IAM-Rollen und -Berechtigungen für BigQuery

In diesem Dokument finden Sie eine Liste der vordefinierten Rollen und Berechtigungen für Identity and Access Management (IAM) für BigQuery. Auf dieser Seite finden Sie Rollen und Berechtigungen für Folgendes:

  • BigQuery: Rollen und Berechtigungen, die für BigQuery-Ressourcen wie Datasets, Tabellen, Ansichten und Routinen gelten. Viele dieser Rollen und Berechtigungen können auch Resource Manager-Ressourcen wie Projekte, Ordner und Organisationen gewährt werden.
  • BigQuery Connection API: Rolle, die einem Dienst-Agenten Zugriff auf eine Cloud SQL-Verbindung gewährt.
  • BigQuery Continuous Query: Rolle, die einem Dienstkonto Zugriff auf eine kontinuierliche Abfrage gewährt.
  • BigQuery-Datenrichtlinie: Rollen und Berechtigungen, die für Datenrichtlinien in BigQuery gelten.
  • BigQuery Data Transfer Service: Rolle, die einem Dienst-Agenten Zugriff zum Erstellen von Jobs zum Übertragen von Daten gewährt.
  • BigQuery Engine for Apache Flink: Rollen und Berechtigungen, die für BigQuery Engine for Apache Flink-Ressourcen gelten.
  • BigQuery Migration Service API: Rollen und Berechtigungen, die für BigQuery Migration Service-Ressourcen gelten.
  • BigQuery Omni: Rolle, die einem Kundenservicemitarbeiter Zugriff auf Tabellen gewährt.
  • BigQuery-Freigabe: Rollen und Berechtigungen, die für die Freigabe von BigQuery-Ressourcen gelten.

Vordefinierte IAM-Rollen für BigQuery

In den folgenden Tabellen sind die vordefinierten BigQuery-IAM-Rollen und die jeweiligen Berechtigungen aufgeführt, die eine Rolle enthält. Beachten Sie, dass jede Berechtigung für einen bestimmten Ressourcentyp gilt.

BigQuery-Rollen

In dieser Tabelle sind die IAM-Rollen und -Berechtigungen für BigQuery aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Role Permissions

(roles/bigquery.admin)

Provides permissions to manage all resources within the project. Can manage all data within the project, and can cancel jobs from other users running within the project.

Lowest-level resources where you can grant this role:

  • Dataset
  • These resources within a dataset:
    • Table
    • View
    • Routine
  • Connection
  • Saved query
  • Data canvas
  • Pipeline
  • Data preparation
  • Repository

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.bireservations.*

  • bigquery.bireservations.get
  • bigquery.bireservations.update

bigquery.capacityCommitments.*

  • bigquery.capacityCommitments.create
  • bigquery.capacityCommitments.delete
  • bigquery.capacityCommitments.get
  • bigquery.capacityCommitments.list
  • bigquery.capacityCommitments.update

bigquery.config.*

  • bigquery.config.get
  • bigquery.config.update

bigquery.connections.*

  • bigquery.connections.create
  • bigquery.connections.delegate
  • bigquery.connections.delete
  • bigquery.connections.get
  • bigquery.connections.getIamPolicy
  • bigquery.connections.list
  • bigquery.connections.setIamPolicy
  • bigquery.connections.update
  • bigquery.connections.updateTag
  • bigquery.connections.use

bigquery.dataPolicies.create

bigquery.dataPolicies.delete

bigquery.dataPolicies.get

bigquery.dataPolicies.getIamPolicy

bigquery.dataPolicies.list

bigquery.dataPolicies.setIamPolicy

bigquery.dataPolicies.update

bigquery.datasets.*

  • bigquery.datasets.create
  • bigquery.datasets.createTagBinding
  • bigquery.datasets.delete
  • bigquery.datasets.deleteTagBinding
  • bigquery.datasets.get
  • bigquery.datasets.getIamPolicy
  • bigquery.datasets.link
  • bigquery.datasets.listEffectiveTags
  • bigquery.datasets.listSharedDatasetUsage
  • bigquery.datasets.listTagBindings
  • bigquery.datasets.setIamPolicy
  • bigquery.datasets.update
  • bigquery.datasets.updateTag

bigquery.jobs.*

  • bigquery.jobs.create
  • bigquery.jobs.delete
  • bigquery.jobs.get
  • bigquery.jobs.list
  • bigquery.jobs.listAll
  • bigquery.jobs.listExecutionMetadata
  • bigquery.jobs.update

bigquery.models.*

  • bigquery.models.create
  • bigquery.models.delete
  • bigquery.models.export
  • bigquery.models.getData
  • bigquery.models.getMetadata
  • bigquery.models.list
  • bigquery.models.updateData
  • bigquery.models.updateMetadata
  • bigquery.models.updateTag

bigquery.objectRefs.*

  • bigquery.objectRefs.read
  • bigquery.objectRefs.write

bigquery.readsessions.*

  • bigquery.readsessions.create
  • bigquery.readsessions.getData
  • bigquery.readsessions.update

bigquery.reservationAssignments.*

  • bigquery.reservationAssignments.create
  • bigquery.reservationAssignments.delete
  • bigquery.reservationAssignments.list
  • bigquery.reservationAssignments.search

bigquery.reservations.*

  • bigquery.reservations.create
  • bigquery.reservations.delete
  • bigquery.reservations.get
  • bigquery.reservations.list
  • bigquery.reservations.listFailoverDatasets
  • bigquery.reservations.update
  • bigquery.reservations.use

bigquery.routines.*

  • bigquery.routines.create
  • bigquery.routines.delete
  • bigquery.routines.get
  • bigquery.routines.list
  • bigquery.routines.update
  • bigquery.routines.updateTag

bigquery.rowAccessPolicies.create

bigquery.rowAccessPolicies.delete

bigquery.rowAccessPolicies.get

bigquery.rowAccessPolicies.getIamPolicy

bigquery.rowAccessPolicies.list

bigquery.rowAccessPolicies.overrideTimeTravelRestrictions

bigquery.rowAccessPolicies.setIamPolicy

bigquery.rowAccessPolicies.update

bigquery.savedqueries.*

  • bigquery.savedqueries.create
  • bigquery.savedqueries.delete
  • bigquery.savedqueries.get
  • bigquery.savedqueries.list
  • bigquery.savedqueries.update

bigquery.tables.*

  • bigquery.tables.create
  • bigquery.tables.createIndex
  • bigquery.tables.createSnapshot
  • bigquery.tables.createTagBinding
  • bigquery.tables.delete
  • bigquery.tables.deleteIndex
  • bigquery.tables.deleteSnapshot
  • bigquery.tables.deleteTagBinding
  • bigquery.tables.export
  • bigquery.tables.get
  • bigquery.tables.getData
  • bigquery.tables.getIamPolicy
  • bigquery.tables.list
  • bigquery.tables.listEffectiveTags
  • bigquery.tables.listTagBindings
  • bigquery.tables.replicateData
  • bigquery.tables.restoreSnapshot
  • bigquery.tables.setCategory
  • bigquery.tables.setColumnDataPolicy
  • bigquery.tables.setIamPolicy
  • bigquery.tables.update
  • bigquery.tables.updateData
  • bigquery.tables.updateIndex
  • bigquery.tables.updateTag

bigquery.transfers.*

  • bigquery.transfers.get
  • bigquery.transfers.update

bigquerymigration.translation.translate

cloudkms.keyHandles.*

  • cloudkms.keyHandles.create
  • cloudkms.keyHandles.get
  • cloudkms.keyHandles.list

