Roles y permisos de gestión de identidades y accesos de BigQuery
En este documento se proporciona una lista de roles predefinidos y permisos de Gestión de Identidades y Accesos (IAM) para BigQuery. En esta página se incluyen los roles y permisos de los siguientes elementos:
- BigQuery: roles y permisos que se aplican a los recursos de BigQuery, como conjuntos de datos, tablas, vistas y rutinas. Muchos de estos roles y permisos también se pueden conceder a recursos de Resource Manager, como proyectos, carpetas y organizaciones.
- API Connection de BigQuery: rol que concede a un agente de servicio acceso a una conexión de Cloud SQL.
- Consulta continua de BigQuery: rol que concede a una cuenta de servicio acceso a una consulta continua.
- Política de datos de BigQuery: roles y permisos que se aplican a las políticas de datos de BigQuery.
- BigQuery Data Transfer Service: rol que concede a un agente de servicio acceso para crear tareas que transfieran datos.
- BigQuery Engine para Apache Flink: roles y permisos que se aplican a los recursos de BigQuery Engine para Apache Flink.
- API BigQuery Migration Service: roles y permisos que se aplican a los recursos de BigQuery Migration Service.
- BigQuery Omni: rol que concede a un agente de servicio acceso a las tablas.
- Compartir en BigQuery: roles y permisos que se aplican a los recursos compartidos de BigQuery.
Roles predefinidos de gestión de identidades y accesos de BigQuery
En las siguientes tablas se indican los roles de gestión de identidades y accesos (IAM) de BigQuery predefinidos, junto con una lista de todos los permisos que incluye cada rol. Ten en cuenta que cada permiso se aplica a un tipo de recurso concreto.
Roles de BigQuery
En esta tabla se enumeran los roles y permisos de gestión de identidades y accesos predefinidos de BigQuery. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Para obtener información sobre cómo conceder roles predefinidos en recursos de BigQuery, como conjuntos de datos, tablas y rutinas, consulta el artículo sobre cómo controlar el acceso a los recursos con gestión de identidades y accesos.
Role | Permissions |
---|---|
BigQuery Admin( Provides permissions to manage all resources within the project. Can manage all data within the project, and can cancel jobs from other users running within the project. It is possible to grant this role to the following lowest-level resources, but it is not recommended. Other predefined roles grant full permissions over these resources and are less permissive. BigQuery Admin is typically granted at the project level. Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
Connected Sheets Service Agent( Grants Connected Sheets Service Account access to create and manage BigQuery jobs on the customers resources. |
|
BigQuery Connection Admin(
Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Connection User(
Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Data Editor( When granted on a dataset, this role grants these permissions:
When granted on a table or view, this role grants these permissions:
The Data Editor role cannot be granted to individual models. Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Data Owner( When granted on a dataset, this role grants these permissions:
When granted on a table or view, this role grants these permissions:
When granted on a routine, this role grants these permissions:
You shouldn't grant the Data Owner role at the routine level. Data Editor also grants all permissions for the routine and is a less permissive role. This role cannot be granted to individual models. Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Data Viewer( When granted on a dataset, this role grants these permissions:
When granted on a table or view, this role provides these permissions:
When granted on a routine, this role grants these permissions:
This role cannot be granted to individual models. Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Filtered Data Viewer(
Access to view filtered table data defined by a row access policy.
|
|
BigQuery Job User( Provides permissions to run jobs, including queries, within the project. This role can only be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Metadata Viewer( When granted on a dataset, this role grants these permissions:
When granted on a table or view, this role provides these permissions:
When granted on a routine, this role grants these permissions:
This role cannot be granted to individual models. Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery ObjectRef Admin( Administer ObjectRef resources that includes read and write permissions Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery ObjectRef Reader( Role for reading referenced objects via ObjectRefs in BigQuery Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Read Session User( Provides the ability to create and use read sessions. This role can only be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Resource Admin( Administers BigQuery workloads, including slot assignments, commitments, and reservations. This role can only be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Resource Editor( Manages BigQuery workloads, but is unable to create or modify slot commitments. This role can only be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Resource Viewer( Can view BigQuery workloads, but cannot create or modify slot reservations or commitments. This role can only be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Security Admin Beta( Administer all BigQuery security controls |
|
