoints
- cloudasset.assets.exportIntegrationsAuthConfigs
- cloudasset.assets.exportIntegrationsCertificates
- cloudasset.assets.exportIntegrationsExecutions
- cloudasset.assets.exportIntegrationsIntegrationVersions
- cloudasset.assets.exportIntegrationsIntegrations
- cloudasset.assets.exportIntegrationsSfdcChannels
- cloudasset.assets.exportIntegrationsSfdcInstances
- cloudasset.assets.exportIntegrationsSuspensions
- cloudasset.assets.exportLoggingLogMetrics
- cloudasset.assets.exportLoggingLogSinks
- cloudasset.assets.exportManagedidentitiesDomain
- cloudasset.assets.exportMetastoreBackups
- cloudasset.assets.exportMetastoreMetadataImports
- cloudasset.assets.exportMetastoreServices
- cloudasset.assets.exportMonitoringAlertPolicies
- cloudasset.assets.exportNetworkConnectivityHubs
- cloudasset.assets.exportNetworkConnectivitySpokes
- cloudasset.assets.exportNetworkManagementConnectivityTests
- cloudasset.assets.exportNetworkServicesEndpointPolicies
- cloudasset.assets.exportNetworkServicesGateways
- cloudasset.assets.exportNetworkServicesGrpcRoutes
- cloudasset.assets.exportNetworkServicesHttpRoutes
- cloudasset.assets.exportNetworkServicesMeshes
- cloudasset.assets.exportNetworkServicesServiceBindings
- cloudasset.assets.exportNetworkServicesTcpRoutes
- cloudasset.assets.exportNetworkServicesTlsRoutes
- cloudasset.assets.exportOSConfigOSPolicyAssignmentReports
- cloudasset.assets.exportOSConfigOSPolicyAssignments
- cloudasset.assets.exportOSConfigVulnerabilityReports
- cloudasset.assets.exportOSInventories
- cloudasset.assets.exportOrgPolicy
- cloudasset.assets.exportPatchDeployments
- cloudasset.assets.exportPubsubSnapshots
- cloudasset.assets.exportPubsubSubscriptions
- cloudasset.assets.exportPubsubTopics
- cloudasset.assets.exportRedisInstances
- cloudasset.assets.exportResource
- cloudasset.assets.exportSecretManagerSecretVersions
- cloudasset.assets.exportSecretManagerSecrets
- cloudasset.assets.exportServiceDirectoryNamespaces
- cloudasset.assets.exportServicePerimeter
- cloudasset.assets.exportServiceconsumermanagementConsumerProperty
- cloudasset.assets.exportServiceconsumermanagementConsumerQuotaLimits
- cloudasset.assets.exportServiceconsumermanagementConsumers
- cloudasset.assets.exportServiceconsumermanagementProducerOverrides
- cloudasset.assets.exportServiceconsumermanagementTenancyUnits
- cloudasset.assets.exportServiceconsumermanagementVisibility
- cloudasset.assets.exportServicemanagementServices
- cloudasset.assets.exportServiceusageAdminOverrides
- cloudasset.assets.exportServiceusageConsumerOverrides
- cloudasset.assets.exportServiceusageServices
- cloudasset.assets.exportSpannerBackups
- cloudasset.assets.exportSpannerDatabases
- cloudasset.assets.exportSpannerInstances
- cloudasset.assets.exportSpeakerIdPhrases
- cloudasset.assets.exportSpeakerIdSettings
- cloudasset.assets.exportSpeakerIdSpeakers
- cloudasset.assets.exportSpeechCustomClasses
- cloudasset.assets.exportSpeechPhraseSets
- cloudasset.assets.exportSqladminBackupRuns
- cloudasset.assets.exportSqladminInstances
- cloudasset.assets.exportStorageBuckets
- cloudasset.assets.exportTpuNodes
- cloudasset.assets.exportVpcaccessConnector
- cloudasset.assets.listAccessLevel
- cloudasset.assets.listAccessPolicy
- cloudasset.assets.listAiplatformBatchPredictionJobs
- cloudasset.assets.listAiplatformCustomJobs
- cloudasset.assets.listAiplatformDataLabelingJobs
- cloudasset.assets.listAiplatformDatasets
- cloudasset.assets.listAiplatformEndpoints
- cloudasset.assets.listAiplatformHyperparameterTuningJobs
- cloudasset.assets.listAiplatformMetadataStores
- cloudasset.assets.listAiplatformModelDeploymentMonitoringJobs
- cloudasset.assets.listAiplatformModels
- cloudasset.assets.listAiplatformPipelineJobs
- cloudasset.assets.listAiplatformSpecialistPools
- cloudasset.assets.listAiplatformTrainingPipelines
- cloudasset.assets.listAllAccessPolicy
- cloudasset.assets.listAnthosConnectedCluster
- cloudasset.assets.listAnthosedgeCluster
- cloudasset.assets.listApigatewayApi
- cloudasset.assets.listApigatewayApiConfig
- cloudasset.assets.listApigatewayGateway
- cloudasset.assets.listApikeysKeys
- cloudasset.assets.listAppengineApplications
- cloudasset.assets.listAppengineServices
- cloudasset.assets.listAppengineVersions
- cloudasset.assets.listArtifactregistryDockerImages
- cloudasset.assets.listArtifactregistryRepositories
- cloudasset.assets.listAssuredWorkloadsWorkloads
- cloudasset.assets.listBeyondCorpApiGateways
- cloudasset.assets.listBeyondCorpAppConnections
- cloudasset.assets.listBeyondCorpAppConnectors
- cloudasset.assets.listBeyondCorpAppGateways
- cloudasset.assets.listBeyondCorpClientConnectorServices
- cloudasset.assets.listBeyondCorpClientGateways
- cloudasset.assets.listBigqueryDatasets
- cloudasset.assets.listBigqueryModels
- cloudasset.assets.listBigqueryTables
- cloudasset.assets.listBigtableAppProfile
- cloudasset.assets.listBigtableBackup
- cloudasset.assets.listBigtableCluster
- cloudasset.assets.listBigtableInstance
- cloudasset.assets.listBigtableTable
- cloudasset.assets.listCloudAssetFeeds
- cloudasset.assets.listCloudDeployDeliveryPipelines
- cloudasset.assets.listCloudDeployReleases
- cloudasset.assets.listCloudDeployRollouts
- cloudasset.assets.listCloudDeployTargets
- cloudasset.assets.listCloudDocumentAIEvaluation
- cloudasset.assets.listCloudDocumentAIHumanReviewConfig
- cloudasset.assets.listCloudDocumentAILabelerPool
- cloudasset.assets.listCloudDocumentAIProcessor
- cloudasset.assets.listCloudDocumentAIProcessorVersion
- cloudasset.assets.listCloudbillingBillingAccounts
- cloudasset.assets.listCloudbillingProjectBillingInfos
- cloudasset.assets.listCloudfunctionsFunctions
- cloudasset.assets.listCloudfunctionsGen2Functions
- cloudasset.assets.listCloudkmsCryptoKeyVersions
- cloudasset.assets.listCloudkmsCryptoKeys
- cloudasset.assets.listCloudkmsEkmConnections
- cloudasset.assets.listCloudkmsImportJobs
- cloudasset.assets.listCloudkmsKeyRings
- cloudasset.assets.listCloudmemcacheInstances
- cloudasset.assets.listCloudresourcemanagerFolders
- cloudasset.assets.listCloudresourcemanagerOrganizations
- cloudasset.assets.listCloudresourcemanagerProjects
- cloudasset.assets.listCloudresourcemanagerTagBindings
- cloudasset.assets.listCloudresourcemanagerTagKeys
- cloudasset.assets.listCloudresourcemanagerTagValues
- cloudasset.assets.listComposerEnvironments
- cloudasset.assets.listComputeAddress
- cloudasset.assets.listComputeAutoscalers
- cloudasset.assets.listComputeBackendBuckets
- cloudasset.assets.listComputeBackendServices
- cloudasset.assets.listComputeCommitments
- cloudasset.assets.listComputeDisks
- cloudasset.assets.listComputeExternalVpnGateways
- cloudasset.assets.listComputeFirewallPolicies
- cloudasset.assets.listComputeFirewalls
- cloudasset.assets.listComputeForwardingRules
- cloudasset.assets.listComputeGlobalAddress
- cloudasset.assets.listComputeGlobalForwardingRules
- cloudasset.assets.listComputeHealthChecks
- cloudasset.assets.listComputeHttpHealthChecks
- cloudasset.assets.listComputeHttpsHealthChecks
- cloudasset.assets.listComputeImages
- cloudasset.assets.listComputeInstanceGroupManagers
- cloudasset.assets.listComputeInstanceGroups
- cloudasset.assets.listComputeInstanceTemplates
- cloudasset.assets.listComputeInstances
- cloudasset.assets.listComputeInterconnect
- cloudasset.assets.listComputeInterconnectAttachment
- cloudasset.assets.listComputeLicenses
- cloudasset.assets.listComputeNetworkEndpointGroups
- cloudasset.assets.listComputeNetworks
- cloudasset.assets.listComputeNodeGroups
- cloudasset.assets.listComputeNodeTemplates
- cloudasset.assets.listComputePacketMirrorings
- cloudasset.assets.listComputeProjects
- cloudasset.assets.listComputeRegionAutoscaler
- cloudasset.assets.listComputeRegionBackendServices
- cloudasset.assets.listComputeRegionDisk
- cloudasset.assets.listComputeRegionInstanceGroup
- cloudasset.assets.listComputeRegionInstanceGroupManager
- cloudasset.assets.listComputeReservations
- cloudasset.assets.listComputeResourcePolicies
- cloudasset.assets.listComputeRouters
- cloudasset.assets.listComputeRoutes
- cloudasset.assets.listComputeSecurityPolicy
- cloudasset.assets.listComputeServiceAttachments
- cloudasset.assets.listComputeSnapshots
- cloudasset.assets.listComputeSslCertificates
- cloudasset.assets.listComputeSslPolicies
- cloudasset.assets.listComputeSubnetworks
- cloudasset.assets.listComputeTargetHttpProxies
- cloudasset.assets.listComputeTargetHttpsProxies
- cloudasset.assets.listComputeTargetInstances
- cloudasset.assets.listComputeTargetPools
- cloudasset.assets.listComputeTargetSslProxies
- cloudasset.assets.listComputeTargetTcpProxies
- cloudasset.assets.listComputeTargetVpnGateways
- cloudasset.assets.listComputeUrlMaps
- cloudasset.assets.listComputeVpnGateways
- cloudasset.assets.listComputeVpnTunnels
- cloudasset.assets.listConnectorsConnections
- cloudasset.assets.listConnectorsConnectorVersions
- cloudasset.assets.listConnectorsConnectors
- cloudasset.assets.listConnectorsProviders
- cloudasset.assets.listConnectorsRuntimeConfigs
- cloudasset.assets.listContainerAppsDeployment
- cloudasset.assets.listContainerAppsReplicaSets
- cloudasset.assets.listContainerBatchJobs
- cloudasset.assets.listContainerClusterrole
- cloudasset.assets.listContainerClusterrolebinding
- cloudasset.assets.listContainerClusters
- cloudasset.assets.listContainerExtensionsIngresses
- cloudasset.assets.listContainerJobs
- cloudasset.assets.listContainerNamespace
- cloudasset.assets.listContainerNetworkingIngresses
- cloudasset.assets.listContainerNetworkingNetworkPolicies
- cloudasset.assets.listContainerNode
- cloudasset.assets.listContainerNodepool
- cloudasset.assets.listContainerPod
- cloudasset.assets.listContainerReplicaSets
- cloudasset.assets.listContainerRole
- cloudasset.assets.listContainerRolebinding
- cloudasset.assets.listContainerServices
- cloudasset.assets.listContainerregistryImage
- cloudasset.assets.listDataMigrationConnectionProfiles
- cloudasset.assets.listDataMigrationMigrationJobs
- cloudasset.assets.listDataflowJobs
- cloudasset.assets.listDatafusionInstance
- cloudasset.assets.listDataplexAssets
- cloudasset.assets.listDataplexLakes
- cloudasset.assets.listDataplexTasks
- cloudasset.assets.listDataplexZones
- cloudasset.assets.listDataprocAutoscalingPolicies
- cloudasset.assets.listDataprocBatches
- cloudasset.assets.listDataprocClusters
- cloudasset.assets.listDataprocJobs
- cloudasset.assets.listDataprocSessions
- cloudasset.assets.listDataprocWorkflowTemplates
- cloudasset.assets.listDatastreamConnectionProfile
- cloudasset.assets.listDatastreamPrivateConnection
- cloudasset.assets.listDatastreamStream
- cloudasset.assets.listDialogflowAgents
- cloudasset.assets.listDialogflowConversationProfiles
- cloudasset.assets.listDialogflowKnowledgeBases
- cloudasset.assets.listDialogflowLocationSettings
- cloudasset.assets.listDlpDeidentifyTemplates
- cloudasset.assets.listDlpDlpJobs
- cloudasset.assets.listDlpInspectTemplates
- cloudasset.assets.listDlpJobTriggers
- cloudasset.assets.listDlpStoredInfoTypes
- cloudasset.assets.listDnsManagedZones
- cloudasset.assets.listDnsPolicies
- cloudasset.assets.listDomainsRegistrations
- cloudasset.assets.listEventarcTriggers
- cloudasset.assets.listFileBackups
- cloudasset.assets.listFileInstances
- cloudasset.assets.listFirebaseAppInfos
- cloudasset.assets.listFirebaseProjects
- cloudasset.assets.listFirestoreDatabases
- cloudasset.assets.listGKEHubFeatures
- cloudasset.assets.listGKEHubMemberships
- cloudasset.assets.listGameservicesGameServerClusters
- cloudasset.assets.listGameservicesGameServerConfigs
- cloudasset.assets.listGameservicesGameServerDeployments
- cloudasset.assets.listGameservicesRealms
- cloudasset.assets.listGkeBackupBackupPlans
- cloudasset.assets.listGkeBackupBackups
- cloudasset.assets.listGkeBackupRestorePlans
- cloudasset.assets.listGkeBackupRestores
- cloudasset.assets.listGkeBackupVolumeBackups
- cloudasset.assets.listGkeBackupVolumeRestores
- cloudasset.assets.listHealthcareConsentStores
- cloudasset.assets.listHealthcareDatasets
- cloudasset.assets.listHealthcareDicomStores
- cloudasset.assets.listHealthcareFhirStores
- cloudasset.assets.listHealthcareHl7V2Stores
- cloudasset.assets.listIamPolicy
- cloudasset.assets.listIamRoles
- cloudasset.assets.listIamServiceAccountKeys
- cloudasset.assets.listIamServiceAccounts
- cloudasset.assets.listIapTunnel
- cloudasset.assets.listIapTunnelInstances
- cloudasset.assets.listIapTunnelZones
- cloudasset.assets.listIapWeb
- cloudasset.assets.listIapWebServiceVersion
- cloudasset.assets.listIapWebServices
- cloudasset.assets.listIapWebType
- cloudasset.assets.listIdsEndpoints
- cloudasset.assets.listIntegrationsAuthConfigs
- cloudasset.assets.listIntegrationsCertificates
- cloudasset.assets.listIntegrationsExecutions
- cloudasset.assets.listIntegrationsIntegrationVersions
- cloudasset.assets.listIntegrationsIntegrations
- cloudasset.assets.listIntegrationsSfdcChannels
- cloudasset.assets.listIntegrationsSfdcInstances
- cloudasset.assets.listIntegrationsSuspensions
- cloudasset.assets.listLoggingLogMetrics
- cloudasset.assets.listLoggingLogSinks
- cloudasset.assets.listManagedidentitiesDomain
- cloudasset.assets.listMetastoreBackups
- cloudasset.assets.listMetastoreMetadataImports
- cloudasset.assets.listMetastoreServices
- cloudasset.assets.listMonitoringAlertPolicies
- cloudasset.assets.listNetworkConnectivityHubs
- cloudasset.assets.listNetworkConnectivitySpokes
- cloudasset.assets.listNetworkManagementConnectivityTests
- cloudasset.assets.listNetworkServicesEndpointPolicies
- cloudasset.assets.listNetworkServicesGateways
- cloudasset.assets.listNetworkServicesGrpcRoutes
- cloudasset.assets.listNetworkServicesHttpRoutes
- cloudasset.assets.listNetworkServicesMeshes
- cloudasset.assets.listNetworkServicesServiceBindings
- cloudasset.assets.listNetworkServicesTcpRoutes
- cloudasset.assets.listNetworkServicesTlsRoutes
- cloudasset.assets.listOSConfigOSPolicyAssignmentReports
- cloudasset.assets.listOSConfigOSPolicyAssignments
- cloudasset.assets.listOSConfigVulnerabilityReports
- cloudasset.assets.listOSInventories
- cloudasset.assets.listOrgPolicy
- cloudasset.assets.listPatchDeployments
- cloudasset.assets.listPubsubSnapshots
- cloudasset.assets.listPubsubSubscriptions
- cloudasset.assets.listPubsubTopics
- cloudasset.assets.listRedisInstances
- cloudasset.assets.listResource
- cloudasset.assets.listRunDomainMapping
- cloudasset.assets.listRunRevision
- cloudasset.assets.listRunService
- cloudasset.assets.listSecretManagerSecretVersions
- cloudasset.assets.listSecretManagerSecrets
- cloudasset.assets.listServiceDirectoryNamespaces
- cloudasset.assets.listServicePerimeter
- cloudasset.assets.listServiceconsumermanagementConsumerProperty
- cloudasset.assets.listServiceconsumermanagementConsumerQuotaLimits
- cloudasset.assets.listServiceconsumermanagementConsumers
- cloudasset.assets.listServiceconsumermanagementProducerOverrides
- cloudasset.assets.listServiceconsumermanagementTenancyUnits
- cloudasset.assets.listServiceconsumermanagementVisibility
- cloudasset.assets.listServicemanagementServices
- cloudasset.assets.listServiceusageAdminOverrides
- cloudasset.assets.listServiceusageConsumerOverrides
- cloudasset.assets.listServiceusageServices
- cloudasset.assets.listSpannerBackups
- cloudasset.assets.listSpannerDatabases
- cloudasset.assets.listSpannerInstances
- cloudasset.assets.listSpeakerIdPhrases
- cloudasset.assets.listSpeakerIdSettings
- cloudasset.assets.listSpeakerIdSpeakers
- cloudasset.assets.listSpeechCustomClasses
- cloudasset.assets.listSpeechPhraseSets
- cloudasset.assets.listSqladminBackupRuns
- cloudasset.assets.listSqladminInstances
- cloudasset.assets.listStorageBuckets
- cloudasset.assets.listTpuNodes
- cloudasset.assets.listVpcaccessConnector
- cloudasset.assets.queryAccessPolicy
- cloudasset.assets.queryIamPolicy
- cloudasset.assets.queryOSInventories
- cloudasset.assets.queryResource
- cloudasset.assets.searchAllIamPolicies
- cloudasset.assets.searchAllResources
- cloudasset.feeds.create
- cloudasset.feeds.delete
- cloudasset.feeds.get
- cloudasset.feeds.list
- cloudasset.feeds.update
- cloudasset.savedqueries.create
- cloudasset.savedqueries.delete
- cloudasset.savedqueries.get
- cloudasset.savedqueries.list
- cloudasset.savedqueries.update
- cloudbuild.builds.approve
- cloudbuild.builds.create
- cloudbuild.builds.get
- cloudbuild.builds.list
- cloudbuild.builds.update
- cloudbuild.connections.create
- cloudbuild.connections.delete
- cloudbuild.connections.fetchLinkableRepositories
- cloudbuild.connections.get
- cloudbuild.connections.getIamPolicy
- cloudbuild.connections.list
- cloudbuild.connections.setIamPolicy
- cloudbuild.connections.update
- cloudbuild.integrations.create
- cloudbuild.integrations.delete
- cloudbuild.integrations.get
- cloudbuild.integrations.list
- cloudbuild.integrations.update
- cloudbuild.repositories.accessReadToken
- cloudbuild.repositories.accessReadWriteToken
- cloudbuild.repositories.create
- cloudbuild.repositories.delete
- cloudbuild.repositories.fetchGitRefs
- cloudbuild.repositories.get
- cloudbuild.repositories.list
- cloudbuild.workerpools.create
- cloudbuild.workerpools.delete
- cloudbuild.workerpools.get
- cloudbuild.workerpools.list
- cloudbuild.workerpools.update
- cloudbuild.workerpools.use
- cloudconfig.configs.get
- cloudconfig.configs.update
- cloudcontrolspartner.customers.get
- cloudcontrolspartner.customers.list
- cloudcontrolspartner.partners.get
- cloudcontrolspartner.violations.get
- cloudcontrolspartner.violations.list
- cloudcontrolspartner.workloads.get
- cloudcontrolspartner.workloads.list
- clouddebugger.breakpoints.create
- clouddebugger.breakpoints.delete
- clouddebugger.breakpoints.get
- clouddebugger.breakpoints.list
- clouddebugger.breakpoints.listActive
- clouddebugger.breakpoints.update
- clouddebugger.debuggees.create
- clouddebugger.debuggees.list
- clouddeploy.config.get
- clouddeploy.deliveryPipelines.create
- clouddeploy.deliveryPipelines.delete
- clouddeploy.deliveryPipelines.get
- clouddeploy.deliveryPipelines.getIamPolicy
- clouddeploy.deliveryPipelines.list
- clouddeploy.deliveryPipelines.setIamPolicy
- clouddeploy.deliveryPipelines.update
- clouddeploy.jobRuns.get
- clouddeploy.jobRuns.list
- clouddeploy.jobRuns.terminate
- clouddeploy.locations.get
- clouddeploy.locations.list
- clouddeploy.operations.cancel
- clouddeploy.operations.delete
- clouddeploy.operations.get
- clouddeploy.operations.list
- clouddeploy.releases.abandon
- clouddeploy.releases.create
- clouddeploy.releases.delete
- clouddeploy.releases.get
- clouddeploy.releases.list
- clouddeploy.rollouts.advance
- clouddeploy.rollouts.approve
- clouddeploy.rollouts.cancel
- clouddeploy.rollouts.create
- clouddeploy.rollouts.get
- clouddeploy.rollouts.ignoreJob
- clouddeploy.rollouts.list
- clouddeploy.rollouts.retryJob
- clouddeploy.targets.create
- clouddeploy.targets.delete
- clouddeploy.targets.get
- clouddeploy.targets.getIamPolicy
- clouddeploy.targets.list
- clouddeploy.targets.setIamPolicy
- clouddeploy.targets.update
- cloudfunctions.functions.call
- cloudfunctions.functions.create
- cloudfunctions.functions.delete
- cloudfunctions.functions.get
- cloudfunctions.functions.getIamPolicy
- cloudfunctions.functions.invoke
- cloudfunctions.functions.list
- cloudfunctions.functions.setIamPolicy
- cloudfunctions.functions.sourceCodeGet
- cloudfunctions.functions.sourceCodeSet
- cloudfunctions.functions.update
- cloudfunctions.locations.get
- cloudfunctions.locations.list
- cloudfunctions.operations.get
- cloudfunctions.operations.list
- cloudfunctions.runtimes.list
- cloudiot.devices.bindGateway
- cloudiot.devices.create
- cloudiot.devices.delete
- cloudiot.devices.get
- cloudiot.devices.list
- cloudiot.devices.sendCommand
- cloudiot.devices.unbindGateway
- cloudiot.devices.update
- cloudiot.devices.updateConfig
- cloudiot.registries.create
- cloudiot.registries.delete
- cloudiot.registries.get
- cloudiot.registries.getIamPolicy
- cloudiot.registries.list
- cloudiot.registries.setIamPolicy
- cloudiot.registries.update
- cloudiottoken.tokensettings.get
- cloudiottoken.tokensettings.update
- cloudjobdiscovery.companies.create
- cloudjobdiscovery.companies.delete
- cloudjobdiscovery.companies.get
- cloudjobdiscovery.companies.list
- cloudjobdiscovery.companies.update
- cloudjobdiscovery.events.create
- cloudjobdiscovery.jobs.create
- cloudjobdiscovery.jobs.delete
- cloudjobdiscovery.jobs.get
- cloudjobdiscovery.jobs.search
- cloudjobdiscovery.jobs.update
- cloudjobdiscovery.profiles.create
- cloudjobdiscovery.profiles.delete
- cloudjobdiscovery.profiles.get
- cloudjobdiscovery.profiles.search
- cloudjobdiscovery.profiles.update
- cloudjobdiscovery.tenants.create
- cloudjobdiscovery.tenants.delete
- cloudjobdiscovery.tenants.get
- cloudjobdiscovery.tenants.update
- cloudjobdiscovery.tools.access
- cloudkms.cryptoKeyVersions.create
- cloudkms.cryptoKeyVersions.destroy
- cloudkms.cryptoKeyVersions.get
- cloudkms.cryptoKeyVersions.list
- cloudkms.cryptoKeyVersions.manageRawPKCS1Keys
- cloudkms.cryptoKeyVersions.restore
- cloudkms.cryptoKeyVersions.update
- cloudkms.cryptoKeyVersions.useToDecrypt
- cloudkms.cryptoKeyVersions.useToDecryptViaDelegation
- cloudkms.cryptoKeyVersions.useToEncrypt
- cloudkms.cryptoKeyVersions.useToEncryptViaDelegation
- cloudkms.cryptoKeyVersions.useToSign
- cloudkms.cryptoKeyVersions.useToVerify
- cloudkms.cryptoKeyVersions.viewPublicKey
- cloudkms.cryptoKeys.create
- cloudkms.cryptoKeys.get
- cloudkms.cryptoKeys.getIamPolicy
- cloudkms.cryptoKeys.list
- cloudkms.cryptoKeys.setIamPolicy
- cloudkms.cryptoKeys.update
- cloudkms.ekmConfigs.get
- cloudkms.ekmConfigs.getIamPolicy
- cloudkms.ekmConfigs.setIamPolicy
- cloudkms.ekmConfigs.update
- cloudkms.ekmConnections.create
- cloudkms.ekmConnections.get
- cloudkms.ekmConnections.getIamPolicy
- cloudkms.ekmConnections.list
- cloudkms.ekmConnections.setIamPolicy
- cloudkms.ekmConnections.update
- cloudkms.ekmConnections.use
- cloudkms.ekmConnections.verifyConnectivity
- cloudkms.importJobs.create
- cloudkms.importJobs.get
- cloudkms.importJobs.getIamPolicy
- cloudkms.importJobs.list
- cloudkms.importJobs.setIamPolicy
- cloudkms.importJobs.useToImport
- cloudkms.keyRings.create
- cloudkms.keyRings.createTagBinding
- cloudkms.keyRings.deleteTagBinding
- cloudkms.keyRings.get
- cloudkms.keyRings.getIamPolicy
- cloudkms.keyRings.list
- cloudkms.keyRings.listEffectiveTags
- cloudkms.keyRings.listTagBindings
- cloudkms.keyRings.setIamPolicy
- cloudkms.locations.generateRandomBytes
- cloudkms.locations.get
- cloudkms.locations.list
- cloudkms.protectedResources.search
- cloudmessaging.messages.create
- cloudmigration.velostrataendpoints.connect
- cloudnotifications.activities.list
- cloudonefs.isiloncloud.com/clusters.create
- cloudonefs.isiloncloud.com/clusters.delete
- cloudonefs.isiloncloud.com/clusters.get
- cloudonefs.isiloncloud.com/clusters.list
- cloudonefs.isiloncloud.com/clusters.update
- cloudonefs.isiloncloud.com/clusters.updateAdvancedSettings
- cloudonefs.isiloncloud.com/fileshares.create
- cloudonefs.isiloncloud.com/fileshares.delete
- cloudonefs.isiloncloud.com/fileshares.get
- cloudonefs.isiloncloud.com/fileshares.list
- cloudonefs.isiloncloud.com/fileshares.update
- cloudoptimization.operations.create
- cloudoptimization.operations.get
- cloudprivatecatalog.targets.get
- cloudprivatecatalogproducer.associations.create
- cloudprivatecatalogproducer.associations.delete
- cloudprivatecatalogproducer.associations.get
- cloudprivatecatalogproducer.associations.list
- cloudprivatecatalogproducer.catalogAssociations.create
- cloudprivatecatalogproducer.catalogAssociations.delete
- cloudprivatecatalogproducer.catalogAssociations.get
- cloudprivatecatalogproducer.catalogAssociations.list
- cloudprivatecatalogproducer.catalogs.create
- cloudprivatecatalogproducer.catalogs.delete
- cloudprivatecatalogproducer.catalogs.get
- cloudprivatecatalogproducer.catalogs.getIamPolicy
- cloudprivatecatalogproducer.catalogs.list
- cloudprivatecatalogproducer.catalogs.setIamPolicy
- cloudprivatecatalogproducer.catalogs.undelete
- cloudprivatecatalogproducer.catalogs.update
- cloudprivatecatalogproducer.producerCatalogs.attachProduct
- cloudprivatecatalogproducer.producerCatalogs.create
- cloudprivatecatalogproducer.producerCatalogs.delete
- cloudprivatecatalogproducer.producerCatalogs.detachProduct
- cloudprivatecatalogproducer.producerCatalogs.get
- cloudprivatecatalogproducer.producerCatalogs.getIamPolicy
- cloudprivatecatalogproducer.producerCatalogs.list
- cloudprivatecatalogproducer.producerCatalogs.setIamPolicy
- cloudprivatecatalogproducer.producerCatalogs.update
- cloudprivatecatalogproducer.products.create
- cloudprivatecatalogproducer.products.delete
- cloudprivatecatalogproducer.products.get
- cloudprivatecatalogproducer.products.getIamPolicy
- cloudprivatecatalogproducer.products.list
- cloudprivatecatalogproducer.products.setIamPolicy
- cloudprivatecatalogproducer.products.update
- cloudprivatecatalogproducer.settings.get
- cloudprivatecatalogproducer.settings.update
- cloudprivatecatalogproducer.targets.associate
- cloudprivatecatalogproducer.targets.unassociate
- cloudprofiler.profiles.create
- cloudprofiler.profiles.list
- cloudprofiler.profiles.update
- cloudscheduler.jobs.create
- cloudscheduler.jobs.delete
- cloudscheduler.jobs.enable
- cloudscheduler.jobs.fullView
- cloudscheduler.jobs.get
- cloudscheduler.jobs.list
- cloudscheduler.jobs.pause
- cloudscheduler.jobs.run
- cloudscheduler.jobs.update
- cloudscheduler.locations.get
- cloudscheduler.locations.list
- cloudsecurityscanner.crawledurls.list
- cloudsecurityscanner.results.get
- cloudsecurityscanner.results.list
- cloudsecurityscanner.scanruns.get
- cloudsecurityscanner.scanruns.getSummary
- cloudsecurityscanner.scanruns.list
- cloudsecurityscanner.scanruns.stop
- cloudsecurityscanner.scans.create
- cloudsecurityscanner.scans.delete
- cloudsecurityscanner.scans.get
- cloudsecurityscanner.scans.list
- cloudsecurityscanner.scans.run
- cloudsecurityscanner.scans.update
- cloudsql.backupRuns.create
- cloudsql.backupRuns.delete
- cloudsql.backupRuns.get
- cloudsql.backupRuns.list
- cloudsql.databases.create
- cloudsql.databases.delete
- cloudsql.databases.get
- cloudsql.databases.list
- cloudsql.databases.update
- cloudsql.instances.addServerCa
- cloudsql.instances.clone
- cloudsql.instances.connect
- cloudsql.instances.create
- cloudsql.instances.createTagBinding
- cloudsql.instances.delete
- cloudsql.instances.deleteTagBinding
- cloudsql.instances.demoteMaster
- cloudsql.instances.export
- cloudsql.instances.failover
- cloudsql.instances.get
- cloudsql.instances.getDiskShrinkConfig
- cloudsql.instances.import
- cloudsql.instances.list
- cloudsql.instances.listEffectiveTags
- cloudsql.instances.listServerCas
- cloudsql.instances.listTagBindings
- cloudsql.instances.login
- cloudsql.instances.migrate
- cloudsql.instances.performDiskShrink
- cloudsql.instances.promoteReplica
- cloudsql.instances.reencrypt
- cloudsql.instances.resetReplicaSize
- cloudsql.instances.resetSslConfig
- cloudsql.instances.restart
- cloudsql.instances.restoreBackup
- cloudsql.instances.rotateServerCa
- cloudsql.instances.startReplica
- cloudsql.instances.stopReplica
- cloudsql.instances.truncateLog
- cloudsql.instances.update
- cloudsql.sslCerts.create
- cloudsql.sslCerts.createEphemeral