cloudkms.operations.get

cloudkms.projects.showEffectiveAutokeyConfig

dataform.*

  • dataform.commentThreads.create
  • dataform.commentThreads.delete
  • dataform.commentThreads.get
  • dataform.commentThreads.list
  • dataform.commentThreads.update
  • dataform.comments.create
  • dataform.comments.delete
  • dataform.comments.get
  • dataform.comments.list
  • dataform.comments.update
  • dataform.compilationResults.create
  • dataform.compilationResults.get
  • dataform.compilationResults.list
  • dataform.compilationResults.query
  • dataform.config.get
  • dataform.config.update
  • dataform.locations.get
  • dataform.locations.list
  • dataform.releaseConfigs.create
  • dataform.releaseConfigs.delete
  • dataform.releaseConfigs.get
  • dataform.releaseConfigs.list
  • dataform.releaseConfigs.update
  • dataform.repositories.commit
  • dataform.repositories.computeAccessTokenStatus
  • dataform.repositories.create
  • dataform.repositories.delete
  • dataform.repositories.fetchHistory
  • dataform.repositories.fetchRemoteBranches
  • dataform.repositories.get
  • dataform.repositories.getIamPolicy
  • dataform.repositories.list
  • dataform.repositories.queryDirectoryContents
  • dataform.repositories.readFile
  • dataform.repositories.setIamPolicy
  • dataform.repositories.update
  • dataform.workflowConfigs.create
  • dataform.workflowConfigs.delete
  • dataform.workflowConfigs.get
  • dataform.workflowConfigs.list
  • dataform.workflowConfigs.update
  • dataform.workflowInvocations.cancel
  • dataform.workflowInvocations.create
  • dataform.workflowInvocations.delete
  • dataform.workflowInvocations.get
  • dataform.workflowInvocations.list
  • dataform.workflowInvocations.query
  • dataform.workspaces.commit
  • dataform.workspaces.create
  • dataform.workspaces.delete
  • dataform.workspaces.fetchFileDiff
  • dataform.workspaces.fetchFileGitStatuses
  • dataform.workspaces.fetchGitAheadBehind
  • dataform.workspaces.get
  • dataform.workspaces.getIamPolicy
  • dataform.workspaces.installNpmPackages
  • dataform.workspaces.list
  • dataform.workspaces.makeDirectory
  • dataform.workspaces.moveDirectory
  • dataform.workspaces.moveFile
  • dataform.workspaces.pull
  • dataform.workspaces.push
  • dataform.workspaces.queryDirectoryContents
  • dataform.workspaces.readFile
  • dataform.workspaces.removeDirectory
  • dataform.workspaces.removeFile
  • dataform.workspaces.reset
  • dataform.workspaces.searchFiles
  • dataform.workspaces.setIamPolicy
  • dataform.workspaces.writeFile

dataplex.datascans.*

  • dataplex.datascans.create
  • dataplex.datascans.delete
  • dataplex.datascans.get
  • dataplex.datascans.getData
  • dataplex.datascans.getIamPolicy
  • dataplex.datascans.list
  • dataplex.datascans.run
  • dataplex.datascans.setIamPolicy
  • dataplex.datascans.update

dataplex.operations.get

dataplex.operations.list

dataplex.projects.search

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.connectionAdmin)

Lowest-level resources where you can grant this role:

  • Connection

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.connections.*

  • bigquery.connections.create
  • bigquery.connections.delegate
  • bigquery.connections.delete
  • bigquery.connections.get
  • bigquery.connections.getIamPolicy
  • bigquery.connections.list
  • bigquery.connections.setIamPolicy
  • bigquery.connections.update
  • bigquery.connections.updateTag
  • bigquery.connections.use

(roles/bigquery.connectionUser)

Lowest-level resources where you can grant this role:

  • Connection

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.connections.get

bigquery.connections.getIamPolicy

bigquery.connections.list

bigquery.connections.use

(roles/bigquery.dataEditor)

When granted on a table or view, this role provides permissions to:

  • Read and update data and metadata for the table or view.
  • Delete the table or view.

This role cannot be granted to individual models.

When granted on a dataset, this role provides permissions to:

  • Read the dataset's metadata and list tables in the dataset.
  • Create, update, get, and delete the dataset's tables.

The BigQuery Data Editor role is mapped to the WRITER BigQuery basic role. When you grant the BigQuery Data Editor role to a principal at the dataset level, the principal is granted WRITER access to the dataset.

When applied at the project or organization level, this role also lets users create new datasets.

Lowest-level resources where you can grant this role:

  • Dataset
  • These resources within a dataset:
    • Table
    • View
    • Routine

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.config.get

bigquery.datasets.create

bigquery.datasets.get

bigquery.datasets.getIamPolicy

bigquery.datasets.updateTag

bigquery.models.*

  • bigquery.models.create
  • bigquery.models.delete
  • bigquery.models.export
  • bigquery.models.getData
  • bigquery.models.getMetadata
  • bigquery.models.list
  • bigquery.models.updateData
  • bigquery.models.updateMetadata
  • bigquery.models.updateTag

bigquery.routines.*

  • bigquery.routines.create
  • bigquery.routines.delete
  • bigquery.routines.get
  • bigquery.routines.list
  • bigquery.routines.update
  • bigquery.routines.updateTag

bigquery.tables.create

bigquery.tables.createIndex

bigquery.tables.createSnapshot

bigquery.tables.delete

bigquery.tables.deleteIndex

bigquery.tables.export

bigquery.tables.get

bigquery.tables.getData

bigquery.tables.getIamPolicy

bigquery.tables.list

bigquery.tables.replicateData

bigquery.tables.restoreSnapshot

bigquery.tables.update

bigquery.tables.updateData

bigquery.tables.updateIndex

bigquery.tables.updateTag

cloudkms.keyHandles.*

  • cloudkms.keyHandles.create
  • cloudkms.keyHandles.get
  • cloudkms.keyHandles.list

cloudkms.operations.get

cloudkms.projects.showEffectiveAutokeyConfig

dataplex.datascans.create

dataplex.datascans.delete

dataplex.datascans.get

dataplex.datascans.getData

dataplex.datascans.getIamPolicy

dataplex.datascans.list

dataplex.datascans.run

dataplex.datascans.update

dataplex.operations.get

dataplex.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.dataOwner)

When granted on a table or view, this role provides permissions to:

  • Read and update data and metadata for the table or view.
  • Share the table or view.
  • Delete the table or view.

This role cannot be granted to individual models.

When granted on a dataset, this role provides permissions to:

  • Read, update, and delete the dataset.
  • Create, update, get, and delete the dataset's tables.

The BigQuery Data Owner role is mapped to the OWNER BigQuery basic role. When you grant the BigQuery Data Owner role to a principal at the dataset level, the principal is granted OWNER access to the dataset.

When applied at the project or organization level, this role can also create new datasets.

Lowest-level resources where you can grant this role:

  • Dataset
  • These resources within a dataset:
    • Table
    • View
    • Routine

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.config.get

bigquery.dataPolicies.create

bigquery.dataPolicies.delete

bigquery.dataPolicies.get

bigquery.dataPolicies.getIamPolicy

bigquery.dataPolicies.list

bigquery.dataPolicies.setIamPolicy

bigquery.dataPolicies.update

bigquery.datasets.*

  • bigquery.datasets.create
  • bigquery.datasets.createTagBinding
  • bigquery.datasets.delete
  • bigquery.datasets.deleteTagBinding
  • bigquery.datasets.get
  • bigquery.datasets.getIamPolicy
  • bigquery.datasets.link
  • bigquery.datasets.listEffectiveTags
  • bigquery.datasets.listSharedDatasetUsage
  • bigquery.datasets.listTagBindings
  • bigquery.datasets.setIamPolicy
  • bigquery.datasets.update
  • bigquery.datasets.updateTag

bigquery.models.*

  • bigquery.models.create
  • bigquery.models.delete
  • bigquery.models.export
  • bigquery.models.getData
  • bigquery.models.getMetadata
  • bigquery.models.list
  • bigquery.models.updateData
  • bigquery.models.updateMetadata
  • bigquery.models.updateTag

bigquery.routines.*

  • bigquery.routines.create
  • bigquery.routines.delete
  • bigquery.routines.get
  • bigquery.routines.list
  • bigquery.routines.update
  • bigquery.routines.updateTag

bigquery.rowAccessPolicies.create

bigquery.rowAccessPolicies.delete

bigquery.rowAccessPolicies.get

bigquery.rowAccessPolicies.getIamPolicy

bigquery.rowAccessPolicies.list

bigquery.rowAccessPolicies.setIamPolicy

bigquery.rowAccessPolicies.update

bigquery.tables.*

  • bigquery.tables.create
  • bigquery.tables.createIndex
  • bigquery.tables.createSnapshot
  • bigquery.tables.createTagBinding
  • bigquery.tables.delete
  • bigquery.tables.deleteIndex
  • bigquery.tables.deleteSnapshot
  • bigquery.tables.deleteTagBinding
  • bigquery.tables.export
  • bigquery.tables.get
  • bigquery.tables.getData
  • bigquery.tables.getIamPolicy
  • bigquery.tables.list
  • bigquery.tables.listEffectiveTags
  • bigquery.tables.listTagBindings
  • bigquery.tables.replicateData
  • bigquery.tables.restoreSnapshot
  • bigquery.tables.setCategory
  • bigquery.tables.setColumnDataPolicy
  • bigquery.tables.setIamPolicy
  • bigquery.tables.update
  • bigquery.tables.updateData
  • bigquery.tables.updateIndex
  • bigquery.tables.updateTag

cloudkms.keyHandles.*

  • cloudkms.keyHandles.create
  • cloudkms.keyHandles.get
  • cloudkms.keyHandles.list

cloudkms.operations.get

cloudkms.projects.showEffectiveAutokeyConfig

dataplex.datascans.*

  • dataplex.datascans.create
  • dataplex.datascans.delete
  • dataplex.datascans.get
  • dataplex.datascans.getData
  • dataplex.datascans.getIamPolicy
  • dataplex.datascans.list
  • dataplex.datascans.run
  • dataplex.datascans.setIamPolicy
  • dataplex.datascans.update

dataplex.operations.get

dataplex.operations.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.dataViewer)

When granted on a table or view, this role provides permissions to:

  • Read data and metadata from the table or view.