BigQuery Studio Admin( Combination role of BigQuery Admin, Dataform Admin, Notebook Runtime Admin and Dataproc Serverless Editor. It is possible to grant this role to the following lowest-level resources, but it is not recommended. Other predefined roles grant full permissions over these resources and are less permissive. BigQuery Studio Admin is typically granted at the project level. Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Studio User( Combination role of BigQuery Job User, BigQuery Read Session User, Dataform Code Creator, Notebook Runtime User and Dataproc Serverless Editor. Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery User( When granted on a dataset, this role provides the ability to read the dataset's metadata and list tables in the dataset. When granted on a project, this role also provides the ability to run jobs, including queries,
within the project. A principal with this role can enumerate their own jobs, cancel their own jobs, and
enumerate datasets within a project. Additionally, allows the creation of new datasets within the
project; the creator is granted the BigQuery Data Owner role ( Lowest-level resources where you can grant this role:
This role can also be granted on Resource Manager resources (projects, folders, and organizations). |
|
Roles de la API Connection de BigQuery
En esta tabla se indican los roles y permisos de gestión de identidades y accesos predefinidos de la API de conexión de BigQuery. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Role | Permissions |
---|---|
BigQuery Connection Service Agent( Gives BigQuery Connection Service access to Cloud SQL instances in user projects. |
|
Roles de consultas continuas de BigQuery
En esta tabla se enumeran los roles y permisos de gestión de identidades y accesos predefinidos de BigQuery Continuous Query. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Role | Permissions |
---|---|
BigQuery Continuous Query Service Agent( Gives BigQuery Continuous Query access to the service accounts in the user project. |
|
Roles de política de datos de BigQuery
En esta tabla se enumeran los roles y permisos de gestión de identidades y accesos predefinidos de la política de datos de BigQuery. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Role | Permissions |
---|---|
BigQuery Data Policy Admin( Role for managing Data Policies in BigQuery This role can only be granted on Resource Manager resources (projects, folders, and organizations). |
|
Masked Reader( Masked read access to sub-resources tagged by the policy tag associated with a data policy, for example, BigQuery columns This role can only be granted on Resource Manager resources (projects, folders, and organizations). |
|
Raw Data Reader Beta( Raw read access to sub-resources associated with a data policy, for example, BigQuery columns This role can only be granted on Resource Manager resources (projects, folders, and organizations). |
|
BigQuery Data Policy Viewer( Role for viewing Data Policies in BigQuery This role can only be granted on Resource Manager resources (projects, folders, and organizations). |
|
Roles de BigQuery Data Transfer Service
En esta tabla se indican los roles y permisos de gestión de identidades y accesos predefinidos de BigQuery Data Transfer Service. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Role | Permissions |
---|---|
BigQuery Data Transfer Service Agent( Gives BigQuery Data Transfer Service access to start BigQuery jobs in consumer project. |
|
Roles de BigQuery Engine para Apache Flink
En esta tabla se enumeran los roles y permisos de gestión de identidades y accesos predefinidos de BigQuery Engine para Apache Flink. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Role | Permissions |
---|---|
Managed Flink Admin Beta( Full access to Managed Flink resources. |
|
Managed Flink Developer Beta( Full access to Managed Flink Jobs and Sessions and read access to Deployments. |
|
Managed Flink Service Agent( Gives Managed Flink Service Agent access to Cloud Platform resources. |
|
Managed Flink Viewer Beta( Readonly access to Managed Flink resources. |
|
Roles de BigQuery Migration Service
En esta tabla se enumeran los roles y permisos de gestión de identidades y accesos predefinidos de BigQuery Migration Service. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Role | Permissions |
---|---|
MigrationWorkflow Editor( Editor of EDW migration workflows. |
|
Task Orchestrator( Orchestrator of EDW migration tasks. |
|
Migration Translation User( User of EDW migration interactive SQL translation service. |
|
MigrationWorkflow Viewer( Viewer of EDW migration MigrationWorkflow. |
|
Task Worker( Worker that executes EDW migration subtasks. |
|
Roles de BigQuery Omni
En esta tabla se enumeran los roles y permisos de gestión de identidades y accesos predefinidos de BigQuery Omni. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Role | Permissions |
---|---|
BigQuery Omni Service Agent( Gives BigQuery Omni access to tables in user projects. |
|
Roles de uso compartido de BigQuery
En esta tabla se enumeran los roles y permisos de gestión de identidades y accesos predefinidos para compartir datos en BigQuery. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Role | Permissions |
---|---|
Analytics Hub Admin( Administer Data Exchanges and Listings |
|
Analytics Hub Listing Admin( Grants full control over the Listing, including updating, deleting and setting ACLs |
|
Analytics Hub Publisher( Can publish to Data Exchanges thus creating Listings |
|
Analytics Hub Subscriber( Can browse Data Exchanges and subscribe to Listings |
|
Analytics Hub Subscription Owner( Grants full control over the Subscription, including updating and deleting |
|
Analytics Hub Viewer( Can browse Data Exchanges and Listings |
|
Permisos de BigQuery
En las siguientes tablas se indican los permisos disponibles en BigQuery. Se incluyen en roles predefinidos y se pueden usar en definiciones de roles personalizados. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Permisos de BigQuery
En esta tabla se indican los permisos de gestión de identidades y accesos de BigQuery y los roles que los incluyen. Para buscar todos los roles y permisos, consulta el índice de roles y permisos.