- cloudsql.sslCerts.delete
- cloudsql.sslCerts.get
- cloudsql.sslCerts.list
- cloudsql.users.create
- cloudsql.users.delete
- cloudsql.users.get
- cloudsql.users.list
- cloudsql.users.update
- cloudsupport.accounts.create
- cloudsupport.accounts.delete
- cloudsupport.accounts.get
- cloudsupport.accounts.getIamPolicy
- cloudsupport.accounts.getUserRoles
- cloudsupport.accounts.list
- cloudsupport.accounts.purchase
- cloudsupport.accounts.setIamPolicy
- cloudsupport.accounts.update
- cloudsupport.accounts.updateUserRoles
- cloudsupport.operations.get
- cloudsupport.properties.get
- cloudsupport.techCases.create
- cloudsupport.techCases.escalate
- cloudsupport.techCases.get
- cloudsupport.techCases.list
- cloudsupport.techCases.update
- cloudtasks.locations.get
- cloudtasks.locations.list
- cloudtasks.queues.create
- cloudtasks.queues.delete
- cloudtasks.queues.get
- cloudtasks.queues.getIamPolicy
- cloudtasks.queues.list
- cloudtasks.queues.pause
- cloudtasks.queues.purge
- cloudtasks.queues.resume
- cloudtasks.queues.setIamPolicy
- cloudtasks.queues.update
- cloudtasks.tasks.create
- cloudtasks.tasks.delete
- cloudtasks.tasks.fullView
- cloudtasks.tasks.get
- cloudtasks.tasks.list
- cloudtasks.tasks.run
- cloudtestservice.environmentcatalog.get
- cloudtestservice.matrices.create
- cloudtestservice.matrices.get
- cloudtestservice.matrices.update
- cloudtoolresults.executions.create
- cloudtoolresults.executions.get
- cloudtoolresults.executions.list
- cloudtoolresults.executions.update
- cloudtoolresults.histories.create
- cloudtoolresults.histories.get
- cloudtoolresults.histories.list
- cloudtoolresults.settings.create
- cloudtoolresults.settings.get
- cloudtoolresults.settings.update
- cloudtoolresults.steps.create
- cloudtoolresults.steps.get
- cloudtoolresults.steps.list
- cloudtoolresults.steps.update
- cloudtrace.insights.get
- cloudtrace.insights.list
- cloudtrace.stats.get
- cloudtrace.tasks.create
- cloudtrace.tasks.delete
- cloudtrace.tasks.get
- cloudtrace.tasks.list
- cloudtrace.traces.get
- cloudtrace.traces.list
- cloudtrace.traces.patch
- cloudtranslate.generalModels.batchDocPredict
- cloudtranslate.generalModels.batchPredict
- cloudtranslate.generalModels.docPredict
- cloudtranslate.generalModels.get
- cloudtranslate.generalModels.predict
- cloudtranslate.glossaries.batchDocPredict
- cloudtranslate.glossaries.batchPredict
- cloudtranslate.glossaries.create
- cloudtranslate.glossaries.delete
- cloudtranslate.glossaries.docPredict
- cloudtranslate.glossaries.get
- cloudtranslate.glossaries.list
- cloudtranslate.glossaries.predict
- cloudtranslate.glossaries.update
- cloudtranslate.glossaryentries.create
- cloudtranslate.glossaryentries.delete
- cloudtranslate.glossaryentries.get
- cloudtranslate.glossaryentries.list
- cloudtranslate.glossaryentries.update
- cloudtranslate.languageDetectionModels.predict
- cloudtranslate.locations.get
- cloudtranslate.locations.list
- cloudtranslate.operations.cancel
- cloudtranslate.operations.delete
- cloudtranslate.operations.get
- cloudtranslate.operations.list
- cloudtranslate.operations.wait
- cloudvolumesgcp-api.netapp.com/activeDirectories.create
- cloudvolumesgcp-api.netapp.com/activeDirectories.delete
- cloudvolumesgcp-api.netapp.com/activeDirectories.get
- cloudvolumesgcp-api.netapp.com/activeDirectories.list
- cloudvolumesgcp-api.netapp.com/activeDirectories.update
- cloudvolumesgcp-api.netapp.com/ipRanges.list
- cloudvolumesgcp-api.netapp.com/jobs.get
- cloudvolumesgcp-api.netapp.com/jobs.list
- cloudvolumesgcp-api.netapp.com/regions.list
- cloudvolumesgcp-api.netapp.com/serviceLevels.list
- cloudvolumesgcp-api.netapp.com/snapshots.create
- cloudvolumesgcp-api.netapp.com/snapshots.delete
- cloudvolumesgcp-api.netapp.com/snapshots.get
- cloudvolumesgcp-api.netapp.com/snapshots.list
- cloudvolumesgcp-api.netapp.com/snapshots.update
- cloudvolumesgcp-api.netapp.com/volumereplication.authorize
- cloudvolumesgcp-api.netapp.com/volumereplication.break
- cloudvolumesgcp-api.netapp.com/volumereplication.create
- cloudvolumesgcp-api.netapp.com/volumereplication.delete
- cloudvolumesgcp-api.netapp.com/volumereplication.get
- cloudvolumesgcp-api.netapp.com/volumereplication.list
- cloudvolumesgcp-api.netapp.com/volumereplication.release
- cloudvolumesgcp-api.netapp.com/volumereplication.resync
- cloudvolumesgcp-api.netapp.com/volumereplication.update
- cloudvolumesgcp-api.netapp.com/volumes.create
- cloudvolumesgcp-api.netapp.com/volumes.delete
- cloudvolumesgcp-api.netapp.com/volumes.get
- cloudvolumesgcp-api.netapp.com/volumes.list
- cloudvolumesgcp-api.netapp.com/volumes.update
- commercebusinessenablement.leadgenConfig.get
- commercebusinessenablement.leadgenConfig.update
- commercebusinessenablement.partnerAccounts.get
- commercebusinessenablement.partnerAccounts.list
- commercebusinessenablement.partnerInfo.get
- commercebusinessenablement.paymentConfig.get
- commercebusinessenablement.paymentConfig.update
- commercebusinessenablement.resellerConfig.get
- commercebusinessenablement.resellerDiscountOffers.cancel
- commercebusinessenablement.resellerDiscountOffers.create
- commercebusinessenablement.resellerDiscountOffers.list
- commerceoffercatalog.documents.get
- commerceoffercatalog.offers.get
- commerceorggovernance.collections.create
- commerceorggovernance.collections.delete
- commerceorggovernance.collections.get
- commerceorggovernance.collections.list
- commerceorggovernance.collections.update
- commerceorggovernance.consumerSharingPolicies.get
- commerceorggovernance.consumerSharingPolicies.update
- commerceorggovernance.organizationSettings.get
- commerceorggovernance.organizationSettings.update
- commerceorggovernance.services.list
- commerceprice.events.get
- commerceprice.events.list
- commerceprice.privateoffers.cancel
- commerceprice.privateoffers.create
- commerceprice.privateoffers.delete
- commerceprice.privateoffers.get
- commerceprice.privateoffers.list
- commerceprice.privateoffers.publish
- commerceprice.privateoffers.update
- composer.dags.execute
- composer.dags.get
- composer.dags.getSourceCode
- composer.dags.list
- composer.environments.create
- composer.environments.delete
- composer.environments.executeAirflowCommand
- composer.environments.get
- composer.environments.list
- composer.environments.update
- composer.imageversions.list
- composer.operations.delete
- composer.operations.get
- composer.operations.list
- compute.acceleratorTypes.get
- compute.acceleratorTypes.list
- compute.addresses.create
- compute.addresses.createInternal
- compute.addresses.delete
- compute.addresses.deleteInternal
- compute.addresses.get
- compute.addresses.list
- compute.addresses.setLabels
- compute.addresses.use
- compute.addresses.useInternal
- compute.autoscalers.create
- compute.autoscalers.delete
- compute.autoscalers.get
- compute.autoscalers.list
- compute.autoscalers.update
- compute.backendBuckets.addSignedUrlKey
- compute.backendBuckets.create
- compute.backendBuckets.delete
- compute.backendBuckets.deleteSignedUrlKey
- compute.backendBuckets.get
- compute.backendBuckets.getIamPolicy
- compute.backendBuckets.list
- compute.backendBuckets.setIamPolicy
- compute.backendBuckets.setSecurityPolicy
- compute.backendBuckets.update
- compute.backendBuckets.use
- compute.backendServices.addSignedUrlKey
- compute.backendServices.create
- compute.backendServices.delete
- compute.backendServices.deleteSignedUrlKey
- compute.backendServices.get
- compute.backendServices.getIamPolicy
- compute.backendServices.list
- compute.backendServices.setIamPolicy
- compute.backendServices.setSecurityPolicy
- compute.backendServices.update
- compute.backendServices.use
- compute.commitments.create
- compute.commitments.get
- compute.commitments.list
- compute.commitments.update
- compute.commitments.updateReservations
- compute.diskTypes.get
- compute.diskTypes.list
- compute.disks.addResourcePolicies
- compute.disks.create
- compute.disks.createSnapshot
- compute.disks.createTagBinding
- compute.disks.delete
- compute.disks.deleteTagBinding
- compute.disks.get
- compute.disks.getIamPolicy
- compute.disks.list
- compute.disks.listEffectiveTags
- compute.disks.listTagBindings
- compute.disks.removeResourcePolicies
- compute.disks.resize
- compute.disks.setIamPolicy
- compute.disks.setLabels
- compute.disks.startAsyncReplication
- compute.disks.stopAsyncReplication
- compute.disks.stopGroupAsyncReplication
- compute.disks.update
- compute.disks.use
- compute.disks.useReadOnly
- compute.externalVpnGateways.create
- compute.externalVpnGateways.delete
- compute.externalVpnGateways.get
- compute.externalVpnGateways.list
- compute.externalVpnGateways.setLabels
- compute.externalVpnGateways.use
- compute.firewallPolicies.addAssociation
- compute.firewallPolicies.cloneRules
- compute.firewallPolicies.copyRules
- compute.firewallPolicies.create
- compute.firewallPolicies.delete
- compute.firewallPolicies.get
- compute.firewallPolicies.getIamPolicy
- compute.firewallPolicies.list
- compute.firewallPolicies.move
- compute.firewallPolicies.removeAssociation
- compute.firewallPolicies.setIamPolicy
- compute.firewallPolicies.update
- compute.firewallPolicies.use
- compute.firewalls.create
- compute.firewalls.delete
- compute.firewalls.get
- compute.firewalls.list
- compute.firewalls.update
- compute.forwardingRules.create
- compute.forwardingRules.delete
- compute.forwardingRules.get
- compute.forwardingRules.list
- compute.forwardingRules.pscCreate
- compute.forwardingRules.pscDelete
- compute.forwardingRules.pscSetLabels
- compute.forwardingRules.pscSetTarget
- compute.forwardingRules.pscUpdate
- compute.forwardingRules.setLabels
- compute.forwardingRules.setTarget
- compute.forwardingRules.update
- compute.forwardingRules.use
- compute.globalAddresses.create
- compute.globalAddresses.createInternal
- compute.globalAddresses.delete
- compute.globalAddresses.deleteInternal
- compute.globalAddresses.get
- compute.globalAddresses.list
- compute.globalAddresses.setLabels
- compute.globalAddresses.use
- compute.globalForwardingRules.create
- compute.globalForwardingRules.delete
- compute.globalForwardingRules.get
- compute.globalForwardingRules.list
- compute.globalForwardingRules.pscCreate
- compute.globalForwardingRules.pscDelete
- compute.globalForwardingRules.pscGet
- compute.globalForwardingRules.pscSetLabels
- compute.globalForwardingRules.pscSetTarget
- compute.globalForwardingRules.pscUpdate
- compute.globalForwardingRules.setLabels
- compute.globalForwardingRules.setTarget
- compute.globalForwardingRules.update
- compute.globalNetworkEndpointGroups.attachNetworkEndpoints
- compute.globalNetworkEndpointGroups.create
- compute.globalNetworkEndpointGroups.delete
- compute.globalNetworkEndpointGroups.detachNetworkEndpoints
- compute.globalNetworkEndpointGroups.get
- compute.globalNetworkEndpointGroups.list
- compute.globalNetworkEndpointGroups.use
- compute.globalOperations.delete
- compute.globalOperations.get
- compute.globalOperations.getIamPolicy
- compute.globalOperations.list
- compute.globalOperations.setIamPolicy
- compute.globalPublicDelegatedPrefixes.create
- compute.globalPublicDelegatedPrefixes.delete
- compute.globalPublicDelegatedPrefixes.get
- compute.globalPublicDelegatedPrefixes.list
- compute.globalPublicDelegatedPrefixes.update
- compute.globalPublicDelegatedPrefixes.updatePolicy
- compute.globalPublicDelegatedPrefixes.use
- compute.healthChecks.create
- compute.healthChecks.delete
- compute.healthChecks.get
- compute.healthChecks.list
- compute.healthChecks.update
- compute.healthChecks.use
- compute.healthChecks.useReadOnly
- compute.httpHealthChecks.create
- compute.httpHealthChecks.delete
- compute.httpHealthChecks.get
- compute.httpHealthChecks.list
- compute.httpHealthChecks.update
- compute.httpHealthChecks.use
- compute.httpHealthChecks.useReadOnly
- compute.httpsHealthChecks.create
- compute.httpsHealthChecks.delete
- compute.httpsHealthChecks.get
- compute.httpsHealthChecks.list
- compute.httpsHealthChecks.update
- compute.httpsHealthChecks.use
- compute.httpsHealthChecks.useReadOnly
- compute.images.create
- compute.images.createTagBinding
- compute.images.delete
- compute.images.deleteTagBinding
- compute.images.deprecate
- compute.images.get
- compute.images.getFromFamily
- compute.images.getIamPolicy
- compute.images.list
- compute.images.listEffectiveTags
- compute.images.listTagBindings
- compute.images.setIamPolicy
- compute.images.setLabels
- compute.images.update
- compute.images.useReadOnly
- compute.instanceGroupManagers.create
- compute.instanceGroupManagers.delete
- compute.instanceGroupManagers.get
- compute.instanceGroupManagers.list
- compute.instanceGroupManagers.update
- compute.instanceGroupManagers.use
- compute.instanceGroups.create
- compute.instanceGroups.delete
- compute.instanceGroups.get
- compute.instanceGroups.list
- compute.instanceGroups.update
- compute.instanceGroups.use
- compute.instanceTemplates.create
- compute.instanceTemplates.delete
- compute.instanceTemplates.get
- compute.instanceTemplates.getIamPolicy
- compute.instanceTemplates.list
- compute.instanceTemplates.setIamPolicy
- compute.instanceTemplates.useReadOnly
- compute.instances.addAccessConfig
- compute.instances.addMaintenancePolicies
- compute.instances.addResourcePolicies
- compute.instances.attachDisk
- compute.instances.create
- compute.instances.createTagBinding
- compute.instances.delete
- compute.instances.deleteAccessConfig
- compute.instances.deleteTagBinding
- compute.instances.detachDisk
- compute.instances.get
- compute.instances.getEffectiveFirewalls
- compute.instances.getGuestAttributes
- compute.instances.getIamPolicy
- compute.instances.getScreenshot
- compute.instances.getSerialPortOutput
- compute.instances.getShieldedInstanceIdentity
- compute.instances.getShieldedVmIdentity
- compute.instances.list
- compute.instances.listEffectiveTags
- compute.instances.listReferrers
- compute.instances.listTagBindings
- compute.instances.osAdminLogin
- compute.instances.osLogin
- compute.instances.removeMaintenancePolicies
- compute.instances.removeResourcePolicies
- compute.instances.reset
- compute.instances.resume
- compute.instances.sendDiagnosticInterrupt
- compute.instances.setDeletionProtection
- compute.instances.setDiskAutoDelete
- compute.instances.setIamPolicy
- compute.instances.setLabels
- compute.instances.setMachineResources
- compute.instances.setMachineType
- compute.instances.setMetadata
- compute.instances.setMinCpuPlatform
- compute.instances.setName
- compute.instances.setScheduling
- compute.instances.setSecurityPolicy
- compute.instances.setServiceAccount
- compute.instances.setShieldedInstanceIntegrityPolicy
- compute.instances.setShieldedVmIntegrityPolicy
- compute.instances.setTags
- compute.instances.simulateMaintenanceEvent
- compute.instances.start
- compute.instances.startWithEncryptionKey
- compute.instances.stop
- compute.instances.suspend
- compute.instances.update
- compute.instances.updateAccessConfig
- compute.instances.updateDisplayDevice
- compute.instances.updateNetworkInterface
- compute.instances.updateSecurity
- compute.instances.updateShieldedInstanceConfig
- compute.instances.updateShieldedVmConfig
- compute.instances.use
- compute.instances.useReadOnly
- compute.instantSnapshots.create
- compute.instantSnapshots.delete
- compute.instantSnapshots.export
- compute.instantSnapshots.get
- compute.instantSnapshots.getIamPolicy
- compute.instantSnapshots.list
- compute.instantSnapshots.setIamPolicy
- compute.instantSnapshots.setLabels
- compute.instantSnapshots.useReadOnly
- compute.interconnectAttachments.create
- compute.interconnectAttachments.delete
- compute.interconnectAttachments.get
- compute.interconnectAttachments.list
- compute.interconnectAttachments.setLabels
- compute.interconnectAttachments.update
- compute.interconnectAttachments.use
- compute.interconnectLocations.get
- compute.interconnectLocations.list
- compute.interconnectRemoteLocations.get
- compute.interconnectRemoteLocations.list
- compute.interconnects.create
- compute.interconnects.delete
- compute.interconnects.get
- compute.interconnects.list
- compute.interconnects.setLabels
- compute.interconnects.update
- compute.interconnects.use
- compute.licenseCodes.get
- compute.licenseCodes.getIamPolicy
- compute.licenseCodes.list
- compute.licenseCodes.setIamPolicy
- compute.licenseCodes.update
- compute.licenseCodes.use
- compute.licenses.create
- compute.licenses.delete
- compute.licenses.get
- compute.licenses.getIamPolicy
- compute.licenses.list
- compute.licenses.setIamPolicy
- compute.machineImages.create
- compute.machineImages.delete
- compute.machineImages.get
- compute.machineImages.getIamPolicy
- compute.machineImages.list
- compute.machineImages.setIamPolicy
- compute.machineImages.useReadOnly
- compute.machineTypes.get
- compute.machineTypes.list
- compute.maintenancePolicies.create
- compute.maintenancePolicies.delete
- compute.maintenancePolicies.get
- compute.maintenancePolicies.getIamPolicy
- compute.maintenancePolicies.list
- compute.maintenancePolicies.setIamPolicy
- compute.maintenancePolicies.use
- compute.networkAttachments.create
- compute.networkAttachments.delete
- compute.networkAttachments.get
- compute.networkAttachments.list
- compute.networkEdgeSecurityServices.create
- compute.networkEdgeSecurityServices.delete
- compute.networkEdgeSecurityServices.get
- compute.networkEdgeSecurityServices.list
- compute.networkEdgeSecurityServices.update
- compute.networkEndpointGroups.attachNetworkEndpoints
- compute.networkEndpointGroups.create
- compute.networkEndpointGroups.delete
- compute.networkEndpointGroups.detachNetworkEndpoints
- compute.networkEndpointGroups.get
- compute.networkEndpointGroups.getIamPolicy
- compute.networkEndpointGroups.list
- compute.networkEndpointGroups.setIamPolicy
- compute.networkEndpointGroups.use
- compute.networks.access
- compute.networks.addPeering
- compute.networks.create
- compute.networks.delete
- compute.networks.get
- compute.networks.getEffectiveFirewalls
- compute.networks.getRegionEffectiveFirewalls
- compute.networks.list
- compute.networks.listPeeringRoutes
- compute.networks.mirror
- compute.networks.removePeering
- compute.networks.setFirewallPolicy
- compute.networks.switchToCustomMode
- compute.networks.update
- compute.networks.updatePeering
- compute.networks.updatePolicy
- compute.networks.use
- compute.networks.useExternalIp
- compute.nodeGroups.addNodes
- compute.nodeGroups.create
- compute.nodeGroups.delete
- compute.nodeGroups.deleteNodes
- compute.nodeGroups.get
- compute.nodeGroups.getIamPolicy
- compute.nodeGroups.list
- compute.nodeGroups.setIamPolicy
- compute.nodeGroups.setNodeTemplate
- compute.nodeGroups.simulateMaintenanceEvent
- compute.nodeGroups.update
- compute.nodeTemplates.create
- compute.nodeTemplates.delete
- compute.nodeTemplates.get
- compute.nodeTemplates.getIamPolicy
- compute.nodeTemplates.list
- compute.nodeTemplates.setIamPolicy
- compute.nodeTypes.get
- compute.nodeTypes.list
- compute.organizations.listAssociations
- compute.organizations.setFirewallPolicy
- compute.organizations.setSecurityPolicy
- compute.oslogin.updateExternalUser
- compute.packetMirrorings.create
- compute.packetMirrorings.delete
- compute.packetMirrorings.get
- compute.packetMirrorings.list
- compute.packetMirrorings.update
- compute.projects.get
- compute.projects.setCommonInstanceMetadata
- compute.projects.setDefaultNetworkTier
- compute.projects.setDefaultServiceAccount
- compute.projects.setUsageExportBucket
- compute.publicAdvertisedPrefixes.create
- compute.publicAdvertisedPrefixes.delete
- compute.publicAdvertisedPrefixes.get
- compute.publicAdvertisedPrefixes.list
- compute.publicAdvertisedPrefixes.update
- compute.publicAdvertisedPrefixes.updatePolicy
- compute.publicAdvertisedPrefixes.use
- compute.publicDelegatedPrefixes.create
- compute.publicDelegatedPrefixes.delete
- compute.publicDelegatedPrefixes.get
- compute.publicDelegatedPrefixes.list
- compute.publicDelegatedPrefixes.update
- compute.publicDelegatedPrefixes.updatePolicy
- compute.publicDelegatedPrefixes.use
- compute.regionBackendServices.create
- compute.regionBackendServices.delete
- compute.regionBackendServices.get
- compute.regionBackendServices.getIamPolicy
- compute.regionBackendServices.list
- compute.regionBackendServices.setIamPolicy
- compute.regionBackendServices.setSecurityPolicy
- compute.regionBackendServices.update
- compute.regionBackendServices.use
- compute.regionFirewallPolicies.cloneRules
- compute.regionFirewallPolicies.create
- compute.regionFirewallPolicies.delete
- compute.regionFirewallPolicies.get
- compute.regionFirewallPolicies.getIamPolicy
- compute.regionFirewallPolicies.list
- compute.regionFirewallPolicies.setIamPolicy
- compute.regionFirewallPolicies.update
- compute.regionFirewallPolicies.use
- compute.regionHealthCheckServices.create
- compute.regionHealthCheckServices.delete
- compute.regionHealthCheckServices.get
- compute.regionHealthCheckServices.list
- compute.regionHealthCheckServices.update
- compute.regionHealthCheckServices.use
- compute.regionHealthChecks.create
- compute.regionHealthChecks.delete
- compute.regionHealthChecks.get
- compute.regionHealthChecks.list
- compute.regionHealthChecks.update
- compute.regionHealthChecks.use
- compute.regionHealthChecks.useReadOnly
- compute.regionNetworkEndpointGroups.create
- compute.regionNetworkEndpointGroups.delete
- compute.regionNetworkEndpointGroups.get
- compute.regionNetworkEndpointGroups.list
- compute.regionNetworkEndpointGroups.use
- compute.regionNotificationEndpoints.create
- compute.regionNotificationEndpoints.delete
- compute.regionNotificationEndpoints.get
- compute.regionNotificationEndpoints.list
- compute.regionNotificationEndpoints.update
- compute.regionNotificationEndpoints.use
- compute.regionOperations.delete
- compute.regionOperations.get
- compute.regionOperations.getIamPolicy
- compute.regionOperations.list
- compute.regionOperations.setIamPolicy
- compute.regionSecurityPolicies.create
- compute.regionSecurityPolicies.delete
- compute.regionSecurityPolicies.get
- compute.regionSecurityPolicies.list
- compute.regionSecurityPolicies.update
- compute.regionSecurityPolicies.use
- compute.regionSslCertificates.create
- compute.regionSslCertificates.delete
- compute.regionSslCertificates.get
- compute.regionSslCertificates.list
- compute.regionSslPolicies.create
- compute.regionSslPolicies.delete
- compute.regionSslPolicies.get
- compute.regionSslPolicies.list
- compute.regionSslPolicies.listAvailableFeatures
- compute.regionSslPolicies.update
- compute.regionSslPolicies.use
- compute.regionTargetHttpProxies.create
- compute.regionTargetHttpProxies.delete
- compute.regionTargetHttpProxies.get
- compute.regionTargetHttpProxies.list
- compute.regionTargetHttpProxies.setUrlMap
- compute.regionTargetHttpProxies.update
- compute.regionTargetHttpProxies.use
- compute.regionTargetHttpsProxies.create
- compute.regionTargetHttpsProxies.delete
- compute.regionTargetHttpsProxies.get
- compute.regionTargetHttpsProxies.list
- compute.regionTargetHttpsProxies.setSslCertificates
- compute.regionTargetHttpsProxies.setUrlMap
- compute.regionTargetHttpsProxies.update
- compute.regionTargetHttpsProxies.use
- compute.regionTargetTcpProxies.create
- compute.regionTargetTcpProxies.delete
- compute.regionTargetTcpProxies.get
- compute.regionTargetTcpProxies.list
- compute.regionTargetTcpProxies.use
- compute.regionUrlMaps.create
- compute.regionUrlMaps.delete
- compute.regionUrlMaps.get
- compute.regionUrlMaps.invalidateCache
- compute.regionUrlMaps.list
- compute.regionUrlMaps.update
- compute.regionUrlMaps.use
- compute.regionUrlMaps.validate
- compute.regions.get
- compute.regions.list
- compute.reservations.create
- compute.reservations.delete
- compute.reservations.get
- compute.reservations.list
- compute.reservations.resize
- compute.reservations.update
- compute.resourcePolicies.create
- compute.resourcePolicies.delete
- compute.resourcePolicies.get
- compute.resourcePolicies.getIamPolicy
- compute.resourcePolicies.list
- compute.resourcePolicies.setIamPolicy
- compute.resourcePolicies.update
- compute.resourcePolicies.use
- compute.resourcePolicies.useReadOnly
- compute.routers.create
- compute.routers.delete
- compute.routers.get
- compute.routers.list
- compute.routers.update
- compute.routers.use
- compute.routes.create
- compute.routes.delete
- compute.routes.get
- compute.routes.list
- compute.securityPolicies.addAssociation
- compute.securityPolicies.copyRules
- compute.securityPolicies.create
- compute.securityPolicies.delete
- compute.securityPolicies.get
- compute.securityPolicies.getIamPolicy
- compute.securityPolicies.list
- compute.securityPolicies.move
- compute.securityPolicies.removeAssociation
- compute.securityPolicies.setIamPolicy
- compute.securityPolicies.setLabels
- compute.securityPolicies.update
- compute.securityPolicies.use
- compute.serviceAttachments.create
- compute.serviceAttachments.delete
- compute.serviceAttachments.get
- compute.serviceAttachments.getIamPolicy
- compute.serviceAttachments.list
- compute.serviceAttachments.setIamPolicy
- compute.serviceAttachments.update
- compute.serviceAttachments.use
- compute.snapshots.create
- compute.snapshots.createTagBinding
- compute.snapshots.delete
- compute.snapshots.deleteTagBinding
- compute.snapshots.get
- compute.snapshots.getIamPolicy
- compute.snapshots.list
- compute.snapshots.listEffectiveTags
- compute.snapshots.listTagBindings
- compute.snapshots.setIamPolicy
- compute.snapshots.setLabels
- compute.snapshots.useReadOnly
- compute.sslCertificates.create
- compute.sslCertificates.delete
- compute.sslCertificates.get
- compute.sslCertificates.list
- compute.sslPolicies.create
- compute.sslPolicies.delete
- compute.sslPolicies.get
- compute.sslPolicies.list
- compute.sslPolicies.listAvailableFeatures
- compute.sslPolicies.update
- compute.sslPolicies.use
- compute.subnetworks.create
- compute.subnetworks.delete
- compute.subnetworks.expandIpCidrRange
- compute.subnetworks.get
- compute.subnetworks.getIamPolicy
- compute.subnetworks.list
- compute.subnetworks.mirror
- compute.subnetworks.setIamPolicy
- compute.subnetworks.setPrivateIpGoogleAccess
- compute.subnetworks.update
- compute.subnetworks.use
- compute.subnetworks.useExternalIp
- compute.targetGrpcProxies.create
- compute.targetGrpcProxies.delete
- compute.targetGrpcProxies.get
- compute.targetGrpcProxies.list
- compute.targetGrpcProxies.update
- compute.targetGrpcProxies.use
- compute.targetHttpProxies.create
- compute.targetHttpProxies.delete
- compute.targetHttpProxies.get
- compute.targetHttpProxies.list
- compute.targetHttpProxies.setUrlMap
- compute.targetHttpProxies.update
- compute.targetHttpProxies.use
- compute.targetHttpsProxies.create
- compute.targetHttpsProxies.delete
- compute.targetHttpsProxies.get
- compute.targetHttpsProxies.list
- compute.targetHttpsProxies.setCertificateMap
- compute.targetHttpsProxies.setQuicOverride
- compute.targetHttpsProxies.setSslCertificates
- compute.targetHttpsProxies.setSslPolicy
- compute.targetHttpsProxies.setUrlMap
- compute.targetHttpsProxies.update
- compute.targetHttpsProxies.use
- compute.targetInstances.create
- compute.targetInstances.delete
- compute.targetInstances.get
- compute.targetInstances.list
- compute.targetInstances.setSecurityPolicy
- compute.targetInstances.use
- compute.targetPools.addHealthCheck