This role cannot be granted to individual models.

When granted on a dataset, this role provides permissions to list all of the resources in the dataset (such as tables, views, snapshots, models, and routines) and to read their data and metadata with applicable APIs and in queries.

The BigQuery Data Viewer role is mapped to the READER BigQuery basic role. When you grant the BigQuery Data Viewer role to a principal at the dataset level, the principal is granted READER access to the dataset.

When applied at the project or organization level, this role can also enumerate all datasets in the project. Additional roles, however, are necessary to allow the running of jobs.

Lowest-level resources where you can grant this role:

  • Dataset
  • These resources within a dataset:
    • Table
    • View
    • Routine

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.datasets.get

bigquery.datasets.getIamPolicy

bigquery.models.export

bigquery.models.getData

bigquery.models.getMetadata

bigquery.models.list

bigquery.routines.get

bigquery.routines.list

bigquery.tables.createSnapshot

bigquery.tables.export

bigquery.tables.get

bigquery.tables.getData

bigquery.tables.getIamPolicy

bigquery.tables.list

bigquery.tables.replicateData

dataplex.datascans.get

dataplex.datascans.getData

dataplex.datascans.getIamPolicy

dataplex.datascans.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.filteredDataViewer)

Access to view filtered table data defined by a row access policy. bigquery.filteredDataViewer is a system-managed role. Grant the role by using row-level access policies. Don't apply the role directly to a resource through Identity and Access Management (IAM).

bigquery.rowAccessPolicies.getFilteredData

(roles/bigquery.jobUser)

Provides permissions to run jobs, including queries, within the project.

This role can only be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.config.get

bigquery.jobs.create

dataform.locations.*

  • dataform.locations.get
  • dataform.locations.list

dataform.repositories.create

dataform.repositories.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.metadataViewer)

When granted on a table or view, this role provides permissions to:

  • Read metadata from the table or view.

This role cannot be granted to individual models.

When granted on a dataset, this role provides permissions to:

  • List tables and views in the dataset.
  • Read metadata from the dataset's tables and views.

When applied at the project or organization level, this role provides permissions to:

  • List all datasets and read metadata for all datasets in the project.
  • List all tables and views and read metadata for all tables and views in the project.

Additional roles are necessary to allow the running of jobs.

Lowest-level resources where you can grant this role:

  • Dataset
  • These resources within a dataset:
    • Table
    • View
    • Routine

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.datasets.get

bigquery.datasets.getIamPolicy

bigquery.models.getMetadata

bigquery.models.list

bigquery.routines.get

bigquery.routines.list

bigquery.tables.get

bigquery.tables.getIamPolicy

bigquery.tables.list

dataplex.projects.search

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.objectRefAdmin)

Administer ObjectRef resources that includes read and write permissions

Lowest-level resources where you can grant this role:

  • Connection

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.objectRefs.*

  • bigquery.objectRefs.read
  • bigquery.objectRefs.write

(roles/bigquery.objectRefReader)

Role for reading referenced objects via ObjectRefs in BigQuery

Lowest-level resources where you can grant this role:

  • Connection

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.objectRefs.read

(roles/bigquery.readSessionUser)

Provides the ability to create and use read sessions.

This role can only be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.readsessions.*

  • bigquery.readsessions.create
  • bigquery.readsessions.getData
  • bigquery.readsessions.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.resourceAdmin)

Administers BigQuery workloads, including slot assignments, commitments, and reservations.

This role can only be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.bireservations.*

  • bigquery.bireservations.get
  • bigquery.bireservations.update

bigquery.capacityCommitments.*

  • bigquery.capacityCommitments.create
  • bigquery.capacityCommitments.delete
  • bigquery.capacityCommitments.get
  • bigquery.capacityCommitments.list
  • bigquery.capacityCommitments.update

bigquery.jobs.get

bigquery.jobs.list

bigquery.jobs.listAll

bigquery.jobs.listExecutionMetadata

bigquery.reservationAssignments.*

  • bigquery.reservationAssignments.create
  • bigquery.reservationAssignments.delete
  • bigquery.reservationAssignments.list
  • bigquery.reservationAssignments.search

bigquery.reservations.*

  • bigquery.reservations.create
  • bigquery.reservations.delete
  • bigquery.reservations.get
  • bigquery.reservations.list
  • bigquery.reservations.listFailoverDatasets
  • bigquery.reservations.update
  • bigquery.reservations.use

recommender.bigqueryCapacityCommitmentsInsights.*

  • recommender.bigqueryCapacityCommitmentsInsights.get
  • recommender.bigqueryCapacityCommitmentsInsights.list
  • recommender.bigqueryCapacityCommitmentsInsights.update

recommender.bigqueryCapacityCommitmentsRecommendations.*

  • recommender.bigqueryCapacityCommitmentsRecommendations.get
  • recommender.bigqueryCapacityCommitmentsRecommendations.list
  • recommender.bigqueryCapacityCommitmentsRecommendations.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.resourceEditor)

Manages BigQuery workloads, but is unable to create or modify slot commitments.

This role can only be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.bireservations.get

bigquery.capacityCommitments.get

bigquery.capacityCommitments.list

bigquery.jobs.get

bigquery.jobs.list

bigquery.jobs.listAll

bigquery.jobs.listExecutionMetadata

bigquery.reservationAssignments.*

  • bigquery.reservationAssignments.create
  • bigquery.reservationAssignments.delete
  • bigquery.reservationAssignments.list
  • bigquery.reservationAssignments.search

bigquery.reservations.*

  • bigquery.reservations.create
  • bigquery.reservations.delete
  • bigquery.reservations.get
  • bigquery.reservations.list
  • bigquery.reservations.listFailoverDatasets
  • bigquery.reservations.update
  • bigquery.reservations.use

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.resourceViewer)

Can view BigQuery workloads, but cannot create or modify slot reservations or commitments.

This role can only be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.bireservations.get

bigquery.capacityCommitments.get

bigquery.capacityCommitments.list

bigquery.jobs.get

bigquery.jobs.list

bigquery.jobs.listAll

bigquery.jobs.listExecutionMetadata

bigquery.reservationAssignments.list

bigquery.reservationAssignments.search

bigquery.reservations.get

bigquery.reservations.list

bigquery.reservations.listFailoverDatasets

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.studioAdmin)

Combination role of BigQuery Admin, Dataform Admin, Notebook Runtime Admin and Dataproc Serverless Editor.

Lowest-level resources where you can grant this role:

  • Dataset
  • These resources within a dataset:
    • Table
    • View
    • Routine
  • Connection
  • Saved query
  • Data canvas
  • Data preparation
  • Pipeline
  • Repository

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

aiplatform.notebookRuntimeTemplates.*

  • aiplatform.notebookRuntimeTemplates.apply
  • aiplatform.notebookRuntimeTemplates.create
  • aiplatform.notebookRuntimeTemplates.delete
  • aiplatform.notebookRuntimeTemplates.get
  • aiplatform.notebookRuntimeTemplates.getIamPolicy
  • aiplatform.notebookRuntimeTemplates.list
  • aiplatform.notebookRuntimeTemplates.setIamPolicy
  • aiplatform.notebookRuntimeTemplates.update

aiplatform.notebookRuntimes.*

  • aiplatform.notebookRuntimes.assign
  • aiplatform.notebookRuntimes.delete
  • aiplatform.notebookRuntimes.get
  • aiplatform.notebookRuntimes.list
  • aiplatform.notebookRuntimes.start
  • aiplatform.notebookRuntimes.update
  • aiplatform.notebookRuntimes.upgrade

aiplatform.operations.list

bigquery.bireservations.*

  • bigquery.bireservations.get
  • bigquery.bireservations.update

bigquery.capacityCommitments.*

  • bigquery.capacityCommitments.create
  • bigquery.capacityCommitments.delete
  • bigquery.capacityCommitments.get
  • bigquery.capacityCommitments.list
  • bigquery.capacityCommitments.update

bigquery.config.*

  • bigquery.config.get
  • bigquery.config.update

bigquery.connections.*

  • bigquery.connections.create
  • bigquery.connections.delegate
  • bigquery.connections.delete
  • bigquery.connections.get
  • bigquery.connections.getIamPolicy
  • bigquery.connections.list
  • bigquery.connections.setIamPolicy
  • bigquery.connections.update
  • bigquery.connections.updateTag
  • bigquery.connections.use