Permiso | Incluido en los roles |
---|---|
|
Propietario (
Editor (
Lector (
Administrador de BigQuery (
Administrador de recursos de BigQuery (
Editor de recursos de BigQuery (
Visor de recursos de BigQuery (
Administrador de BigQuery Studio (
Usuario de BigQuery (
Controlador de perfiles de datos de organización de DLP (
Controlador de perfiles de datos de proyectos de DLP (
Administrador de bases de datos (
Usuario de asistencia ( Roles de agente de servicio
|
|
Propietario (
Editor (
Administrador de BigQuery (
Administrador de recursos de BigQuery (
Administrador de BigQuery Studio (
Administrador de bases de datos ( Roles de agente de servicio
|
|
Propietario (
Administrador de BigQuery (
Administrador de recursos de BigQuery (
Administrador de BigQuery Studio (
Administrador de bases de datos ( Roles de agente de servicio
|
|
Propietario (
Administrador de BigQuery (
Administrador de recursos de BigQuery (
Administrador de BigQuery Studio (
Administrador de bases de datos ( Roles de agente de servicio
|
|
Propietario (
Editor (
Lector (
Administrador de BigQuery (
Administrador de recursos de BigQuery (
Editor de recursos de BigQuery (
Visor de recursos de BigQuery (
Administrador de BigQuery Studio (
Usuario de BigQuery (
Controlador de perfiles de datos de organización de DLP (
Controlador de perfiles de datos de proyectos de DLP (
Administrador de bases de datos (
Usuario de asistencia ( Roles de agente de servicio
|
|
Propietario (
Editor (
Lector (
Administrador de BigQuery (
Administrador de recursos de BigQuery (
Editor de recursos de BigQuery (
Visor de recursos de BigQuery (
Administrador de BigQuery Studio (
Usuario de BigQuery (
Controlador de perfiles de datos de organización de DLP (
Controlador de perfiles de datos de proyectos de DLP (
Administrador de bases de datos (
Administrador de seguridad (
Auditor de seguridad (
Revisor de seguridad (
Usuario de asistencia ( Roles de agente de servicio
|
|
Propietario (
Editor (
Administrador de BigQuery (
Administrador de recursos de BigQuery (
Administrador de BigQuery Studio (
Administrador de bases de datos ( Roles de agente de servicio
|
|
Propietario (
Editor (
Lector (
Administrador de BigQuery (
Editor de datos de BigQuery (
Propietario de datos de BigQuery (
Usuario de tareas de BigQuery (
Administrador de BigQuery Studio (
Usuario de BigQuery Studio (
Usuario de BigQuery (
Controlador de perfiles de datos de organización de DLP (
Controlador de perfiles de datos de proyectos de DLP (
Científico de datos (
Administrador de bases de datos (
Ingeniero de aprendizaje automático (
Usuario de asistencia ( Roles de agente de servicio
|
|
Propietario (
Editor (
Administrador de Assured Workloads (
Editor de Assured Workloads (
Administrador de BigQuery (
Administrador de BigQuery Studio (
Administrador de bases de datos ( Roles de agente de servicio
|
|
Propietario (
Editor (
Administrador de BigQuery (
Administrador de conexiones de BigQuery (
Administrador de BigQuery Studio (
Administrador de bases de datos ( Roles de agente de servicio
|
|
Propietario (
Administrador de BigQuery (
Administrador de conexiones de BigQuery (
Administrador de BigQuery Studio (
Escritor de BigQuery de DataStream (
Administrador de bases de datos ( Roles de agente de servicio
|
|
Propietario (
Editor (
Administrador de BigQuery (
Administrador de conexiones de BigQuery (
Administrador de BigQuery Studio (
Administrador de bases de datos ( Roles de agente de servicio
|
|
Propietario (
Editor (
Lector (
Administrador de BigQuery (
Administrador de conexiones de BigQuery (
Usuario de conexión de BigQuery (
Administrador de BigQuery Studio (
Administrador de Data Catalog (
Lector de Data Catalog (
Escritor de BigQuery de DataStream (
Administrador de bases de datos (
Usuario de asistencia ( Roles de agente de servicio
|
|
Propietario (
Editor (
Lector (
Administrador de BigQuery (
Administrador de conexiones de BigQuery (
Usuario de conexión de BigQuery (
Administrador de BigQuery Studio (
Administrador de bases de datos (
Administrador de seguridad (
Auditor de seguridad (
Revisor de seguridad (
Usuario de asistencia ( Roles de agente de servicio
|
|
Propietario (
Editor (
Lector (
Administrador de BigQuery (
Administrador de conexiones de BigQuery (
Usuario de conexión de BigQuery (
Administrador de BigQuery Studio (
Administrador de bases de datos (
Administrador de seguridad (
Auditor de seguridad (
Revisor de seguridad (
Usuario de asistencia ( Roles de agente de servicio
|
|
Propietario (
Administrador de BigQuery (
Administrador de conexiones de BigQuery (
|