Skip to main content
Google Cloud
Documentation Technology areas
  • AI and ML
  • Application development
  • Application hosting
  • Compute
  • Data analytics and pipelines
  • Databases
  • Distributed, hybrid, and multicloud
  • Generative AI
  • Industry solutions
  • Networking
  • Observability and monitoring
  • Security
  • Storage
Cross-product tools
  • Access and resources management
  • Costs and usage management
  • Google Cloud SDK, languages, frameworks, and tools
  • Infrastructure as code
  • Migration
Related sites
  • Google Cloud Home
  • Free Trial and Free Tier
  • Architecture Center
  • Blog
  • Contact Sales
  • Google Cloud Developer Center
  • Google Developer Center
  • Google Cloud Marketplace
  • Google Cloud Marketplace Documentation
  • Google Cloud Skills Boost
  • Google Cloud Solution Center
  • Google Cloud Support
  • Google Cloud Tech Youtube Channel
/
  • English
  • Deutsch
  • Español
  • Español – América Latina
  • Français
  • Indonesia
  • Italiano
  • Português
  • Português – Brasil
  • 中文 – 简体
  • 中文 – 繁體
  • 日本語
  • 한국어
Console Sign in
  • IAM
Guides Reference Samples Resources
Contact Us Start free
Google Cloud
  • Documentation
    • Guides
    • Reference
    • Samples
    • Resources
  • Technology areas
    • More
  • Cross-product tools
    • More
  • Related sites
    • More
  • Console
  • Contact Us
  • Start free
  • Discover
  • Product overview
  • Get started
  • Grant roles in the Google Cloud console
  • Grant roles using client libraries
  • IAM and your security architecture
  • Identity management for Google Cloud
  • Configure identities for users
  • Identities for users
  • Create and manage Google groups in the Google Cloud console
  • Best practices for using Google groups
  • Federate identities for users
    • Workforce identity federation
    • Configure Workforce Identity Federation
      • Microsoft Entra ID
      • Microsoft Entra ID with a large number of groups
      • Okta
      • Other OIDC or SAML 2.0
      • Access BigQuery data in Power BI with Microsoft Entra
    • Obtain short-lived credentials for Workforce Identity Federation
    • Manage workforce identity pools and providers
    • Delete Workforce Identity Federation users and their data
    • Set up user access to console (federated)
    • Sign in to the gcloud CLI with your federated identity
    • Integrate OAuth applications
      • OAuth application integration overview
      • Manage OAuth applications
  • Configure identities for workloads
  • Identities for workloads
  • Create and manage service accounts
    • About service accounts
      • Service accounts
      • Service account credentials
      • Service account impersonation
      • Service account types
      • Roles for service account authentication
    • Create and grant roles to service agents
    • Create service accounts
    • Manage service accounts
      • List and edit service accounts
      • Disable and enable service accounts
      • Delete and undelete service accounts
      • Manage tags for service accounts
    • Attach service accounts to resources
    • Use custom organization policies for service accounts and keys
    • Service account best practices
      • Best practices for using service accounts
      • Best practices for using service accounts in deployment pipelines
  • Use managed workload identities
    • About managed workload identities
    • Compute Engine
      • Create managed workload identities for GCE
    • GKE
      • Create managed workload identities for GKE
      • Troubleshoot managed workload identities for GKE
  • Federate identities for external workloads
    • Workload Identity Federation
    • Configure Workload Identity Federation
      • AWS or Azure
      • Active Directory
      • Deployment pipelines
      • Kubernetes
      • Workloads with X.509 certificates
      • Other identity providers
    • Manage workload identity pools and providers
    • Best practices for using Workload Identity Federation
    • Let customers access their Google Cloud resources from your product or service
    • Download credential configuration and grant access
    • Integrate Cloud Run and Workload Identity Federation
  • Create and manage service account keys
    • Migrate from service account keys
    • Service account key rotation
    • Create and delete service account keys
    • List and get service account keys
    • Upload a public key
    • Disable and enable service account keys
    • Best practices for managing service account keys
  • Built-in identities for resources
  • Control access to resources
  • About IAM access controls
    • Roles and permissions
    • Principals
    • Policy types
    • Allow policies
    • Allow policy inheritance
    • Deny policies
    • Principal access boundary policies
    • Access change propagation
    • IAM Conditions
  • Choose roles to grant
    • Choose which type of role to use
    • Find the right predefined roles
    • Get predefined role suggestions with Gemini assistance
    • View grantable roles
    • Roles for specific job functions
      • Billing-related job functions
      • Networking-related job functions
      • Auditing-related job functions
  • Create and manage custom roles
    • Create and manage custom roles
    • Use Deployment Manager to maintain custom roles
  • Grant access
    • Manage access to projects, folders, and organizations
    • Manage access to service accounts
    • Manage access to other resources
    • Test allow policy changes
  • Grant access conditionally
    • Manage conditional role bindings
    • Configure temporary access
    • Configure resource-based access
    • Tags and conditional access
    • Set limits on granting roles
    • Lint conditions in allow policies
  • Deny access
  • Restrict the resources that a principal can access
    • Create and apply principal access boundary policies
    • View principal access boundary policies
    • Edit principal access boundary policies
    • Remove principal access boundary policies
  • Temporary elevated access
    • Temporary elevated access overview
    • Control temporary elevated access with PAM
      • PAM overview
      • Permissions and setup
      • Create entitlements
      • View, update, and delete entitlements
      • View grants
      • Revoke grants
      • Audit entitlement and grant events
    • Request temporary elevated access with PAM
    • Approve or deny grants with PAM
    • Create short-lived credentials for a service account
    • Create short-lived credentials for multiple service accounts
    • Restrict a credential's Cloud Storage permissions
      • Credential Access Boundaries overview
      • Create a downscoped short-lived credential
    • Migrate to the Service Account Credentials API
  • Test permissions for custom user interfaces
  • Use custom organization policies for allow policies
  • Use IAM to help prevent exfiltration from data pipelines
  • Optimize your IAM configuration
  • Use IAM securely
  • Optimize IAM policies by using Policy Intelligence tools
  • Help secure IAM using VPC Service Controls
  • Monitor
  • Audit logging
    • IAM API audit logging
    • Service Account Credentials API audit logging
    • Privileged Access Manager audit logging
    • Security Token Service API audit logging
    • Example logs for service accounts
    • Example logs for Workforce Identity Federation
    • Example logs for Workforce OAuth application integration
    • Example logs for Workload Identity Federation
  • Analyze access to resources
  • Monitor service account usage
    • Tools to understand service account usage
    • Monitor usage patterns for service accounts and keys
  • Review allow policy history
  • Troubleshoot
  • Troubleshoot allow and deny policies
  • Troubleshoot organization policy errors for service accounts
  • Troubleshoot "withcond" in policies and role bindings
  • Troubleshoot Workforce Identity Federation
  • Troubleshoot Workload Identity Federation
  • Samples
  • All Identity and Access Management code samples
  • Code samples for all products
  • AI and ML
  • Application development
  • Application hosting
  • Compute
  • Data analytics and pipelines
  • Databases
  • Distributed, hybrid, and multicloud
  • Generative AI
  • Industry solutions
  • Networking
  • Observability and monitoring
  • Security
  • Storage
  • Access and resources management
  • Costs and usage management
  • Google Cloud SDK, languages, frameworks, and tools
  • Infrastructure as code
  • Migration