bigquery.dataPolicies.create

bigquery.dataPolicies.delete

bigquery.dataPolicies.get

bigquery.dataPolicies.getIamPolicy

bigquery.dataPolicies.list

bigquery.dataPolicies.setIamPolicy

bigquery.dataPolicies.update

bigquery.datasets.*

  • bigquery.datasets.create
  • bigquery.datasets.createTagBinding
  • bigquery.datasets.delete
  • bigquery.datasets.deleteTagBinding
  • bigquery.datasets.get
  • bigquery.datasets.getIamPolicy
  • bigquery.datasets.link
  • bigquery.datasets.listEffectiveTags
  • bigquery.datasets.listSharedDatasetUsage
  • bigquery.datasets.listTagBindings
  • bigquery.datasets.setIamPolicy
  • bigquery.datasets.update
  • bigquery.datasets.updateTag

bigquery.jobs.*

  • bigquery.jobs.create
  • bigquery.jobs.delete
  • bigquery.jobs.get
  • bigquery.jobs.list
  • bigquery.jobs.listAll
  • bigquery.jobs.listExecutionMetadata
  • bigquery.jobs.update

bigquery.models.*

  • bigquery.models.create
  • bigquery.models.delete
  • bigquery.models.export
  • bigquery.models.getData
  • bigquery.models.getMetadata
  • bigquery.models.list
  • bigquery.models.updateData
  • bigquery.models.updateMetadata
  • bigquery.models.updateTag

bigquery.objectRefs.*

  • bigquery.objectRefs.read
  • bigquery.objectRefs.write

bigquery.readsessions.*

  • bigquery.readsessions.create
  • bigquery.readsessions.getData
  • bigquery.readsessions.update

bigquery.reservationAssignments.*

  • bigquery.reservationAssignments.create
  • bigquery.reservationAssignments.delete
  • bigquery.reservationAssignments.list
  • bigquery.reservationAssignments.search

bigquery.reservations.*

  • bigquery.reservations.create
  • bigquery.reservations.delete
  • bigquery.reservations.get
  • bigquery.reservations.list
  • bigquery.reservations.listFailoverDatasets
  • bigquery.reservations.update
  • bigquery.reservations.use

bigquery.routines.*

  • bigquery.routines.create
  • bigquery.routines.delete
  • bigquery.routines.get
  • bigquery.routines.list
  • bigquery.routines.update
  • bigquery.routines.updateTag

bigquery.rowAccessPolicies.create

bigquery.rowAccessPolicies.delete

bigquery.rowAccessPolicies.get

bigquery.rowAccessPolicies.getIamPolicy

bigquery.rowAccessPolicies.list

bigquery.rowAccessPolicies.overrideTimeTravelRestrictions

bigquery.rowAccessPolicies.setIamPolicy

bigquery.rowAccessPolicies.update

bigquery.savedqueries.*

  • bigquery.savedqueries.create
  • bigquery.savedqueries.delete
  • bigquery.savedqueries.get
  • bigquery.savedqueries.list
  • bigquery.savedqueries.update

bigquery.tables.*

  • bigquery.tables.create
  • bigquery.tables.createIndex
  • bigquery.tables.createSnapshot
  • bigquery.tables.createTagBinding
  • bigquery.tables.delete
  • bigquery.tables.deleteIndex
  • bigquery.tables.deleteSnapshot
  • bigquery.tables.deleteTagBinding
  • bigquery.tables.export
  • bigquery.tables.get
  • bigquery.tables.getData
  • bigquery.tables.getIamPolicy
  • bigquery.tables.list
  • bigquery.tables.listEffectiveTags
  • bigquery.tables.listTagBindings
  • bigquery.tables.replicateData
  • bigquery.tables.restoreSnapshot
  • bigquery.tables.setCategory
  • bigquery.tables.setColumnDataPolicy
  • bigquery.tables.setIamPolicy
  • bigquery.tables.update
  • bigquery.tables.updateData
  • bigquery.tables.updateIndex
  • bigquery.tables.updateTag

bigquery.transfers.*

  • bigquery.transfers.get
  • bigquery.transfers.update

bigquerymigration.translation.translate

cloudaicompanion.codeToolsSettings.*

  • cloudaicompanion.codeToolsSettings.create
  • cloudaicompanion.codeToolsSettings.delete
  • cloudaicompanion.codeToolsSettings.get
  • cloudaicompanion.codeToolsSettings.list
  • cloudaicompanion.codeToolsSettings.update

cloudaicompanion.companions.*

  • cloudaicompanion.companions.generateChat
  • cloudaicompanion.companions.generateCode

cloudaicompanion.dataSharingWithGoogleSettings.*

  • cloudaicompanion.dataSharingWithGoogleSettings.create
  • cloudaicompanion.dataSharingWithGoogleSettings.delete
  • cloudaicompanion.dataSharingWithGoogleSettings.get
  • cloudaicompanion.dataSharingWithGoogleSettings.list
  • cloudaicompanion.dataSharingWithGoogleSettings.update

cloudaicompanion.entitlements.get

cloudaicompanion.geminiGcpEnablementSettings.*

  • cloudaicompanion.geminiGcpEnablementSettings.create
  • cloudaicompanion.geminiGcpEnablementSettings.delete
  • cloudaicompanion.geminiGcpEnablementSettings.get
  • cloudaicompanion.geminiGcpEnablementSettings.list
  • cloudaicompanion.geminiGcpEnablementSettings.update

cloudaicompanion.instances.*

  • cloudaicompanion.instances.completeCode
  • cloudaicompanion.instances.completeTask
  • cloudaicompanion.instances.exportMetrics
  • cloudaicompanion.instances.generateCode
  • cloudaicompanion.instances.generateText
  • cloudaicompanion.instances.queryEffectiveSetting
  • cloudaicompanion.instances.queryEffectiveSettingBindings

cloudaicompanion.licenses.selfAssign

cloudaicompanion.loggingSettings.*

  • cloudaicompanion.loggingSettings.create
  • cloudaicompanion.loggingSettings.delete
  • cloudaicompanion.loggingSettings.get
  • cloudaicompanion.loggingSettings.list
  • cloudaicompanion.loggingSettings.update

cloudaicompanion.operations.get

cloudaicompanion.releaseChannelSettings.*

  • cloudaicompanion.releaseChannelSettings.create
  • cloudaicompanion.releaseChannelSettings.delete
  • cloudaicompanion.releaseChannelSettings.get
  • cloudaicompanion.releaseChannelSettings.list
  • cloudaicompanion.releaseChannelSettings.update

cloudaicompanion.settingBindings.*

  • cloudaicompanion.settingBindings.codeToolsSettingsCreate
  • cloudaicompanion.settingBindings.codeToolsSettingsDelete
  • cloudaicompanion.settingBindings.codeToolsSettingsGet
  • cloudaicompanion.settingBindings.codeToolsSettingsList
  • cloudaicompanion.settingBindings.codeToolsSettingsUpdate
  • cloudaicompanion.settingBindings.codeToolsSettingsUse
  • cloudaicompanion.settingBindings.dataSharingWithGoogleSettingsCreate
  • cloudaicompanion.settingBindings.dataSharingWithGoogleSettingsDelete
  • cloudaicompanion.settingBindings.dataSharingWithGoogleSettingsGet
  • cloudaicompanion.settingBindings.dataSharingWithGoogleSettingsList
  • cloudaicompanion.settingBindings.dataSharingWithGoogleSettingsUpdate
  • cloudaicompanion.settingBindings.dataSharingWithGoogleSettingsUse
  • cloudaicompanion.settingBindings.geminiGcpEnablementSettingsCreate
  • cloudaicompanion.settingBindings.geminiGcpEnablementSettingsDelete
  • cloudaicompanion.settingBindings.geminiGcpEnablementSettingsGet
  • cloudaicompanion.settingBindings.geminiGcpEnablementSettingsList
  • cloudaicompanion.settingBindings.geminiGcpEnablementSettingsUpdate
  • cloudaicompanion.settingBindings.geminiGcpEnablementSettingsUse
  • cloudaicompanion.settingBindings.loggingSettingsCreate
  • cloudaicompanion.settingBindings.loggingSettingsDelete
  • cloudaicompanion.settingBindings.loggingSettingsGet
  • cloudaicompanion.settingBindings.loggingSettingsList
  • cloudaicompanion.settingBindings.loggingSettingsUpdate
  • cloudaicompanion.settingBindings.loggingSettingsUse
  • cloudaicompanion.settingBindings.releaseChannelSettingsCreate
  • cloudaicompanion.settingBindings.releaseChannelSettingsDelete
  • cloudaicompanion.settingBindings.releaseChannelSettingsGet
  • cloudaicompanion.settingBindings.releaseChannelSettingsList
  • cloudaicompanion.settingBindings.releaseChannelSettingsUpdate
  • cloudaicompanion.settingBindings.releaseChannelSettingsUse

cloudaicompanion.topics.create

cloudkms.keyHandles.*

  • cloudkms.keyHandles.create
  • cloudkms.keyHandles.get
  • cloudkms.keyHandles.list