- compute.targetPools.addInstance
- compute.targetPools.create
- compute.targetPools.delete
- compute.targetPools.get
- compute.targetPools.list
- compute.targetPools.removeHealthCheck
- compute.targetPools.removeInstance
- compute.targetPools.setSecurityPolicy
- compute.targetPools.update
- compute.targetPools.use
- compute.targetSslProxies.create
- compute.targetSslProxies.delete
- compute.targetSslProxies.get
- compute.targetSslProxies.list
- compute.targetSslProxies.setBackendService
- compute.targetSslProxies.setCertificateMap
- compute.targetSslProxies.setProxyHeader
- compute.targetSslProxies.setSslCertificates
- compute.targetSslProxies.setSslPolicy
- compute.targetSslProxies.update
- compute.targetSslProxies.use
- compute.targetTcpProxies.create
- compute.targetTcpProxies.delete
- compute.targetTcpProxies.get
- compute.targetTcpProxies.list
- compute.targetTcpProxies.update
- compute.targetTcpProxies.use
- compute.targetVpnGateways.create
- compute.targetVpnGateways.delete
- compute.targetVpnGateways.get
- compute.targetVpnGateways.list
- compute.targetVpnGateways.setLabels
- compute.targetVpnGateways.use
- compute.urlMaps.create
- compute.urlMaps.delete
- compute.urlMaps.get
- compute.urlMaps.invalidateCache
- compute.urlMaps.list
- compute.urlMaps.update
- compute.urlMaps.use
- compute.urlMaps.validate
- compute.vpnGateways.create
- compute.vpnGateways.delete
- compute.vpnGateways.get
- compute.vpnGateways.list
- compute.vpnGateways.setLabels
- compute.vpnGateways.use
- compute.vpnTunnels.create
- compute.vpnTunnels.delete
- compute.vpnTunnels.get
- compute.vpnTunnels.list
- compute.vpnTunnels.setLabels
- compute.zoneOperations.delete
- compute.zoneOperations.get
- compute.zoneOperations.getIamPolicy
- compute.zoneOperations.list
- compute.zoneOperations.setIamPolicy
- compute.zones.get
- compute.zones.list
- confidentialcomputing.challenges.create
- confidentialcomputing.challenges.verify
- confidentialcomputing.locations.get
- confidentialcomputing.locations.list
- config.deployments.create
- config.deployments.delete
- config.deployments.get
- config.deployments.getIamPolicy
- config.deployments.list
- config.deployments.setIamPolicy
- config.deployments.update
- config.locations.get
- config.locations.list
- config.operations.cancel
- config.operations.delete
- config.operations.get
- config.operations.list
- config.revisions.get
- config.revisions.list
- connectors.actions.execute
- connectors.actions.list
- connectors.connections.create
- connectors.connections.delete
- connectors.connections.executeSqlQuery
- connectors.connections.get
- connectors.connections.getConnectionSchemaMetadata
- connectors.connections.getIamPolicy
- connectors.connections.getRuntimeActionSchema
- connectors.connections.getRuntimeEntitySchema
- connectors.connections.list
- connectors.connections.setIamPolicy
- connectors.connections.update
- connectors.connectors.get
- connectors.connectors.list
- connectors.endpointAttachments.create
- connectors.endpointAttachments.delete
- connectors.endpointAttachments.get
- connectors.endpointAttachments.getIamPolicy
- connectors.endpointAttachments.list
- connectors.endpointAttachments.setIamPolicy
- connectors.endpointAttachments.update
- connectors.entities.create
- connectors.entities.delete
- connectors.entities.deleteEntitiesWithConditions
- connectors.entities.get
- connectors.entities.list
- connectors.entities.update
- connectors.entities.updateEntitiesWithConditions
- connectors.entityTypes.list
- connectors.locations.get
- connectors.locations.list
- connectors.managedZones.create
- connectors.managedZones.delete
- connectors.managedZones.get
- connectors.managedZones.getIamPolicy
- connectors.managedZones.list
- connectors.managedZones.setIamPolicy
- connectors.managedZones.update
- connectors.operations.cancel
- connectors.operations.delete
- connectors.operations.get
- connectors.operations.list
- connectors.providers.get
- connectors.providers.list
- connectors.runtimeconfig.get
- connectors.schemaMetadata.refresh
- connectors.settings.get
- connectors.settings.update
- connectors.versions.get
- connectors.versions.list
- consumerprocurement.accounts.create
- consumerprocurement.accounts.delete
- consumerprocurement.accounts.get
- consumerprocurement.accounts.list
- consumerprocurement.consents.allowProjectGrant
- consumerprocurement.consents.check
- consumerprocurement.consents.grant
- consumerprocurement.consents.list
- consumerprocurement.consents.revoke
- consumerprocurement.entitlements.get
- consumerprocurement.entitlements.list
- consumerprocurement.events.get
- consumerprocurement.events.list
- consumerprocurement.freeTrials.create
- consumerprocurement.freeTrials.get
- consumerprocurement.freeTrials.list
- consumerprocurement.orderAttributions.get
- consumerprocurement.orderAttributions.list
- consumerprocurement.orderAttributions.update
- consumerprocurement.orders.cancel
- consumerprocurement.orders.get
- consumerprocurement.orders.list
- consumerprocurement.orders.modify
- consumerprocurement.orders.place
- contactcenteraiplatform.contactCenters.create
- contactcenteraiplatform.contactCenters.delete
- contactcenteraiplatform.contactCenters.get
- contactcenteraiplatform.contactCenters.list
- contactcenteraiplatform.contactCenters.queryQuota
- contactcenteraiplatform.contactCenters.update
- contactcenteraiplatform.locations.get
- contactcenteraiplatform.locations.list
- contactcenteraiplatform.operations.cancel
- contactcenteraiplatform.operations.delete
- contactcenteraiplatform.operations.get
- contactcenteraiplatform.operations.list
- contactcenterinsights.analyses.create
- contactcenterinsights.analyses.delete
- contactcenterinsights.analyses.get
- contactcenterinsights.analyses.list
- contactcenterinsights.conversations.create
- contactcenterinsights.conversations.delete
- contactcenterinsights.conversations.export
- contactcenterinsights.conversations.get
- contactcenterinsights.conversations.list
- contactcenterinsights.conversations.update
- contactcenterinsights.issueModels.create
- contactcenterinsights.issueModels.delete
- contactcenterinsights.issueModels.deploy
- contactcenterinsights.issueModels.get
- contactcenterinsights.issueModels.list
- contactcenterinsights.issueModels.undeploy
- contactcenterinsights.issueModels.update
- contactcenterinsights.issues.create
- contactcenterinsights.issues.delete
- contactcenterinsights.issues.get
- contactcenterinsights.issues.list
- contactcenterinsights.issues.update
- contactcenterinsights.operations.get
- contactcenterinsights.operations.list
- contactcenterinsights.phraseMatchers.create
- contactcenterinsights.phraseMatchers.delete
- contactcenterinsights.phraseMatchers.get
- contactcenterinsights.phraseMatchers.list
- contactcenterinsights.phraseMatchers.update
- contactcenterinsights.settings.get
- contactcenterinsights.settings.update
- contactcenterinsights.views.create
- contactcenterinsights.views.delete
- contactcenterinsights.views.get
- contactcenterinsights.views.list
- contactcenterinsights.views.update
- container.apiServices.create
- container.apiServices.delete
- container.apiServices.get
- container.apiServices.getStatus
- container.apiServices.list
- container.apiServices.update
- container.apiServices.updateStatus
- container.auditSinks.create
- container.auditSinks.delete
- container.auditSinks.get
- container.auditSinks.list
- container.auditSinks.update
- container.backendConfigs.create
- container.backendConfigs.delete
- container.backendConfigs.get
- container.backendConfigs.list
- container.backendConfigs.update
- container.bindings.create
- container.bindings.delete
- container.bindings.get
- container.bindings.list
- container.bindings.update
- container.certificateSigningRequests.approve
- container.certificateSigningRequests.create
- container.certificateSigningRequests.delete
- container.certificateSigningRequests.get
- container.certificateSigningRequests.getStatus
- container.certificateSigningRequests.list
- container.certificateSigningRequests.update
- container.certificateSigningRequests.updateStatus
- container.clusterRoleBindings.create
- container.clusterRoleBindings.delete
- container.clusterRoleBindings.get
- container.clusterRoleBindings.list
- container.clusterRoleBindings.update
- container.clusterRoles.bind
- container.clusterRoles.create
- container.clusterRoles.delete
- container.clusterRoles.escalate
- container.clusterRoles.get
- container.clusterRoles.list
- container.clusterRoles.update
- container.clusters.create
- container.clusters.createTagBinding
- container.clusters.delete
- container.clusters.deleteTagBinding
- container.clusters.get
- container.clusters.getCredentials
- container.clusters.impersonate
- container.clusters.list
- container.clusters.listEffectiveTags
- container.clusters.listTagBindings
- container.clusters.update
- container.componentStatuses.get
- container.componentStatuses.list
- container.configMaps.create
- container.configMaps.delete
- container.configMaps.get
- container.configMaps.list
- container.configMaps.update
- container.controllerRevisions.create
- container.controllerRevisions.delete
- container.controllerRevisions.get
- container.controllerRevisions.list
- container.controllerRevisions.update
- container.cronJobs.create
- container.cronJobs.delete
- container.cronJobs.get
- container.cronJobs.getStatus
- container.cronJobs.list
- container.cronJobs.update
- container.cronJobs.updateStatus
- container.csiDrivers.create
- container.csiDrivers.delete
- container.csiDrivers.get
- container.csiDrivers.list
- container.csiDrivers.update
- container.csiNodeInfos.create
- container.csiNodeInfos.delete
- container.csiNodeInfos.get
- container.csiNodeInfos.list
- container.csiNodeInfos.update
- container.csiNodes.create
- container.csiNodes.delete
- container.csiNodes.get
- container.csiNodes.list
- container.csiNodes.update
- container.customResourceDefinitions.create
- container.customResourceDefinitions.delete
- container.customResourceDefinitions.get
- container.customResourceDefinitions.getStatus
- container.customResourceDefinitions.list
- container.customResourceDefinitions.update
- container.customResourceDefinitions.updateStatus
- container.daemonSets.create
- container.daemonSets.delete
- container.daemonSets.get
- container.daemonSets.getStatus
- container.daemonSets.list
- container.daemonSets.update
- container.daemonSets.updateStatus
- container.deployments.create
- container.deployments.delete
- container.deployments.get
- container.deployments.getScale
- container.deployments.getStatus
- container.deployments.list
- container.deployments.rollback
- container.deployments.update
- container.deployments.updateScale
- container.deployments.updateStatus
- container.endpointSlices.create
- container.endpointSlices.delete
- container.endpointSlices.get
- container.endpointSlices.list
- container.endpointSlices.update
- container.endpoints.create
- container.endpoints.delete
- container.endpoints.get
- container.endpoints.list
- container.endpoints.update
- container.events.create
- container.events.delete
- container.events.get
- container.events.list
- container.events.update
- container.frontendConfigs.create
- container.frontendConfigs.delete
- container.frontendConfigs.get
- container.frontendConfigs.list
- container.frontendConfigs.update
- container.horizontalPodAutoscalers.create
- container.horizontalPodAutoscalers.delete
- container.horizontalPodAutoscalers.get
- container.horizontalPodAutoscalers.getStatus
- container.horizontalPodAutoscalers.list
- container.horizontalPodAutoscalers.update
- container.horizontalPodAutoscalers.updateStatus
- container.ingresses.create
- container.ingresses.delete
- container.ingresses.get
- container.ingresses.getStatus
- container.ingresses.list
- container.ingresses.update
- container.ingresses.updateStatus
- container.initializerConfigurations.create
- container.initializerConfigurations.delete
- container.initializerConfigurations.get
- container.initializerConfigurations.list
- container.initializerConfigurations.update
- container.jobs.create
- container.jobs.delete
- container.jobs.get
- container.jobs.getStatus
- container.jobs.list
- container.jobs.update
- container.jobs.updateStatus
- container.leases.create
- container.leases.delete
- container.leases.get
- container.leases.list
- container.leases.update
- container.limitRanges.create
- container.limitRanges.delete
- container.limitRanges.get
- container.limitRanges.list
- container.limitRanges.update
- container.localSubjectAccessReviews.create
- container.localSubjectAccessReviews.list
- container.managedCertificates.create
- container.managedCertificates.delete
- container.managedCertificates.get
- container.managedCertificates.list
- container.managedCertificates.update
- container.mutatingWebhookConfigurations.create
- container.mutatingWebhookConfigurations.delete
- container.mutatingWebhookConfigurations.get
- container.mutatingWebhookConfigurations.list
- container.mutatingWebhookConfigurations.update
- container.namespaces.create
- container.namespaces.delete
- container.namespaces.finalize
- container.namespaces.get
- container.namespaces.getStatus
- container.namespaces.list
- container.namespaces.update
- container.namespaces.updateStatus
- container.networkPolicies.create
- container.networkPolicies.delete
- container.networkPolicies.get
- container.networkPolicies.list
- container.networkPolicies.update
- container.nodes.create
- container.nodes.delete
- container.nodes.get
- container.nodes.getStatus
- container.nodes.list
- container.nodes.proxy
- container.nodes.update
- container.nodes.updateStatus
- container.operations.get
- container.operations.list
- container.persistentVolumeClaims.create
- container.persistentVolumeClaims.delete
- container.persistentVolumeClaims.get
- container.persistentVolumeClaims.getStatus
- container.persistentVolumeClaims.list
- container.persistentVolumeClaims.update
- container.persistentVolumeClaims.updateStatus
- container.persistentVolumes.create
- container.persistentVolumes.delete
- container.persistentVolumes.get
- container.persistentVolumes.getStatus
- container.persistentVolumes.list
- container.persistentVolumes.update
- container.persistentVolumes.updateStatus
- container.petSets.create
- container.petSets.delete
- container.petSets.get
- container.petSets.list
- container.petSets.update
- container.petSets.updateStatus
- container.podDisruptionBudgets.create
- container.podDisruptionBudgets.delete
- container.podDisruptionBudgets.get
- container.podDisruptionBudgets.getStatus
- container.podDisruptionBudgets.list
- container.podDisruptionBudgets.update
- container.podDisruptionBudgets.updateStatus
- container.podPresets.create
- container.podPresets.delete
- container.podPresets.get
- container.podPresets.list
- container.podPresets.update
- container.podSecurityPolicies.create
- container.podSecurityPolicies.delete
- container.podSecurityPolicies.get
- container.podSecurityPolicies.list
- container.podSecurityPolicies.update
- container.podSecurityPolicies.use
- container.podTemplates.create
- container.podTemplates.delete
- container.podTemplates.get
- container.podTemplates.list
- container.podTemplates.update
- container.pods.attach
- container.pods.create
- container.pods.delete
- container.pods.evict
- container.pods.exec
- container.pods.get
- container.pods.getLogs
- container.pods.getStatus
- container.pods.initialize
- container.pods.list
- container.pods.portForward
- container.pods.proxy
- container.pods.update
- container.pods.updateStatus
- container.priorityClasses.create
- container.priorityClasses.delete
- container.priorityClasses.get
- container.priorityClasses.list
- container.priorityClasses.update
- container.replicaSets.create
- container.replicaSets.delete
- container.replicaSets.get
- container.replicaSets.getScale
- container.replicaSets.getStatus
- container.replicaSets.list
- container.replicaSets.update
- container.replicaSets.updateScale
- container.replicaSets.updateStatus
- container.replicationControllers.create
- container.replicationControllers.delete
- container.replicationControllers.get
- container.replicationControllers.getScale
- container.replicationControllers.getStatus
- container.replicationControllers.list
- container.replicationControllers.update
- container.replicationControllers.updateScale
- container.replicationControllers.updateStatus
- container.resourceQuotas.create
- container.resourceQuotas.delete
- container.resourceQuotas.get
- container.resourceQuotas.getStatus
- container.resourceQuotas.list
- container.resourceQuotas.update
- container.resourceQuotas.updateStatus
- container.roleBindings.create
- container.roleBindings.delete
- container.roleBindings.get
- container.roleBindings.list
- container.roleBindings.update
- container.roles.bind
- container.roles.create
- container.roles.delete
- container.roles.escalate
- container.roles.get
- container.roles.list
- container.roles.update
- container.runtimeClasses.create
- container.runtimeClasses.delete
- container.runtimeClasses.get
- container.runtimeClasses.list
- container.runtimeClasses.update
- container.scheduledJobs.create
- container.scheduledJobs.delete
- container.scheduledJobs.get
- container.scheduledJobs.list
- container.scheduledJobs.update
- container.scheduledJobs.updateStatus
- container.secrets.create
- container.secrets.delete
- container.secrets.get
- container.secrets.list
- container.secrets.update
- container.selfSubjectAccessReviews.create
- container.selfSubjectAccessReviews.list
- container.selfSubjectRulesReviews.create
- container.serviceAccounts.create
- container.serviceAccounts.createToken
- container.serviceAccounts.delete
- container.serviceAccounts.get
- container.serviceAccounts.list
- container.serviceAccounts.update
- container.services.create
- container.services.delete
- container.services.get
- container.services.getStatus
- container.services.list
- container.services.proxy
- container.services.update
- container.services.updateStatus
- container.statefulSets.create
- container.statefulSets.delete
- container.statefulSets.get
- container.statefulSets.getScale
- container.statefulSets.getStatus
- container.statefulSets.list
- container.statefulSets.update
- container.statefulSets.updateScale
- container.statefulSets.updateStatus
- container.storageClasses.create
- container.storageClasses.delete
- container.storageClasses.get
- container.storageClasses.list
- container.storageClasses.update
- container.storageStates.create
- container.storageStates.delete
- container.storageStates.get
- container.storageStates.getStatus
- container.storageStates.list
- container.storageStates.update
- container.storageStates.updateStatus
- container.storageVersionMigrations.create
- container.storageVersionMigrations.delete
- container.storageVersionMigrations.get
- container.storageVersionMigrations.getStatus
- container.storageVersionMigrations.list
- container.storageVersionMigrations.update
- container.storageVersionMigrations.updateStatus
- container.subjectAccessReviews.create
- container.subjectAccessReviews.list
- container.thirdPartyObjects.create
- container.thirdPartyObjects.delete
- container.thirdPartyObjects.get
- container.thirdPartyObjects.list
- container.thirdPartyObjects.update
- container.thirdPartyResources.create
- container.thirdPartyResources.delete
- container.thirdPartyResources.get
- container.thirdPartyResources.list
- container.thirdPartyResources.update
- container.tokenReviews.create
- container.updateInfos.create
- container.updateInfos.delete
- container.updateInfos.get
- container.updateInfos.list
- container.updateInfos.update
- container.validatingWebhookConfigurations.create
- container.validatingWebhookConfigurations.delete
- container.validatingWebhookConfigurations.get
- container.validatingWebhookConfigurations.list
- container.validatingWebhookConfigurations.update
- container.volumeAttachments.create
- container.volumeAttachments.delete
- container.volumeAttachments.get
- container.volumeAttachments.getStatus
- container.volumeAttachments.list
- container.volumeAttachments.update
- container.volumeAttachments.updateStatus
- container.volumeSnapshotClasses.create
- container.volumeSnapshotClasses.delete
- container.volumeSnapshotClasses.get
- container.volumeSnapshotClasses.list
- container.volumeSnapshotClasses.update
- container.volumeSnapshotContents.create
- container.volumeSnapshotContents.delete
- container.volumeSnapshotContents.get
- container.volumeSnapshotContents.getStatus
- container.volumeSnapshotContents.list
- container.volumeSnapshotContents.update
- container.volumeSnapshotContents.updateStatus
- container.volumeSnapshots.create
- container.volumeSnapshots.delete
- container.volumeSnapshots.get
- container.volumeSnapshots.getStatus
- container.volumeSnapshots.list
- container.volumeSnapshots.update
- container.volumeSnapshots.updateStatus
- containeranalysis.notes.attachOccurrence
- containeranalysis.notes.create
- containeranalysis.notes.delete
- containeranalysis.notes.get
- containeranalysis.notes.getIamPolicy
- containeranalysis.notes.list
- containeranalysis.notes.listOccurrences
- containeranalysis.notes.setIamPolicy
- containeranalysis.notes.update
- containeranalysis.occurrences.create
- containeranalysis.occurrences.delete
- containeranalysis.occurrences.get
- containeranalysis.occurrences.getIamPolicy
- containeranalysis.occurrences.list
- containeranalysis.occurrences.setIamPolicy
- containeranalysis.occurrences.update
- containersecurity.clusterSummaries.list
- containersecurity.findings.list
- containersecurity.locations.get
- containersecurity.locations.list
- containersecurity.workloadConfigAudits.list
- contentwarehouse.documentSchemas.create
- contentwarehouse.documentSchemas.delete
- contentwarehouse.documentSchemas.get
- contentwarehouse.documentSchemas.list
- contentwarehouse.documentSchemas.update
- contentwarehouse.documents.create
- contentwarehouse.documents.delete
- contentwarehouse.documents.get
- contentwarehouse.documents.getIamPolicy
- contentwarehouse.documents.setIamPolicy
- contentwarehouse.documents.update
- contentwarehouse.locations.initialize
- contentwarehouse.operations.get
- contentwarehouse.rawDocuments.download
- contentwarehouse.rawDocuments.upload
- contentwarehouse.ruleSets.create
- contentwarehouse.ruleSets.delete
- contentwarehouse.ruleSets.get
- contentwarehouse.ruleSets.list
- contentwarehouse.ruleSets.update
- contentwarehouse.synonymSets.create
- contentwarehouse.synonymSets.delete
- contentwarehouse.synonymSets.get
- contentwarehouse.synonymSets.list
- contentwarehouse.synonymSets.update
- datacatalog.categories.getIamPolicy
- datacatalog.categories.setIamPolicy
- datacatalog.entries.create
- datacatalog.entries.createGlossary
- datacatalog.entries.createGlossaryTerm
- datacatalog.entries.delete
- datacatalog.entries.deleteGlossary
- datacatalog.entries.deleteGlossaryTerm
- datacatalog.entries.get
- datacatalog.entries.getIamPolicy
- datacatalog.entries.list
- datacatalog.entries.setIamPolicy
- datacatalog.entries.update
- datacatalog.entries.updateContacts
- datacatalog.entries.updateGlossary
- datacatalog.entries.updateGlossaryTerm
- datacatalog.entries.updateOverview
- datacatalog.entries.updateTag
- datacatalog.entryGroups.create
- datacatalog.entryGroups.delete
- datacatalog.entryGroups.get
- datacatalog.entryGroups.getIamPolicy
- datacatalog.entryGroups.list
- datacatalog.entryGroups.setIamPolicy
- datacatalog.entryGroups.update
- datacatalog.entryGroups.updateTag
- datacatalog.relationships.create
- datacatalog.relationships.createIsDescribedBy
- datacatalog.relationships.createIsRelatedTo
- datacatalog.relationships.createIsSynonymousTo
- datacatalog.relationships.delete
- datacatalog.relationships.deleteIsDescribedBy
- datacatalog.relationships.deleteIsRelatedTo
- datacatalog.relationships.deleteIsSynonymousTo
- datacatalog.relationships.list
- datacatalog.tagTemplates.create
- datacatalog.tagTemplates.delete
- datacatalog.tagTemplates.get
- datacatalog.tagTemplates.getIamPolicy
- datacatalog.tagTemplates.getTag
- datacatalog.tagTemplates.setIamPolicy
- datacatalog.tagTemplates.update
- datacatalog.tagTemplates.use
- datacatalog.taxonomies.create
- datacatalog.taxonomies.delete
- datacatalog.taxonomies.get
- datacatalog.taxonomies.getIamPolicy
- datacatalog.taxonomies.list
- datacatalog.taxonomies.setIamPolicy
- datacatalog.taxonomies.update
- dataconnectors.connectors.create
- dataconnectors.connectors.delete
- dataconnectors.connectors.get
- dataconnectors.connectors.getIamPolicy
- dataconnectors.connectors.list
- dataconnectors.connectors.setIamPolicy
- dataconnectors.connectors.update
- dataconnectors.connectors.use
- dataconnectors.locations.get
- dataconnectors.locations.list
- dataconnectors.operations.cancel
- dataconnectors.operations.delete
- dataconnectors.operations.get
- dataconnectors.operations.list
- dataflow.jobs.cancel
- dataflow.jobs.create
- dataflow.jobs.get
- dataflow.jobs.list
- dataflow.jobs.snapshot
- dataflow.jobs.updateContents
- dataflow.messages.list
- dataflow.metrics.get
- dataflow.shuffle.read
- dataflow.shuffle.write
- dataflow.snapshots.delete
- dataflow.snapshots.get
- dataflow.snapshots.list
- dataflow.streamingWorkItems.ImportState
- dataflow.streamingWorkItems.commitWork
- dataflow.streamingWorkItems.getData
- dataflow.streamingWorkItems.getWork
- dataflow.streamingWorkItems.getWorkerMetadata
- dataflow.workItems.lease
- dataflow.workItems.sendMessage
- dataflow.workItems.update
- dataform.compilationResults.create
- dataform.compilationResults.get
- dataform.compilationResults.list
- dataform.compilationResults.query
- dataform.locations.get
- dataform.locations.list
- dataform.releaseConfigs.create
- dataform.releaseConfigs.delete
- dataform.releaseConfigs.get
- dataform.releaseConfigs.list
- dataform.releaseConfigs.update
- dataform.repositories.commit
- dataform.repositories.computeAccessTokenStatus
- dataform.repositories.create
- dataform.repositories.delete
- dataform.repositories.fetchHistory
- dataform.repositories.fetchRemoteBranches
- dataform.repositories.get
- dataform.repositories.getIamPolicy
- dataform.repositories.list
- dataform.repositories.queryDirectoryContents
- dataform.repositories.readFile
- dataform.repositories.setIamPolicy
- dataform.repositories.update
- dataform.workflowConfigs.create
- dataform.workflowConfigs.delete
- dataform.workflowConfigs.get
- dataform.workflowConfigs.list
- dataform.workflowConfigs.update
- dataform.workflowInvocations.cancel
- dataform.workflowInvocations.create
- dataform.workflowInvocations.delete
- dataform.workflowInvocations.get
- dataform.workflowInvocations.list
- dataform.workflowInvocations.query
- dataform.workspaces.commit
- dataform.workspaces.create
- dataform.workspaces.delete
- dataform.workspaces.fetchFileDiff
- dataform.workspaces.fetchFileGitStatuses
- dataform.workspaces.fetchGitAheadBehind
- dataform.workspaces.get
- dataform.workspaces.getIamPolicy
- dataform.workspaces.installNpmPackages
- dataform.workspaces.list
- dataform.workspaces.makeDirectory
- dataform.workspaces.moveDirectory
- dataform.workspaces.moveFile
- dataform.workspaces.pull
- dataform.workspaces.push
- dataform.workspaces.queryDirectoryContents
- dataform.workspaces.readFile
- dataform.workspaces.removeDirectory
