![]() ![]() ![]() |
How to configure in ADAudit Plus :
How to create Custom Role :
title: "ROLE_NAME"
description: "ROLE_DESCRIPTION"
stage: "ALPHA"
includedPermissions:
- alloydb.clusters.list
- alloydb.instances.list
- alloydb.locations.list
- apikeys.keys.list
- appengine.applications.get
- batch.jobs.list
- batch.locations.list
- batch.tasks.list
- bigquery.datasets.get
- bigquery.tables.list
- bigtable.instances.list
- cloudbuild.builds.list
- cloudfunctions.functions.getIamPolicy
- cloudfunctions.functions.list
- cloudkms.cryptoKeys.list
- cloudkms.keyRings.list
- cloudkms.locations.list
- cloudsql.backupRuns.get
- cloudsql.instances.list
- cloudsql.users.list
- composer.environments.list
- compute.autoscalers.list
- compute.backendServices.list
- compute.disks.list
- compute.firewalls.list
- compute.images.list
- compute.instanceGroupManagers.list
- compute.instanceGroups.list
- compute.instances.list
- compute.networks.list
- compute.projects.get
- compute.regionUrlMaps.list
- compute.regions.list
- compute.resourcePolicies.list
- compute.routers.list
- compute.snapshots.list
- compute.sslPolicies.list
- compute.subnetworks.list
- compute.targetHttpsProxies.list
- compute.urlMaps.list
- container.clusters.list
- dataflow.jobs.get
- dataflow.jobs.list
- dataproc.clusters.list
- deploymentmanager.deployments.list
- dns.managedZones.list
- dns.policies.list
- file.instances.list
- file.locations.list
- iam.serviceAccountKeys.list
- iam.serviceAccounts.list
- logging.logMetrics.list
- logging.sinks.list
- monitoring.alertPolicies.list
- pubsub.subscriptions.list
- pubsub.topics.getIamPolicy
- pubsub.topics.list
- resourcemanager.projects.get
- resourcemanager.projects.getIamPolicy
- run.services.getIamPolicy
- run.services.list
- serviceusage.services.list
- spanner.instances.list
- storage.buckets.getIamPolicy
- storage.buckets.list
- resourcemanager.organizations.get
- resourcemanager.organizations.getIamPolicy
- logging.views.access
gcloud iam roles create ROLE_ID --organization=ORGANIZATION_ID --file=YAML_FILE_PATH
How to create Service Account :
Now you have successfully created a service account and downloaded its JSON key file from GCP.
Remember to keep this key file secure, as it contains sensitive information and grants access to your GCP resources. If it's ever compromised, you should regenerate the key and update any services using it.
Activity log: Fetches and shows all the Operations performed on the Cloud Account Services
![]() ![]() ![]() |