cloudkms.operations.get

cloudkms.projects.showEffectiveAutokeyConfig

compute.projects.get

compute.regions.*

  • compute.regions.get
  • compute.regions.list

compute.reservations.get

compute.reservations.list

compute.zones.*

  • compute.zones.get
  • compute.zones.list

dataform.*

  • dataform.commentThreads.create
  • dataform.commentThreads.delete
  • dataform.commentThreads.get
  • dataform.commentThreads.list
  • dataform.commentThreads.update
  • dataform.comments.create
  • dataform.comments.delete
  • dataform.comments.get
  • dataform.comments.list
  • dataform.comments.update
  • dataform.compilationResults.create
  • dataform.compilationResults.get
  • dataform.compilationResults.list
  • dataform.compilationResults.query
  • dataform.config.get
  • dataform.config.update
  • dataform.locations.get
  • dataform.locations.list
  • dataform.releaseConfigs.create
  • dataform.releaseConfigs.delete
  • dataform.releaseConfigs.get
  • dataform.releaseConfigs.list
  • dataform.releaseConfigs.update
  • dataform.repositories.commit
  • dataform.repositories.computeAccessTokenStatus
  • dataform.repositories.create
  • dataform.repositories.delete
  • dataform.repositories.fetchHistory
  • dataform.repositories.fetchRemoteBranches
  • dataform.repositories.get
  • dataform.repositories.getIamPolicy
  • dataform.repositories.list
  • dataform.repositories.queryDirectoryContents
  • dataform.repositories.readFile
  • dataform.repositories.setIamPolicy
  • dataform.repositories.update
  • dataform.workflowConfigs.create
  • dataform.workflowConfigs.delete
  • dataform.workflowConfigs.get
  • dataform.workflowConfigs.list
  • dataform.workflowConfigs.update
  • dataform.workflowInvocations.cancel
  • dataform.workflowInvocations.create
  • dataform.workflowInvocations.delete
  • dataform.workflowInvocations.get
  • dataform.workflowInvocations.list
  • dataform.workflowInvocations.query
  • dataform.workspaces.commit
  • dataform.workspaces.create
  • dataform.workspaces.delete
  • dataform.workspaces.fetchFileDiff
  • dataform.workspaces.fetchFileGitStatuses
  • dataform.workspaces.fetchGitAheadBehind
  • dataform.workspaces.get
  • dataform.workspaces.getIamPolicy
  • dataform.workspaces.installNpmPackages
  • dataform.workspaces.list
  • dataform.workspaces.makeDirectory
  • dataform.workspaces.moveDirectory
  • dataform.workspaces.moveFile
  • dataform.workspaces.pull
  • dataform.workspaces.push
  • dataform.workspaces.queryDirectoryContents
  • dataform.workspaces.readFile
  • dataform.workspaces.removeDirectory
  • dataform.workspaces.removeFile
  • dataform.workspaces.reset
  • dataform.workspaces.searchFiles
  • dataform.workspaces.setIamPolicy
  • dataform.workspaces.writeFile

dataplex.datascans.*

  • dataplex.datascans.create
  • dataplex.datascans.delete
  • dataplex.datascans.get
  • dataplex.datascans.getData
  • dataplex.datascans.getIamPolicy
  • dataplex.datascans.list
  • dataplex.datascans.run
  • dataplex.datascans.setIamPolicy
  • dataplex.datascans.update

dataplex.operations.get

dataplex.operations.list

dataplex.projects.search

dataproc.batches.*

  • dataproc.batches.analyze
  • dataproc.batches.cancel
  • dataproc.batches.create
  • dataproc.batches.delete
  • dataproc.batches.get
  • dataproc.batches.list
  • dataproc.batches.sparkApplicationRead
  • dataproc.batches.sparkApplicationWrite

dataproc.operations.cancel

dataproc.operations.delete

dataproc.operations.get

dataproc.operations.list

dataproc.sessionTemplates.*

  • dataproc.sessionTemplates.create
  • dataproc.sessionTemplates.delete
  • dataproc.sessionTemplates.get
  • dataproc.sessionTemplates.list
  • dataproc.sessionTemplates.update

dataproc.sessions.*

  • dataproc.sessions.create
  • dataproc.sessions.delete
  • dataproc.sessions.get
  • dataproc.sessions.list
  • dataproc.sessions.sparkApplicationRead
  • dataproc.sessions.sparkApplicationWrite
  • dataproc.sessions.terminate

dataprocrm.nodePools.*

  • dataprocrm.nodePools.create
  • dataprocrm.nodePools.delete
  • dataprocrm.nodePools.deleteNodes
  • dataprocrm.nodePools.get
  • dataprocrm.nodePools.list
  • dataprocrm.nodePools.resize

dataprocrm.nodes.get

dataprocrm.nodes.heartbeat

dataprocrm.nodes.list

dataprocrm.nodes.update

dataprocrm.operations.get

dataprocrm.operations.list

dataprocrm.workloads.*

  • dataprocrm.workloads.cancel
  • dataprocrm.workloads.create
  • dataprocrm.workloads.delete
  • dataprocrm.workloads.get
  • dataprocrm.workloads.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.studioUser)

Combination role of BigQuery Job User, BigQuery Read Session User, Dataform Code Creator, Notebook Runtime User and Dataproc Serverless Editor.

Lowest-level resources where you can grant this role:

  • Saved query
  • Data canvas
  • Data preparation
  • Pipeline
  • Repository

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

aiplatform.notebookRuntimeTemplates.apply

aiplatform.notebookRuntimeTemplates.get

aiplatform.notebookRuntimeTemplates.getIamPolicy

aiplatform.notebookRuntimeTemplates.list

aiplatform.notebookRuntimes.assign

aiplatform.notebookRuntimes.get

aiplatform.notebookRuntimes.list

aiplatform.operations.list

bigquery.config.get

bigquery.jobs.create

bigquery.readsessions.*

  • bigquery.readsessions.create
  • bigquery.readsessions.getData
  • bigquery.readsessions.update

cloudaicompanion.companions.*

  • cloudaicompanion.companions.generateChat
  • cloudaicompanion.companions.generateCode

cloudaicompanion.entitlements.get

cloudaicompanion.instances.*

  • cloudaicompanion.instances.completeCode
  • cloudaicompanion.instances.completeTask
  • cloudaicompanion.instances.exportMetrics
  • cloudaicompanion.instances.generateCode
  • cloudaicompanion.instances.generateText
  • cloudaicompanion.instances.queryEffectiveSetting
  • cloudaicompanion.instances.queryEffectiveSettingBindings

cloudaicompanion.licenses.selfAssign

cloudaicompanion.operations.get

cloudaicompanion.topics.create

compute.projects.get

compute.regions.*

  • compute.regions.get
  • compute.regions.list

compute.zones.*

  • compute.zones.get
  • compute.zones.list

dataform.commentThreads.get

dataform.commentThreads.list

dataform.comments.get

dataform.comments.list

dataform.locations.*

  • dataform.locations.get
  • dataform.locations.list

dataform.repositories.create

dataform.repositories.list

dataplex.projects.search

dataproc.batches.*

  • dataproc.batches.analyze
  • dataproc.batches.cancel
  • dataproc.batches.create
  • dataproc.batches.delete
  • dataproc.batches.get
  • dataproc.batches.list
  • dataproc.batches.sparkApplicationRead
  • dataproc.batches.sparkApplicationWrite

dataproc.operations.cancel

dataproc.operations.delete

dataproc.operations.get

dataproc.operations.list

dataproc.sessionTemplates.*

  • dataproc.sessionTemplates.create
  • dataproc.sessionTemplates.delete
  • dataproc.sessionTemplates.get
  • dataproc.sessionTemplates.list
  • dataproc.sessionTemplates.update

dataproc.sessions.*

  • dataproc.sessions.create
  • dataproc.sessions.delete
  • dataproc.sessions.get
  • dataproc.sessions.list
  • dataproc.sessions.sparkApplicationRead
  • dataproc.sessions.sparkApplicationWrite
  • dataproc.sessions.terminate

dataprocrm.nodePools.*

  • dataprocrm.nodePools.create
  • dataprocrm.nodePools.delete
  • dataprocrm.nodePools.deleteNodes
  • dataprocrm.nodePools.get
  • dataprocrm.nodePools.list
  • dataprocrm.nodePools.resize

dataprocrm.nodes.get

dataprocrm.nodes.heartbeat

dataprocrm.nodes.list

dataprocrm.nodes.update

dataprocrm.operations.get

dataprocrm.operations.list

dataprocrm.workloads.*

  • dataprocrm.workloads.cancel
  • dataprocrm.workloads.create
  • dataprocrm.workloads.delete
  • dataprocrm.workloads.get
  • dataprocrm.workloads.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/bigquery.user)

When granted on a dataset, this role provides the ability to read the dataset's metadata and list tables in the dataset.