- dataform.workspaces.removeFile
- dataform.workspaces.reset
- dataform.workspaces.setIamPolicy
- dataform.workspaces.writeFile
- datafusion.artifacts.create
- datafusion.artifacts.delete
- datafusion.artifacts.get
- datafusion.artifacts.list
- datafusion.artifacts.update
- datafusion.instances.create
- datafusion.instances.delete
- datafusion.instances.get
- datafusion.instances.getIamPolicy
- datafusion.instances.list
- datafusion.instances.restart
- datafusion.instances.runtime
- datafusion.instances.setIamPolicy
- datafusion.instances.update
- datafusion.instances.upgrade
- datafusion.locations.get
- datafusion.locations.list
- datafusion.operations.cancel
- datafusion.operations.delete
- datafusion.operations.get
- datafusion.operations.list
- datafusion.pipelineConnections.create
- datafusion.pipelineConnections.delete
- datafusion.pipelineConnections.get
- datafusion.pipelineConnections.list
- datafusion.pipelineConnections.update
- datafusion.pipelineConnections.use
- datafusion.pipelines.create
- datafusion.pipelines.delete
- datafusion.pipelines.execute
- datafusion.pipelines.get
- datafusion.pipelines.list
- datafusion.pipelines.preview
- datafusion.pipelines.update
- datafusion.profiles.create
- datafusion.profiles.delete
- datafusion.profiles.get
- datafusion.profiles.list
- datafusion.profiles.update
- datafusion.secureKeys.create
- datafusion.secureKeys.delete
- datafusion.secureKeys.getSecret
- datafusion.secureKeys.list
- datafusion.secureKeys.update
- datalabeling.annotateddatasets.delete
- datalabeling.annotateddatasets.get
- datalabeling.annotateddatasets.label
- datalabeling.annotateddatasets.list
- datalabeling.annotationspecsets.create
- datalabeling.annotationspecsets.delete
- datalabeling.annotationspecsets.get
- datalabeling.annotationspecsets.list
- datalabeling.dataitems.get
- datalabeling.dataitems.list
- datalabeling.datasets.create
- datalabeling.datasets.delete
- datalabeling.datasets.export
- datalabeling.datasets.get
- datalabeling.datasets.import
- datalabeling.datasets.list
- datalabeling.examples.get
- datalabeling.examples.list
- datalabeling.instructions.create
- datalabeling.instructions.delete
- datalabeling.instructions.get
- datalabeling.instructions.list
- datalabeling.operations.cancel
- datalabeling.operations.get
- datalabeling.operations.list
- datalineage.events.create
- datalineage.events.delete
- datalineage.events.get
- datalineage.events.list
- datalineage.locations.searchLinks
- datalineage.operations.get
- datalineage.processes.create
- datalineage.processes.delete
- datalineage.processes.get
- datalineage.processes.list
- datalineage.processes.update
- datalineage.runs.create
- datalineage.runs.delete
- datalineage.runs.get
- datalineage.runs.list
- datalineage.runs.update
- datamigration.connectionprofiles.create
- datamigration.connectionprofiles.delete
- datamigration.connectionprofiles.get
- datamigration.connectionprofiles.getIamPolicy
- datamigration.connectionprofiles.list
- datamigration.connectionprofiles.setIamPolicy
- datamigration.connectionprofiles.update
- datamigration.conversionworkspaces.commit
- datamigration.conversionworkspaces.convert
- datamigration.conversionworkspaces.create
- datamigration.conversionworkspaces.delete
- datamigration.conversionworkspaces.get
- datamigration.conversionworkspaces.getIamPolicy
- datamigration.conversionworkspaces.list
- datamigration.conversionworkspaces.rollback
- datamigration.conversionworkspaces.seed
- datamigration.conversionworkspaces.setIamPolicy
- datamigration.conversionworkspaces.update
- datamigration.locations.fetchStaticIps
- datamigration.locations.get
- datamigration.locations.list
- datamigration.mappingrules.getIamPolicy
- datamigration.mappingrules.import
- datamigration.mappingrules.setIamPolicy
- datamigration.migrationjobs.create
- datamigration.migrationjobs.delete
- datamigration.migrationjobs.generateSshScript
- datamigration.migrationjobs.generateTcpProxyScript
- datamigration.migrationjobs.get
- datamigration.migrationjobs.getIamPolicy
- datamigration.migrationjobs.list
- datamigration.migrationjobs.promote
- datamigration.migrationjobs.restart
- datamigration.migrationjobs.resume
- datamigration.migrationjobs.setIamPolicy
- datamigration.migrationjobs.start
- datamigration.migrationjobs.stop
- datamigration.migrationjobs.update
- datamigration.migrationjobs.verify
- datamigration.operations.cancel
- datamigration.operations.delete
- datamigration.operations.get
- datamigration.operations.list
- datamigration.privateconnections.create
- datamigration.privateconnections.delete
- datamigration.privateconnections.get
- datamigration.privateconnections.getIamPolicy
- datamigration.privateconnections.list
- datamigration.privateconnections.setIamPolicy
- datapipelines.jobs.list
- datapipelines.pipelines.create
- datapipelines.pipelines.delete
- datapipelines.pipelines.get
- datapipelines.pipelines.list
- datapipelines.pipelines.run
- datapipelines.pipelines.stop
- datapipelines.pipelines.update
- dataplex.assetActions.list
- dataplex.assets.create
- dataplex.assets.delete
- dataplex.assets.get
- dataplex.assets.getIamPolicy
- dataplex.assets.list
- dataplex.assets.ownData
- dataplex.assets.readData
- dataplex.assets.setIamPolicy
- dataplex.assets.update
- dataplex.assets.writeData
- dataplex.content.create
- dataplex.content.delete
- dataplex.content.get
- dataplex.content.getIamPolicy
- dataplex.content.list
- dataplex.content.setIamPolicy
- dataplex.content.update
- dataplex.dataAttributeBindings.create
- dataplex.dataAttributeBindings.delete
- dataplex.dataAttributeBindings.get
- dataplex.dataAttributeBindings.getIamPolicy
- dataplex.dataAttributeBindings.list
- dataplex.dataAttributeBindings.setIamPolicy
- dataplex.dataAttributeBindings.update
- dataplex.dataAttributes.bind
- dataplex.dataAttributes.create
- dataplex.dataAttributes.delete
- dataplex.dataAttributes.get
- dataplex.dataAttributes.getIamPolicy
- dataplex.dataAttributes.list
- dataplex.dataAttributes.setIamPolicy
- dataplex.dataAttributes.update
- dataplex.dataTaxonomies.configureDataAccess
- dataplex.dataTaxonomies.configureResourceAccess
- dataplex.dataTaxonomies.create
- dataplex.dataTaxonomies.delete
- dataplex.dataTaxonomies.get
- dataplex.dataTaxonomies.getIamPolicy
- dataplex.dataTaxonomies.list
- dataplex.dataTaxonomies.setIamPolicy
- dataplex.dataTaxonomies.update
- dataplex.datascans.create
- dataplex.datascans.delete
- dataplex.datascans.get
- dataplex.datascans.getData
- dataplex.datascans.getIamPolicy
- dataplex.datascans.list
- dataplex.datascans.run
- dataplex.datascans.setIamPolicy
- dataplex.datascans.update
- dataplex.entities.create
- dataplex.entities.delete
- dataplex.entities.get
- dataplex.entities.list
- dataplex.entities.update
- dataplex.environments.create
- dataplex.environments.delete
- dataplex.environments.execute
- dataplex.environments.get
- dataplex.environments.getIamPolicy
- dataplex.environments.list
- dataplex.environments.setIamPolicy
- dataplex.environments.update
- dataplex.lakeActions.list
- dataplex.lakes.create
- dataplex.lakes.delete
- dataplex.lakes.get
- dataplex.lakes.getIamPolicy
- dataplex.lakes.list
- dataplex.lakes.setIamPolicy
- dataplex.lakes.update
- dataplex.locations.get
- dataplex.locations.list
- dataplex.operations.cancel
- dataplex.operations.delete
- dataplex.operations.get
- dataplex.operations.list
- dataplex.partitions.create
- dataplex.partitions.delete
- dataplex.partitions.get
- dataplex.partitions.list
- dataplex.partitions.update
- dataplex.tasks.cancel
- dataplex.tasks.create
- dataplex.tasks.delete
- dataplex.tasks.get
- dataplex.tasks.getIamPolicy
- dataplex.tasks.list
- dataplex.tasks.run
- dataplex.tasks.setIamPolicy
- dataplex.tasks.update
- dataplex.zoneActions.list
- dataplex.zones.create
- dataplex.zones.delete
- dataplex.zones.get
- dataplex.zones.getIamPolicy
- dataplex.zones.list
- dataplex.zones.setIamPolicy
- dataplex.zones.update
- dataprep.projects.use
- dataproc.agents.create
- dataproc.agents.delete
- dataproc.agents.get
- dataproc.agents.list
- dataproc.agents.update
- dataproc.autoscalingPolicies.create
- dataproc.autoscalingPolicies.delete
- dataproc.autoscalingPolicies.get
- dataproc.autoscalingPolicies.getIamPolicy
- dataproc.autoscalingPolicies.list
- dataproc.autoscalingPolicies.setIamPolicy
- dataproc.autoscalingPolicies.update
- dataproc.autoscalingPolicies.use
- dataproc.batches.cancel
- dataproc.batches.create
- dataproc.batches.delete
- dataproc.batches.get
- dataproc.batches.list
- dataproc.clusters.create
- dataproc.clusters.delete
- dataproc.clusters.get
- dataproc.clusters.getIamPolicy
- dataproc.clusters.list
- dataproc.clusters.setIamPolicy
- dataproc.clusters.start
- dataproc.clusters.stop
- dataproc.clusters.update
- dataproc.clusters.use
- dataproc.jobs.cancel
- dataproc.jobs.create
- dataproc.jobs.delete
- dataproc.jobs.get
- dataproc.jobs.getIamPolicy
- dataproc.jobs.list
- dataproc.jobs.setIamPolicy
- dataproc.jobs.update
- dataproc.nodeGroups.create
- dataproc.nodeGroups.get
- dataproc.nodeGroups.update
- dataproc.operations.cancel
- dataproc.operations.delete
- dataproc.operations.get
- dataproc.operations.getIamPolicy
- dataproc.operations.list
- dataproc.operations.setIamPolicy
- dataproc.tasks.lease
- dataproc.tasks.listInvalidatedLeases
- dataproc.tasks.reportStatus
- dataproc.workflowTemplates.create
- dataproc.workflowTemplates.delete
- dataproc.workflowTemplates.get
- dataproc.workflowTemplates.getIamPolicy
- dataproc.workflowTemplates.instantiate
- dataproc.workflowTemplates.instantiateInline
- dataproc.workflowTemplates.list
- dataproc.workflowTemplates.setIamPolicy
- dataproc.workflowTemplates.update
- dataprocessing.datasources.get
- dataprocessing.datasources.list
- dataprocessing.datasources.update
- dataprocessing.featurecontrols.list
- dataprocessing.featurecontrols.update
- dataprocessing.groupcontrols.get
- dataprocessing.groupcontrols.list
- dataprocessing.groupcontrols.update
- datastore.databases.create
- datastore.databases.export
- datastore.databases.get
- datastore.databases.getMetadata
- datastore.databases.import
- datastore.databases.list
- datastore.databases.update
- datastore.entities.allocateIds
- datastore.entities.create
- datastore.entities.delete
- datastore.entities.get
- datastore.entities.list
- datastore.entities.update
- datastore.indexes.create
- datastore.indexes.delete
- datastore.indexes.get
- datastore.indexes.list
- datastore.indexes.update
- datastore.keyVisualizerScans.get
- datastore.keyVisualizerScans.list
- datastore.locations.get
- datastore.locations.list
- datastore.namespaces.get
- datastore.namespaces.list
- datastore.operations.cancel
- datastore.operations.delete
- datastore.operations.get
- datastore.operations.list
- datastore.statistics.get
- datastore.statistics.list
- datastream.connectionProfiles.create
- datastream.connectionProfiles.createTagBinding
- datastream.connectionProfiles.delete
- datastream.connectionProfiles.deleteTagBinding
- datastream.connectionProfiles.destinationTypes
- datastream.connectionProfiles.discover
- datastream.connectionProfiles.get
- datastream.connectionProfiles.getIamPolicy
- datastream.connectionProfiles.list
- datastream.connectionProfiles.listEffectiveTags
- datastream.connectionProfiles.listStaticServiceIps
- datastream.connectionProfiles.listTagBindings
- datastream.connectionProfiles.setIamPolicy
- datastream.connectionProfiles.sourceTypes
- datastream.connectionProfiles.update
- datastream.locations.fetchStaticIps
- datastream.locations.get
- datastream.locations.list
- datastream.objects.get
- datastream.objects.list
- datastream.objects.startBackfillJob
- datastream.objects.stopBackfillJob
- datastream.operations.cancel
- datastream.operations.delete
- datastream.operations.get
- datastream.operations.list
- datastream.privateConnections.create
- datastream.privateConnections.createTagBinding
- datastream.privateConnections.delete
- datastream.privateConnections.deleteTagBinding
- datastream.privateConnections.get
- datastream.privateConnections.getIamPolicy
- datastream.privateConnections.list
- datastream.privateConnections.listEffectiveTags
- datastream.privateConnections.listTagBindings
- datastream.privateConnections.setIamPolicy
- datastream.routes.create
- datastream.routes.delete
- datastream.routes.get
- datastream.routes.getIamPolicy
- datastream.routes.list
- datastream.routes.setIamPolicy
- datastream.streams.computeState
- datastream.streams.create
- datastream.streams.createTagBinding
- datastream.streams.delete
- datastream.streams.deleteTagBinding
- datastream.streams.fetchErrors
- datastream.streams.get
- datastream.streams.getIamPolicy
- datastream.streams.list
- datastream.streams.listEffectiveTags
- datastream.streams.listTagBindings
- datastream.streams.pause
- datastream.streams.resume
- datastream.streams.setIamPolicy
- datastream.streams.start
- datastream.streams.update
- datastudio.datasources.delete
- datastudio.datasources.get
- datastudio.datasources.getIamPolicy
- datastudio.datasources.move
- datastudio.datasources.restoreTrash
- datastudio.datasources.search
- datastudio.datasources.setIamPolicy
- datastudio.datasources.settingsShare
- datastudio.datasources.share
- datastudio.datasources.trash
- datastudio.datasources.update
- datastudio.reports.delete
- datastudio.reports.get
- datastudio.reports.getIamPolicy
- datastudio.reports.move
- datastudio.reports.restoreTrash
- datastudio.reports.search
- datastudio.reports.setIamPolicy
- datastudio.reports.settingsShare
- datastudio.reports.share
- datastudio.reports.trash
- datastudio.reports.update
- datastudio.workspaces.createUnder
- datastudio.workspaces.delete
- datastudio.workspaces.get
- datastudio.workspaces.getIamPolicy
- datastudio.workspaces.moveIn
- datastudio.workspaces.moveOut
- datastudio.workspaces.restoreTrash
- datastudio.workspaces.search
- datastudio.workspaces.setIamPolicy
- datastudio.workspaces.trash
- datastudio.workspaces.update
- deploymentmanager.compositeTypes.create
- deploymentmanager.compositeTypes.delete
- deploymentmanager.compositeTypes.get
- deploymentmanager.compositeTypes.list
- deploymentmanager.compositeTypes.update
- deploymentmanager.deployments.cancelPreview
- deploymentmanager.deployments.create
- deploymentmanager.deployments.delete
- deploymentmanager.deployments.get
- deploymentmanager.deployments.getIamPolicy
- deploymentmanager.deployments.list
- deploymentmanager.deployments.setIamPolicy
- deploymentmanager.deployments.stop
- deploymentmanager.deployments.update
- deploymentmanager.manifests.get
- deploymentmanager.manifests.list
- deploymentmanager.operations.get
- deploymentmanager.operations.list
- deploymentmanager.resources.get
- deploymentmanager.resources.list
- deploymentmanager.typeProviders.create
- deploymentmanager.typeProviders.delete
- deploymentmanager.typeProviders.get
- deploymentmanager.typeProviders.getType
- deploymentmanager.typeProviders.list
- deploymentmanager.typeProviders.listTypes
- deploymentmanager.typeProviders.update
- deploymentmanager.types.create
- deploymentmanager.types.delete
- deploymentmanager.types.get
- deploymentmanager.types.list
- deploymentmanager.types.update
- dialogflow.agents.create
- dialogflow.agents.delete
- dialogflow.agents.export
- dialogflow.agents.get
- dialogflow.agents.import
- dialogflow.agents.list
- dialogflow.agents.restore
- dialogflow.agents.search
- dialogflow.agents.searchResources
- dialogflow.agents.train
- dialogflow.agents.update
- dialogflow.agents.validate
- dialogflow.answerrecords.delete
- dialogflow.answerrecords.get
- dialogflow.answerrecords.list
- dialogflow.answerrecords.update
- dialogflow.callMatchers.create
- dialogflow.callMatchers.delete
- dialogflow.callMatchers.list
- dialogflow.changelogs.get
- dialogflow.changelogs.list
- dialogflow.contexts.create
- dialogflow.contexts.delete
- dialogflow.contexts.get
- dialogflow.contexts.list
- dialogflow.contexts.update
- dialogflow.conversationDatasets.create
- dialogflow.conversationDatasets.delete
- dialogflow.conversationDatasets.get
- dialogflow.conversationDatasets.import
- dialogflow.conversationDatasets.list
- dialogflow.conversationModels.create
- dialogflow.conversationModels.delete
- dialogflow.conversationModels.deploy
- dialogflow.conversationModels.get
- dialogflow.conversationModels.list
- dialogflow.conversationModels.undeploy
- dialogflow.conversationProfiles.create
- dialogflow.conversationProfiles.delete
- dialogflow.conversationProfiles.get
- dialogflow.conversationProfiles.list
- dialogflow.conversationProfiles.update
- dialogflow.conversations.addPhoneNumber
- dialogflow.conversations.complete
- dialogflow.conversations.create
- dialogflow.conversations.get
- dialogflow.conversations.list
- dialogflow.conversations.update
- dialogflow.deployments.get
- dialogflow.deployments.list
- dialogflow.documents.create
- dialogflow.documents.delete
- dialogflow.documents.get
- dialogflow.documents.list
- dialogflow.entityTypes.create
- dialogflow.entityTypes.createEntity
- dialogflow.entityTypes.delete
- dialogflow.entityTypes.deleteEntity
- dialogflow.entityTypes.get
- dialogflow.entityTypes.list
- dialogflow.entityTypes.update
- dialogflow.entityTypes.updateEntity
- dialogflow.environments.create
- dialogflow.environments.delete
- dialogflow.environments.get
- dialogflow.environments.getHistory
- dialogflow.environments.list
- dialogflow.environments.lookupHistory
- dialogflow.environments.runContinuousTest
- dialogflow.environments.update
- dialogflow.experiments.create
- dialogflow.experiments.delete
- dialogflow.experiments.get
- dialogflow.experiments.list
- dialogflow.experiments.update
- dialogflow.flows.create
- dialogflow.flows.delete
- dialogflow.flows.get
- dialogflow.flows.list
- dialogflow.flows.train
- dialogflow.flows.update
- dialogflow.flows.validate
- dialogflow.fulfillments.get
- dialogflow.fulfillments.update
- dialogflow.integrations.create
- dialogflow.integrations.delete
- dialogflow.integrations.get
- dialogflow.integrations.list
- dialogflow.integrations.update
- dialogflow.intents.create
- dialogflow.intents.delete
- dialogflow.intents.get
- dialogflow.intents.list
- dialogflow.intents.update
- dialogflow.knowledgeBases.create
- dialogflow.knowledgeBases.delete
- dialogflow.knowledgeBases.get
- dialogflow.knowledgeBases.list
- dialogflow.knowledgeBases.update
- dialogflow.messages.list
- dialogflow.modelEvaluations.get
- dialogflow.modelEvaluations.list
- dialogflow.operations.get
- dialogflow.pages.create
- dialogflow.pages.delete
- dialogflow.pages.get
- dialogflow.pages.list
- dialogflow.pages.update
- dialogflow.participants.analyzeContent
- dialogflow.participants.create
- dialogflow.participants.get
- dialogflow.participants.list
- dialogflow.participants.suggest
- dialogflow.participants.update
- dialogflow.phoneNumberOrders.cancel
- dialogflow.phoneNumberOrders.create
- dialogflow.phoneNumberOrders.get
- dialogflow.phoneNumberOrders.list
- dialogflow.phoneNumberOrders.update
- dialogflow.phoneNumbers.delete
- dialogflow.phoneNumbers.list
- dialogflow.phoneNumbers.undelete
- dialogflow.phoneNumbers.update
- dialogflow.securitySettings.create
- dialogflow.securitySettings.delete
- dialogflow.securitySettings.get
- dialogflow.securitySettings.list
- dialogflow.securitySettings.update
- dialogflow.sessionEntityTypes.create
- dialogflow.sessionEntityTypes.delete
- dialogflow.sessionEntityTypes.get
- dialogflow.sessionEntityTypes.list
- dialogflow.sessionEntityTypes.update
- dialogflow.sessions.detectIntent
- dialogflow.sessions.streamingDetectIntent
- dialogflow.smartMessagingEntries.create
- dialogflow.smartMessagingEntries.delete
- dialogflow.smartMessagingEntries.get
- dialogflow.smartMessagingEntries.list
- dialogflow.testcases.calculateCoverage
- dialogflow.testcases.create
- dialogflow.testcases.delete
- dialogflow.testcases.export
- dialogflow.testcases.get
- dialogflow.testcases.import
- dialogflow.testcases.list
- dialogflow.testcases.run
- dialogflow.testcases.update
- dialogflow.transitionRouteGroups.create
- dialogflow.transitionRouteGroups.delete
- dialogflow.transitionRouteGroups.get
- dialogflow.transitionRouteGroups.list
- dialogflow.transitionRouteGroups.update
- dialogflow.versions.create
- dialogflow.versions.delete
- dialogflow.versions.get
- dialogflow.versions.list
- dialogflow.versions.load
- dialogflow.versions.update
- dialogflow.webhooks.create
- dialogflow.webhooks.delete
- dialogflow.webhooks.get
- dialogflow.webhooks.list
- dialogflow.webhooks.update
- discoveryengine.documents.create
- discoveryengine.documents.delete
- discoveryengine.documents.get
- discoveryengine.documents.import
- discoveryengine.documents.list
- discoveryengine.documents.update
- discoveryengine.operations.get
- discoveryengine.operations.list
- discoveryengine.servingConfigs.recommend
- discoveryengine.userEvents.create
- discoveryengine.userEvents.import
- dlp.analyzeRiskTemplates.create
- dlp.analyzeRiskTemplates.delete
- dlp.analyzeRiskTemplates.get
- dlp.analyzeRiskTemplates.list
- dlp.analyzeRiskTemplates.update
- dlp.columnDataProfiles.get
- dlp.columnDataProfiles.list
- dlp.deidentifyTemplates.create
- dlp.deidentifyTemplates.delete
- dlp.deidentifyTemplates.get
- dlp.deidentifyTemplates.list
- dlp.deidentifyTemplates.update
- dlp.estimates.cancel
- dlp.estimates.create
- dlp.estimates.delete
- dlp.estimates.get
- dlp.estimates.list
- dlp.inspectFindings.list
- dlp.inspectTemplates.create
- dlp.inspectTemplates.delete
- dlp.inspectTemplates.get
- dlp.inspectTemplates.list
- dlp.inspectTemplates.update
- dlp.jobTriggers.create
- dlp.jobTriggers.delete
- dlp.jobTriggers.get
- dlp.jobTriggers.hybridInspect
- dlp.jobTriggers.list
- dlp.jobTriggers.update
- dlp.jobs.cancel
- dlp.jobs.create
- dlp.jobs.delete
- dlp.jobs.get
- dlp.jobs.hybridInspect
- dlp.jobs.list
- dlp.kms.encrypt
- dlp.locations.get
- dlp.locations.list
- dlp.projectDataProfiles.get
- dlp.projectDataProfiles.list
- dlp.storedInfoTypes.create
- dlp.storedInfoTypes.delete
- dlp.storedInfoTypes.get
- dlp.storedInfoTypes.list
- dlp.storedInfoTypes.update
- dlp.subscriptions.cancel
- dlp.subscriptions.create
- dlp.subscriptions.get
- dlp.subscriptions.list
- dlp.subscriptions.update
- dlp.tableDataProfiles.get
- dlp.tableDataProfiles.list
- dns.changes.create
- dns.changes.get
- dns.changes.list
- dns.dnsKeys.get
- dns.dnsKeys.list
- dns.gkeClusters.bindDNSResponsePolicy
- dns.gkeClusters.bindPrivateDNSZone
- dns.managedZoneOperations.get
- dns.managedZoneOperations.list
- dns.managedZones.create
- dns.managedZones.delete
- dns.managedZones.get
- dns.managedZones.getIamPolicy
- dns.managedZones.list
- dns.managedZones.setIamPolicy
- dns.managedZones.update
- dns.networks.bindDNSResponsePolicy
- dns.networks.bindPrivateDNSPolicy
- dns.networks.bindPrivateDNSZone
- dns.networks.targetWithPeeringZone
- dns.networks.useHealthSignals
- dns.policies.create
- dns.policies.delete
- dns.policies.get
- dns.policies.getIamPolicy
- dns.policies.list
- dns.policies.setIamPolicy
- dns.policies.update
- dns.projects.get
- dns.resourceRecordSets.create
- dns.resourceRecordSets.delete
- dns.resourceRecordSets.get
- dns.resourceRecordSets.list
- dns.resourceRecordSets.update
- dns.responsePolicies.create
- dns.responsePolicies.delete
- dns.responsePolicies.get
- dns.responsePolicies.list
- dns.responsePolicies.update
- dns.responsePolicyRules.create
- dns.responsePolicyRules.delete
- dns.responsePolicyRules.get
- dns.responsePolicyRules.list
- dns.responsePolicyRules.update
- documentai.dataLabelingJobs.cancel
- documentai.dataLabelingJobs.create
- documentai.dataLabelingJobs.delete
- documentai.dataLabelingJobs.list
- documentai.dataLabelingJobs.update
- documentai.datasetSchemas.get
- documentai.datasetSchemas.update
- documentai.datasets.createDocuments
- documentai.datasets.deleteDocuments
- documentai.datasets.get
- documentai.datasets.getDocuments
- documentai.datasets.listDocuments
- documentai.datasets.update
- documentai.datasets.updateDocuments
- documentai.evaluationDocuments.get
- documentai.evaluations.create
- documentai.evaluations.get
- documentai.evaluations.list
- documentai.humanReviewConfigs.get
- documentai.humanReviewConfigs.review
- documentai.humanReviewConfigs.update
- documentai.labelerPools.create
- documentai.labelerPools.delete
- documentai.labelerPools.get
- documentai.labelerPools.list
- documentai.labelerPools.update
- documentai.locations.get
- documentai.locations.list
- documentai.operations.getLegacy
- documentai.processedDocumentsSets.get
- documentai.processedDocumentsSets.getDocuments
- documentai.processedDocumentsSets.listDocuments
- documentai.processorTypes.get
- documentai.processorTypes.list
- documentai.processorVersions.create
- documentai.processorVersions.delete
- documentai.processorVersions.get
- documentai.processorVersions.list
- documentai.processorVersions.processBatch
- documentai.processorVersions.processOnline
- documentai.processorVersions.update
- documentai.processors.create
- documentai.processors.delete
- documentai.processors.fetchHumanReviewDetails
- documentai.processors.get
- documentai.processors.list
- documentai.processors.processBatch
- documentai.processors.processOnline
- documentai.processors.update
- domains.locations.get
- domains.locations.list
- domains.operations.cancel
- domains.operations.get
- domains.operations.list
- domains.registrations.configureContact
- domains.registrations.configureDns
- domains.registrations.configureManagement
- domains.registrations.create
- domains.registrations.createTagBinding
- domains.registrations.delete
- domains.registrations.deleteTagBinding
- domains.registrations.get
- domains.registrations.getIamPolicy
- domains.registrations.list
- domains.registrations.listEffectiveTags
- domains.registrations.listTagBindings
- domains.registrations.setIamPolicy
- domains.registrations.update
- earthengine.assets.create
- earthengine.assets.delete
- earthengine.assets.get
- earthengine.assets.getIamPolicy
- earthengine.assets.list
- earthengine.assets.setIamPolicy
- earthengine.assets.update
- earthengine.computations.create
- earthengine.config.get
- earthengine.config.update
- earthengine.exports.create
- earthengine.featureviews.create
- earthengine.filmstripthumbnails.create
- earthengine.filmstripthumbnails.get
- earthengine.imports.create
- earthengine.maps.create
- earthengine.maps.get
- earthengine.operations.delete
- earthengine.operations.get
- earthengine.operations.list
- earthengine.operations.update
- earthengine.tables.create
- earthengine.tables.get
- earthengine.thumbnails.create
- earthengine.thumbnails.get
- earthengine.videothumbnails.create
- earthengine.videothumbnails.get
- edgecontainer.clusters.create
- edgecontainer.clusters.delete
- edgecontainer.clusters.generateAccessToken
- edgecontainer.clusters.get
- edgecontainer.clusters.getIamPolicy
- edgecontainer.clusters.list
- edgecontainer.clusters.setIamPolicy
- edgecontainer.clusters.update
- edgecontainer.locations.get
- edgecontainer.locations.list
- edgecontainer.machines.create
- edgecontainer.machines.delete
- edgecontainer.machines.get
- edgecontainer.machines.getIamPolicy
- edgecontainer.machines.list
- edgecontainer.machines.setIamPolicy
- edgecontainer.machines.update
- edgecontainer.machines.use
- edgecontainer.nodePools.create
- edgecontainer.nodePools.delete
- edgecontainer.nodePools.get
