This page lists the IAM roles and permissions for Confidential Computing. To search through all roles and permissions, see the role and permission index.
Confidential Computing roles
| Role | Permissions |
|---|---|
Confidentialcomputing Admin( Admin role for confidentialcomputing |
|
Confidential GKE Workload User( Grants the ability to generate a GKE attestation token and run a workload in a GKE cluster. |
|
Confidentialcomputing Viewer( Viewer role for confidentialcomputing |
|
Confidential Space Workload User( Grants the ability to generate an attestation token and run a workload in a VM. Intended for service accounts that run on Confidential Space VMs. |
|
Confidential Computing permissions
| Permission | Included in roles |
|---|---|
|
Owner (
Editor (
Confidentialcomputing Admin (
Confidential GKE Workload User (
Confidential Space Workload User ( |
|
Owner (
Editor (
Confidentialcomputing Admin (
Confidential Space Workload User ( |
|
Owner (
Editor (
Confidentialcomputing Admin (
Confidential GKE Workload User ( |
|
Owner (
Editor (
Viewer (
Confidentialcomputing Admin (
Confidential GKE Workload User (
Confidentialcomputing Viewer (
Confidential Space Workload User (
Support User ( |
|
Owner (
Editor (
Viewer (
Confidentialcomputing Admin (
Confidential GKE Workload User (
Confidentialcomputing Viewer (
Confidential Space Workload User (
Security Admin (
Security Auditor (
Security Reviewer (
Support User ( |