When granted on a project, this role also provides the ability to run jobs, including queries, within the project. A principal with this role can enumerate their own jobs, cancel their own jobs, and enumerate datasets within a project. Additionally, allows the creation of new datasets within the project; the creator is granted the BigQuery Data Owner role (roles/bigquery.dataOwner) on these new datasets.

Lowest-level resources where you can grant this role:

  • Dataset
  • These resources within a dataset:
    • Routine

This role can also be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.bireservations.get

bigquery.capacityCommitments.get

bigquery.capacityCommitments.list

bigquery.config.get

bigquery.datasets.create

bigquery.datasets.get

bigquery.datasets.getIamPolicy

bigquery.jobs.create

bigquery.jobs.list

bigquery.models.list

bigquery.readsessions.*

  • bigquery.readsessions.create
  • bigquery.readsessions.getData
  • bigquery.readsessions.update

bigquery.reservationAssignments.list

bigquery.reservationAssignments.search

bigquery.reservations.get

bigquery.reservations.list

bigquery.reservations.listFailoverDatasets

bigquery.reservations.use

bigquery.routines.list

bigquery.savedqueries.get

bigquery.savedqueries.list

bigquery.tables.list

bigquery.transfers.get

bigquerymigration.translation.translate

cloudkms.keyHandles.*

  • cloudkms.keyHandles.create
  • cloudkms.keyHandles.get
  • cloudkms.keyHandles.list

cloudkms.operations.get

cloudkms.projects.showEffectiveAutokeyConfig

dataform.locations.*

  • dataform.locations.get
  • dataform.locations.list

dataform.repositories.create

dataform.repositories.list

dataplex.projects.search

resourcemanager.projects.get

resourcemanager.projects.list

BigQuery Connection API-Rollen

In dieser Tabelle sind die IAM-Rollen und -Berechtigungen für die BigQuery Connection API aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Role Permissions

(roles/bigqueryconnection.serviceAgent)

Gives BigQuery Connection Service access to Cloud SQL instances in user projects.

cloudsql.instances.connect

cloudsql.instances.get

logging.logEntries.create

logging.logEntries.route

monitoring.metricDescriptors.create

monitoring.metricDescriptors.get

monitoring.metricDescriptors.list

monitoring.monitoredResourceDescriptors.*

  • monitoring.monitoredResourceDescriptors.get
  • monitoring.monitoredResourceDescriptors.list

monitoring.timeSeries.create

Rollen für BigQuery-Continuous-Query

In dieser Tabelle sind die IAM-Rollen und -Berechtigungen für BigQuery-kontinuierliche Abfragen aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Role Permissions

(roles/bigquerycontinuousquery.serviceAgent)

Gives BigQuery Continuous Query access to the service accounts in the user project.

iam.serviceAccounts.getAccessToken

Rollen für die BigQuery-Datenrichtlinie

In dieser Tabelle sind die IAM-Rollen und -Berechtigungen für die BigQuery-Datenrichtlinie aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Role Permissions

(roles/bigquerydatapolicy.admin)

Role for managing Data Policies in BigQuery

This role can only be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.dataPolicies.create

bigquery.dataPolicies.delete

bigquery.dataPolicies.get

bigquery.dataPolicies.getIamPolicy

bigquery.dataPolicies.list

bigquery.dataPolicies.setIamPolicy

bigquery.dataPolicies.update

(roles/bigquerydatapolicy.maskedReader)

Masked read access to sub-resources tagged by the policy tag associated with a data policy, for example, BigQuery columns

This role can only be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.dataPolicies.maskedGet

(roles/bigquerydatapolicy.rawDataReader)

Raw read access to sub-resources associated with a data policy, for example, BigQuery columns

This role can only be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.dataPolicies.getRawData

(roles/bigquerydatapolicy.viewer)

Role for viewing Data Policies in BigQuery

This role can only be granted on Resource Manager resources (projects, folders, and organizations).

bigquery.dataPolicies.get

bigquery.dataPolicies.list

Rollen für BigQuery Data Transfer Service

In dieser Tabelle sind die IAM-Rollen und -Berechtigungen für BigQuery Data Transfer Service aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Role Permissions

(roles/bigquerydatatransfer.serviceAgent)

Gives BigQuery Data Transfer Service access to start BigQuery jobs in consumer project.

bigquery.config.get

bigquery.jobs.create

compute.networkAttachments.get

compute.networkAttachments.update

compute.regionOperations.get

compute.subnetworks.use

dataform.locations.*

  • dataform.locations.get
  • dataform.locations.list

dataform.repositories.create

dataform.repositories.list

iam.serviceAccounts.getAccessToken

logging.logEntries.create

logging.logEntries.route

resourcemanager.projects.get

resourcemanager.projects.list

serviceusage.services.use

In dieser Tabelle sind die IAM-Rollen und -Berechtigungen für BigQuery Engine for Apache Flink aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Role Permissions

(roles/managedflink.admin)

Full access to Managed Flink resources.

managedflink.*

  • managedflink.deployments.create
  • managedflink.deployments.delete
  • managedflink.deployments.get
  • managedflink.deployments.list
  • managedflink.deployments.update
  • managedflink.jobs.create
  • managedflink.jobs.delete
  • managedflink.jobs.get
  • managedflink.jobs.list
  • managedflink.jobs.update
  • managedflink.locations.get
  • managedflink.locations.list
  • managedflink.operations.cancel
  • managedflink.operations.delete
  • managedflink.operations.get
  • managedflink.operations.list
  • managedflink.sessions.create
  • managedflink.sessions.delete
  • managedflink.sessions.get
  • managedflink.sessions.list
  • managedflink.sessions.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/managedflink.developer)

Full access to Managed Flink Jobs and Sessions and read access to Deployments.

managedflink.deployments.get

managedflink.deployments.list

managedflink.jobs.*

  • managedflink.jobs.create
  • managedflink.jobs.delete
  • managedflink.jobs.get
  • managedflink.jobs.list
  • managedflink.jobs.update

managedflink.locations.*

  • managedflink.locations.get
  • managedflink.locations.list

managedflink.operations.get

managedflink.operations.list

managedflink.sessions.*

  • managedflink.sessions.create
  • managedflink.sessions.delete
  • managedflink.sessions.get
  • managedflink.sessions.list
  • managedflink.sessions.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/managedflink.serviceAgent)

Gives Managed Flink Service Agent access to Cloud Platform resources.

compute.networkAttachments.create

compute.networkAttachments.delete

compute.networkAttachments.get

compute.networkAttachments.list

compute.networkAttachments.update

compute.networks.get

compute.networks.list

compute.regionOperations.get

compute.subnetworks.get

compute.subnetworks.list

compute.subnetworks.use

dns.networks.targetWithPeeringZone

managedkafka.clusters.get

managedkafka.clusters.list

managedkafka.clusters.update

monitoring.metricDescriptors.create

monitoring.metricDescriptors.get

monitoring.metricDescriptors.list

monitoring.monitoredResourceDescriptors.*

  • monitoring.monitoredResourceDescriptors.get
  • monitoring.monitoredResourceDescriptors.list

monitoring.timeSeries.create

serviceusage.services.use

storage.objects.get

(roles/managedflink.viewer)

Readonly access to Managed Flink resources.

managedflink.deployments.get

managedflink.deployments.list

managedflink.jobs.get

managedflink.jobs.list

managedflink.locations.*

  • managedflink.locations.get
  • managedflink.locations.list

managedflink.operations.get

managedflink.operations.list

managedflink.sessions.get

managedflink.sessions.list

resourcemanager.projects.get

resourcemanager.projects.list

Rollen für den BigQuery-Migrationsdienst

In dieser Tabelle sind die IAM-Rollen und -Berechtigungen für den BigQuery Migration Service aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Role Permissions

(roles/bigquerymigration.editor)

Editor of EDW migration workflows.

bigquerymigration.subtasks.*

  • bigquerymigration.subtasks.get
  • bigquerymigration.subtasks.list

bigquerymigration.workflows.create

bigquerymigration.workflows.delete

bigquerymigration.workflows.enableAiOutputTypes

bigquerymigration.workflows.enableLineageOutputTypes

bigquerymigration.workflows.enableOutputTypePermissions

bigquerymigration.workflows.get

bigquerymigration.workflows.list

bigquerymigration.workflows.update

(roles/bigquerymigration.orchestrator)

Orchestrator of EDW migration tasks.

bigquerymigration.workflows.orchestrateTask

storage.objects.list

(roles/bigquerymigration.translationUser)

User of EDW migration interactive SQL translation service.

bigquerymigration.translation.translate

(roles/bigquerymigration.viewer)

Viewer of EDW migration MigrationWorkflow.

bigquerymigration.subtasks.*

  • bigquerymigration.subtasks.get
  • bigquerymigration.subtasks.list

bigquerymigration.workflows.get

bigquerymigration.workflows.list

(roles/bigquerymigration.worker)