- edgecontainer.nodePools.getIamPolicy
- edgecontainer.nodePools.list
- edgecontainer.nodePools.setIamPolicy
- edgecontainer.nodePools.update
- edgecontainer.operations.cancel
- edgecontainer.operations.delete
- edgecontainer.operations.get
- edgecontainer.operations.list
- edgecontainer.vpnConnections.create
- edgecontainer.vpnConnections.delete
- edgecontainer.vpnConnections.get
- edgecontainer.vpnConnections.getIamPolicy
- edgecontainer.vpnConnections.list
- edgecontainer.vpnConnections.setIamPolicy
- edgecontainer.vpnConnections.update
- edgenetwork.interconnectAttachments.create
- edgenetwork.interconnectAttachments.delete
- edgenetwork.interconnectAttachments.get
- edgenetwork.interconnectAttachments.getIamPolicy
- edgenetwork.interconnectAttachments.list
- edgenetwork.interconnectAttachments.setIamPolicy
- edgenetwork.interconnectAttachments.update
- edgenetwork.interconnects.get
- edgenetwork.interconnects.getDiagnostics
- edgenetwork.interconnects.getIamPolicy
- edgenetwork.interconnects.list
- edgenetwork.interconnects.setIamPolicy
- edgenetwork.locations.get
- edgenetwork.locations.list
- edgenetwork.networks.create
- edgenetwork.networks.delete
- edgenetwork.networks.get
- edgenetwork.networks.getIamPolicy
- edgenetwork.networks.getStatus
- edgenetwork.networks.list
- edgenetwork.networks.setIamPolicy
- edgenetwork.networks.update
- edgenetwork.operations.cancel
- edgenetwork.operations.delete
- edgenetwork.operations.get
- edgenetwork.operations.list
- edgenetwork.routers.create
- edgenetwork.routers.delete
- edgenetwork.routers.get
- edgenetwork.routers.getIamPolicy
- edgenetwork.routers.getRouterStatus
- edgenetwork.routers.list
- edgenetwork.routers.patch
- edgenetwork.routers.setIamPolicy
- edgenetwork.routers.update
- edgenetwork.routes.create
- edgenetwork.routes.delete
- edgenetwork.routes.get
- edgenetwork.routes.list
- edgenetwork.subnetworks.create
- edgenetwork.subnetworks.delete
- edgenetwork.subnetworks.get
- edgenetwork.subnetworks.getIamPolicy
- edgenetwork.subnetworks.getStatus
- edgenetwork.subnetworks.list
- edgenetwork.subnetworks.setIamPolicy
- edgenetwork.subnetworks.update
- edgenetwork.zones.get
- edgenetwork.zones.initialize
- edgenetwork.zones.list
- endpoints.portals.attachCustomDomain
- endpoints.portals.detachCustomDomain
- endpoints.portals.listCustomDomains
- endpoints.portals.update
- enterpriseknowledgegraph.cloudKnowledgeGraphEntities.lookup
- enterpriseknowledgegraph.cloudKnowledgeGraphEntities.search
- enterpriseknowledgegraph.entityReconciliationJobs.cancel
- enterpriseknowledgegraph.entityReconciliationJobs.create
- enterpriseknowledgegraph.entityReconciliationJobs.delete
- enterpriseknowledgegraph.entityReconciliationJobs.get
- enterpriseknowledgegraph.entityReconciliationJobs.list
- enterpriseknowledgegraph.publicKnowledgeGraphEntities.lookup
- enterpriseknowledgegraph.publicKnowledgeGraphEntities.search
- errorreporting.applications.list
- errorreporting.errorEvents.create
- errorreporting.errorEvents.delete
- errorreporting.errorEvents.list
- errorreporting.groupMetadata.get
- errorreporting.groupMetadata.update
- errorreporting.groups.list
- essentialcontacts.contacts.create
- essentialcontacts.contacts.delete
- essentialcontacts.contacts.get
- essentialcontacts.contacts.list
- essentialcontacts.contacts.send
- essentialcontacts.contacts.update
- eventarc.channelConnections.create
- eventarc.channelConnections.delete
- eventarc.channelConnections.get
- eventarc.channelConnections.getIamPolicy
- eventarc.channelConnections.list
- eventarc.channelConnections.publish
- eventarc.channelConnections.setIamPolicy
- eventarc.channels.attach
- eventarc.channels.create
- eventarc.channels.delete
- eventarc.channels.get
- eventarc.channels.getIamPolicy
- eventarc.channels.list
- eventarc.channels.publish
- eventarc.channels.setIamPolicy
- eventarc.channels.undelete
- eventarc.channels.update
- eventarc.events.receiveAuditLogWritten
- eventarc.events.receiveEvent
- eventarc.googleChannelConfigs.get
- eventarc.googleChannelConfigs.update
- eventarc.locations.get
- eventarc.locations.list
- eventarc.operations.cancel
- eventarc.operations.delete
- eventarc.operations.get
- eventarc.operations.list
- eventarc.providers.get
- eventarc.providers.list
- eventarc.triggers.create
- eventarc.triggers.delete
- eventarc.triggers.get
- eventarc.triggers.getIamPolicy
- eventarc.triggers.list
- eventarc.triggers.setIamPolicy
- eventarc.triggers.undelete
- eventarc.triggers.update
- fcmdata.deliverydata.list
- file.backups.create
- file.backups.createTagBinding
- file.backups.delete
- file.backups.deleteTagBinding
- file.backups.get
- file.backups.list
- file.backups.listEffectiveTags
- file.backups.listTagBindings
- file.backups.update
- file.instances.create
- file.instances.createTagBinding
- file.instances.delete
- file.instances.deleteTagBinding
- file.instances.get
- file.instances.list
- file.instances.listEffectiveTags
- file.instances.listTagBindings
- file.instances.restore
- file.instances.revert
- file.instances.update
- file.locations.get
- file.locations.list
- file.operations.cancel
- file.operations.delete
- file.operations.get
- file.operations.list
- file.snapshots.create
- file.snapshots.createTagBinding
- file.snapshots.delete
- file.snapshots.deleteTagBinding
- file.snapshots.get
- file.snapshots.list
- file.snapshots.listEffectiveTags
- file.snapshots.listTagBindings
- file.snapshots.update
- firebase.billingPlans.get
- firebase.billingPlans.update
- firebase.clients.create
- firebase.clients.delete
- firebase.clients.get
- firebase.clients.list
- firebase.clients.undelete
- firebase.clients.update
- firebase.links.create
- firebase.links.delete
- firebase.links.list
- firebase.links.update
- firebase.playLinks.get
- firebase.playLinks.list
- firebase.playLinks.update
- firebase.projects.delete
- firebase.projects.get
- firebase.projects.update
- firebaseabt.experimentresults.get
- firebaseabt.experiments.create
- firebaseabt.experiments.delete
- firebaseabt.experiments.get
- firebaseabt.experiments.list
- firebaseabt.experiments.update
- firebaseabt.projectmetadata.get
- firebaseanalytics.resources.googleAnalyticsEdit
- firebaseanalytics.resources.googleAnalyticsReadAndAnalyze
- firebaseappcheck.appAttestConfig.get
- firebaseappcheck.appAttestConfig.update
- firebaseappcheck.debugTokens.get
- firebaseappcheck.debugTokens.update
- firebaseappcheck.deviceCheckConfig.get
- firebaseappcheck.deviceCheckConfig.update
- firebaseappcheck.playIntegrityConfig.get
- firebaseappcheck.playIntegrityConfig.update
- firebaseappcheck.recaptchaEnterpriseConfig.get
- firebaseappcheck.recaptchaEnterpriseConfig.update
- firebaseappcheck.recaptchaV3Config.get
- firebaseappcheck.recaptchaV3Config.update
- firebaseappcheck.safetyNetConfig.get
- firebaseappcheck.safetyNetConfig.update
- firebaseappcheck.services.get
- firebaseappcheck.services.update
- firebaseappdistro.groups.list
- firebaseappdistro.groups.update
- firebaseappdistro.releases.list
- firebaseappdistro.releases.update
- firebaseappdistro.testers.list
- firebaseappdistro.testers.update
- firebaseauth.configs.create
- firebaseauth.configs.get
- firebaseauth.configs.getHashConfig
- firebaseauth.configs.getSecret
- firebaseauth.configs.update
- firebaseauth.users.create
- firebaseauth.users.createSession
- firebaseauth.users.delete
- firebaseauth.users.get
- firebaseauth.users.sendEmail
- firebaseauth.users.update
- firebasecrash.issues.update
- firebasecrash.reports.get
- firebasecrashlytics.config.get
- firebasecrashlytics.config.update
- firebasecrashlytics.data.get
- firebasecrashlytics.issues.get
- firebasecrashlytics.issues.list
- firebasecrashlytics.issues.update
- firebasecrashlytics.sessions.get
- firebasedatabase.instances.create
- firebasedatabase.instances.delete
- firebasedatabase.instances.disable
- firebasedatabase.instances.get
- firebasedatabase.instances.list
- firebasedatabase.instances.reenable
- firebasedatabase.instances.undelete
- firebasedatabase.instances.update
- firebasedynamiclinks.destinations.list
- firebasedynamiclinks.destinations.update
- firebasedynamiclinks.domains.create
- firebasedynamiclinks.domains.delete
- firebasedynamiclinks.domains.get
- firebasedynamiclinks.domains.list
- firebasedynamiclinks.domains.update
- firebasedynamiclinks.links.create
- firebasedynamiclinks.links.get
- firebasedynamiclinks.links.list
- firebasedynamiclinks.links.update
- firebasedynamiclinks.stats.get
- firebaseextensions.configs.create
- firebaseextensions.configs.delete
- firebaseextensions.configs.list
- firebaseextensions.configs.update
- firebasehosting.sites.create
- firebasehosting.sites.delete
- firebasehosting.sites.get
- firebasehosting.sites.list
- firebasehosting.sites.update
- firebaseinappmessaging.campaigns.create
- firebaseinappmessaging.campaigns.delete
- firebaseinappmessaging.campaigns.get
- firebaseinappmessaging.campaigns.list
- firebaseinappmessaging.campaigns.update
- firebasemessagingcampaigns.campaigns.create
- firebasemessagingcampaigns.campaigns.delete
- firebasemessagingcampaigns.campaigns.get
- firebasemessagingcampaigns.campaigns.list
- firebasemessagingcampaigns.campaigns.start
- firebasemessagingcampaigns.campaigns.stop
- firebasemessagingcampaigns.campaigns.update
- firebaseml.compressionjobs.create
- firebaseml.compressionjobs.delete
- firebaseml.compressionjobs.get
- firebaseml.compressionjobs.list
- firebaseml.compressionjobs.start
- firebaseml.compressionjobs.update
- firebaseml.models.create
- firebaseml.models.delete
- firebaseml.models.get
- firebaseml.models.list
- firebaseml.models.update
- firebaseml.modelversions.create
- firebaseml.modelversions.get
- firebaseml.modelversions.list
- firebaseml.modelversions.update
- firebasenotifications.messages.create
- firebasenotifications.messages.delete
- firebasenotifications.messages.get
- firebasenotifications.messages.list
- firebasenotifications.messages.update
- firebaseperformance.config.update
- firebaseperformance.data.get
- firebaserules.releases.create
- firebaserules.releases.delete
- firebaserules.releases.get
- firebaserules.releases.getExecutable
- firebaserules.releases.list
- firebaserules.releases.update
- firebaserules.rulesets.create
- firebaserules.rulesets.delete
- firebaserules.rulesets.get
- firebaserules.rulesets.list
- firebaserules.rulesets.test
- firebasestorage.buckets.addFirebase
- firebasestorage.buckets.get
- firebasestorage.buckets.list
- firebasestorage.buckets.removeFirebase
- fleetengine.deliveryvehicles.create
- fleetengine.deliveryvehicles.get
- fleetengine.deliveryvehicles.list
- fleetengine.deliveryvehicles.update
- fleetengine.deliveryvehicles.updateLocation
- fleetengine.deliveryvehicles.updateVehicleStops
- fleetengine.tasks.create
- fleetengine.tasks.get
- fleetengine.tasks.list
- fleetengine.tasks.searchWithTrackingId
- fleetengine.tasks.update
- fleetengine.tasktrackinginfo.get
- fleetengine.trips.create
- fleetengine.trips.get
- fleetengine.trips.search
- fleetengine.trips.update
- fleetengine.trips.updateState
- fleetengine.vehicles.create
- fleetengine.vehicles.get
- fleetengine.vehicles.list
- fleetengine.vehicles.search
- fleetengine.vehicles.searchFuzzed
- fleetengine.vehicles.update
- fleetengine.vehicles.updateLocation
- gameservices.gameServerClusters.create
- gameservices.gameServerClusters.delete
- gameservices.gameServerClusters.get
- gameservices.gameServerClusters.list
- gameservices.gameServerClusters.update
- gameservices.gameServerConfigs.create
- gameservices.gameServerConfigs.delete
- gameservices.gameServerConfigs.get
- gameservices.gameServerConfigs.list
- gameservices.gameServerDeployments.create
- gameservices.gameServerDeployments.delete
- gameservices.gameServerDeployments.get
- gameservices.gameServerDeployments.list
- gameservices.gameServerDeployments.rollout
- gameservices.gameServerDeployments.update
- gameservices.locations.get
- gameservices.locations.list
- gameservices.operations.cancel
- gameservices.operations.delete
- gameservices.operations.get
- gameservices.operations.list
- gameservices.realms.create
- gameservices.realms.delete
- gameservices.realms.get
- gameservices.realms.list
- gameservices.realms.update
- gcp.redisenterprise.com/databases.create
- gcp.redisenterprise.com/databases.delete
- gcp.redisenterprise.com/databases.get
- gcp.redisenterprise.com/databases.list
- gcp.redisenterprise.com/databases.update
- gcp.redisenterprise.com/subscriptions.create
- gcp.redisenterprise.com/subscriptions.delete
- gcp.redisenterprise.com/subscriptions.get
- gcp.redisenterprise.com/subscriptions.list
- gcp.redisenterprise.com/subscriptions.update
- genomics.datasets.create
- genomics.datasets.delete
- genomics.datasets.get
- genomics.datasets.getIamPolicy
- genomics.datasets.list
- genomics.datasets.setIamPolicy
- genomics.datasets.update
- genomics.operations.cancel
- genomics.operations.create
- genomics.operations.get
- genomics.operations.list
- gkebackup.backupPlans.create
- gkebackup.backupPlans.delete
- gkebackup.backupPlans.get
- gkebackup.backupPlans.getIamPolicy
- gkebackup.backupPlans.list
- gkebackup.backupPlans.setIamPolicy
- gkebackup.backupPlans.update
- gkebackup.backups.create
- gkebackup.backups.delete
- gkebackup.backups.get
- gkebackup.backups.list
- gkebackup.backups.update
- gkebackup.locations.get
- gkebackup.locations.list
- gkebackup.operations.cancel
- gkebackup.operations.delete
- gkebackup.operations.get
- gkebackup.operations.list
- gkebackup.restorePlans.create
- gkebackup.restorePlans.delete
- gkebackup.restorePlans.get
- gkebackup.restorePlans.getIamPolicy
- gkebackup.restorePlans.list
- gkebackup.restorePlans.setIamPolicy
- gkebackup.restorePlans.update
- gkebackup.restores.create
- gkebackup.restores.delete
- gkebackup.restores.get
- gkebackup.restores.list
- gkebackup.restores.update
- gkebackup.volumeBackups.get
- gkebackup.volumeBackups.list
- gkebackup.volumeRestores.get
- gkebackup.volumeRestores.list
- gkehub.endpoints.connect
- gkehub.features.create
- gkehub.features.delete
- gkehub.features.get
- gkehub.features.getIamPolicy
- gkehub.features.list
- gkehub.features.setIamPolicy
- gkehub.features.update
- gkehub.fleet.create
- gkehub.fleet.delete
- gkehub.fleet.get
- gkehub.fleet.update
- gkehub.gateway.delete
- gkehub.gateway.get
- gkehub.gateway.getIamPolicy
- gkehub.gateway.patch
- gkehub.gateway.post
- gkehub.gateway.put
- gkehub.gateway.setIamPolicy
- gkehub.locations.get
- gkehub.locations.list
- gkehub.memberships.create
- gkehub.memberships.delete
- gkehub.memberships.generateConnectManifest
- gkehub.memberships.get
- gkehub.memberships.getIamPolicy
- gkehub.memberships.list
- gkehub.memberships.setIamPolicy
- gkehub.memberships.update
- gkehub.operations.cancel
- gkehub.operations.delete
- gkehub.operations.get
- gkehub.operations.list
- gkemulticloud.attachedClusters.create
- gkemulticloud.attachedClusters.delete
- gkemulticloud.attachedClusters.generateInstallManifest
- gkemulticloud.attachedClusters.get
- gkemulticloud.attachedClusters.import
- gkemulticloud.attachedClusters.list
- gkemulticloud.attachedClusters.update
- gkemulticloud.attachedServerConfigs.get
- gkemulticloud.awsClusters.create
- gkemulticloud.awsClusters.delete
- gkemulticloud.awsClusters.generateAccessToken
- gkemulticloud.awsClusters.get
- gkemulticloud.awsClusters.getAdminKubeconfig
- gkemulticloud.awsClusters.list
- gkemulticloud.awsClusters.update
- gkemulticloud.awsNodePools.create
- gkemulticloud.awsNodePools.delete
- gkemulticloud.awsNodePools.get
- gkemulticloud.awsNodePools.list
- gkemulticloud.awsNodePools.update
- gkemulticloud.awsServerConfigs.get
- gkemulticloud.azureClients.create
- gkemulticloud.azureClients.delete
- gkemulticloud.azureClients.get
- gkemulticloud.azureClients.list
- gkemulticloud.azureClusters.create
- gkemulticloud.azureClusters.delete
- gkemulticloud.azureClusters.generateAccessToken
- gkemulticloud.azureClusters.get
- gkemulticloud.azureClusters.getAdminKubeconfig
- gkemulticloud.azureClusters.list
- gkemulticloud.azureClusters.update
- gkemulticloud.azureNodePools.create
- gkemulticloud.azureNodePools.delete
- gkemulticloud.azureNodePools.get
- gkemulticloud.azureNodePools.list
- gkemulticloud.azureNodePools.update
- gkemulticloud.azureServerConfigs.get
- gkemulticloud.operations.cancel
- gkemulticloud.operations.delete
- gkemulticloud.operations.get
- gkemulticloud.operations.list
- gkemulticloud.operations.wait
- gkeonprem.bareMetalAdminClusters.connect
- gkeonprem.bareMetalAdminClusters.create
- gkeonprem.bareMetalAdminClusters.enroll
- gkeonprem.bareMetalAdminClusters.get
- gkeonprem.bareMetalAdminClusters.getIamPolicy
- gkeonprem.bareMetalAdminClusters.list
- gkeonprem.bareMetalAdminClusters.queryVersionConfig
- gkeonprem.bareMetalAdminClusters.setIamPolicy
- gkeonprem.bareMetalAdminClusters.unenroll
- gkeonprem.bareMetalAdminClusters.update
- gkeonprem.bareMetalClusters.create
- gkeonprem.bareMetalClusters.delete
- gkeonprem.bareMetalClusters.enroll
- gkeonprem.bareMetalClusters.get
- gkeonprem.bareMetalClusters.getIamPolicy
- gkeonprem.bareMetalClusters.list
- gkeonprem.bareMetalClusters.queryVersionConfig
- gkeonprem.bareMetalClusters.setIamPolicy
- gkeonprem.bareMetalClusters.unenroll
- gkeonprem.bareMetalClusters.update
- gkeonprem.bareMetalNodePools.create
- gkeonprem.bareMetalNodePools.delete
- gkeonprem.bareMetalNodePools.enroll
- gkeonprem.bareMetalNodePools.get
- gkeonprem.bareMetalNodePools.getIamPolicy
- gkeonprem.bareMetalNodePools.list
- gkeonprem.bareMetalNodePools.setIamPolicy
- gkeonprem.bareMetalNodePools.unenroll
- gkeonprem.bareMetalNodePools.update
- gkeonprem.locations.get
- gkeonprem.locations.list
- gkeonprem.operations.cancel
- gkeonprem.operations.delete
- gkeonprem.operations.get
- gkeonprem.operations.list
- gkeonprem.vmwareAdminClusters.connect
- gkeonprem.vmwareAdminClusters.enroll
- gkeonprem.vmwareAdminClusters.get
- gkeonprem.vmwareAdminClusters.getIamPolicy
- gkeonprem.vmwareAdminClusters.list
- gkeonprem.vmwareAdminClusters.setIamPolicy
- gkeonprem.vmwareAdminClusters.unenroll
- gkeonprem.vmwareAdminClusters.update
- gkeonprem.vmwareClusters.create
- gkeonprem.vmwareClusters.delete
- gkeonprem.vmwareClusters.enroll
- gkeonprem.vmwareClusters.get
- gkeonprem.vmwareClusters.getIamPolicy
- gkeonprem.vmwareClusters.list
- gkeonprem.vmwareClusters.queryVersionConfig
- gkeonprem.vmwareClusters.setIamPolicy
- gkeonprem.vmwareClusters.unenroll
- gkeonprem.vmwareClusters.update
- gkeonprem.vmwareNodePools.create
- gkeonprem.vmwareNodePools.delete
- gkeonprem.vmwareNodePools.enroll
- gkeonprem.vmwareNodePools.get
- gkeonprem.vmwareNodePools.getIamPolicy
- gkeonprem.vmwareNodePools.list
- gkeonprem.vmwareNodePools.setIamPolicy
- gkeonprem.vmwareNodePools.unenroll
- gkeonprem.vmwareNodePools.update
- gsuiteaddons.authorizations.get
- gsuiteaddons.deployments.create
- gsuiteaddons.deployments.delete
- gsuiteaddons.deployments.execute
- gsuiteaddons.deployments.get
- gsuiteaddons.deployments.install
- gsuiteaddons.deployments.installStatus
- gsuiteaddons.deployments.list
- gsuiteaddons.deployments.uninstall
- gsuiteaddons.deployments.update
- healthcare.annotationStores.create
- healthcare.annotationStores.delete
- healthcare.annotationStores.evaluate
- healthcare.annotationStores.export
- healthcare.annotationStores.get
- healthcare.annotationStores.getIamPolicy
- healthcare.annotationStores.import
- healthcare.annotationStores.list
- healthcare.annotationStores.setIamPolicy
- healthcare.annotationStores.update
- healthcare.annotations.create
- healthcare.annotations.delete
- healthcare.annotations.get
- healthcare.annotations.list
- healthcare.annotations.update
- healthcare.attributeDefinitions.create
- healthcare.attributeDefinitions.delete
- healthcare.attributeDefinitions.get
- healthcare.attributeDefinitions.list
- healthcare.attributeDefinitions.update
- healthcare.consentArtifacts.create
- healthcare.consentArtifacts.delete
- healthcare.consentArtifacts.get
- healthcare.consentArtifacts.list
- healthcare.consentStores.checkDataAccess
- healthcare.consentStores.create
- healthcare.consentStores.delete
- healthcare.consentStores.evaluateUserConsents
- healthcare.consentStores.get
- healthcare.consentStores.getIamPolicy
- healthcare.consentStores.list
- healthcare.consentStores.queryAccessibleData
- healthcare.consentStores.setIamPolicy
- healthcare.consentStores.update
- healthcare.consents.activate
- healthcare.consents.create
- healthcare.consents.delete
- healthcare.consents.get
- healthcare.consents.list
- healthcare.consents.reject
- healthcare.consents.revoke
- healthcare.consents.update
- healthcare.datasets.create
- healthcare.datasets.deidentify
- healthcare.datasets.delete
- healthcare.datasets.get
- healthcare.datasets.getIamPolicy
- healthcare.datasets.list
- healthcare.datasets.setIamPolicy
- healthcare.datasets.update
- healthcare.dicomStores.create
- healthcare.dicomStores.deidentify
- healthcare.dicomStores.delete
- healthcare.dicomStores.dicomWebDelete
- healthcare.dicomStores.dicomWebRead
- healthcare.dicomStores.dicomWebWrite
- healthcare.dicomStores.export
- healthcare.dicomStores.get
- healthcare.dicomStores.getIamPolicy
- healthcare.dicomStores.import
- healthcare.dicomStores.list
- healthcare.dicomStores.setIamPolicy
- healthcare.dicomStores.update
- healthcare.fhirResources.create
- healthcare.fhirResources.delete
- healthcare.fhirResources.get
- healthcare.fhirResources.patch
- healthcare.fhirResources.purge
- healthcare.fhirResources.translateConceptMap
- healthcare.fhirResources.update
- healthcare.fhirStores.configureSearch
- healthcare.fhirStores.create
- healthcare.fhirStores.deidentify
- healthcare.fhirStores.delete
- healthcare.fhirStores.executeBundle
- healthcare.fhirStores.export
- healthcare.fhirStores.get
- healthcare.fhirStores.getIamPolicy
- healthcare.fhirStores.import
- healthcare.fhirStores.list
- healthcare.fhirStores.searchResources
- healthcare.fhirStores.setIamPolicy
- healthcare.fhirStores.update
- healthcare.hl7V2Messages.create
- healthcare.hl7V2Messages.delete
- healthcare.hl7V2Messages.get
- healthcare.hl7V2Messages.ingest
- healthcare.hl7V2Messages.list
- healthcare.hl7V2Messages.update
- healthcare.hl7V2Stores.create
- healthcare.hl7V2Stores.delete
- healthcare.hl7V2Stores.get
- healthcare.hl7V2Stores.getIamPolicy
- healthcare.hl7V2Stores.import
- healthcare.hl7V2Stores.list
- healthcare.hl7V2Stores.setIamPolicy
- healthcare.hl7V2Stores.update
- healthcare.locations.get
- healthcare.locations.list
- healthcare.nlpservice.analyzeEntities
- healthcare.operations.cancel
- healthcare.operations.get
- healthcare.operations.list
- healthcare.userDataMappings.archive
- healthcare.userDataMappings.create
- healthcare.userDataMappings.delete
- healthcare.userDataMappings.get
- healthcare.userDataMappings.list
- healthcare.userDataMappings.update
- iam.denypolicies.get
- iam.denypolicies.list
- iam.googleapis.com/workforcePoolProviderKeys.create
- iam.googleapis.com/workforcePoolProviderKeys.delete
- iam.googleapis.com/workforcePoolProviderKeys.get
- iam.googleapis.com/workforcePoolProviderKeys.list
- iam.googleapis.com/workforcePoolProviderKeys.undelete
- iam.googleapis.com/workforcePoolProviders.create
- iam.googleapis.com/workforcePoolProviders.delete
- iam.googleapis.com/workforcePoolProviders.get
- iam.googleapis.com/workforcePoolProviders.list
- iam.googleapis.com/workforcePoolProviders.undelete
- iam.googleapis.com/workforcePoolProviders.update
- iam.googleapis.com/workforcePoolSubjects.delete
- iam.googleapis.com/workforcePoolSubjects.undelete
- iam.googleapis.com/workforcePools.create
- iam.googleapis.com/workforcePools.delete
- iam.googleapis.com/workforcePools.get
- iam.googleapis.com/workforcePools.getIamPolicy
- iam.googleapis.com/workforcePools.list
- iam.googleapis.com/workforcePools.setIamPolicy
- iam.googleapis.com/workforcePools.undelete
- iam.googleapis.com/workforcePools.update
- iam.googleapis.com/workloadIdentityPoolProviderKeys.create
- iam.googleapis.com/workloadIdentityPoolProviderKeys.delete
- iam.googleapis.com/workloadIdentityPoolProviderKeys.get
- iam.googleapis.com/workloadIdentityPoolProviderKeys.list
- iam.googleapis.com/workloadIdentityPoolProviderKeys.undelete
- iam.googleapis.com/workloadIdentityPoolProviders.create
- iam.googleapis.com/workloadIdentityPoolProviders.delete
- iam.googleapis.com/workloadIdentityPoolProviders.get
- iam.googleapis.com/workloadIdentityPoolProviders.list
- iam.googleapis.com/workloadIdentityPoolProviders.undelete
- iam.googleapis.com/workloadIdentityPoolProviders.update
- iam.googleapis.com/workloadIdentityPools.create
- iam.googleapis.com/workloadIdentityPools.delete
- iam.googleapis.com/workloadIdentityPools.get
- iam.googleapis.com/workloadIdentityPools.list
- iam.googleapis.com/workloadIdentityPools.undelete
- iam.googleapis.com/workloadIdentityPools.update
- iam.roles.create
- iam.roles.delete
- iam.roles.get
- iam.roles.list
- iam.roles.undelete
- iam.roles.update
- iam.serviceAccountKeys.create
- iam.serviceAccountKeys.delete
- iam.serviceAccountKeys.disable
- iam.serviceAccountKeys.enable
- iam.serviceAccountKeys.get
- iam.serviceAccountKeys.list
- iam.serviceAccounts.actAs
- iam.serviceAccounts.create
- iam.serviceAccounts.delete
- iam.serviceAccounts.disable
- iam.serviceAccounts.enable
- iam.serviceAccounts.get
- iam.serviceAccounts.getIamPolicy
- iam.serviceAccounts.list
- iam.serviceAccounts.setIamPolicy
- iam.serviceAccounts.undelete
- iam.serviceAccounts.update
- iap.projects.getSettings
- iap.projects.updateSettings
- iap.tunnel.getIamPolicy
- iap.tunnel.setIamPolicy
- iap.tunnelDestGroups.accessViaIAP
- iap.tunnelDestGroups.create
- iap.tunnelDestGroups.delete
- iap.tunnelDestGroups.get
- iap.tunnelDestGroups.getIamPolicy
- iap.tunnelDestGroups.list
- iap.tunnelDestGroups.setIamPolicy
- iap.tunnelDestGroups.update
- iap.tunnelInstances.accessViaIAP
- iap.tunnelInstances.getIamPolicy
- iap.tunnelInstances.setIamPolicy
- iap.tunnelLocations.getIamPolicy
- iap.tunnelLocations.setIamPolicy
- iap.tunnelZones.getIamPolicy
- iap.tunnelZones.setIamPolicy
- iap.web.getIamPolicy
- iap.web.getSettings
- iap.web.setIamPolicy
- iap.web.updateSettings
- iap.webServiceVersions.getIamPolicy
- iap.webServiceVersions.getSettings
- iap.webServiceVersions.setIamPolicy
- iap.webServiceVersions.updateSettings
- iap.webServices.getIamPolicy
- iap.webServices.getSettings
- iap.webServices.setIamPolicy
- iap.webServices.updateSettings
- iap.webTypes.getIamPolicy
- iap.webTypes.getSettings
- iap.webTypes.setIamPolicy
- iap.webTypes.updateSettings
- identitytoolkit.tenants.create
- identitytoolkit.tenants.delete
- identitytoolkit.tenants.get
- identitytoolkit.tenants.getIamPolicy
- identitytoolkit.tenants.list
- identitytoolkit.tenants.setIamPolicy
- identitytoolkit.tenants.update
- ids.endpoints.create
- ids.endpoints.delete
- ids.endpoints.get
- ids.endpoints.getIamPolicy
- ids.endpoints.list
- ids.endpoints.setIamPolicy
- ids.endpoints.update
- ids.locations.get
- ids.locations.list
- ids.operations.cancel
- ids.operations.delete
- ids.operations.get
- ids.operations.list
- integrations.apigeeAuthConfigs.create
- integrations.apigeeAuthConfigs.delete
- integrations.apigeeAuthConfigs.get
- integrations.apigeeAuthConfigs.list
- integrations.apigeeAuthConfigs.update
- integrations.apigeeCertificates.create
- integrations.apigeeCertificates.delete
- integrations.apigeeCertificates.get
- integrations.apigeeCertificates.list
- integrations.apigeeCertificates.update
- integrations.apigeeExecutions.list
- integrations.apigeeIntegrationVers.create
- integrations.apigeeIntegrationVers.delete
- integrations.apigeeIntegrationVers.deploy
- integrations.apigeeIntegrationVers.get
- integrations.apigeeIntegrationVers.list
- integrations.apigeeIntegrationVers.update
- integrations.apigeeIntegrations.invoke
- integrations.apigeeIntegrations.list
- integrations.apigeeSfdcChannels.create
- integrations.apigeeSfdcChannels.delete
- integrations.apigeeSfdcChannels.get
- integrations.apigeeSfdcChannels.list
- integrations.apigeeSfdcChannels.update
- integrations.apigeeSfdcInstances.create
- integrations.apigeeSfdcInstances.delete
- integrations.apigeeSfdcInstances.get
- integrations.apigeeSfdcInstances.list
- integrations.apigeeSfdcInstances.update
- integrations.apigeeSuspensions.lift
- integrations.apigeeSuspensions.list
- integrations.apigeeSuspensions.resolve
- integrations.authConfigs.create
- integrations.authConfigs.delete
- integrations.authConfigs.get
- integrations.authConfigs.list
- integrations.authConfigs.update
- integrations.certificates.create
- integrations.certificates.delete
- integrations.certificates.get
- integrations.certificates.list
- integrations.certificates.update
- integrations.executions.get
- integrations.executions.list
- integrations.integrationVersions.create
- integrations.integrationVersions.delete
- integrations.integrationVersions.deploy
- integrations.integrationVersions.get
- integrations.integrationVersions.invoke
- integrations.integrationVersions.list
- integrations.integrationVersions.update
- integrations.integrations.create
- integrations.integrations.delete
- integrations.integrations.deploy
- integrations.integrations.get
- integrations.integrations.invoke
- integrations.integrations.list
- integrations.integrations.update
- integrations.securityAuthConfigs.create
- integrations.securityAuthConfigs.delete
- integrations.securityAuthConfigs.get
- integrations.securityAuthConfigs.list
- integrations.securityAuthConfigs.update
- integrations.securityExecutions.cancel
- integrations.securityExecutions.get
- integrations.securityExecutions.list
- integrations.securityIntegTempVers.create
- integrations.securityIntegTempVers.get
- integrations.securityIntegTempVers.list
- integrations.securityIntegrationVers.create
- integrations.securityIntegrationVers.delete
- integrations.securityIntegrationVers.deploy
- integrations.securityIntegrationVers.get
- integrations.securityIntegrationVers.list
- integrations.securityIntegrationVers.update
- integrations.securityIntegrations.invoke
- integrations.securityIntegrations.list
- integrations.sfdcChannels.create
- integrations.sfdcChannels.delete
- integrations.sfdcChannels.get
- integrations.sfdcChannels.list
- integrations.sfdcChannels.update
- integrations.sfdcInstances.create
- integrations.sfdcInstances.delete
- integrations.sfdcInstances.get
- integrations.sfdcInstances.list
- integrations.sfdcInstances.update
- integrations.suspensions.lift
- integrations.suspensions.list
- integrations.suspensions.resolve
- issuerswitch.complaintTransactions.list
- issuerswitch.complaints.create
- issuerswitch.complaints.resolve
- issuerswitch.disputes.create
- issuerswitch.disputes.resolve
- issuerswitch.financialTransactions.list
- issuerswitch.mandateTransactions.list
- issuerswitch.metadataTransactions.list
- issuerswitch.operations.cancel
- issuerswitch.operations.delete
- issuerswitch.operations.get
- issuerswitch.operations.list
- issuerswitch.operations.wait
- issuerswitch.ruleMetadata.list
- issuerswitch.ruleMetadataValues.create
- issuerswitch.ruleMetadataValues.delete
- issuerswitch.ruleMetadataValues.list
- issuerswitch.rules.list
- krmapihosting.krmApiHosts.create
- krmapihosting.krmApiHosts.delete
- krmapihosting.krmApiHosts.get
- krmapihosting.krmApiHosts.getIamPolicy
- krmapihosting.krmApiHosts.list
- krmapihosting.krmApiHosts.setIamPolicy
- krmapihosting.krmApiHosts.update
- krmapihosting.locations.get
- krmapihosting.locations.list
- krmapihosting.operations.cancel
- krmapihosting.operations.delete
- krmapihosting.operations.get
- krmapihosting.operations.list
- lifesciences.operations.cancel
- lifesciences.operations.get
- lifesciences.operations.list
- lifesciences.workflows.run
- livestream.channels.create
- livestream.channels.delete
- livestream.channels.get
- livestream.channels.list
- livestream.channels.start
- livestream.channels.stop
- livestream.channels.update
- livestream.events.create
- livestream.events.delete
- livestream.events.get
- livestream.events.list
- livestream.inputs.create
- livestream.inputs.delete
- livestream.inputs.get
- livestream.inputs.list
- livestream.inputs.update
- livestream.locations.get
- livestream.locations.list
- livestream.operations.cancel
- livestream.operations.delete
- livestream.operations.get
- livestream.operations.list
- logging.buckets.copyLogEntries
- logging.buckets.create
- logging.buckets.delete
- logging.buckets.get
- logging.buckets.list
- logging.buckets.undelete
- logging.buckets.update
- logging.exclusions.create
- logging.exclusions.delete
- logging.exclusions.get
- logging.exclusions.list
- logging.exclusions.update
- logging.fields.access
- logging.links.create
- logging.links.delete
- logging.links.get
- logging.links.list
- logging.locations.get
- logging.locations.list
- logging.logEntries.create
- logging.logEntries.download
- logging.logEntries.list
- logging.logEntries.route
- logging.logMetrics.create
- logging.logMetrics.delete
- logging.logMetrics.get
- logging.logMetrics.list
- logging.logMetrics.update
- logging.logServiceIndexes.list
- logging.logServices.list
- logging.logs.delete
- logging.logs.list
- logging.notificationRules.create
- logging.notificationRules.delete
- logging.notificationRules.get
- logging.notificationRules.list
- logging.notificationRules.update
- logging.operations.cancel
- logging.operations.get
- logging.operations.list
- logging.privateLogEntries.list
- logging.queries.create
- logging.queries.delete
- logging.queries.get
- logging.queries.list
- logging.queries.listShared
- logging.queries.share
- logging.queries.update
- logging.queries.updateShared
- logging.settings.get
- logging.settings.update
- logging.sinks.create
- logging.sinks.delete
- logging.sinks.get
- logging.sinks.list
- logging.sinks.update
- logging.usage.get
- logging.views.access
- logging.views.create
- logging.views.delete
- logging.views.get
- logging.views.list
- logging.views.listLogs
- logging.views.listResourceKeys
- logging.views.listResourceValues
- logging.views.update
- looker.backups.create
- looker.backups.delete
- looker.backups.get
- looker.backups.list
- looker.instances.create
- looker.instances.delete
- looker.instances.export
- looker.instances.get
- looker.instances.import
- looker.instances.list
- looker.instances.login
- looker.instances.update
- looker.locations.get
- looker.locations.list
- looker.operations.cancel
- looker.operations.delete
- looker.operations.get
- looker.operations.list
- managedidentities.backups.create
- managedidentities.backups.delete
- managedidentities.backups.get
- managedidentities.backups.getIamPolicy
- managedidentities.backups.list
- managedidentities.backups.setIamPolicy
- managedidentities.backups.update
- managedidentities.domains.attachTrust
- managedidentities.domains.checkMigrationPermission
- managedidentities.domains.create
- managedidentities.domains.createTagBinding
- managedidentities.domains.delete
- managedidentities.domains.deleteTagBinding
- managedidentities.domains.detachTrust
- managedidentities.domains.disableMigration
- managedidentities.domains.domainJoinMachine
- managedidentities.domains.enableMigration
- managedidentities.domains.extendSchema
- managedidentities.domains.get
- managedidentities.domains.getIamPolicy
- managedidentities.domains.list
- managedidentities.domains.listEffectiveTags
- managedidentities.domains.listTagBindings
- managedidentities.domains.reconfigureTrust
- managedidentities.domains.resetpassword
- managedidentities.domains.restore
- managedidentities.domains.setIamPolicy
- managedidentities.domains.update
- managedidentities.domains.updateLDAPSSettings
- managedidentities.domains.validateTrust
- managedidentities.locations.get
- managedidentities.locations.list
- managedidentities.operations.cancel
- managedidentities.operations.delete
- managedidentities.operations.get
- managedidentities.operations.list
- managedidentities.peerings.create
- managedidentities.peerings.delete
- managedidentities.peerings.get
- managedidentities.peerings.getIamPolicy
- managedidentities.peerings.list
- managedidentities.peerings.setIamPolicy
- managedidentities.peerings.update
- managedidentities.sqlintegrations.get
- managedidentities.sqlintegrations.list
- mapsadmin.clientMaps.create
- mapsadmin.clientMaps.delete
- mapsadmin.clientMaps.get
- mapsadmin.clientMaps.list
- mapsadmin.clientMaps.update
- mapsadmin.clientStyleActivationRules.update
- mapsadmin.clientStyleSheetSnapshots.list
- mapsadmin.clientStyleSheetSnapshots.update
- mapsadmin.clientStyles.create
- mapsadmin.clientStyles.delete
- mapsadmin.clientStyles.get
- mapsadmin.clientStyles.list
- mapsadmin.clientStyles.update
- mapsadmin.styleEditorConfigs.get
- mapsadmin.styleSnapshots.list
- mapsadmin.styleSnapshots.update
- mapsplatformdatasets.datasets.create
- mapsplatformdatasets.datasets.delete
- mapsplatformdatasets.datasets.export
- mapsplatformdatasets.datasets.get
- mapsplatformdatasets.datasets.import
- mapsplatformdatasets.datasets.list
- mapsplatformdatasets.datasets.update
- memcache.instances.applyParameters
- memcache.instances.applySoftwareUpdate
- memcache.instances.create
- memcache.instances.delete
- memcache.instances.get
- memcache.instances.list
- memcache.instances.rescheduleMaintenance
- memcache.instances.update
- memcache.instances.updateParameters
- memcache.locations.get
- memcache.locations.list
- memcache.operations.cancel
- memcache.operations.delete
- memcache.operations.get
- memcache.operations.list
- meshconfig.projects.get
- meshconfig.projects.init
- metastore.backups.create
- metastore.backups.delete
- metastore.backups.get
- metastore.backups.getIamPolicy
- metastore.backups.list
- metastore.backups.setIamPolicy
- metastore.backups.use
- metastore.databases.create
- metastore.databases.delete
- metastore.databases.get
- metastore.databases.getIamPolicy
- metastore.databases.list
- metastore.databases.setIamPolicy
- metastore.databases.update
- metastore.federations.create
- metastore.federations.delete
- metastore.federations.get
- metastore.federations.getIamPolicy
- metastore.federations.list
- metastore.federations.setIamPolicy
- metastore.federations.update
- metastore.federations.use
- metastore.imports.create
- metastore.imports.get
- metastore.imports.list
- metastore.imports.update
- metastore.locations.get
- metastore.locations.list
- metastore.operations.cancel
- metastore.operations.delete
- metastore.operations.get
- metastore.operations.list
- metastore.services.create
- metastore.services.delete
- metastore.services.export
- metastore.services.get
- metastore.services.getIamPolicy
- metastore.services.list
- metastore.services.mutateMetadata
- metastore.services.queryMetadata
- metastore.services.restore
- metastore.services.setIamPolicy
- metastore.services.update
- metastore.services.use
- metastore.tables.create
- metastore.tables.delete
- metastore.tables.get
- metastore.tables.getIamPolicy
- metastore.tables.list
- metastore.tables.setIamPolicy
- metastore.tables.update
- migrationcenter.assets.create
- migrationcenter.assets.delete
- migrationcenter.assets.get
- migrationcenter.assets.list
- migrationcenter.assets.reportFrames
- migrationcenter.assets.update
- migrationcenter.groups.create
- migrationcenter.groups.delete
- migrationcenter.groups.get
- migrationcenter.groups.list
- migrationcenter.groups.update
- migrationcenter.importJobs.create
- migrationcenter.importJobs.delete
- migrationcenter.importJobs.get
- migrationcenter.importJobs.list
- migrationcenter.importJobs.update
- migrationcenter.locations.get
- migrationcenter.locations.list
- migrationcenter.operations.cancel
- migrationcenter.operations.delete
- migrationcenter.operations.get
- migrationcenter.operations.list
- migrationcenter.preferenceSets.create
- migrationcenter.preferenceSets.delete
- migrationcenter.preferenceSets.get
- migrationcenter.preferenceSets.list
- migrationcenter.preferenceSets.update
- migrationcenter.settings.get
- migrationcenter.settings.update
- migrationcenter.sources.create
- migrationcenter.sources.delete
- migrationcenter.sources.get
- migrationcenter.sources.list
- migrationcenter.sources.update
- ml.jobs.cancel
- ml.jobs.create
- ml.jobs.get
- ml.jobs.getIamPolicy
- ml.jobs.list
- ml.jobs.setIamPolicy
- ml.jobs.update
- ml.locations.get
- ml.locations.list
- ml.models.create
- ml.models.delete
- ml.models.get
- ml.models.getIamPolicy
- ml.models.list
- ml.models.predict
- ml.models.setIamPolicy
- ml.models.update
- ml.operations.cancel
- ml.operations.get
- ml.operations.list
- ml.projects.getConfig
- ml.studies.create
- ml.studies.delete
- ml.studies.get
- ml.studies.getIamPolicy
- ml.studies.list
- ml.studies.setIamPolicy
- ml.trials.create
- ml.trials.delete
- ml.trials.get
- ml.trials.list
- ml.trials.update
- ml.versions.create
- ml.versions.delete
- ml.versions.get
- ml.versions.list
- ml.versions.predict
- ml.versions.update
- monitoring.alertPolicies.create
- monitoring.alertPolicies.delete
- monitoring.alertPolicies.get
- monitoring.alertPolicies.list
- monitoring.alertPolicies.update
- monitoring.dashboards.create
- monitoring.dashboards.delete
- monitoring.dashboards.get
- monitoring.dashboards.list
- monitoring.dashboards.update
- monitoring.groups.create
- monitoring.groups.delete
- monitoring.groups.get
- monitoring.groups.list
- monitoring.groups.update
- monitoring.metricDescriptors.create
- monitoring.metricDescriptors.delete
- monitoring.metricDescriptors.get
- monitoring.metricDescriptors.list
- monitoring.metricsScopes.link
- monitoring.monitoredResourceDescriptors.get
- monitoring.monitoredResourceDescriptors.list
- monitoring.notificationChannelDescriptors.get
- monitoring.notificationChannelDescriptors.list
- monitoring.notificationChannels.create
- monitoring.notificationChannels.delete
- monitoring.notificationChannels.get
- monitoring.notificationChannels.getVerificationCode
- monitoring.notificationChannels.list
- monitoring.notificationChannels.sendVerificationCode
- monitoring.notificationChannels.update
- monitoring.notificationChannels.verify
- monitoring.publicWidgets.create
- monitoring.publicWidgets.delete
- monitoring.publicWidgets.get
- monitoring.publicWidgets.list
- monitoring.publicWidgets.update
- monitoring.services.create
- monitoring.services.delete
- monitoring.services.get
- monitoring.services.list
- monitoring.services.update
- monitoring.slos.create
- monitoring.slos.delete
- monitoring.slos.get
- monitoring.slos.list
- monitoring.slos.update
- monitoring.snoozes.create
- monitoring.snoozes.get
- monitoring.snoozes.list
- monitoring.snoozes.update
- monitoring.timeSeries.create
- monitoring.timeSeries.list
- monitoring.uptimeCheckConfigs.create
- monitoring.uptimeCheckConfigs.delete
- monitoring.uptimeCheckConfigs.get
- monitoring.uptimeCheckConfigs.list
- monitoring.uptimeCheckConfigs.update
- nestconsole.smarthomePreviews.update
- nestconsole.smarthomeProjects.create
- nestconsole.smarthomeProjects.delete
- nestconsole.smarthomeProjects.get
- nestconsole.smarthomeProjects.update
- nestconsole.smarthomeVersions.create
- nestconsole.smarthomeVersions.get
- nestconsole.smarthomeVersions.submit
- networkconnectivity.hubs.create
- networkconnectivity.hubs.delete
- networkconnectivity.hubs.get
- networkconnectivity.hubs.getIamPolicy
- networkconnectivity.hubs.list
- networkconnectivity.hubs.setIamPolicy
- networkconnectivity.hubs.update
- networkconnectivity.internalRanges.create
- networkconnectivity.internalRanges.delete
- networkconnectivity.internalRanges.get
- networkconnectivity.internalRanges.getIamPolicy
- networkconnectivity.internalRanges.list
- networkconnectivity.internalRanges.setIamPolicy
- networkconnectivity.internalRanges.update
- networkconnectivity.locations.get
- networkconnectivity.locations.list
- networkconnectivity.operations.cancel
- networkconnectivity.operations.delete
- networkconnectivity.operations.get
- networkconnectivity.operations.list
- networkconnectivity.policyBasedRoutes.create
- networkconnectivity.policyBasedRoutes.delete
- networkconnectivity.policyBasedRoutes.get
- networkconnectivity.policyBasedRoutes.getIamPolicy
- networkconnectivity.policyBasedRoutes.list
- networkconnectivity.policyBasedRoutes.setIamPolicy
- networkconnectivity.spokes.create
- networkconnectivity.spokes.delete
- networkconnectivity.spokes.get
- networkconnectivity.spokes.getIamPolicy
- networkconnectivity.spokes.list
- networkconnectivity.spokes.setIamPolicy
- networkconnectivity.spokes.update
- networkmanagement.config.get
- networkmanagement.config.startFreeTrial
- networkmanagement.config.update
- networkmanagement.connectivitytests.create
- networkmanagement.connectivitytests.delete
- networkmanagement.connectivitytests.get
- networkmanagement.connectivitytests.getIamPolicy
- networkmanagement.connectivitytests.list
- networkmanagement.connectivitytests.rerun
- networkmanagement.connectivitytests.setIamPolicy
- networkmanagement.connectivitytests.update
- networkmanagement.locations.get
- networkmanagement.locations.list
- networkmanagement.operations.get
- networkmanagement.operations.list
- networkmanagement.topologygraphs.read
- networksecurity.authorizationPolicies.create
- networksecurity.authorizationPolicies.delete
- networksecurity.authorizationPolicies.get
- networksecurity.authorizationPolicies.getIamPolicy
- networksecurity.authorizationPolicies.list
- networksecurity.authorizationPolicies.setIamPolicy
- networksecurity.authorizationPolicies.update
- networksecurity.authorizationPolicies.use
- networksecurity.clientTlsPolicies.create
- networksecurity.clientTlsPolicies.delete
- networksecurity.clientTlsPolicies.get
- networksecurity.clientTlsPolicies.getIamPolicy
- networksecurity.clientTlsPolicies.list
- networksecurity.clientTlsPolicies.setIamPolicy
- networksecurity.clientTlsPolicies.update
- networksecurity.clientTlsPolicies.use
- networksecurity.gatewaySecurityPolicies.create
- networksecurity.gatewaySecurityPolicies.delete
- networksecurity.gatewaySecurityPolicies.get
- networksecurity.gatewaySecurityPolicies.list
- networksecurity.gatewaySecurityPolicies.update
- networksecurity.gatewaySecurityPolicies.use
- networksecurity.gatewaySecurityPolicyRules.create
- networksecurity.gatewaySecurityPolicyRules.delete
- networksecurity.gatewaySecurityPolicyRules.get
- networksecurity.gatewaySecurityPolicyRules.list
- networksecurity.gatewaySecurityPolicyRules.update
- networksecurity.gatewaySecurityPolicyRules.use
- networksecurity.locations.get
- networksecurity.locations.list
- networksecurity.operations.cancel
- networksecurity.operations.delete
- networksecurity.operations.get
- networksecurity.operations.list
- networksecurity.serverTlsPolicies.create
- networksecurity.serverTlsPolicies.delete
- networksecurity.serverTlsPolicies.get
- networksecurity.serverTlsPolicies.getIamPolicy
- networksecurity.serverTlsPolicies.list
- networksecurity.serverTlsPolicies.setIamPolicy
- networksecurity.serverTlsPolicies.update
- networksecurity.serverTlsPolicies.use
- networksecurity.tlsInspectionPolicies.create
- networksecurity.tlsInspectionPolicies.delete
- networksecurity.tlsInspectionPolicies.get
- networksecurity.tlsInspectionPolicies.list
- networksecurity.tlsInspectionPolicies.update
- networksecurity.tlsInspectionPolicies.use
- networksecurity.urlLists.create
- networksecurity.urlLists.delete
- networksecurity.urlLists.get
- networksecurity.urlLists.list
- networksecurity.urlLists.update
- networksecurity.urlLists.use
- networkservices.endpointConfigSelectors.create
- networkservices.endpointConfigSelectors.delete
- networkservices.endpointConfigSelectors.get
- networkservices.endpointConfigSelectors.getIamPolicy
- networkservices.endpointConfigSelectors.list
- networkservices.endpointConfigSelectors.setIamPolicy
- networkservices.endpointConfigSelectors.update
- networkservices.endpointConfigSelectors.use
- networkservices.endpointPolicies.create
- networkservices.endpointPolicies.delete
- networkservices.endpointPolicies.get
- networkservices.endpointPolicies.getIamPolicy
- networkservices.endpointPolicies.list
- networkservices.endpointPolicies.setIamPolicy
- networkservices.endpointPolicies.update
- networkservices.endpointPolicies.use
- networkservices.gateways.create
- networkservices.gateways.delete
- networkservices.gateways.get
- networkservices.gateways.list
- networkservices.gateways.update
- networkservices.gateways.use
- networkservices.grpcRoutes.create
- networkservices.grpcRoutes.delete
- networkservices.grpcRoutes.get
- networkservices.grpcRoutes.getIamPolicy
- networkservices.grpcRoutes.list
- networkservices.grpcRoutes.setIamPolicy
- networkservices.grpcRoutes.update
- networkservices.grpcRoutes.use
- networkservices.httpFilters.create
- networkservices.httpFilters.delete
- networkservices.httpFilters.get
- networkservices.httpFilters.getIamPolicy
- networkservices.httpFilters.list
- networkservices.httpFilters.setIamPolicy
- networkservices.httpFilters.update
- networkservices.httpFilters.use
- networkservices.httpRoutes.create
- networkservices.httpRoutes.delete
- networkservices.httpRoutes.get
- networkservices.httpRoutes.getIamPolicy
- networkservices.httpRoutes.list
- networkservices.httpRoutes.setIamPolicy
- networkservices.httpRoutes.update
- networkservices.httpRoutes.use
- networkservices.httpfilters.create
- networkservices.httpfilters.delete
- networkservices.httpfilters.get
- networkservices.httpfilters.getIamPolicy
- networkservices.httpfilters.list
- networkservices.httpfilters.setIamPolicy
- networkservices.httpfilters.update
- networkservices.httpfilters.use
- networkservices.locations.get
- networkservices.locations.list
- networkservices.meshes.create
- networkservices.meshes.delete
- networkservices.meshes.get
- networkservices.meshes.getIamPolicy
- networkservices.meshes.list
- networkservices.meshes.setIamPolicy
- networkservices.meshes.update
- networkservices.meshes.use
- networkservices.operations.cancel
- networkservices.operations.delete
- networkservices.operations.get
- networkservices.operations.list
- networkservices.serviceBindings.create
- networkservices.serviceBindings.delete
- networkservices.serviceBindings.get
- networkservices.serviceBindings.list
- networkservices.serviceBindings.update
- networkservices.tcpRoutes.create
- networkservices.tcpRoutes.delete
- networkservices.tcpRoutes.get
- networkservices.tcpRoutes.getIamPolicy
- networkservices.tcpRoutes.list
- networkservices.tcpRoutes.setIamPolicy
- networkservices.tcpRoutes.update
- networkservices.tcpRoutes.use
- networkservices.tlsRoutes.create
- networkservices.tlsRoutes.delete
- networkservices.tlsRoutes.get
- networkservices.tlsRoutes.list
- networkservices.tlsRoutes.update
- networkservices.tlsRoutes.use
- notebooks.environments.create
- notebooks.environments.delete
- notebooks.environments.get
- notebooks.environments.getIamPolicy
- notebooks.environments.list
- notebooks.environments.setIamPolicy
- notebooks.executions.create
- notebooks.executions.delete
- notebooks.executions.get
- notebooks.executions.getIamPolicy
- notebooks.executions.list
- notebooks.executions.setIamPolicy
- notebooks.instances.checkUpgradability
- notebooks.instances.create
- notebooks.instances.delete
- notebooks.instances.diagnose
- notebooks.instances.get
- notebooks.instances.getHealth
- notebooks.instances.getIamPolicy
- notebooks.instances.list
- notebooks.instances.reset
- notebooks.instances.setAccelerator
- notebooks.instances.setIamPolicy
- notebooks.instances.setLabels
- notebooks.instances.setMachineType
- notebooks.instances.start
- notebooks.instances.stop
- notebooks.instances.update
- notebooks.instances.updateConfig
- notebooks.instances.updateShieldInstanceConfig
- notebooks.instances.upgrade
- notebooks.instances.use
- notebooks.locations.get
- notebooks.locations.list
- notebooks.operations.cancel
- notebooks.operations.delete
- notebooks.operations.get
- notebooks.operations.list
- notebooks.runtimes.create
- notebooks.runtimes.delete
- notebooks.runtimes.diagnose
- notebooks.runtimes.get
- notebooks.runtimes.getIamPolicy
- notebooks.runtimes.list
- notebooks.runtimes.reset
- notebooks.runtimes.setIamPolicy
- notebooks.runtimes.start
- notebooks.runtimes.stop
- notebooks.runtimes.switch
- notebooks.runtimes.update
- notebooks.runtimes.upgrade
- notebooks.schedules.create
- notebooks.schedules.delete
- notebooks.schedules.get
- notebooks.schedules.getIamPolicy
- notebooks.schedules.list
- notebooks.schedules.setIamPolicy
- oauthconfig.clientpolicy.get
- oauthconfig.testusers.get
- oauthconfig.testusers.update
- oauthconfig.verification.get
- oauthconfig.verification.submit
- oauthconfig.verification.update
- ondemandscanning.operations.cancel
- ondemandscanning.operations.delete
- ondemandscanning.operations.get
- ondemandscanning.operations.list
- ondemandscanning.operations.wait
- ondemandscanning.scans.analyzePackages
- ondemandscanning.scans.listVulnerabilities
- ondemandscanning.scans.scan
- opsconfigmonitoring.resourceMetadata.list
- opsconfigmonitoring.resourceMetadata.write
- orgpolicy.constraints.list
- orgpolicy.customConstraints.get
- orgpolicy.customConstraints.list
- orgpolicy.policies.list
- orgpolicy.policy.get
- osconfig.guestPolicies.create
- osconfig.guestPolicies.delete
- osconfig.guestPolicies.get
- osconfig.guestPolicies.list
- osconfig.guestPolicies.update
- osconfig.instanceOSPoliciesCompliances.get
- osconfig.instanceOSPoliciesCompliances.list
- osconfig.inventories.get
- osconfig.inventories.list
- osconfig.osPolicyAssignmentReports.get
- osconfig.osPolicyAssignmentReports.list
- osconfig.osPolicyAssignments.create
- osconfig.osPolicyAssignments.delete
- osconfig.osPolicyAssignments.get
- osconfig.osPolicyAssignments.list
- osconfig.osPolicyAssignments.update
- osconfig.patchDeployments.create
- osconfig.patchDeployments.delete
- osconfig.patchDeployments.execute
- osconfig.patchDeployments.get
- osconfig.patchDeployments.list
- osconfig.patchDeployments.pause
- osconfig.patchDeployments.resume
- osconfig.patchDeployments.update
- osconfig.patchJobs.exec
- osconfig.patchJobs.get
- osconfig.patchJobs.list
- osconfig.vulnerabilityReports.get
- osconfig.vulnerabilityReports.list
- paymentsresellersubscription.products.list
- paymentsresellersubscription.promotions.list
- paymentsresellersubscription.subscriptions.cancel
- paymentsresellersubscription.subscriptions.extend
- paymentsresellersubscription.subscriptions.get
- paymentsresellersubscription.subscriptions.provision
- paymentsresellersubscription.subscriptions.undoCancel
- policyanalyzer.serviceAccountKeyLastAuthenticationActivities.query
- policyanalyzer.serviceAccountLastAuthenticationActivities.query
- policysimulator.replayResults.list
- policysimulator.replays.create