Worker that executes EDW migration subtasks.

storage.objects.create

storage.objects.get

storage.objects.list

BigQuery Omni-Rollen

In dieser Tabelle sind die IAM-Rollen und -Berechtigungen für BigQuery Omni aufgeführt. Eine Übersicht über alle Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Role Permissions

(roles/bigqueryomni.serviceAgent)

Gives BigQuery Omni access to tables in user projects.

bigquery.jobs.create

bigquery.tables.updateData

BigQuery-Freigaberollen

In dieser Tabelle sind die IAM-Rollen und -Berechtigungen für die Freigabe in BigQuery aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Role Permissions

(roles/analyticshub.admin)

Administer Data Exchanges and Listings

analyticshub.dataExchanges.create

analyticshub.dataExchanges.delete

analyticshub.dataExchanges.get

analyticshub.dataExchanges.getIamPolicy

analyticshub.dataExchanges.list

analyticshub.dataExchanges.setIamPolicy

analyticshub.dataExchanges.update

analyticshub.dataExchanges.viewSubscriptions

analyticshub.listings.create

analyticshub.listings.delete

analyticshub.listings.get

analyticshub.listings.getIamPolicy

analyticshub.listings.list

analyticshub.listings.setIamPolicy

analyticshub.listings.update

analyticshub.listings.viewSubscriptions

analyticshub.subscriptions.*

  • analyticshub.subscriptions.create
  • analyticshub.subscriptions.delete
  • analyticshub.subscriptions.get
  • analyticshub.subscriptions.list
  • analyticshub.subscriptions.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/analyticshub.listingAdmin)

Grants full control over the Listing, including updating, deleting and setting ACLs

analyticshub.dataExchanges.get

analyticshub.dataExchanges.getIamPolicy

analyticshub.dataExchanges.list

analyticshub.listings.delete

analyticshub.listings.get

analyticshub.listings.getIamPolicy

analyticshub.listings.list

analyticshub.listings.setIamPolicy

analyticshub.listings.update

analyticshub.listings.viewSubscriptions

resourcemanager.projects.get

resourcemanager.projects.list

(roles/analyticshub.publisher)

Can publish to Data Exchanges thus creating Listings

analyticshub.dataExchanges.get

analyticshub.dataExchanges.getIamPolicy

analyticshub.dataExchanges.list

analyticshub.listings.create

analyticshub.listings.get

analyticshub.listings.getIamPolicy

analyticshub.listings.list

resourcemanager.projects.get

resourcemanager.projects.list

(roles/analyticshub.subscriber)

Can browse Data Exchanges and subscribe to Listings

analyticshub.dataExchanges.get

analyticshub.dataExchanges.getIamPolicy

analyticshub.dataExchanges.list

analyticshub.dataExchanges.subscribe

analyticshub.listings.get

analyticshub.listings.getIamPolicy

analyticshub.listings.list

analyticshub.listings.subscribe

resourcemanager.projects.get

resourcemanager.projects.list

(roles/analyticshub.subscriptionOwner)

Grants full control over the Subscription, including updating and deleting

analyticshub.dataExchanges.get

analyticshub.dataExchanges.getIamPolicy

analyticshub.dataExchanges.list

analyticshub.listings.get

analyticshub.listings.getIamPolicy

analyticshub.listings.list

analyticshub.subscriptions.*

  • analyticshub.subscriptions.create
  • analyticshub.subscriptions.delete
  • analyticshub.subscriptions.get
  • analyticshub.subscriptions.list
  • analyticshub.subscriptions.update

resourcemanager.projects.get

resourcemanager.projects.list

(roles/analyticshub.viewer)

Can browse Data Exchanges and Listings

analyticshub.dataExchanges.get

analyticshub.dataExchanges.getIamPolicy

analyticshub.dataExchanges.list

analyticshub.listings.get

analyticshub.listings.getIamPolicy

analyticshub.listings.list

resourcemanager.projects.get

resourcemanager.projects.list

BigQuery-Berechtigungen

In den folgenden Tabellen sind die in BigQuery verfügbaren Berechtigungen aufgeführt. Diese sind in vordefinierten Rollen enthalten und können in der Definition benutzerdefinierter Rollen verwendet werden. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

BigQuery-Berechtigungen

In dieser Tabelle sind die IAM-Berechtigungen für BigQuery und die Rollen aufgeführt, die sie enthalten. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Berechtigung In Rollen enthalten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agenten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Jobnutzer (roles/bigquery.jobUser)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery Studio-Nutzer (roles/bigquery.studioUser)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Assured Workloads-Administrator (roles/assuredworkloads.admin)

Assured Workloads-Bearbeiter (roles/assuredworkloads.editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery-Verbindungsnutzer (roles/bigquery.connectionUser)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Betrachter (roles/datacatalog.viewer)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery-Verbindungsnutzer (roles/bigquery.connectionUser)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery-Verbindungsnutzer (roles/bigquery.connectionUser)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Tag-Bearbeiter (roles/datacatalog.tagEditor)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Connection Admin (roles/bigquery.connectionAdmin)

BigQuery-Verbindungsnutzer (roles/bigquery.connectionUser)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Administrator für BigQuery-Datenrichtlinien (roles/bigquerydatapolicy.admin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Administrator für BigQuery-Datenrichtlinien (roles/bigquerydatapolicy.admin)

Rollen von Dienst-Agenten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Administrator für BigQuery-Datenrichtlinien (roles/bigquerydatapolicy.admin)

BigQuery-Datenrichtlinien-Viewer (roles/bigquerydatapolicy.viewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Administrator für BigQuery-Datenrichtlinien (roles/bigquerydatapolicy.admin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Raw Data Reader (roles/bigquerydatapolicy.rawDataReader)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Administrator für BigQuery-Datenrichtlinien (roles/bigquerydatapolicy.admin)

BigQuery-Datenrichtlinien-Viewer (roles/bigquerydatapolicy.viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Maskierter Leser (roles/bigquerydatapolicy.maskedReader)

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Administrator für BigQuery-Datenrichtlinien (roles/bigquerydatapolicy.admin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Administrator für BigQuery-Datenrichtlinien (roles/bigquerydatapolicy.admin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Tag-Nutzer (roles/resourcemanager.tagUser)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Tag-Nutzer (roles/resourcemanager.tagUser)

Rollen von Dienst-Agenten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery-Metadaten-Betrachter (roles/bigquery.metadataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Betrachter (roles/datacatalog.viewer)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Remediator der SLZ-BQDW-Blueprint-Projektebene (roles/securedlandingzone.bqdwProjectRemediator)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery-Metadaten-Betrachter (roles/bigquery.metadataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Remediator der SLZ-BQDW-Blueprint-Projektebene (roles/securedlandingzone.bqdwProjectRemediator)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Tag-Nutzer (roles/resourcemanager.tagUser)

Tag-Betrachter (roles/resourcemanager.tagViewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Tag-Nutzer (roles/resourcemanager.tagUser)

Tag-Betrachter (roles/resourcemanager.tagViewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Remediator der SLZ-BQDW-Blueprint-Projektebene (roles/securedlandingzone.bqdwProjectRemediator)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Remediator der SLZ-BQDW-Blueprint-Projektebene (roles/securedlandingzone.bqdwProjectRemediator)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Tag-Bearbeiter (roles/datacatalog.tagEditor)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Jobnutzer (roles/bigquery.jobUser)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery Studio-Nutzer (roles/bigquery.studioUser)

BigQuery-Nutzer (roles/bigquery.user)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery-Metadaten-Betrachter (roles/bigquery.metadataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Betrachter (roles/datacatalog.viewer)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery-Metadaten-Betrachter (roles/bigquery.metadataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Tag-Bearbeiter (roles/datacatalog.tagEditor)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery ObjectRef Admin (roles/bigquery.objectRefAdmin)

BigQuery ObjectRef Reader (roles/bigquery.objectRefReader)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery ObjectRef Admin (roles/bigquery.objectRefAdmin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Read Session-Nutzer (roles/bigquery.readSessionUser)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery Studio-Nutzer (roles/bigquery.studioUser)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Read Session-Nutzer (roles/bigquery.readSessionUser)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery Studio-Nutzer (roles/bigquery.studioUser)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Read Session-Nutzer (roles/bigquery.readSessionUser)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery Studio-Nutzer (roles/bigquery.studioUser)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Resource Viewer (roles/bigquery.resourceViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Ressourcen-Administrator (roles/bigquery.resourceAdmin)

BigQuery-Ressourcenbearbeiter (roles/bigquery.resourceEditor)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery-Metadaten-Betrachter (roles/bigquery.metadataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Betrachter (roles/datacatalog.viewer)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery-Metadaten-Betrachter (roles/bigquery.metadataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Tag-Bearbeiter (roles/datacatalog.tagEditor)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agenten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agenten