- policysimulator.replays.get
- policysimulator.replays.list
- policysimulator.replays.run
- privateca.caPools.create
- privateca.caPools.delete
- privateca.caPools.get
- privateca.caPools.getIamPolicy
- privateca.caPools.list
- privateca.caPools.setIamPolicy
- privateca.caPools.update
- privateca.caPools.use
- privateca.certificateAuthorities.create
- privateca.certificateAuthorities.delete
- privateca.certificateAuthorities.get
- privateca.certificateAuthorities.getIamPolicy
- privateca.certificateAuthorities.list
- privateca.certificateAuthorities.setIamPolicy
- privateca.certificateAuthorities.update
- privateca.certificateRevocationLists.create
- privateca.certificateRevocationLists.get
- privateca.certificateRevocationLists.getIamPolicy
- privateca.certificateRevocationLists.list
- privateca.certificateRevocationLists.setIamPolicy
- privateca.certificateRevocationLists.update
- privateca.certificateTemplates.create
- privateca.certificateTemplates.delete
- privateca.certificateTemplates.get
- privateca.certificateTemplates.getIamPolicy
- privateca.certificateTemplates.list
- privateca.certificateTemplates.setIamPolicy
- privateca.certificateTemplates.update
- privateca.certificateTemplates.use
- privateca.certificates.create
- privateca.certificates.createForSelf
- privateca.certificates.get
- privateca.certificates.getIamPolicy
- privateca.certificates.list
- privateca.certificates.setIamPolicy
- privateca.certificates.update
- privateca.locations.get
- privateca.locations.list
- privateca.operations.cancel
- privateca.operations.delete
- privateca.operations.get
- privateca.operations.list
- privateca.reusableConfigs.create
- privateca.reusableConfigs.delete
- privateca.reusableConfigs.get
- privateca.reusableConfigs.getIamPolicy
- privateca.reusableConfigs.list
- privateca.reusableConfigs.setIamPolicy
- privateca.reusableConfigs.update
- proximitybeacon.attachments.create
- proximitybeacon.attachments.delete
- proximitybeacon.attachments.get
- proximitybeacon.attachments.list
- proximitybeacon.beacons.attach
- proximitybeacon.beacons.create
- proximitybeacon.beacons.get
- proximitybeacon.beacons.getIamPolicy
- proximitybeacon.beacons.list
- proximitybeacon.beacons.setIamPolicy
- proximitybeacon.beacons.update
- proximitybeacon.namespaces.create
- proximitybeacon.namespaces.delete
- proximitybeacon.namespaces.get
- proximitybeacon.namespaces.getIamPolicy
- proximitybeacon.namespaces.list
- proximitybeacon.namespaces.setIamPolicy
- proximitybeacon.namespaces.update
- publicca.externalAccountKeys.create
- pubsub.schemas.attach
- pubsub.schemas.commit
- pubsub.schemas.create
- pubsub.schemas.delete
- pubsub.schemas.get
- pubsub.schemas.getIamPolicy
- pubsub.schemas.list
- pubsub.schemas.listRevisions
- pubsub.schemas.rollback
- pubsub.schemas.setIamPolicy
- pubsub.schemas.validate
- pubsub.snapshots.create
- pubsub.snapshots.delete
- pubsub.snapshots.get
- pubsub.snapshots.getIamPolicy
- pubsub.snapshots.list
- pubsub.snapshots.seek
- pubsub.snapshots.setIamPolicy
- pubsub.snapshots.update
- pubsub.subscriptions.consume
- pubsub.subscriptions.create
- pubsub.subscriptions.delete
- pubsub.subscriptions.get
- pubsub.subscriptions.getIamPolicy
- pubsub.subscriptions.list
- pubsub.subscriptions.setIamPolicy
- pubsub.subscriptions.update
- pubsub.topics.attachSubscription
- pubsub.topics.create
- pubsub.topics.delete
- pubsub.topics.detachSubscription
- pubsub.topics.get
- pubsub.topics.getIamPolicy
- pubsub.topics.list
- pubsub.topics.publish
- pubsub.topics.setIamPolicy
- pubsub.topics.update
- pubsub.topics.updateTag
- pubsublite.locations.openKafkaStream
- pubsublite.operations.get
- pubsublite.operations.list
- pubsublite.reservations.attachTopic
- pubsublite.reservations.create
- pubsublite.reservations.delete
- pubsublite.reservations.get
- pubsublite.reservations.list
- pubsublite.reservations.listTopics
- pubsublite.reservations.update
- pubsublite.subscriptions.create
- pubsublite.subscriptions.delete
- pubsublite.subscriptions.get
- pubsublite.subscriptions.getCursor
- pubsublite.subscriptions.list
- pubsublite.subscriptions.seek
- pubsublite.subscriptions.setCursor
- pubsublite.subscriptions.subscribe
- pubsublite.subscriptions.update
- pubsublite.topics.computeHeadCursor
- pubsublite.topics.computeMessageStats
- pubsublite.topics.computeTimeCursor
- pubsublite.topics.create
- pubsublite.topics.delete
- pubsublite.topics.get
- pubsublite.topics.getPartitions
- pubsublite.topics.list
- pubsublite.topics.listSubscriptions
- pubsublite.topics.publish
- pubsublite.topics.subscribe
- pubsublite.topics.update
- recaptchaenterprise.assessments.annotate
- recaptchaenterprise.assessments.create
- recaptchaenterprise.keys.create
- recaptchaenterprise.keys.delete
- recaptchaenterprise.keys.get
- recaptchaenterprise.keys.list
- recaptchaenterprise.keys.retrievelegacysecretkey
- recaptchaenterprise.keys.update
- recaptchaenterprise.metrics.get
- recaptchaenterprise.projectmetadata.get
- recaptchaenterprise.projectmetadata.update
- recaptchaenterprise.relatedaccountgroupmemberships.list
- recaptchaenterprise.relatedaccountgroups.list
- recommender.bigqueryCapacityCommitmentsInsights.get
- recommender.bigqueryCapacityCommitmentsInsights.list
- recommender.bigqueryCapacityCommitmentsInsights.update
- recommender.bigqueryCapacityCommitmentsRecommendations.get
- recommender.bigqueryCapacityCommitmentsRecommendations.list
- recommender.bigqueryCapacityCommitmentsRecommendations.update
- recommender.bigqueryPartitionClusterRecommendations.get
- recommender.bigqueryPartitionClusterRecommendations.list
- recommender.bigqueryPartitionClusterRecommendations.update
- recommender.bigqueryTableStatsInsights.get
- recommender.bigqueryTableStatsInsights.list
- recommender.bigqueryTableStatsInsights.update
- recommender.cloudAssetInsights.get
- recommender.cloudAssetInsights.list
- recommender.cloudAssetInsights.update
- recommender.cloudFunctionsPerformanceInsights.get
- recommender.cloudFunctionsPerformanceInsights.list
- recommender.cloudFunctionsPerformanceInsights.update
- recommender.cloudFunctionsPerformanceRecommendations.get
- recommender.cloudFunctionsPerformanceRecommendations.list
- recommender.cloudFunctionsPerformanceRecommendations.update
- recommender.cloudsqlIdleInstanceRecommendations.get
- recommender.cloudsqlIdleInstanceRecommendations.list
- recommender.cloudsqlIdleInstanceRecommendations.update
- recommender.cloudsqlInstanceActivityInsights.get
- recommender.cloudsqlInstanceActivityInsights.list
- recommender.cloudsqlInstanceActivityInsights.update
- recommender.cloudsqlInstanceCpuUsageInsights.get
- recommender.cloudsqlInstanceCpuUsageInsights.list
- recommender.cloudsqlInstanceCpuUsageInsights.update
- recommender.cloudsqlInstanceDiskUsageTrendInsights.get
- recommender.cloudsqlInstanceDiskUsageTrendInsights.list
- recommender.cloudsqlInstanceDiskUsageTrendInsights.update
- recommender.cloudsqlInstanceMemoryUsageInsights.get
- recommender.cloudsqlInstanceMemoryUsageInsights.list
- recommender.cloudsqlInstanceMemoryUsageInsights.update
- recommender.cloudsqlInstanceOomProbabilityInsights.get
- recommender.cloudsqlInstanceOomProbabilityInsights.list
- recommender.cloudsqlInstanceOomProbabilityInsights.update
- recommender.cloudsqlInstanceOutOfDiskRecommendations.get
- recommender.cloudsqlInstanceOutOfDiskRecommendations.list
- recommender.cloudsqlInstanceOutOfDiskRecommendations.update
- recommender.cloudsqlInstancePerformanceInsights.get
- recommender.cloudsqlInstancePerformanceInsights.list
- recommender.cloudsqlInstancePerformanceInsights.update
- recommender.cloudsqlInstancePerformanceRecommendations.get
- recommender.cloudsqlInstancePerformanceRecommendations.list
- recommender.cloudsqlInstancePerformanceRecommendations.update
- recommender.cloudsqlInstanceSecurityInsights.get
- recommender.cloudsqlInstanceSecurityInsights.list
- recommender.cloudsqlInstanceSecurityInsights.update
- recommender.cloudsqlInstanceSecurityRecommendations.get
- recommender.cloudsqlInstanceSecurityRecommendations.list
- recommender.cloudsqlInstanceSecurityRecommendations.update
- recommender.cloudsqlInstanceUnderprovisionedCpuUsageInsights.get
- recommender.cloudsqlInstanceUnderprovisionedCpuUsageInsights.list
- recommender.cloudsqlInstanceUnderprovisionedCpuUsageInsights.update
- recommender.cloudsqlInstanceUnderprovisionedMemoryUsageInsights.get
- recommender.cloudsqlInstanceUnderprovisionedMemoryUsageInsights.list
- recommender.cloudsqlInstanceUnderprovisionedMemoryUsageInsights.update
- recommender.cloudsqlOverprovisionedInstanceRecommendations.get
- recommender.cloudsqlOverprovisionedInstanceRecommendations.list
- recommender.cloudsqlOverprovisionedInstanceRecommendations.update
- recommender.cloudsqlUnderProvisionedInstanceRecommendations.get
- recommender.cloudsqlUnderProvisionedInstanceRecommendations.list
- recommender.cloudsqlUnderProvisionedInstanceRecommendations.update
- recommender.commitmentUtilizationInsights.get
- recommender.commitmentUtilizationInsights.list
- recommender.commitmentUtilizationInsights.update
- recommender.computeAddressIdleResourceInsights.get
- recommender.computeAddressIdleResourceInsights.list
- recommender.computeAddressIdleResourceInsights.update
- recommender.computeAddressIdleResourceRecommendations.get
- recommender.computeAddressIdleResourceRecommendations.list
- recommender.computeAddressIdleResourceRecommendations.update
- recommender.computeDiskIdleResourceInsights.get
- recommender.computeDiskIdleResourceInsights.list
- recommender.computeDiskIdleResourceInsights.update
- recommender.computeDiskIdleResourceRecommendations.get
- recommender.computeDiskIdleResourceRecommendations.list
- recommender.computeDiskIdleResourceRecommendations.update
- recommender.computeFirewallInsightTypeConfigs.get
- recommender.computeFirewallInsightTypeConfigs.update
- recommender.computeFirewallInsights.get
- recommender.computeFirewallInsights.list
- recommender.computeFirewallInsights.update
- recommender.computeImageIdleResourceInsights.get
- recommender.computeImageIdleResourceInsights.list
- recommender.computeImageIdleResourceInsights.update
- recommender.computeImageIdleResourceRecommendations.get
- recommender.computeImageIdleResourceRecommendations.list
- recommender.computeImageIdleResourceRecommendations.update
- recommender.computeInstanceCpuUsageInsights.get
- recommender.computeInstanceCpuUsageInsights.list
- recommender.computeInstanceCpuUsageInsights.update
- recommender.computeInstanceCpuUsagePredictionInsights.get
- recommender.computeInstanceCpuUsagePredictionInsights.list
- recommender.computeInstanceCpuUsagePredictionInsights.update
- recommender.computeInstanceCpuUsageTrendInsights.get
- recommender.computeInstanceCpuUsageTrendInsights.list
- recommender.computeInstanceCpuUsageTrendInsights.update
- recommender.computeInstanceGroupManagerCpuUsageInsights.get
- recommender.computeInstanceGroupManagerCpuUsageInsights.list
- recommender.computeInstanceGroupManagerCpuUsageInsights.update
- recommender.computeInstanceGroupManagerCpuUsagePredictionInsights.get
- recommender.computeInstanceGroupManagerCpuUsagePredictionInsights.list
- recommender.computeInstanceGroupManagerCpuUsagePredictionInsights.update
- recommender.computeInstanceGroupManagerCpuUsageTrendInsights.get
- recommender.computeInstanceGroupManagerCpuUsageTrendInsights.list
- recommender.computeInstanceGroupManagerCpuUsageTrendInsights.update
- recommender.computeInstanceGroupManagerMachineTypeRecommendations.get
- recommender.computeInstanceGroupManagerMachineTypeRecommendations.list
- recommender.computeInstanceGroupManagerMachineTypeRecommendations.update
- recommender.computeInstanceGroupManagerMemoryUsageInsights.get
- recommender.computeInstanceGroupManagerMemoryUsageInsights.list
- recommender.computeInstanceGroupManagerMemoryUsageInsights.update
- recommender.computeInstanceGroupManagerMemoryUsagePredictionInsights.get
- recommender.computeInstanceGroupManagerMemoryUsagePredictionInsights.list
- recommender.computeInstanceGroupManagerMemoryUsagePredictionInsights.update
- recommender.computeInstanceIdleResourceRecommendations.get
- recommender.computeInstanceIdleResourceRecommendations.list
- recommender.computeInstanceIdleResourceRecommendations.update
- recommender.computeInstanceIdleResourceRecommenderConfig.get
- recommender.computeInstanceIdleResourceRecommenderConfig.update
- recommender.computeInstanceMachineTypeRecommendations.get
- recommender.computeInstanceMachineTypeRecommendations.list
- recommender.computeInstanceMachineTypeRecommendations.update
- recommender.computeInstanceMemoryUsageInsights.get
- recommender.computeInstanceMemoryUsageInsights.list
- recommender.computeInstanceMemoryUsageInsights.update
- recommender.computeInstanceMemoryUsagePredictionInsights.get
- recommender.computeInstanceMemoryUsagePredictionInsights.list
- recommender.computeInstanceMemoryUsagePredictionInsights.update
- recommender.computeInstanceNetworkThroughputInsights.get
- recommender.computeInstanceNetworkThroughputInsights.list
- recommender.computeInstanceNetworkThroughputInsights.update
- recommender.containerDiagnosisInsights.get
- recommender.containerDiagnosisInsights.list
- recommender.containerDiagnosisInsights.update
- recommender.containerDiagnosisRecommendations.get
- recommender.containerDiagnosisRecommendations.list
- recommender.containerDiagnosisRecommendations.update
- recommender.costInsights.get
- recommender.costInsights.list
- recommender.costInsights.update
- recommender.dataflowDiagnosticsInsights.get
- recommender.dataflowDiagnosticsInsights.list
- recommender.dataflowDiagnosticsInsights.update
- recommender.errorReportingInsights.get
- recommender.errorReportingInsights.list
- recommender.errorReportingInsights.update
- recommender.errorReportingRecommendations.get
- recommender.errorReportingRecommendations.list
- recommender.errorReportingRecommendations.update
- recommender.gmpGuidedExperienceInsights.get
- recommender.gmpGuidedExperienceInsights.list
- recommender.gmpGuidedExperienceInsights.update
- recommender.gmpGuidedExperienceRecommendations.get
- recommender.gmpGuidedExperienceRecommendations.list
- recommender.gmpGuidedExperienceRecommendations.update
- recommender.gmpProjectManagementInsights.get
- recommender.gmpProjectManagementInsights.list
- recommender.gmpProjectManagementInsights.update
- recommender.gmpProjectManagementRecommendations.get
- recommender.gmpProjectManagementRecommendations.list
- recommender.gmpProjectManagementRecommendations.update
- recommender.gmpProjectProductSuggestionsInsights.get
- recommender.gmpProjectProductSuggestionsInsights.list
- recommender.gmpProjectProductSuggestionsInsights.update
- recommender.gmpProjectProductSuggestionsRecommendations.get
- recommender.gmpProjectProductSuggestionsRecommendations.list
- recommender.gmpProjectProductSuggestionsRecommendations.update
- recommender.gmpProjectQuotaInsights.get
- recommender.gmpProjectQuotaInsights.list
- recommender.gmpProjectQuotaInsights.update
- recommender.gmpProjectQuotaRecommendations.get
- recommender.gmpProjectQuotaRecommendations.list
- recommender.gmpProjectQuotaRecommendations.update
- recommender.iamPolicyInsights.get
- recommender.iamPolicyInsights.list
- recommender.iamPolicyInsights.update
- recommender.iamPolicyLateralMovementInsights.get
- recommender.iamPolicyLateralMovementInsights.list
- recommender.iamPolicyLateralMovementInsights.update
- recommender.iamPolicyRecommendations.get
- recommender.iamPolicyRecommendations.list
- recommender.iamPolicyRecommendations.update
- recommender.iamPolicyRecommenderConfig.get
- recommender.iamPolicyRecommenderConfig.update
- recommender.iamServiceAccountInsights.get
- recommender.iamServiceAccountInsights.list
- recommender.iamServiceAccountInsights.update
- recommender.locations.get
- recommender.locations.list
- recommender.loggingProductSuggestionContainerInsights.get
- recommender.loggingProductSuggestionContainerInsights.list
- recommender.loggingProductSuggestionContainerInsights.update
- recommender.loggingProductSuggestionContainerRecommendations.get
- recommender.loggingProductSuggestionContainerRecommendations.list
- recommender.loggingProductSuggestionContainerRecommendations.update
- recommender.monitoringProductSuggestionComputeInsights.get
- recommender.monitoringProductSuggestionComputeInsights.list
- recommender.monitoringProductSuggestionComputeInsights.update
- recommender.monitoringProductSuggestionComputeRecommendations.get
- recommender.monitoringProductSuggestionComputeRecommendations.list
- recommender.monitoringProductSuggestionComputeRecommendations.update
- recommender.networkAnalyzerCloudSqlInsights.get
- recommender.networkAnalyzerCloudSqlInsights.list
- recommender.networkAnalyzerCloudSqlInsights.update
- recommender.networkAnalyzerDynamicRouteInsights.get
- recommender.networkAnalyzerDynamicRouteInsights.list
- recommender.networkAnalyzerDynamicRouteInsights.update
- recommender.networkAnalyzerGkeConnectivityInsights.get
- recommender.networkAnalyzerGkeConnectivityInsights.list
- recommender.networkAnalyzerGkeConnectivityInsights.update
- recommender.networkAnalyzerGkeIpAddressInsights.get
- recommender.networkAnalyzerGkeIpAddressInsights.list
- recommender.networkAnalyzerGkeIpAddressInsights.update
- recommender.networkAnalyzerIpAddressInsights.get
- recommender.networkAnalyzerIpAddressInsights.list
- recommender.networkAnalyzerIpAddressInsights.update
- recommender.networkAnalyzerLoadBalancerInsights.get
- recommender.networkAnalyzerLoadBalancerInsights.list
- recommender.networkAnalyzerLoadBalancerInsights.update
- recommender.networkAnalyzerVpcConnectivityInsights.get
- recommender.networkAnalyzerVpcConnectivityInsights.list
- recommender.networkAnalyzerVpcConnectivityInsights.update
- recommender.resourcemanagerProjectUtilizationInsightTypeConfigs.get
- recommender.resourcemanagerProjectUtilizationInsightTypeConfigs.update
- recommender.resourcemanagerProjectUtilizationInsights.get
- recommender.resourcemanagerProjectUtilizationInsights.list
- recommender.resourcemanagerProjectUtilizationInsights.update
- recommender.resourcemanagerProjectUtilizationRecommendations.get
- recommender.resourcemanagerProjectUtilizationRecommendations.list
- recommender.resourcemanagerProjectUtilizationRecommendations.update
- recommender.resourcemanagerProjectUtilizationRecommenderConfigs.get
- recommender.resourcemanagerProjectUtilizationRecommenderConfigs.update
- recommender.resourcemanagerServiceLimitInsights.get
- recommender.resourcemanagerServiceLimitInsights.list
- recommender.resourcemanagerServiceLimitInsights.update
- recommender.resourcemanagerServiceLimitRecommendations.get
- recommender.resourcemanagerServiceLimitRecommendations.list
- recommender.resourcemanagerServiceLimitRecommendations.update
- recommender.resources.export
- recommender.runServiceIdentityInsights.get
- recommender.runServiceIdentityInsights.list
- recommender.runServiceIdentityInsights.update
- recommender.runServiceIdentityRecommendations.get
- recommender.runServiceIdentityRecommendations.list
- recommender.runServiceIdentityRecommendations.update
- recommender.runServiceSecurityInsights.get
- recommender.runServiceSecurityInsights.list
- recommender.runServiceSecurityInsights.update
- recommender.runServiceSecurityRecommendations.get
- recommender.runServiceSecurityRecommendations.list
- recommender.runServiceSecurityRecommendations.update
- recommender.spendBasedCommitmentInsights.get
- recommender.spendBasedCommitmentInsights.list
- recommender.spendBasedCommitmentInsights.update
- recommender.spendBasedCommitmentRecommendations.get
- recommender.spendBasedCommitmentRecommendations.list
- recommender.spendBasedCommitmentRecommendations.update
- recommender.spendBasedCommitmentRecommenderConfig.get
- recommender.spendBasedCommitmentRecommenderConfig.update
- recommender.usageCommitmentRecommendations.get
- recommender.usageCommitmentRecommendations.list
- recommender.usageCommitmentRecommendations.update
- redis.instances.create
- redis.instances.delete
- redis.instances.export
- redis.instances.failover
- redis.instances.get
- redis.instances.getAuthString
- redis.instances.import
- redis.instances.list
- redis.instances.rescheduleMaintenance
- redis.instances.update
- redis.instances.updateAuth
- redis.instances.upgrade
- redis.locations.get
- redis.locations.list
- redis.operations.cancel
- redis.operations.delete
- redis.operations.get
- redis.operations.list
- remotebuildexecution.actions.create
- remotebuildexecution.actions.delete
- remotebuildexecution.actions.get
- remotebuildexecution.actions.update
- remotebuildexecution.blobs.create
- remotebuildexecution.blobs.get
- remotebuildexecution.botsessions.create
- remotebuildexecution.botsessions.update
- remotebuildexecution.instances.create
- remotebuildexecution.instances.delete
- remotebuildexecution.instances.get
- remotebuildexecution.instances.list
- remotebuildexecution.instances.update
- remotebuildexecution.logstreams.create
- remotebuildexecution.logstreams.get
- remotebuildexecution.logstreams.update
- remotebuildexecution.workerpools.create
- remotebuildexecution.workerpools.delete
- remotebuildexecution.workerpools.get
- remotebuildexecution.workerpools.list
- remotebuildexecution.workerpools.update
- resourcemanager.hierarchyNodes.createTagBinding
- resourcemanager.hierarchyNodes.deleteTagBinding
- resourcemanager.hierarchyNodes.listEffectiveTags
- resourcemanager.hierarchyNodes.listTagBindings
- resourcemanager.projects.createBillingAssignment
- resourcemanager.projects.delete
- resourcemanager.projects.deleteBillingAssignment
- resourcemanager.projects.get
- resourcemanager.projects.getIamPolicy
- resourcemanager.projects.list
- resourcemanager.projects.move
- resourcemanager.projects.setIamPolicy
- resourcemanager.projects.undelete
- resourcemanager.projects.update
- resourcemanager.projects.updateLiens
- resourcemanager.tagHolds.create
- resourcemanager.tagHolds.delete
- resourcemanager.tagHolds.list
- resourcemanager.tagKeys.create
- resourcemanager.tagKeys.delete
- resourcemanager.tagKeys.get
- resourcemanager.tagKeys.getIamPolicy
- resourcemanager.tagKeys.list
- resourcemanager.tagKeys.setIamPolicy
- resourcemanager.tagKeys.update
- resourcemanager.tagValueBindings.create
- resourcemanager.tagValueBindings.delete
- resourcemanager.tagValues.create
- resourcemanager.tagValues.delete
- resourcemanager.tagValues.get
- resourcemanager.tagValues.getIamPolicy
- resourcemanager.tagValues.list
- resourcemanager.tagValues.setIamPolicy
- resourcemanager.tagValues.update
- resourcesettings.settings.get
- resourcesettings.settings.list
- retail.attributesConfigs.addCatalogAttribute
- retail.attributesConfigs.batchRemoveCatalogAttributes
- retail.attributesConfigs.exportCatalogAttributes
- retail.attributesConfigs.get
- retail.attributesConfigs.importCatalogAttributes
- retail.attributesConfigs.removeCatalogAttribute
- retail.attributesConfigs.replaceCatalogAttribute
- retail.attributesConfigs.update
- retail.catalogs.completeQuery
- retail.catalogs.import
- retail.catalogs.list
- retail.catalogs.update
- retail.controls.create
- retail.controls.delete
- retail.controls.export
- retail.controls.get
- retail.controls.import
- retail.controls.list
- retail.controls.update
- retail.models.create
- retail.models.delete
- retail.models.get
- retail.models.list
- retail.models.pause
- retail.models.resume
- retail.models.tune
- retail.models.update
- retail.operations.get
- retail.operations.list
- retail.placements.predict
- retail.placements.search
- retail.products.create
- retail.products.delete
- retail.products.export
- retail.products.get
- retail.products.import
- retail.products.list
- retail.products.purge
- retail.products.setSponsorship
- retail.products.update
- retail.retailProjects.get
- retail.servingConfigs.create
- retail.servingConfigs.delete
- retail.servingConfigs.get
- retail.servingConfigs.list
- retail.servingConfigs.predict
- retail.servingConfigs.search
- retail.servingConfigs.update
- retail.userEvents.create
- retail.userEvents.import
- retail.userEvents.purge
- retail.userEvents.rejoin
- riscconfigurationservice.riscconfigs.createOrUpdate
- riscconfigurationservice.riscconfigs.delete
- riscconfigurationservice.riscconfigs.get
- riskmanager.controlScoreBreakdowns.get
- riskmanager.controlScoreBreakdowns.list
- riskmanager.operations.delete
- riskmanager.operations.get
- riskmanager.operations.list
- riskmanager.policies.get
- riskmanager.policies.list
- riskmanager.reports.create
- riskmanager.reports.delete
- riskmanager.reports.get
- riskmanager.reports.list
- riskmanager.reports.review
- riskmanager.reports.share
- riskmanager.serviceAccount.create
- riskmanager.settings.get
- riskmanager.settings.update
- rma.annotations.create
- rma.annotations.get
- rma.collectors.create
- rma.collectors.delete
- rma.collectors.get
- rma.collectors.list
- rma.collectors.update
- rma.locations.get
- rma.locations.list
- rma.operations.cancel
- rma.operations.delete
- rma.operations.get
- rma.operations.list
- run.configurations.get
- run.configurations.list
- run.executions.delete
- run.executions.get
- run.executions.list
- run.jobs.create
- run.jobs.delete
- run.jobs.get
- run.jobs.getIamPolicy
- run.jobs.list
- run.jobs.run
- run.jobs.runWithOverrides
- run.jobs.setIamPolicy
- run.jobs.update
- run.locations.list
- run.operations.delete
- run.operations.get
- run.operations.list
- run.revisions.delete
- run.revisions.get
- run.revisions.list
- run.routes.get
- run.routes.invoke
- run.routes.list
- run.services.create
- run.services.createTagBinding
- run.services.delete
- run.services.deleteTagBinding
- run.services.get
- run.services.getIamPolicy
- run.services.list
- run.services.listEffectiveTags
- run.services.listTagBindings
- run.services.setIamPolicy
- run.services.update
- run.tasks.get
- run.tasks.list
- runapps.applications.create
- runapps.applications.delete
- runapps.applications.get
- runapps.applications.getStatus
- runapps.applications.list
- runapps.applications.update
- runapps.deployments.create
- runapps.deployments.get
- runapps.deployments.list
- runapps.locations.get
- runapps.locations.list
- runapps.operations.cancel
- runapps.operations.delete
- runapps.operations.get
- runapps.operations.list
- runtimeconfig.configs.create
- runtimeconfig.configs.delete
- runtimeconfig.configs.get
- runtimeconfig.configs.getIamPolicy
- runtimeconfig.configs.list
- runtimeconfig.configs.setIamPolicy
- runtimeconfig.configs.update
- runtimeconfig.operations.get
- runtimeconfig.operations.list
- runtimeconfig.variables.create
- runtimeconfig.variables.delete
- runtimeconfig.variables.get
- runtimeconfig.variables.getIamPolicy
- runtimeconfig.variables.list
- runtimeconfig.variables.setIamPolicy
- runtimeconfig.variables.update
- runtimeconfig.variables.watch
- runtimeconfig.waiters.create
- runtimeconfig.waiters.delete
- runtimeconfig.waiters.get
- runtimeconfig.waiters.getIamPolicy
- runtimeconfig.waiters.list
- runtimeconfig.waiters.setIamPolicy
- runtimeconfig.waiters.update
- secretmanager.locations.get
- secretmanager.locations.list
- secretmanager.secrets.create
- secretmanager.secrets.delete
- secretmanager.secrets.get
- secretmanager.secrets.getIamPolicy
- secretmanager.secrets.list
- secretmanager.secrets.setIamPolicy
- secretmanager.secrets.update