Betrachter von gefilterten BigQuery-Daten (roles/bigquery.filteredDataViewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agenten

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Tag-Nutzer (roles/resourcemanager.tagUser)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Tag-Nutzer (roles/resourcemanager.tagUser)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery-Metadaten-Betrachter (roles/bigquery.metadataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Betrachter (roles/datacatalog.viewer)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agenten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery-Metadaten-Betrachter (roles/bigquery.metadataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery-Metadaten-Betrachter (roles/bigquery.metadataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Leser von Dataplex-Speicherdaten (roles/dataplex.storageDataReader)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Tag-Nutzer (roles/resourcemanager.tagUser)

Tag-Betrachter (roles/resourcemanager.tagViewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Tag-Nutzer (roles/resourcemanager.tagUser)

Tag-Betrachter (roles/resourcemanager.tagViewer)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery-Datenbetrachter (roles/bigquery.dataViewer)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Inhaber (roles/owner)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Rollen von Dienst-Agenten

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Inhaber von Dataplex-Speicherdaten (roles/dataplex.storageDataOwner)

Autor von Dataplex-Speicherdaten (roles/dataplex.storageDataWriter)

Datastream BigQuery Writer (roles/datastream.bigqueryWriter)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agenten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Data Editor (roles/bigquery.dataEditor)

BigQuery-Dateninhaber (roles/bigquery.dataOwner)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Data Catalog-Administrator (roles/datacatalog.admin)

Data Catalog-Tag-Bearbeiter (roles/datacatalog.tagEditor)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

Rollen von Dienst-Agents

Berechtigungen für die BigQuery Connection API

Für diesen Dienst sind keine IAM-Berechtigungen vorhanden.

Berechtigungen für BigQuery-Continuous-Queries

Für diesen Dienst sind keine IAM-Berechtigungen vorhanden.

Berechtigungen für die BigQuery-Datenrichtlinie

Für diesen Dienst sind keine IAM-Berechtigungen vorhanden.

Berechtigungen für BigQuery Data Transfer Service

Für diesen Dienst sind keine IAM-Berechtigungen vorhanden.

In dieser Tabelle sind die IAM-Berechtigungen für BigQuery Engine for Apache Flink und die zugehörigen Rollen aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Berechtigung In Rollen enthalten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Managed Flink Viewer (roles/managedflink.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Verwalteter Flink-Administrator (roles/managedflink.admin)

Managed Flink Developer (roles/managedflink.developer)

Berechtigungen für den BigQuery-Migrationsdienst

In dieser Tabelle sind die IAM-Berechtigungen für den BigQuery Migration Service und die zugehörigen Rollen aufgeführt. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Berechtigung In Rollen enthalten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

MigrationWorkflow-Betrachter (roles/bigquerymigration.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

MigrationWorkflow-Betrachter (roles/bigquerymigration.viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

BigQuery-Administrator (roles/bigquery.admin)

BigQuery Studio Admin (roles/bigquery.studioAdmin)

BigQuery-Nutzer (roles/bigquery.user)

Nutzer von Übersetzungen für Migrationen (roles/bigquerymigration.translationUser)

Treiber von DLP-Organisationsdatenprofilen (roles/dlp.orgdriver)

Treiber von DLP-Projektdatenprofilen (roles/dlp.projectdriver)

Rollen von Dienst-Agents

Inhaber (roles/owner)

Bearbeiter (roles/editor)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

MigrationWorkflow-Betrachter (roles/bigquerymigration.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

MigrationWorkflow-Betrachter (roles/bigquerymigration.viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Inhaber (roles/owner)

Aufgaben-Orchestrator (roles/bigquerymigration.orchestrator)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

MigrationWorkflow-Bearbeiter (roles/bigquerymigration.editor)

BigQuery Omni-Berechtigungen

Für diesen Dienst sind keine IAM-Berechtigungen vorhanden.

BigQuery-Freigabeberechtigungen

In dieser Tabelle sind die IAM-Berechtigungen für die Freigabe von BigQuery-Daten und die Rollen aufgeführt, die diese Berechtigungen umfassen. Eine Liste aller Rollen und Berechtigungen finden Sie im Index für Rollen und Berechtigungen.

Berechtigung In Rollen enthalten

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Analytics Hub-Administrator (roles/analyticshub.admin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Analytics Hub-Administrator (roles/analyticshub.admin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Analytics Hub-Publisher (roles/analyticshub.publisher)

Analytics Hub-Abonnent (roles/analyticshub.subscriber)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Analytics Hub-Betrachter (roles/analyticshub.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Analytics Hub-Publisher (roles/analyticshub.publisher)

Analytics Hub-Abonnent (roles/analyticshub.subscriber)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Analytics Hub-Betrachter (roles/analyticshub.viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Analytics Hub-Publisher (roles/analyticshub.publisher)

Analytics Hub-Abonnent (roles/analyticshub.subscriber)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Analytics Hub-Betrachter (roles/analyticshub.viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Inhaber (roles/owner)

Analytics Hub-Administrator (roles/analyticshub.admin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Inhaber (roles/owner)

Analytics Hub-Abonnent (roles/analyticshub.subscriber)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Analytics Hub-Administrator (roles/analyticshub.admin)

Inhaber (roles/owner)

Analytics Hub-Administrator (roles/analyticshub.admin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Analytics Hub-Administrator (roles/analyticshub.admin)

Analytics Hub-Publisher (roles/analyticshub.publisher)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Analytics Hub-Publisher (roles/analyticshub.publisher)

Analytics Hub-Abonnent (roles/analyticshub.subscriber)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Analytics Hub-Betrachter (roles/analyticshub.viewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Analytics Hub-Publisher (roles/analyticshub.publisher)

Analytics Hub-Abonnent (roles/analyticshub.subscriber)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Analytics Hub-Betrachter (roles/analyticshub.viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Analytics Hub-Publisher (roles/analyticshub.publisher)

Analytics Hub-Abonnent (roles/analyticshub.subscriber)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Analytics Hub-Betrachter (roles/analyticshub.viewer)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Inhaber (roles/owner)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Sicherheitsadministrator (roles/iam.securityAdmin)

Inhaber (roles/owner)

Analytics Hub-Abonnent (roles/analyticshub.subscriber)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Inhaber (roles/owner)

Analytics Hub-Administrator (roles/analyticshub.admin)

Administrator von Analytics Hub-Einträgen (roles/analyticshub.listingAdmin)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Analytics Hub-Administrator (roles/analyticshub.admin)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Analytics Hub-Administrator (roles/analyticshub.admin)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Analytics Hub-Administrator (roles/analyticshub.admin)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Betrachter (roles/viewer)

Analytics Hub-Administrator (roles/analyticshub.admin)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Sicherheitsadministrator (roles/iam.securityAdmin)

Sicherheitsprüfer (roles/iam.securityReviewer)

Inhaber (roles/owner)

Bearbeiter (roles/editor)

Analytics Hub-Administrator (roles/analyticshub.admin)

Analytics Hub Subscription Owner (roles/analyticshub.subscriptionOwner)

Berechtigungen für BigQuery ML-Aufgaben

In der folgenden Tabelle werden die Berechtigungen beschrieben, die für gängige BigQuery ML-Aufgaben erforderlich sind.

Berechtigung Beschreibung
bigquery.jobs.create
bigquery.models.create
bigquery.models.getData
bigquery.models.updateData
Neues Modell mit der Anweisung CREATE MODEL erstellen
bigquery.jobs.create
bigquery.models.create
bigquery.models.getData
bigquery.models.updateData
bigquery.models.updateMetadata
Vorhandenes Modell mit der Anweisung CREATE OR REPLACE MODEL ersetzen
bigquery.models.delete Modell mit der models.delete API löschen
bigquery.jobs.create
bigquery.models.delete
Modell mit der DROP MODEL-Anweisung löschen
bigquery.models.getMetadata Modellmetadaten mit der models.get API abrufen
bigquery.models.list Modelle und Metadaten zu Modellen mithilfe der models.list API auflisten
bigquery.models.updateMetadata Aktualisieren Sie die Modellmetadaten mit der models.delete API. Wenn Sie eine Ablaufzeit ungleich null für das Modell festlegen oder aktualisieren, ist außerdem die Berechtigung bigquery.models.delete erforderlich.
bigquery.jobs.create
bigquery.models.getData
Führen Sie mit Funktionen wie ML.EVALUATE, ML.PREDICT, ML.TRAINING_INFO und ML.WEIGHTS Bewertung, Vorhersage, Modell- und Featureinspektionen durch.
bigquery.jobs.create
bigquery.models.export
Modell exportieren
bigquery.models.updateTag Data Catalog-Tags für ein Modell aktualisieren.

Nächste Schritte