- secretmanager.versions.access
- secretmanager.versions.add
- secretmanager.versions.destroy
- secretmanager.versions.disable
- secretmanager.versions.enable
- secretmanager.versions.get
- secretmanager.versions.list
- securedlandingzone.operations.get
- securedlandingzone.overwatches.activate
- securedlandingzone.overwatches.create
- securedlandingzone.overwatches.delete
- securedlandingzone.overwatches.get
- securedlandingzone.overwatches.list
- securedlandingzone.overwatches.suspend
- securedlandingzone.overwatches.update
- securitycenter.assets.group
- securitycenter.assets.list
- securitycenter.assets.listAssetPropertyNames
- securitycenter.assets.runDiscovery
- securitycenter.assetsecuritymarks.update
- securitycenter.bigQueryExports.create
- securitycenter.bigQueryExports.delete
- securitycenter.bigQueryExports.get
- securitycenter.bigQueryExports.list
- securitycenter.bigQueryExports.update
- securitycenter.containerthreatdetectionsettings.calculate
- securitycenter.containerthreatdetectionsettings.get
- securitycenter.containerthreatdetectionsettings.update
- securitycenter.effectivesecurityhealthanalyticscustommodules.get
- securitycenter.effectivesecurityhealthanalyticscustommodules.list
- securitycenter.eventthreatdetectionsettings.calculate
- securitycenter.eventthreatdetectionsettings.get
- securitycenter.eventthreatdetectionsettings.update
- securitycenter.findingexternalsystems.update
- securitycenter.findings.bulkMuteUpdate
- securitycenter.findings.group
- securitycenter.findings.list
- securitycenter.findings.listFindingPropertyNames
- securitycenter.findings.setMute
- securitycenter.findings.setState
- securitycenter.findings.setWorkflowState
- securitycenter.findings.update
- securitycenter.findingsecuritymarks.update
- securitycenter.integratedvulnerabilityscannersettings.calculate
- securitycenter.integratedvulnerabilityscannersettings.get
- securitycenter.integratedvulnerabilityscannersettings.update
- securitycenter.muteconfigs.create
- securitycenter.muteconfigs.delete
- securitycenter.muteconfigs.get
- securitycenter.muteconfigs.list
- securitycenter.muteconfigs.update
- securitycenter.notificationconfig.create
- securitycenter.notificationconfig.delete
- securitycenter.notificationconfig.get
- securitycenter.notificationconfig.list
- securitycenter.notificationconfig.update
- securitycenter.organizationsettings.get
- securitycenter.organizationsettings.update
- securitycenter.rapidvulnerabilitydetectionsettings.calculate
- securitycenter.rapidvulnerabilitydetectionsettings.get
- securitycenter.rapidvulnerabilitydetectionsettings.update
- securitycenter.securitycentersettings.get
- securitycenter.securitycentersettings.update
- securitycenter.securityhealthanalyticscustommodules.create
- securitycenter.securityhealthanalyticscustommodules.delete
- securitycenter.securityhealthanalyticscustommodules.get
- securitycenter.securityhealthanalyticscustommodules.list
- securitycenter.securityhealthanalyticscustommodules.test
- securitycenter.securityhealthanalyticscustommodules.update
- securitycenter.securityhealthanalyticssettings.calculate
- securitycenter.securityhealthanalyticssettings.get
- securitycenter.securityhealthanalyticssettings.update
- securitycenter.sources.get
- securitycenter.sources.getIamPolicy
- securitycenter.sources.list
- securitycenter.sources.setIamPolicy
- securitycenter.sources.update
- securitycenter.subscription.get
- securitycenter.userinterfacemetadata.get
- securitycenter.virtualmachinethreatdetectionsettings.calculate
- securitycenter.virtualmachinethreatdetectionsettings.get
- securitycenter.virtualmachinethreatdetectionsettings.update
- securitycenter.websecurityscannersettings.calculate
- securitycenter.websecurityscannersettings.get
- securitycenter.websecurityscannersettings.update
- servicebroker.bindingoperations.get
- servicebroker.bindingoperations.list
- servicebroker.bindings.create
- servicebroker.bindings.delete
- servicebroker.bindings.get
- servicebroker.bindings.getIamPolicy
- servicebroker.bindings.list
- servicebroker.bindings.setIamPolicy
- servicebroker.catalogs.create
- servicebroker.catalogs.delete
- servicebroker.catalogs.get
- servicebroker.catalogs.getIamPolicy
- servicebroker.catalogs.list
- servicebroker.catalogs.setIamPolicy
- servicebroker.catalogs.validate
- servicebroker.instanceoperations.get
- servicebroker.instanceoperations.list
- servicebroker.instances.create
- servicebroker.instances.delete
- servicebroker.instances.get
- servicebroker.instances.getIamPolicy
- servicebroker.instances.list
- servicebroker.instances.setIamPolicy
- servicebroker.instances.update
- serviceconsumermanagement.consumers.get
- serviceconsumermanagement.quota.get
- serviceconsumermanagement.quota.update
- serviceconsumermanagement.tenancyu.addResource
- serviceconsumermanagement.tenancyu.create
- serviceconsumermanagement.tenancyu.delete
- serviceconsumermanagement.tenancyu.list
- serviceconsumermanagement.tenancyu.removeResource
- servicedirectory.endpoints.create
- servicedirectory.endpoints.delete
- servicedirectory.endpoints.get
- servicedirectory.endpoints.getIamPolicy
- servicedirectory.endpoints.list
- servicedirectory.endpoints.setIamPolicy
- servicedirectory.endpoints.update
- servicedirectory.locations.get
- servicedirectory.locations.list
- servicedirectory.namespaces.associatePrivateZone
- servicedirectory.namespaces.create
- servicedirectory.namespaces.delete
- servicedirectory.namespaces.get
- servicedirectory.namespaces.getIamPolicy
- servicedirectory.namespaces.list
- servicedirectory.namespaces.setIamPolicy
- servicedirectory.namespaces.update
- servicedirectory.networks.attach
- servicedirectory.services.bind
- servicedirectory.services.create
- servicedirectory.services.delete
- servicedirectory.services.get
- servicedirectory.services.getIamPolicy
- servicedirectory.services.list
- servicedirectory.services.resolve
- servicedirectory.services.setIamPolicy
- servicedirectory.services.update
- servicemanagement.services.bind
- servicemanagement.services.check
- servicemanagement.services.create
- servicemanagement.services.delete
- servicemanagement.services.get
- servicemanagement.services.getIamPolicy
- servicemanagement.services.list
- servicemanagement.services.quota
- servicemanagement.services.report
- servicemanagement.services.setIamPolicy
- servicemanagement.services.update
- servicenetworking.operations.cancel
- servicenetworking.operations.delete
- servicenetworking.operations.get
- servicenetworking.operations.list
- servicenetworking.services.addDnsRecordSet
- servicenetworking.services.addDnsZone
- servicenetworking.services.addPeering
- servicenetworking.services.addSubnetwork
- servicenetworking.services.createPeeredDnsDomain
- servicenetworking.services.deleteConnection
- servicenetworking.services.deletePeeredDnsDomain
- servicenetworking.services.disableVpcServiceControls
- servicenetworking.services.enableVpcServiceControls
- servicenetworking.services.get
- servicenetworking.services.getConsumerConfig
- servicenetworking.services.listPeeredDnsDomains
- servicenetworking.services.removeDnsRecordSet
- servicenetworking.services.removeDnsZone
- servicenetworking.services.updateConsumerConfig
- servicenetworking.services.updateDnsRecordSet
- servicenetworking.services.use
- servicesecurityinsights.clusterSecurityInfo.get
- servicesecurityinsights.clusterSecurityInfo.list
- servicesecurityinsights.policies.get
- servicesecurityinsights.projectStates.get
- servicesecurityinsights.securityInfo.list
- servicesecurityinsights.securityViews.get
- servicesecurityinsights.workloadPolicies.list
- servicesecurityinsights.workloadSecurityInfo.get
- serviceusage.apiKeys.regenerate
- serviceusage.apiKeys.revert
- serviceusage.operations.cancel
- serviceusage.operations.delete
- serviceusage.operations.get
- serviceusage.operations.list
- serviceusage.quotas.get
- serviceusage.quotas.update
- serviceusage.services.disable
- serviceusage.services.enable
- serviceusage.services.get
- serviceusage.services.list
- serviceusage.services.use
- source.repos.create
- source.repos.delete
- source.repos.get
- source.repos.getIamPolicy
- source.repos.getProjectConfig
- source.repos.list
- source.repos.setIamPolicy
- source.repos.update
- source.repos.updateProjectConfig
- source.repos.updateRepoConfig
- spanner.backupOperations.cancel
- spanner.backupOperations.get
- spanner.backupOperations.list
- spanner.backups.copy
- spanner.backups.create
- spanner.backups.delete
- spanner.backups.get
- spanner.backups.getIamPolicy
- spanner.backups.list
- spanner.backups.restoreDatabase
- spanner.backups.setIamPolicy
- spanner.backups.update
- spanner.databaseOperations.cancel
- spanner.databaseOperations.delete
- spanner.databaseOperations.get
- spanner.databaseOperations.list
- spanner.databaseRoles.list
- spanner.databaseRoles.use
- spanner.databases.beginOrRollbackReadWriteTransaction
- spanner.databases.beginPartitionedDmlTransaction
- spanner.databases.beginReadOnlyTransaction
- spanner.databases.create
- spanner.databases.createBackup
- spanner.databases.drop
- spanner.databases.get
- spanner.databases.getDdl
- spanner.databases.getIamPolicy
- spanner.databases.list
- spanner.databases.partitionQuery
- spanner.databases.partitionRead
- spanner.databases.read
- spanner.databases.select
- spanner.databases.setIamPolicy
- spanner.databases.update
- spanner.databases.updateDdl
- spanner.databases.updateTag
- spanner.databases.useDataBoost
- spanner.databases.useRoleBasedAccess
- spanner.databases.write
- spanner.instanceConfigOperations.cancel
- spanner.instanceConfigOperations.delete
- spanner.instanceConfigOperations.get
- spanner.instanceConfigOperations.list
- spanner.instanceConfigs.create
- spanner.instanceConfigs.delete
- spanner.instanceConfigs.get
- spanner.instanceConfigs.list
- spanner.instanceConfigs.update
- spanner.instanceOperations.cancel
- spanner.instanceOperations.delete
- spanner.instanceOperations.get
- spanner.instanceOperations.list
- spanner.instances.create
- spanner.instances.createTagBinding
- spanner.instances.delete
- spanner.instances.deleteTagBinding
- spanner.instances.get
- spanner.instances.getIamPolicy
- spanner.instances.list
- spanner.instances.listEffectiveTags
- spanner.instances.listTagBindings
- spanner.instances.setIamPolicy
- spanner.instances.update
- spanner.instances.updateTag
- spanner.sessions.create
- spanner.sessions.delete
- spanner.sessions.get
- spanner.sessions.list
- speech.adaptations.execute
- speech.config.get
- speech.config.update
- speech.customClasses.create
- speech.customClasses.delete
- speech.customClasses.get
- speech.customClasses.list
- speech.customClasses.undelete
- speech.customClasses.update
- speech.locations.get
- speech.locations.list
- speech.operations.cancel
- speech.operations.delete
- speech.operations.get
- speech.operations.list
- speech.operations.wait
- speech.phraseSets.create
- speech.phraseSets.delete
- speech.phraseSets.get
- speech.phraseSets.list
- speech.phraseSets.undelete
- speech.phraseSets.update
- speech.recognizers.create
- speech.recognizers.delete
- speech.recognizers.get
- speech.recognizers.list
- speech.recognizers.recognize
- speech.recognizers.undelete
- speech.recognizers.update
- stackdriver.projects.edit
- stackdriver.projects.get
- stackdriver.resourceMetadata.list
- stackdriver.resourceMetadata.write
- storage.buckets.create
- storage.buckets.createTagBinding
- storage.buckets.delete
- storage.buckets.deleteTagBinding
- storage.buckets.getObjectInsights
- storage.buckets.list
- storage.buckets.listEffectiveTags
- storage.buckets.listTagBindings
- storage.hmacKeys.create
- storage.hmacKeys.delete
- storage.hmacKeys.get
- storage.hmacKeys.list
- storage.hmacKeys.update
- storageinsights.locations.get
- storageinsights.locations.list
- storageinsights.operations.cancel
- storageinsights.operations.delete
- storageinsights.operations.get
- storageinsights.operations.list
- storageinsights.reportConfigs.create
- storageinsights.reportConfigs.delete
- storageinsights.reportConfigs.get
- storageinsights.reportConfigs.list
- storageinsights.reportConfigs.update
- storageinsights.reportDetails.get
- storageinsights.reportDetails.list
- storagetransfer.agentpools.create
- storagetransfer.agentpools.delete
- storagetransfer.agentpools.get
- storagetransfer.agentpools.list
- storagetransfer.agentpools.report
- storagetransfer.agentpools.update
- storagetransfer.jobs.create
- storagetransfer.jobs.delete
- storagetransfer.jobs.get
- storagetransfer.jobs.list
- storagetransfer.jobs.run
- storagetransfer.jobs.update
- storagetransfer.operations.assign
- storagetransfer.operations.cancel
- storagetransfer.operations.get
- storagetransfer.operations.list
- storagetransfer.operations.pause
- storagetransfer.operations.report
- storagetransfer.operations.resume
- storagetransfer.projects.getServiceAccount
- stream.locations.get
- stream.locations.list
- stream.operations.cancel
- stream.operations.delete
- stream.operations.get
- stream.operations.list
- stream.streamContents.build
- stream.streamContents.create
- stream.streamContents.delete
- stream.streamContents.get
- stream.streamContents.list
- stream.streamContents.update
- stream.streamInstances.create
- stream.streamInstances.delete
- stream.streamInstances.get
- stream.streamInstances.list
- stream.streamInstances.rollout
- stream.streamInstances.update
- subscribewithgoogledeveloper.tools.get
- timeseriesinsights.datasets.create
- timeseriesinsights.datasets.delete
- timeseriesinsights.datasets.evaluate
- timeseriesinsights.datasets.list
- timeseriesinsights.datasets.query
- timeseriesinsights.datasets.update
- timeseriesinsights.locations.get
- timeseriesinsights.locations.list
- tpu.acceleratortypes.get
- tpu.acceleratortypes.list
- tpu.locations.get
- tpu.locations.list
- tpu.nodes.create
- tpu.nodes.delete
- tpu.nodes.get
- tpu.nodes.list
- tpu.nodes.reimage
- tpu.nodes.reset
- tpu.nodes.simulateMaintenanceEvent
- tpu.nodes.start
- tpu.nodes.stop
- tpu.nodes.update
- tpu.operations.get
- tpu.operations.list
- tpu.runtimeversions.get
- tpu.runtimeversions.list
- tpu.tensorflowversions.get
- tpu.tensorflowversions.list
- trafficdirector.networks.getConfigs
- trafficdirector.networks.reportMetrics
- transcoder.jobTemplates.create
- transcoder.jobTemplates.delete
- transcoder.jobTemplates.get
- transcoder.jobTemplates.list
- transcoder.jobs.create
- transcoder.jobs.delete
- transcoder.jobs.get
- transcoder.jobs.list
- transferappliance.appliances.create
- transferappliance.appliances.delete
- transferappliance.appliances.get
- transferappliance.appliances.list
- transferappliance.appliances.update
- transferappliance.credentials.get
- transferappliance.locations.get
- transferappliance.locations.list
- transferappliance.operations.cancel
- transferappliance.operations.delete
- transferappliance.operations.get
- transferappliance.operations.list
- transferappliance.orders.create
- transferappliance.orders.delete
- transferappliance.orders.get
- transferappliance.orders.list
- transferappliance.orders.update
- transferappliance.savedAddresses.create
- transferappliance.savedAddresses.delete
- transferappliance.savedAddresses.get
- transferappliance.savedAddresses.list
- transferappliance.savedAddresses.update
- translationhub.portals.create
- translationhub.portals.delete
- translationhub.portals.get
- translationhub.portals.list
- translationhub.portals.update
- videostitcher.cdnKeys.create
- videostitcher.cdnKeys.delete
- videostitcher.cdnKeys.get
- videostitcher.cdnKeys.list
- videostitcher.cdnKeys.update
- videostitcher.liveAdTagDetails.get
- videostitcher.liveAdTagDetails.list
- videostitcher.liveSessions.create
- videostitcher.liveSessions.get
- videostitcher.slates.create
- videostitcher.slates.delete
- videostitcher.slates.get
- videostitcher.slates.list
- videostitcher.slates.update
- videostitcher.vodAdTagDetails.get
- videostitcher.vodAdTagDetails.list
- videostitcher.vodSessions.create
- videostitcher.vodSessions.get
- videostitcher.vodStitchDetails.get
- videostitcher.vodStitchDetails.list
- visionai.analyses.create
- visionai.analyses.delete
- visionai.analyses.get
- visionai.analyses.getIamPolicy
- visionai.analyses.list
- visionai.analyses.setIamPolicy
- visionai.analyses.update
- visionai.annotations.create
- visionai.annotations.delete
- visionai.annotations.get
- visionai.annotations.list
- visionai.annotations.update
- visionai.applications.create
- visionai.applications.delete
- visionai.applications.deploy
- visionai.applications.get
- visionai.applications.list
- visionai.applications.undeploy
- visionai.applications.update
- visionai.assets.clip
- visionai.assets.create
- visionai.assets.delete
- visionai.assets.generateHlsUri
- visionai.assets.get
- visionai.assets.ingest
- visionai.assets.list
- visionai.assets.search
- visionai.assets.update
- visionai.clusters.create
- visionai.clusters.delete
- visionai.clusters.get
- visionai.clusters.getIamPolicy
- visionai.clusters.list
- visionai.clusters.setIamPolicy
- visionai.clusters.update
- visionai.clusters.watch
- visionai.corpora.create
- visionai.corpora.delete
- visionai.corpora.get
- visionai.corpora.list
- visionai.corpora.suggest
- visionai.corpora.update
- visionai.dataSchemas.create
- visionai.dataSchemas.delete
- visionai.dataSchemas.get
- visionai.dataSchemas.list
- visionai.dataSchemas.update
- visionai.dataSchemas.validate
- visionai.drafts.create
- visionai.drafts.delete
- visionai.drafts.get
- visionai.drafts.list
- visionai.drafts.update
- visionai.events.create
- visionai.events.delete
- visionai.events.get
- visionai.events.getIamPolicy
- visionai.events.list
- visionai.events.setIamPolicy
- visionai.events.update
- visionai.instances.get
- visionai.instances.list
- visionai.locations.get
- visionai.locations.list
- visionai.operations.cancel
- visionai.operations.delete
- visionai.operations.get
- visionai.operations.list
- visionai.operations.wait
- visionai.operators.create
- visionai.operators.delete
- visionai.operators.get
- visionai.operators.getIamPolicy
- visionai.operators.list
- visionai.operators.setIamPolicy
- visionai.operators.update
- visionai.processors.create
- visionai.processors.delete
- visionai.processors.get
- visionai.processors.list
- visionai.processors.listPrebuilt
- visionai.processors.update
- visionai.searchConfigs.create
- visionai.searchConfigs.delete
- visionai.searchConfigs.get
- visionai.searchConfigs.list
- visionai.searchConfigs.update
- visionai.series.acquireLease
- visionai.series.create
- visionai.series.delete
- visionai.series.get
- visionai.series.getIamPolicy
- visionai.series.list
- visionai.series.receive
- visionai.series.releaseLease
- visionai.series.renewLease
- visionai.series.send
- visionai.series.setIamPolicy
- visionai.series.update
- visionai.streams.create
- visionai.streams.delete
- visionai.streams.get
- visionai.streams.getIamPolicy
- visionai.streams.list
- visionai.streams.receive
- visionai.streams.send
- visionai.streams.setIamPolicy
- visionai.streams.update
- visionai.uistreams.create
- visionai.uistreams.delete
- visionai.uistreams.generateStreamThumbnails
- visionai.uistreams.get
- visionai.uistreams.list
- visualinspection.annotationSets.create
- visualinspection.annotationSets.delete
- visualinspection.annotationSets.get
- visualinspection.annotationSets.list
- visualinspection.annotationSets.update
- visualinspection.annotationSpecs.create
- visualinspection.annotationSpecs.delete
- visualinspection.annotationSpecs.get
- visualinspection.annotationSpecs.list
- visualinspection.annotations.create
- visualinspection.annotations.delete
- visualinspection.annotations.get
- visualinspection.annotations.list
- visualinspection.annotations.update
- visualinspection.datasets.create
- visualinspection.datasets.delete
- visualinspection.datasets.export
- visualinspection.datasets.get
- visualinspection.datasets.import
- visualinspection.datasets.list
- visualinspection.datasets.update
- visualinspection.images.delete
- visualinspection.images.get
- visualinspection.images.list
- visualinspection.images.update
- visualinspection.locations.get
- visualinspection.locations.list
- visualinspection.locations.reportUsageMetrics
- visualinspection.modelEvaluations.get
- visualinspection.modelEvaluations.list
- visualinspection.models.create
- visualinspection.models.delete
- visualinspection.models.get
- visualinspection.models.list
- visualinspection.models.update
- visualinspection.models.writePrediction
- visualinspection.modules.create
- visualinspection.modules.delete
- visualinspection.modules.get
- visualinspection.modules.list
- visualinspection.modules.update
- visualinspection.operations.get
- visualinspection.operations.list
- visualinspection.solutionArtifacts.create
- visualinspection.solutionArtifacts.delete
- visualinspection.solutionArtifacts.get
- visualinspection.solutionArtifacts.list
- visualinspection.solutionArtifacts.predict
- visualinspection.solutionArtifacts.update
- visualinspection.solutions.create
- visualinspection.solutions.delete
- visualinspection.solutions.get
- visualinspection.solutions.list
- vmmigration.cloneJobs.create
- vmmigration.cloneJobs.get
- vmmigration.cloneJobs.list
- vmmigration.cloneJobs.update
- vmmigration.cutoverJobs.create
- vmmigration.cutoverJobs.get
- vmmigration.cutoverJobs.list
- vmmigration.cutoverJobs.update
- vmmigration.datacenterConnectors.create
- vmmigration.datacenterConnectors.delete
- vmmigration.datacenterConnectors.get
- vmmigration.datacenterConnectors.list
- vmmigration.datacenterConnectors.update
- vmmigration.deployments.create
- vmmigration.deployments.get
- vmmigration.deployments.list
- vmmigration.groups.create
- vmmigration.groups.delete
- vmmigration.groups.get
- vmmigration.groups.list
- vmmigration.groups.update
- vmmigration.locations.get
- vmmigration.locations.list
- vmmigration.migratingVms.create
- vmmigration.migratingVms.delete
- vmmigration.migratingVms.get
- vmmigration.migratingVms.list
- vmmigration.migratingVms.update
- vmmigration.operations.cancel
- vmmigration.operations.delete
- vmmigration.operations.get
- vmmigration.operations.list
- vmmigration.replicationCycles.get
- vmmigration.replicationCycles.list
- vmmigration.sources.create
- vmmigration.sources.delete
- vmmigration.sources.get
- vmmigration.sources.list
- vmmigration.sources.update
- vmmigration.targets.create
- vmmigration.targets.delete
- vmmigration.targets.get
- vmmigration.targets.list
- vmmigration.targets.update
- vmmigration.utilizationReports.create
- vmmigration.utilizationReports.delete
- vmmigration.utilizationReports.get
- vmmigration.utilizationReports.list
- vmwareengine.clusters.create
- vmwareengine.clusters.delete
- vmwareengine.clusters.get
- vmwareengine.clusters.getIamPolicy
- vmwareengine.clusters.list
- vmwareengine.clusters.setIamPolicy
- vmwareengine.clusters.update
- vmwareengine.hcxActivationKeys.create
- vmwareengine.hcxActivationKeys.get
- vmwareengine.hcxActivationKeys.getIamPolicy
- vmwareengine.hcxActivationKeys.list
- vmwareengine.hcxActivationKeys.setIamPolicy
- vmwareengine.locations.get
- vmwareengine.locations.list
- vmwareengine.networkPolicies.create
- vmwareengine.networkPolicies.delete
- vmwareengine.networkPolicies.get
- vmwareengine.networkPolicies.list
- vmwareengine.networkPolicies.update
- vmwareengine.nodeTypes.get
- vmwareengine.nodeTypes.list
- vmwareengine.operations.delete
- vmwareengine.operations.get
- vmwareengine.operations.list
- vmwareengine.privateClouds.create
- vmwareengine.privateClouds.delete
- vmwareengine.privateClouds.get
- vmwareengine.privateClouds.getIamPolicy
- vmwareengine.privateClouds.list
- vmwareengine.privateClouds.resetNsxCredentials
- vmwareengine.privateClouds.resetVcenterCredentials
- vmwareengine.privateClouds.setIamPolicy
- vmwareengine.privateClouds.showNsxCredentials
- vmwareengine.privateClouds.showVcenterCredentials
- vmwareengine.privateClouds.undelete
- vmwareengine.privateClouds.update
- vmwareengine.privateConnections.create
- vmwareengine.privateConnections.delete
- vmwareengine.privateConnections.get
- vmwareengine.privateConnections.list
- vmwareengine.privateConnections.listPeeringRoutes
- vmwareengine.privateConnections.update
- vmwareengine.services.use
- vmwareengine.services.view
- vmwareengine.subnets.get
- vmwareengine.subnets.list
- vmwareengine.subnets.update
- vmwareengine.vmwareEngineNetworks.create
- vmwareengine.vmwareEngineNetworks.delete
- vmwareengine.vmwareEngineNetworks.get
- vmwareengine.vmwareEngineNetworks.list
- vmwareengine.vmwareEngineNetworks.update
- vpcaccess.connectors.create
- vpcaccess.connectors.delete
- vpcaccess.connectors.get
- vpcaccess.connectors.list
- vpcaccess.connectors.update
- vpcaccess.connectors.use
- vpcaccess.locations.list
- vpcaccess.operations.get
- vpcaccess.operations.list
- workflows.callbacks.send
- workflows.executions.cancel
- workflows.executions.create
- workflows.executions.get
- workflows.executions.list
- workflows.locations.get
- workflows.locations.list
- workflows.operations.cancel
- workflows.operations.get
- workflows.operations.list
- workflows.workflows.create
- workflows.workflows.delete
- workflows.workflows.get
- workflows.workflows.list
- workflows.workflows.update
- workloadcertificate.locations.get
- workloadcertificate.locations.list
- workloadcertificate.operations.cancel
- workloadcertificate.operations.delete
- workloadcertificate.operations.get
- workloadcertificate.operations.list
- workloadcertificate.workloadCertificateFeature.get
- workloadcertificate.workloadCertificateFeature.update
- workloadcertificate.workloadRegistrations.create
- workloadcertificate.workloadRegistrations.delete
- workloadcertificate.workloadRegistrations.get
- workloadcertificate.workloadRegistrations.list
- workloadcertificate.workloadRegistrations.update
- workloadmanager.evaluations.create
- workloadmanager.evaluations.delete
- workloadmanager.evaluations.get
- workloadmanager.evaluations.list
- workloadmanager.evaluations.run
- workloadmanager.evaluations.update
- workloadmanager.executions.delete
- workloadmanager.executions.get
- workloadmanager.executions.list
- workloadmanager.locations.get
- workloadmanager.locations.list
- workloadmanager.operations.cancel
- workloadmanager.operations.delete
- workloadmanager.operations.get
- workloadmanager.operations.list
- workloadmanager.results.list
- workloadmanager.rules.list
- workstations.operations.get
- workstations.workstationClusters.create
- workstations.workstationClusters.delete
- workstations.workstationClusters.get
- workstations.workstationClusters.list
- workstations.workstationClusters.update
- workstations.workstationConfigs.create
- workstations.workstationConfigs.delete
- workstations.workstationConfigs.get
- workstations.workstationConfigs.getIamPolicy
- workstations.workstationConfigs.list
- workstations.workstationConfigs.setIamPolicy
- workstations.workstationConfigs.update
- workstations.workstations.create
- workstations.workstations.delete
- workstations.workstations.get
- workstations.workstations.getIamPolicy
- workstations.workstations.list
- workstations.workstations.setIamPolicy
- workstations.workstations.start
- workstations.workstations.stop
- workstations.workstations.update
name: roles/owner
stage: GA
title: Owner
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment