Skip to content

Instantly share code, notes, and snippets.

@Code-Hex
Last active August 11, 2022 01:02
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save Code-Hex/b653ac81786e7117a63b2f13f1f11035 to your computer and use it in GitHub Desktop.
Save Code-Hex/b653ac81786e7117a63b2f13f1f11035 to your computer and use it in GitHub Desktop.
Get GCP IAM Roles
const cheerio = require('cheerio');
const fetch = require('node-fetch');
const fs = require('fs');
// roles["roles/accesscontextmanager.policyAdmin"]["en"]
const roles = {};
async function makePredefinedRoles(locale) {
const response = await fetch(
`https://cloud.google.com/iam/docs/understanding-roles?hl=${locale}`
);
const html = await response.text();
const $ = await cheerio.load(html);
if (locale === 'en') {
$('div', '#predefined-roles').each((_, div) => {
$(div)
.find('tr')
.each((_, tr) => {
const role = $(tr).find('td')[0];
const roleName = $(role).find('.role-name').text().trim();
if (roleName === '') return;
const permission = $(tr).find('td')[1];
const permissions = [];
$(permission)
.find('li')
.each((_, v) => permissions.push($(v).text()));
roles[roleName] = { permissions };
});
});
}
$('div', '#predefined-roles').each((_, div) => {
$(div)
.find('tr')
.each((_, tr) => {
const role = $(tr).find('td')[0];
const roleName = $(role).find('.role-name').text().trim();
if (roleName === '') return;
roles[roleName][locale] = {
roleTitle: $(role).find('.role-title').text().trim(),
roleName: roleName,
roleDescription: $(role).find('.role-description').text().trim(),
};
});
});
}
async function main() {
await makePredefinedRoles('en');
await makePredefinedRoles('ja');
const jsonRoles = JSON.stringify(roles);
fs.writeFile('roles.json', jsonRoles, (err) => console.error('error: ', err));
}
(async function () {
await main();
})();
$ node scripts/gcp-roles.js
This file has been truncated, but you can view the full file.
{"roles/accessapproval.approver":{"permissions":["accessapproval.requests.*","accessapproval.settings.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Access Approval Approver","roleName":"roles/accessapproval.approver","roleDescription":"Ability to view or act on access approval requests and view configuration"},"ja":{"roleTitle":"Access Approval 承認者","roleName":"roles/accessapproval.approver","roleDescription":"アクセス承認リクエストを表示または操作し、構成を表示できる権限"}},"roles/accessapproval.configEditor":{"permissions":["accessapproval.settings.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Access Approval Config Editor","roleName":"roles/accessapproval.configEditor","roleDescription":"Ability to update the Access Approval configuration"},"ja":{"roleTitle":"Access Approval Config 編集者","roleName":"roles/accessapproval.configEditor","roleDescription":"アクセス承認の構成を更新する権限"}},"roles/accessapproval.viewer":{"permissions":["accessapproval.requests.get","accessapproval.requests.list","accessapproval.settings.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Access Approval Viewer","roleName":"roles/accessapproval.viewer","roleDescription":"Ability to view access approval requests and configuration"},"ja":{"roleTitle":"Access Approval 閲覧者","roleName":"roles/accessapproval.viewer","roleDescription":"アクセス承認リクエストおよび構成を閲覧できる権限"}},"roles/accesscontextmanager.gcpAccessAdmin":{"permissions":["accesscontextmanager.gcpUserAccessBindings.*"],"en":{"roleTitle":"Cloud Access Binding Admin","roleName":"roles/accesscontextmanager.gcpAccessAdmin","roleDescription":"Create, edit, and change Cloud access bindings."},"ja":{"roleTitle":"Cloud アクセス バインディング管理者","roleName":"roles/accesscontextmanager.gcpAccessAdmin","roleDescription":"Cloud アクセス バインディングの作成、編集、変更。"}},"roles/accesscontextmanager.gcpAccessReader":{"permissions":["accesscontextmanager.gcpUserAccessBindings.get","accesscontextmanager.gcpUserAccessBindings.list"],"en":{"roleTitle":"Cloud Access Binding Reader","roleName":"roles/accesscontextmanager.gcpAccessReader","roleDescription":"Read access to Cloud access bindings."},"ja":{"roleTitle":"Cloud アクセス バインディング リーダー","roleName":"roles/accesscontextmanager.gcpAccessReader","roleDescription":"Cloud アクセス バインディングへの読み取りアクセス。"}},"roles/accesscontextmanager.policyAdmin":{"permissions":["accesscontextmanager.accessLevels.*","accesscontextmanager.accessPolicies.*","accesscontextmanager.accessZones.*","accesscontextmanager.policies.*","accesscontextmanager.servicePerimeters.*","cloudasset.assets.searchAllResources","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Access Context Manager Admin","roleName":"roles/accesscontextmanager.policyAdmin","roleDescription":"Full access to policies, access levels, and access zones"},"ja":{"roleTitle":"Access Context Manager 管理者","roleName":"roles/accesscontextmanager.policyAdmin","roleDescription":"ポリシー、アクセスレベル、アクセスゾーンへの完全アクセス権。"}},"roles/accesscontextmanager.policyEditor":{"permissions":["accesscontextmanager.accessLevels.*","accesscontextmanager.accessPolicies.create","accesscontextmanager.accessPolicies.delete","accesscontextmanager.accessPolicies.get","accesscontextmanager.accessPolicies.getIamPolicy","accesscontextmanager.accessPolicies.list","accesscontextmanager.accessPolicies.update","accesscontextmanager.accessZones.*","accesscontextmanager.policies.create","accesscontextmanager.policies.delete","accesscontextmanager.policies.get","accesscontextmanager.policies.getIamPolicy","accesscontextmanager.policies.list","accesscontextmanager.policies.update","accesscontextmanager.servicePerimeters.*","cloudasset.assets.searchAllResources","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Access Context Manager Editor","roleName":"roles/accesscontextmanager.policyEditor","roleDescription":"Edit access to policies. Create, edit, and change access levels and access zones."},"ja":{"roleTitle":"Access Context Manager 編集者","roleName":"roles/accesscontextmanager.policyEditor","roleDescription":"ポリシーに対する編集権限。アクセスレベルとアクセスゾーンを作成、編集、変更します。"}},"roles/accesscontextmanager.policyReader":{"permissions":["accesscontextmanager.accessLevels.get","accesscontextmanager.accessLevels.list","accesscontextmanager.accessPolicies.get","accesscontextmanager.accessPolicies.getIamPolicy","accesscontextmanager.accessPolicies.list","accesscontextmanager.accessZones.get","accesscontextmanager.accessZones.list","accesscontextmanager.policies.get","accesscontextmanager.policies.getIamPolicy","accesscontextmanager.policies.list","accesscontextmanager.servicePerimeters.get","accesscontextmanager.servicePerimeters.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Access Context Manager Reader","roleName":"roles/accesscontextmanager.policyReader","roleDescription":"Read access to policies, access levels, and access zones."},"ja":{"roleTitle":"Access Context Manager 読み取り","roleName":"roles/accesscontextmanager.policyReader","roleDescription":"ポリシー、アクセスレベル、アクセスゾーンに対する読み取り権限。"}},"roles/accesscontextmanager.vpcScTroubleshooterViewer":{"permissions":["accesscontextmanager.accessLevels.get","accesscontextmanager.accessLevels.list","accesscontextmanager.policies.get","accesscontextmanager.policies.getIamPolicy","accesscontextmanager.policies.list","accesscontextmanager.servicePerimeters.get","accesscontextmanager.servicePerimeters.list","logging.exclusions.get","logging.exclusions.list","logging.logEntries.list","logging.logMetrics.get","logging.logMetrics.list","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.sinks.get","logging.sinks.list","logging.usage.*","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"VPC Service Controls Troubleshooter Viewer","roleName":"roles/accesscontextmanager.vpcScTroubleshooterViewer","roleDescription":""},"ja":{"roleTitle":"VPC Service Controls トラブルシューティング閲覧者","roleName":"roles/accesscontextmanager.vpcScTroubleshooterViewer","roleDescription":""}},"roles/actions.Admin":{"permissions":["actions.*","firebase.projects.get","firebase.projects.update","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use"],"en":{"roleTitle":"Actions Admin","roleName":"roles/actions.Admin","roleDescription":"Access to edit and deploy an action"},"ja":{"roleTitle":"アクション管理者","roleName":"roles/actions.Admin","roleDescription":"アクセスしてアクションの編集とデプロイを行います。"}},"roles/actions.Viewer":{"permissions":["actions.agent.get","actions.agentVersions.get","actions.agentVersions.list","firebase.projects.get","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use"],"en":{"roleTitle":"Actions Viewer","roleName":"roles/actions.Viewer","roleDescription":"Access to view an action"},"ja":{"roleTitle":"アクション閲覧者","roleName":"roles/actions.Viewer","roleDescription":"アクセスしてアクションを表示します。"}},"roles/notebooks.admin":{"permissions":["compute.acceleratorTypes.*","compute.addresses.get","compute.addresses.list","compute.autoscalers.get","compute.autoscalers.list","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.getIamPolicy","compute.backendServices.list","compute.commitments.get","compute.commitments.list","compute.diskTypes.*","compute.disks.get","compute.disks.getIamPolicy","compute.disks.list","compute.disks.listTagBindings","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewallPolicies.get","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.get","compute.globalNetworkEndpointGroups.list","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.get","compute.images.getFromFamily","compute.images.getIamPolicy","compute.images.list","compute.images.listTagBindings","compute.instanceGroupManagers.get","compute.instanceGroupManagers.list","compute.instanceGroups.get","compute.instanceGroups.list","compute.instanceTemplates.get","compute.instanceTemplates.getIamPolicy","compute.instanceTemplates.list","compute.instances.get","compute.instances.getEffectiveFirewalls","compute.instances.getGuestAttributes","compute.instances.getIamPolicy","compute.instances.getScreenshot","compute.instances.getSerialPortOutput","compute.instances.getShieldedInstanceIdentity","compute.instances.getShieldedVmIdentity","compute.instances.list","compute.instances.listReferrers","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.get","compute.licenseCodes.getIamPolicy","compute.licenseCodes.list","compute.licenses.get","compute.licenses.getIamPolicy","compute.licenses.list","compute.machineImages.get","compute.machineImages.getIamPolicy","compute.machineImages.list","compute.machineTypes.*","compute.maintenancePolicies.get","compute.maintenancePolicies.getIamPolicy","compute.maintenancePolicies.list","compute.networkEndpointGroups.get","compute.networkEndpointGroups.getIamPolicy","compute.networkEndpointGroups.list","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.nodeGroups.get","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeTemplates.get","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTypes.*","compute.organizations.listAssociations","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.publicAdvertisedPrefixes.get","compute.publicAdvertisedPrefixes.list","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.regionBackendServices.get","compute.regionBackendServices.getIamPolicy","compute.regionBackendServices.list","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.getIamPolicy","compute.regionFirewallPolicies.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.get","compute.regionNetworkEndpointGroups.list","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regionUrlMaps.validate","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.get","compute.resourcePolicies.list","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.securityPolicies.get","compute.securityPolicies.getIamPolicy","compute.securityPolicies.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.get","compute.snapshots.getIamPolicy","compute.snapshots.list","compute.snapshots.listTagBindings","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.getIamPolicy","compute.subnetworks.list","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.urlMaps.validate","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.getIamPolicy","compute.zoneOperations.list","compute.zones.*","notebooks.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Notebooks Admin","roleName":"roles/notebooks.admin","roleDescription":"Full access to Notebooks, all resources."},"ja":{"roleTitle":"Notebooks 管理者","roleName":"roles/notebooks.admin","roleDescription":"Notebooks のすべてのリソースに対する完全アクセス権。"}},"roles/notebooks.legacyAdmin":{"permissions":["compute.*","notebooks.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Notebooks Legacy Admin","roleName":"roles/notebooks.legacyAdmin","roleDescription":"Full access to Notebooks all resources through compute API."},"ja":{"roleTitle":"Notebooks の従来の管理者","roleName":"roles/notebooks.legacyAdmin","roleDescription":"Compute API での Notebooks のすべてのリソースに対する完全アクセス権。"}},"roles/notebooks.legacyViewer":{"permissions":["compute.acceleratorTypes.*","compute.addresses.get","compute.addresses.list","compute.autoscalers.get","compute.autoscalers.list","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.getIamPolicy","compute.backendServices.list","compute.commitments.get","compute.commitments.list","compute.diskTypes.*","compute.disks.get","compute.disks.getIamPolicy","compute.disks.list","compute.disks.listTagBindings","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewallPolicies.get","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.get","compute.globalNetworkEndpointGroups.list","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.get","compute.images.getFromFamily","compute.images.getIamPolicy","compute.images.list","compute.images.listTagBindings","compute.instanceGroupManagers.get","compute.instanceGroupManagers.list","compute.instanceGroups.get","compute.instanceGroups.list","compute.instanceTemplates.get","compute.instanceTemplates.getIamPolicy","compute.instanceTemplates.list","compute.instances.get","compute.instances.getEffectiveFirewalls","compute.instances.getGuestAttributes","compute.instances.getIamPolicy","compute.instances.getScreenshot","compute.instances.getSerialPortOutput","compute.instances.getShieldedInstanceIdentity","compute.instances.getShieldedVmIdentity","compute.instances.list","compute.instances.listReferrers","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.get","compute.licenseCodes.getIamPolicy","compute.licenseCodes.list","compute.licenses.get","compute.licenses.getIamPolicy","compute.licenses.list","compute.machineImages.get","compute.machineImages.getIamPolicy","compute.machineImages.list","compute.machineTypes.*","compute.maintenancePolicies.get","compute.maintenancePolicies.getIamPolicy","compute.maintenancePolicies.list","compute.networkEndpointGroups.get","compute.networkEndpointGroups.getIamPolicy","compute.networkEndpointGroups.list","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.nodeGroups.get","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeTemplates.get","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTypes.*","compute.organizations.listAssociations","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.publicAdvertisedPrefixes.get","compute.publicAdvertisedPrefixes.list","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.regionBackendServices.get","compute.regionBackendServices.getIamPolicy","compute.regionBackendServices.list","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.getIamPolicy","compute.regionFirewallPolicies.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.get","compute.regionNetworkEndpointGroups.list","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regionUrlMaps.validate","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.get","compute.resourcePolicies.list","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.securityPolicies.get","compute.securityPolicies.getIamPolicy","compute.securityPolicies.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.get","compute.snapshots.getIamPolicy","compute.snapshots.list","compute.snapshots.listTagBindings","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.getIamPolicy","compute.subnetworks.list","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.urlMaps.validate","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.getIamPolicy","compute.zoneOperations.list","compute.zones.*","notebooks.environments.get","notebooks.environments.getIamPolicy","notebooks.environments.list","notebooks.executions.get","notebooks.executions.getIamPolicy","notebooks.executions.list","notebooks.instances.checkUpgradability","notebooks.instances.get","notebooks.instances.getHealth","notebooks.instances.getIamPolicy","notebooks.instances.list","notebooks.locations.*","notebooks.operations.get","notebooks.operations.list","notebooks.runtimes.get","notebooks.runtimes.getIamPolicy","notebooks.runtimes.list","notebooks.schedules.get","notebooks.schedules.getIamPolicy","notebooks.schedules.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Notebooks Legacy Viewer","roleName":"roles/notebooks.legacyViewer","roleDescription":"Read-only access to Notebooks all resources through compute API."},"ja":{"roleTitle":"Notebooks の従来の閲覧者","roleName":"roles/notebooks.legacyViewer","roleDescription":"Compute API での Notebooks のすべてのリソースに対する読み取り専用アクセス権。"}},"roles/notebooks.runner":{"permissions":["compute.acceleratorTypes.*","compute.addresses.get","compute.addresses.list","compute.autoscalers.get","compute.autoscalers.list","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.getIamPolicy","compute.backendServices.list","compute.commitments.get","compute.commitments.list","compute.diskTypes.*","compute.disks.get","compute.disks.getIamPolicy","compute.disks.list","compute.disks.listTagBindings","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewallPolicies.get","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.get","compute.globalNetworkEndpointGroups.list","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.get","compute.images.getFromFamily","compute.images.getIamPolicy","compute.images.list","compute.images.listTagBindings","compute.instanceGroupManagers.get","compute.instanceGroupManagers.list","compute.instanceGroups.get","compute.instanceGroups.list","compute.instanceTemplates.get","compute.instanceTemplates.getIamPolicy","compute.instanceTemplates.list","compute.instances.get","compute.instances.getEffectiveFirewalls","compute.instances.getGuestAttributes","compute.instances.getIamPolicy","compute.instances.getScreenshot","compute.instances.getSerialPortOutput","compute.instances.getShieldedInstanceIdentity","compute.instances.getShieldedVmIdentity","compute.instances.list","compute.instances.listReferrers","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.get","compute.licenseCodes.getIamPolicy","compute.licenseCodes.list","compute.licenses.get","compute.licenses.getIamPolicy","compute.licenses.list","compute.machineImages.get","compute.machineImages.getIamPolicy","compute.machineImages.list","compute.machineTypes.*","compute.maintenancePolicies.get","compute.maintenancePolicies.getIamPolicy","compute.maintenancePolicies.list","compute.networkEndpointGroups.get","compute.networkEndpointGroups.getIamPolicy","compute.networkEndpointGroups.list","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.nodeGroups.get","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeTemplates.get","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTypes.*","compute.organizations.listAssociations","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.publicAdvertisedPrefixes.get","compute.publicAdvertisedPrefixes.list","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.regionBackendServices.get","compute.regionBackendServices.getIamPolicy","compute.regionBackendServices.list","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.getIamPolicy","compute.regionFirewallPolicies.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.get","compute.regionNetworkEndpointGroups.list","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regionUrlMaps.validate","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.get","compute.resourcePolicies.list","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.securityPolicies.get","compute.securityPolicies.getIamPolicy","compute.securityPolicies.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.get","compute.snapshots.getIamPolicy","compute.snapshots.list","compute.snapshots.listTagBindings","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.getIamPolicy","compute.subnetworks.list","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.urlMaps.validate","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.getIamPolicy","compute.zoneOperations.list","compute.zones.*","notebooks.environments.get","notebooks.environments.getIamPolicy","notebooks.environments.list","notebooks.executions.create","notebooks.executions.get","notebooks.executions.getIamPolicy","notebooks.executions.list","notebooks.instances.checkUpgradability","notebooks.instances.create","notebooks.instances.get","notebooks.instances.getHealth","notebooks.instances.getIamPolicy","notebooks.instances.list","notebooks.locations.*","notebooks.operations.get","notebooks.operations.list","notebooks.runtimes.create","notebooks.runtimes.get","notebooks.runtimes.getIamPolicy","notebooks.runtimes.list","notebooks.schedules.create","notebooks.schedules.get","notebooks.schedules.getIamPolicy","notebooks.schedules.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Notebooks Runner","roleName":"roles/notebooks.runner","roleDescription":"Restricted access for running scheduled Notebooks."},"ja":{"roleTitle":"Notebooks 実行者","roleName":"roles/notebooks.runner","roleDescription":"スケジュール設定された Notebooks を実行するための制限付きアクセス権"}},"roles/notebooks.viewer":{"permissions":["compute.acceleratorTypes.*","compute.addresses.get","compute.addresses.list","compute.autoscalers.get","compute.autoscalers.list","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.getIamPolicy","compute.backendServices.list","compute.commitments.get","compute.commitments.list","compute.diskTypes.*","compute.disks.get","compute.disks.getIamPolicy","compute.disks.list","compute.disks.listTagBindings","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewallPolicies.get","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.get","compute.globalNetworkEndpointGroups.list","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.get","compute.images.getFromFamily","compute.images.getIamPolicy","compute.images.list","compute.images.listTagBindings","compute.instanceGroupManagers.get","compute.instanceGroupManagers.list","compute.instanceGroups.get","compute.instanceGroups.list","compute.instanceTemplates.get","compute.instanceTemplates.getIamPolicy","compute.instanceTemplates.list","compute.instances.get","compute.instances.getEffectiveFirewalls","compute.instances.getGuestAttributes","compute.instances.getIamPolicy","compute.instances.getScreenshot","compute.instances.getSerialPortOutput","compute.instances.getShieldedInstanceIdentity","compute.instances.getShieldedVmIdentity","compute.instances.list","compute.instances.listReferrers","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.get","compute.licenseCodes.getIamPolicy","compute.licenseCodes.list","compute.licenses.get","compute.licenses.getIamPolicy","compute.licenses.list","compute.machineImages.get","compute.machineImages.getIamPolicy","compute.machineImages.list","compute.machineTypes.*","compute.maintenancePolicies.get","compute.maintenancePolicies.getIamPolicy","compute.maintenancePolicies.list","compute.networkEndpointGroups.get","compute.networkEndpointGroups.getIamPolicy","compute.networkEndpointGroups.list","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.nodeGroups.get","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeTemplates.get","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTypes.*","compute.organizations.listAssociations","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.publicAdvertisedPrefixes.get","compute.publicAdvertisedPrefixes.list","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.regionBackendServices.get","compute.regionBackendServices.getIamPolicy","compute.regionBackendServices.list","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.getIamPolicy","compute.regionFirewallPolicies.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.get","compute.regionNetworkEndpointGroups.list","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regionUrlMaps.validate","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.get","compute.resourcePolicies.list","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.securityPolicies.get","compute.securityPolicies.getIamPolicy","compute.securityPolicies.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.get","compute.snapshots.getIamPolicy","compute.snapshots.list","compute.snapshots.listTagBindings","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.getIamPolicy","compute.subnetworks.list","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.urlMaps.validate","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.getIamPolicy","compute.zoneOperations.list","compute.zones.*","notebooks.environments.get","notebooks.environments.getIamPolicy","notebooks.environments.list","notebooks.executions.get","notebooks.executions.getIamPolicy","notebooks.executions.list","notebooks.instances.checkUpgradability","notebooks.instances.get","notebooks.instances.getHealth","notebooks.instances.getIamPolicy","notebooks.instances.list","notebooks.locations.*","notebooks.operations.get","notebooks.operations.list","notebooks.runtimes.get","notebooks.runtimes.getIamPolicy","notebooks.runtimes.list","notebooks.schedules.get","notebooks.schedules.getIamPolicy","notebooks.schedules.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Notebooks Viewer","roleName":"roles/notebooks.viewer","roleDescription":"Read-only access to Notebooks, all resources."},"ja":{"roleTitle":"Notebooks 閲覧者","roleName":"roles/notebooks.viewer","roleDescription":"Notebooks のすべてのリソースに対する読み取り専用アクセス権。"}},"roles/ml.admin":{"permissions":["ml.*","resourcemanager.projects.get"],"en":{"roleTitle":"AI Platform Admin","roleName":"roles/ml.admin","roleDescription":"Provides full access to AI Platform resources, and its jobs,\noperations, models, and versions."},"ja":{"roleTitle":"AI Platform 管理者","roleName":"roles/ml.admin","roleDescription":"AI Platform リソースとそのジョブ、オペレーション、モデル、バージョンに対する完全アクセス権を付与します。"}},"roles/ml.developer":{"permissions":["ml.jobs.create","ml.jobs.get","ml.jobs.getIamPolicy","ml.jobs.list","ml.locations.*","ml.models.create","ml.models.get","ml.models.getIamPolicy","ml.models.list","ml.models.predict","ml.operations.get","ml.operations.list","ml.projects.*","ml.studies.*","ml.trials.*","ml.versions.get","ml.versions.list","ml.versions.predict","resourcemanager.projects.get"],"en":{"roleTitle":"AI Platform Developer","roleName":"roles/ml.developer","roleDescription":"Provides ability to use AI Platform resources for creating models,\nversions, jobs for training and prediction, and sending online prediction\nrequests."},"ja":{"roleTitle":"AI Platform デベロッパー","roleName":"roles/ml.developer","roleDescription":"モデル、バージョン、トレーニングと予測用のジョブの作成や、オンライン予測リクエストの送信を行うために AI Platform リソースを使用することを許可します。"}},"roles/ml.jobOwner":{"permissions":["ml.jobs.*"],"en":{"roleTitle":"AI Platform Job Owner","roleName":"roles/ml.jobOwner","roleDescription":"Provides full access to all permissions for a particular job resource. This\nrole is automatically granted to the user who creates the job."},"ja":{"roleTitle":"AI Platform ジョブオーナー","roleName":"roles/ml.jobOwner","roleDescription":"特定のジョブリソースに対するすべての権限への完全アクセス権を付与します。このロールはジョブを作成したユーザーに自動的に付与されます。"}},"roles/ml.modelOwner":{"permissions":["ml.models.*","ml.versions.*"],"en":{"roleTitle":"AI Platform Model Owner","roleName":"roles/ml.modelOwner","roleDescription":"Provides full access to the model and its versions. This role is\nautomatically granted to the user who creates the model."},"ja":{"roleTitle":"AI Platform モデルオーナー","roleName":"roles/ml.modelOwner","roleDescription":"モデルとそのバージョンへの完全アクセス権を付与します。このロールは、モデルを作成したユーザーに自動的に付与されます。"}},"roles/ml.modelUser":{"permissions":["ml.models.get","ml.models.predict","ml.versions.get","ml.versions.list","ml.versions.predict"],"en":{"roleTitle":"AI Platform Model User","roleName":"roles/ml.modelUser","roleDescription":"Provides permissions to read the model and its versions, and use them for\nprediction."},"ja":{"roleTitle":"AI Platform モデルユーザー","roleName":"roles/ml.modelUser","roleDescription":"モデルとそのバージョンを読み取り、予測に使用する権限を付与します。"}},"roles/ml.operationOwner":{"permissions":["ml.operations.*"],"en":{"roleTitle":"AI Platform Operation Owner","roleName":"roles/ml.operationOwner","roleDescription":"Provides full access to all permissions for a particular operation resource."},"ja":{"roleTitle":"AI Platform オペレーション オーナー","roleName":"roles/ml.operationOwner","roleDescription":"特定のオペレーション リソースに対する完全アクセス権を付与します。"}},"roles/ml.viewer":{"permissions":["ml.jobs.get","ml.jobs.list","ml.locations.*","ml.models.get","ml.models.list","ml.operations.get","ml.operations.list","ml.projects.*","ml.studies.get","ml.studies.getIamPolicy","ml.studies.list","ml.trials.get","ml.trials.list","ml.versions.get","ml.versions.list","resourcemanager.projects.get"],"en":{"roleTitle":"AI Platform Viewer","roleName":"roles/ml.viewer","roleDescription":"Provides read-only access to AI Platform resources."},"ja":{"roleTitle":"AI Platform 閲覧者","roleName":"roles/ml.viewer","roleDescription":"AI Platform のリソースに対する読み取り専用権限を付与します。"}},"roles/analyticshub.admin":{"permissions":["analyticshub.dataExchanges.*","analyticshub.listings.create","analyticshub.listings.delete","analyticshub.listings.get","analyticshub.listings.getIamPolicy","analyticshub.listings.list","analyticshub.listings.setIamPolicy","analyticshub.listings.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Analytics Hub Admin","roleName":"roles/analyticshub.admin","roleDescription":"Administer Data Exchanges and Listings"},"ja":{"roleTitle":"Analytics Hub 管理者","roleName":"roles/analyticshub.admin","roleDescription":"データ交換とリスティングの管理"}},"roles/analyticshub.listingAdmin":{"permissions":["analyticshub.dataExchanges.get","analyticshub.dataExchanges.getIamPolicy","analyticshub.dataExchanges.list","analyticshub.listings.delete","analyticshub.listings.get","analyticshub.listings.getIamPolicy","analyticshub.listings.list","analyticshub.listings.setIamPolicy","analyticshub.listings.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Analytics Hub Listing Admin","roleName":"roles/analyticshub.listingAdmin","roleDescription":"Grants full control over the Listing, including updating, deleting and setting ACLs"},"ja":{"roleTitle":"Analytics Hub リスティング管理者","roleName":"roles/analyticshub.listingAdmin","roleDescription":"ACL の更新、削除、設定を含め、リスティングに対する完全な管理権限を付与します"}},"roles/analyticshub.publisher":{"permissions":["analyticshub.dataExchanges.get","analyticshub.dataExchanges.getIamPolicy","analyticshub.dataExchanges.list","analyticshub.listings.create","analyticshub.listings.get","analyticshub.listings.getIamPolicy","analyticshub.listings.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Analytics Hub Publisher","roleName":"roles/analyticshub.publisher","roleDescription":"Can publish to Data Exchanges thus creating Listings"},"ja":{"roleTitle":"Analytics Hub パブリッシャー","roleName":"roles/analyticshub.publisher","roleDescription":"データ交換に公開してリスティングを作成可能"}},"roles/analyticshub.subscriber":{"permissions":["analyticshub.dataExchanges.get","analyticshub.dataExchanges.getIamPolicy","analyticshub.dataExchanges.list","analyticshub.listings.get","analyticshub.listings.getIamPolicy","analyticshub.listings.list","analyticshub.listings.subscribe","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Analytics Hub Subscriber","roleName":"roles/analyticshub.subscriber","roleDescription":"Can browse Data Exchanges and subscribe to Listings"},"ja":{"roleTitle":"Analytics Hub サブスクライバー","roleName":"roles/analyticshub.subscriber","roleDescription":"データ交換の閲覧とリスティングへの登録が可能です"}},"roles/analyticshub.viewer":{"permissions":["analyticshub.dataExchanges.get","analyticshub.dataExchanges.getIamPolicy","analyticshub.dataExchanges.list","analyticshub.listings.get","analyticshub.listings.getIamPolicy","analyticshub.listings.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Analytics Hub Viewer","roleName":"roles/analyticshub.viewer","roleDescription":"Can browse Data Exchanges and Listings"},"ja":{"roleTitle":"Analytics Hub 閲覧者","roleName":"roles/analyticshub.viewer","roleDescription":"データ交換とリスティングを閲覧できます。"}},"roles/androidmanagement.user":{"permissions":["androidmanagement.*","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Android Management User","roleName":"roles/androidmanagement.user","roleDescription":"Full access to manage devices."},"ja":{"roleTitle":"Android Management ユーザー","roleName":"roles/androidmanagement.user","roleDescription":"デバイスを管理するための完全アクセス権。"}},"roles/gkemulticloud.admin":{"permissions":["gkemulticloud.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Anthos Multi-cloud Admin","roleName":"roles/gkemulticloud.admin","roleDescription":"Admin access to Anthos Multi-cloud resources."},"ja":{"roleTitle":"Anthos マルチクラウド管理者","roleName":"roles/gkemulticloud.admin","roleDescription":"Anthos マルチクラウド リソースに対する管理者アクセス権。"}},"roles/gkemulticloud.telemetryWriter":{"permissions":["logging.logEntries.create","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create","opsconfigmonitoring.resourceMetadata.write"],"en":{"roleTitle":"Anthos Multi-cloud Telemetry Writer","roleName":"roles/gkemulticloud.telemetryWriter","roleDescription":"Grant access to write cluster telemetry data such as logs, metrics, and resource metadata."},"ja":{"roleTitle":"Anthos マルチクラウド テレメトリー ライター","roleName":"roles/gkemulticloud.telemetryWriter","roleDescription":"ログ、指標、リソース メタデータなどのクラスタのテレメトリー データを書き込むアクセス権を付与します。"}},"roles/gkemulticloud.viewer":{"permissions":["gkemulticloud.awsClusters.generateAccessToken","gkemulticloud.awsClusters.get","gkemulticloud.awsClusters.list","gkemulticloud.awsNodePools.get","gkemulticloud.awsNodePools.list","gkemulticloud.awsServerConfigs.*","gkemulticloud.azureClients.get","gkemulticloud.azureClients.list","gkemulticloud.azureClusters.generateAccessToken","gkemulticloud.azureClusters.get","gkemulticloud.azureClusters.list","gkemulticloud.azureNodePools.get","gkemulticloud.azureNodePools.list","gkemulticloud.azureServerConfigs.*","gkemulticloud.operations.get","gkemulticloud.operations.list","gkemulticloud.operations.wait","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Anthos Multi-cloud Viewer","roleName":"roles/gkemulticloud.viewer","roleDescription":"Viewer access to Anthos Multi-cloud resources."},"ja":{"roleTitle":"Anthos マルチクラウド閲覧者","roleName":"roles/gkemulticloud.viewer","roleDescription":"Anthos マルチクラウド リソースに対する閲覧者アクセス権。"}},"roles/apigateway.admin":{"permissions":["apigateway.*","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.get","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.list","servicemanagement.services.get","serviceusage.services.list"],"en":{"roleTitle":"ApiGateway Admin","roleName":"roles/apigateway.admin","roleDescription":"Full access to ApiGateway and related resources."},"ja":{"roleTitle":"API Gateway 管理者","roleName":"roles/apigateway.admin","roleDescription":"API Gateway と関連リソースに対する完全アクセス権。"}},"roles/apigateway.viewer":{"permissions":["apigateway.apiconfigs.get","apigateway.apiconfigs.getIamPolicy","apigateway.apiconfigs.list","apigateway.apis.get","apigateway.apis.getIamPolicy","apigateway.apis.list","apigateway.gateways.get","apigateway.gateways.getIamPolicy","apigateway.gateways.list","apigateway.locations.*","apigateway.operations.get","apigateway.operations.list","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.get","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.list","servicemanagement.services.get","serviceusage.services.list"],"en":{"roleTitle":"ApiGateway Viewer","roleName":"roles/apigateway.viewer","roleDescription":"Read-only access to ApiGateway and related resources."},"ja":{"roleTitle":"API Gateway 閲覧者","roleName":"roles/apigateway.viewer","roleDescription":"API Gateway と関連リソースに対する読み取り専用アクセス権。"}},"roles/apigee.admin":{"permissions":["apigee.*","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Organization Admin","roleName":"roles/apigee.admin","roleDescription":"Full access to all apigee resource features"},"ja":{"roleTitle":"Apigee 組織管理者","roleName":"roles/apigee.admin","roleDescription":"すべての Apigee リソース機能に対する完全アクセス権"}},"roles/apigee.analyticsAgent":{"permissions":["apigee.environments.getDataLocation","apigee.runtimeconfigs.*"],"en":{"roleTitle":"Apigee Analytics Agent","roleName":"roles/apigee.analyticsAgent","roleDescription":"Curated set of permissions for Apigee Universal Data Collection Agent to manage analytics for an Apigee Organization"},"ja":{"roleTitle":"Apigee Analytics エージェント","roleName":"roles/apigee.analyticsAgent","roleDescription":"Apigee 組織のアナリティクスを管理するために、Apigee Universal Data Collection Agent 用にキュレートされた権限セット"}},"roles/apigee.analyticsEditor":{"permissions":["apigee.datacollectors.*","apigee.datastores.*","apigee.envgroupattachments.get","apigee.envgroupattachments.list","apigee.envgroups.get","apigee.envgroups.list","apigee.environments.get","apigee.environments.getStats","apigee.environments.list","apigee.exports.*","apigee.hostqueries.*","apigee.hoststats.*","apigee.organizations.get","apigee.organizations.list","apigee.queries.*","apigee.reports.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Analytics Editor","roleName":"roles/apigee.analyticsEditor","roleDescription":"Analytics editor for an Apigee Organization"},"ja":{"roleTitle":"Apigee Analytics 編集者","roleName":"roles/apigee.analyticsEditor","roleDescription":"Apigee 組織のアナリティクス編集者"}},"roles/apigee.analyticsViewer":{"permissions":["apigee.datacollectors.get","apigee.datacollectors.list","apigee.datastores.get","apigee.datastores.list","apigee.envgroupattachments.get","apigee.envgroupattachments.list","apigee.envgroups.get","apigee.envgroups.list","apigee.environments.get","apigee.environments.getStats","apigee.environments.list","apigee.exports.get","apigee.exports.list","apigee.hostqueries.get","apigee.hostqueries.list","apigee.hoststats.*","apigee.organizations.get","apigee.organizations.list","apigee.queries.get","apigee.queries.list","apigee.reports.get","apigee.reports.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Analytics Viewer","roleName":"roles/apigee.analyticsViewer","roleDescription":"Analytics viewer for an Apigee Organization"},"ja":{"roleTitle":"Apigee Analytics 閲覧者","roleName":"roles/apigee.analyticsViewer","roleDescription":"Apigee 組織のアナリティクス閲覧者"}},"roles/apigee.apiAdminV2":{"permissions":["apigee.apiproductattributes.*","apigee.apiproducts.*","apigee.envgroupattachments.get","apigee.envgroupattachments.list","apigee.envgroups.get","apigee.envgroups.list","apigee.environments.get","apigee.environments.getStats","apigee.environments.list","apigee.keyvaluemapentries.*","apigee.keyvaluemaps.list","apigee.organizations.get","apigee.organizations.list","apigee.proxies.*","apigee.proxyrevisions.*","apigee.sharedflowrevisions.*","apigee.sharedflows.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee API Admin","roleName":"roles/apigee.apiAdminV2","roleDescription":"Full read/write access to all apigee API resources"},"ja":{"roleTitle":"Apigee API 管理者","roleName":"roles/apigee.apiAdminV2","roleDescription":"すべての Apigee API リソースに対する完全な読み取り / 書き込みアクセス権"}},"roles/apigee.apiReaderV2":{"permissions":["apigee.apiproductattributes.get","apigee.apiproductattributes.list","apigee.apiproducts.get","apigee.apiproducts.list","apigee.envgroupattachments.get","apigee.envgroupattachments.list","apigee.envgroups.get","apigee.envgroups.list","apigee.environments.get","apigee.environments.getStats","apigee.environments.list","apigee.keyvaluemapentries.*","apigee.keyvaluemaps.list","apigee.organizations.get","apigee.organizations.list","apigee.proxies.get","apigee.proxies.list","apigee.proxyrevisions.deploy","apigee.proxyrevisions.get","apigee.proxyrevisions.list","apigee.proxyrevisions.undeploy","apigee.sharedflowrevisions.deploy","apigee.sharedflowrevisions.get","apigee.sharedflowrevisions.list","apigee.sharedflowrevisions.undeploy","apigee.sharedflows.get","apigee.sharedflows.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee API Reader","roleName":"roles/apigee.apiReaderV2","roleDescription":"Reader of apigee resources"},"ja":{"roleTitle":"Apigee API 読み取り","roleName":"roles/apigee.apiReaderV2","roleDescription":"Apigee リソースの読み取り"}},"roles/apigee.developerAdmin":{"permissions":["apigee.apiproductattributes.get","apigee.apiproductattributes.list","apigee.apiproducts.get","apigee.apiproducts.list","apigee.appkeys.*","apigee.apps.*","apigee.datacollectors.*","apigee.developerappattributes.*","apigee.developerapps.*","apigee.developerattributes.*","apigee.developerbalances.*","apigee.developermonetizationconfigs.*","apigee.developers.*","apigee.developersubscriptions.*","apigee.environments.get","apigee.environments.getStats","apigee.hoststats.*","apigee.organizations.get","apigee.organizations.list","apigee.rateplans.get","apigee.rateplans.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Developer Admin","roleName":"roles/apigee.developerAdmin","roleDescription":"Developer admin of apigee resources"},"ja":{"roleTitle":"Apigee デベロッパー管理者","roleName":"roles/apigee.developerAdmin","roleDescription":"Apigee リソースのデベロッパー管理者"}},"roles/apigee.environmentAdmin":{"permissions":["apigee.archivedeployments.*","apigee.datacollectors.get","apigee.datacollectors.list","apigee.deployments.*","apigee.envgroupattachments.get","apigee.envgroupattachments.list","apigee.envgroups.get","apigee.envgroups.list","apigee.environments.get","apigee.environments.getIamPolicy","apigee.environments.getStats","apigee.environments.list","apigee.environments.setIamPolicy","apigee.environments.update","apigee.flowhooks.*","apigee.ingressconfigs.*","apigee.keystorealiases.*","apigee.keystores.*","apigee.keyvaluemaps.*","apigee.maskconfigs.*","apigee.organizations.get","apigee.organizations.list","apigee.proxies.get","apigee.proxies.list","apigee.proxyrevisions.deploy","apigee.proxyrevisions.get","apigee.proxyrevisions.list","apigee.proxyrevisions.undeploy","apigee.references.*","apigee.resourcefiles.*","apigee.sharedflowrevisions.deploy","apigee.sharedflowrevisions.get","apigee.sharedflowrevisions.list","apigee.sharedflowrevisions.undeploy","apigee.sharedflows.get","apigee.sharedflows.list","apigee.targetservers.*","apigee.tracesessions.*","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Environment Admin","roleName":"roles/apigee.environmentAdmin","roleDescription":"Full read/write access to apigee environment resources, including deployments."},"ja":{"roleTitle":"Apigee 環境管理者","roleName":"roles/apigee.environmentAdmin","roleDescription":"デプロイメントを含む Apigee 環境リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/apigee.monetizationAdmin":{"permissions":["apigee.apiproducts.get","apigee.apiproducts.list","apigee.developerbalances.*","apigee.developermonetizationconfigs.*","apigee.developersubscriptions.*","apigee.organizations.get","apigee.organizations.list","apigee.rateplans.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Monetization Admin","roleName":"roles/apigee.monetizationAdmin","roleDescription":"All permissions related to monetization"},"ja":{"roleTitle":"Apigee Monetization 管理者","roleName":"roles/apigee.monetizationAdmin","roleDescription":"収益化に関連するすべての権限"}},"roles/apigee.portalAdmin":{"permissions":["apigee.organizations.get","apigee.organizations.list","apigee.portals.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Portal Admin","roleName":"roles/apigee.portalAdmin","roleDescription":"Portal admin for an Apigee Organization"},"ja":{"roleTitle":"Apigee ポータル管理者","roleName":"roles/apigee.portalAdmin","roleDescription":"Apigee 組織のポータル管理者"}},"roles/apigee.readOnlyAdmin":{"permissions":["apigee.apiproductattributes.get","apigee.apiproductattributes.list","apigee.apiproducts.get","apigee.apiproducts.list","apigee.appkeys.get","apigee.apps.*","apigee.archivedeployments.download","apigee.archivedeployments.get","apigee.archivedeployments.list","apigee.caches.list","apigee.canaryevaluations.get","apigee.datacollectors.get","apigee.datacollectors.list","apigee.datastores.get","apigee.datastores.list","apigee.deployments.get","apigee.deployments.list","apigee.developerappattributes.get","apigee.developerappattributes.list","apigee.developerapps.get","apigee.developerapps.list","apigee.developerattributes.get","apigee.developerattributes.list","apigee.developerbalances.get","apigee.developermonetizationconfigs.get","apigee.developers.get","apigee.developers.list","apigee.developersubscriptions.get","apigee.developersubscriptions.list","apigee.envgroupattachments.get","apigee.envgroupattachments.list","apigee.envgroups.get","apigee.envgroups.list","apigee.environments.get","apigee.environments.getDataLocation","apigee.environments.getIamPolicy","apigee.environments.getStats","apigee.environments.list","apigee.exports.get","apigee.exports.list","apigee.flowhooks.getSharedFlow","apigee.flowhooks.list","apigee.hostqueries.get","apigee.hostqueries.list","apigee.hostsecurityreports.get","apigee.hostsecurityreports.list","apigee.hoststats.*","apigee.ingressconfigs.*","apigee.instanceattachments.get","apigee.instanceattachments.list","apigee.instances.get","apigee.instances.list","apigee.keystorealiases.get","apigee.keystorealiases.list","apigee.keystores.get","apigee.keystores.list","apigee.keyvaluemapentries.*","apigee.keyvaluemaps.list","apigee.maskconfigs.get","apigee.operations.*","apigee.organizations.get","apigee.organizations.list","apigee.portals.get","apigee.portals.list","apigee.proxies.get","apigee.proxies.list","apigee.proxyrevisions.get","apigee.proxyrevisions.list","apigee.queries.get","apigee.queries.list","apigee.rateplans.get","apigee.rateplans.list","apigee.references.get","apigee.references.list","apigee.reports.get","apigee.reports.list","apigee.resourcefiles.get","apigee.resourcefiles.list","apigee.runtimeconfigs.*","apigee.securityreports.get","apigee.securityreports.list","apigee.sharedflowrevisions.get","apigee.sharedflowrevisions.list","apigee.sharedflows.get","apigee.sharedflows.list","apigee.targetservers.get","apigee.targetservers.list","apigee.tracesessions.get","apigee.tracesessions.list","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Read-only Admin","roleName":"roles/apigee.readOnlyAdmin","roleDescription":"Viewer of all apigee resources"},"ja":{"roleTitle":"Apigee 読み取り専用管理者","roleName":"roles/apigee.readOnlyAdmin","roleDescription":"すべての Apigee リソースの閲覧者"}},"roles/apigee.runtimeAgent":{"permissions":["apigee.canaryevaluations.*","apigee.ingressconfigs.*","apigee.instances.reportStatus","apigee.operations.*","apigee.organizations.get","apigee.runtimeconfigs.*"],"en":{"roleTitle":"Apigee Runtime Agent","roleName":"roles/apigee.runtimeAgent","roleDescription":"Curated set of permissions for a runtime agent to access Apigee Organization resources"},"ja":{"roleTitle":"Apigee ランタイム エージェント","roleName":"roles/apigee.runtimeAgent","roleDescription":"ランタイム エージェントが Apigee 組織リソースにアクセスするための、キュレートされた権限セット"}},"roles/apigee.securityAdmin":{"permissions":["apigee.envgroupattachments.get","apigee.envgroupattachments.list","apigee.envgroups.get","apigee.envgroups.list","apigee.environments.get","apigee.environments.list","apigee.hostsecurityreports.*","apigee.organizations.get","apigee.organizations.list","apigee.securityreports.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Security Admin","roleName":"roles/apigee.securityAdmin","roleDescription":"Security admin for an Apigee Organization"},"ja":{"roleTitle":"Apigee セキュリティ管理者","roleName":"roles/apigee.securityAdmin","roleDescription":"Apigee 組織のセキュリティ管理者"}},"roles/apigee.securityViewer":{"permissions":["apigee.envgroupattachments.get","apigee.envgroupattachments.list","apigee.envgroups.get","apigee.envgroups.list","apigee.environments.get","apigee.environments.list","apigee.hostsecurityreports.get","apigee.hostsecurityreports.list","apigee.organizations.get","apigee.organizations.list","apigee.securityreports.get","apigee.securityreports.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Security Viewer","roleName":"roles/apigee.securityViewer","roleDescription":"Security viewer for an Apigee Organization"},"ja":{"roleTitle":"Apigee セキュリティ閲覧者","roleName":"roles/apigee.securityViewer","roleDescription":"Apigee 組織のセキュリティ閲覧者"}},"roles/apigee.synchronizerManager":{"permissions":["apigee.environments.get","apigee.environments.manageRuntime","apigee.ingressconfigs.*"],"en":{"roleTitle":"Apigee Synchronizer Manager","roleName":"roles/apigee.synchronizerManager","roleDescription":"Curated set of permissions for a Synchronizer to manage environments in an Apigee Organization"},"ja":{"roleTitle":"Apigee Synchronizer 管理者","roleName":"roles/apigee.synchronizerManager","roleDescription":"Synchronizer で Apigee 組織の環境を管理するための、キュレートされた権限セット"}},"roles/apigeeconnect.Admin":{"permissions":["apigeeconnect.connections.*"],"en":{"roleTitle":"Apigee Connect Admin","roleName":"roles/apigeeconnect.Admin","roleDescription":"Admin of Apigee Connect"},"ja":{"roleTitle":"Apigee Connect 管理者","roleName":"roles/apigeeconnect.Admin","roleDescription":"Apigee Connect の管理者"}},"roles/apigeeconnect.Agent":{"permissions":["apigeeconnect.endpoints.*"],"en":{"roleTitle":"Apigee Connect Agent","roleName":"roles/apigeeconnect.Agent","roleDescription":"Ability to set up Apigee Connect agent between external clusters and Google."},"ja":{"roleTitle":"Apigee Connect エージェント","roleName":"roles/apigeeconnect.Agent","roleDescription":"外部クラスタと Google の間の Apigee Connect エージェントを設定できます。"}},"roles/apigeeregistry.admin":{"permissions":["apigeeregistry.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Apigee Registry Admin","roleName":"roles/apigeeregistry.admin","roleDescription":"Full access to Cloud Apigee Registry Registry and Runtime resources."},"ja":{"roleTitle":"Cloud Apigee Registry 管理者","roleName":"roles/apigeeregistry.admin","roleDescription":"Cloud Apigee Registry と Runtime のリソースに対する完全アクセス権。"}},"roles/apigeeregistry.editor":{"permissions":["apigeeregistry.apis.create","apigeeregistry.apis.delete","apigeeregistry.apis.get","apigeeregistry.apis.getIamPolicy","apigeeregistry.apis.list","apigeeregistry.apis.update","apigeeregistry.artifacts.create","apigeeregistry.artifacts.delete","apigeeregistry.artifacts.get","apigeeregistry.artifacts.getIamPolicy","apigeeregistry.artifacts.list","apigeeregistry.artifacts.update","apigeeregistry.deployments.*","apigeeregistry.specs.create","apigeeregistry.specs.delete","apigeeregistry.specs.get","apigeeregistry.specs.getIamPolicy","apigeeregistry.specs.list","apigeeregistry.specs.update","apigeeregistry.versions.create","apigeeregistry.versions.delete","apigeeregistry.versions.get","apigeeregistry.versions.getIamPolicy","apigeeregistry.versions.list","apigeeregistry.versions.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Apigee Registry Editor","roleName":"roles/apigeeregistry.editor","roleDescription":"Edit access to Cloud Apigee Registry Registry resources."},"ja":{"roleTitle":"Cloud Apigee Registry 編集者","roleName":"roles/apigeeregistry.editor","roleDescription":"Cloud Apigee Registry リソースに対する編集アクセス権。"}},"roles/apigeeregistry.viewer":{"permissions":["apigeeregistry.apis.get","apigeeregistry.apis.list","apigeeregistry.artifacts.get","apigeeregistry.artifacts.list","apigeeregistry.deployments.get","apigeeregistry.deployments.list","apigeeregistry.specs.get","apigeeregistry.specs.list","apigeeregistry.versions.get","apigeeregistry.versions.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Apigee Registry Viewer","roleName":"roles/apigeeregistry.viewer","roleDescription":"Read-only access to Cloud Apigee Registry Registry resources."},"ja":{"roleTitle":"Cloud Apigee Registry 閲覧者","roleName":"roles/apigeeregistry.viewer","roleDescription":"Cloud Apigee Registry のリソースに対する読み取り専用アクセス権。"}},"roles/apigeeregistry.worker":{"permissions":["apigeeregistry.apis.get","apigeeregistry.apis.list","apigeeregistry.apis.update","apigeeregistry.artifacts.create","apigeeregistry.artifacts.delete","apigeeregistry.artifacts.get","apigeeregistry.artifacts.list","apigeeregistry.artifacts.update","apigeeregistry.deployments.get","apigeeregistry.deployments.list","apigeeregistry.deployments.update","apigeeregistry.specs.get","apigeeregistry.specs.list","apigeeregistry.specs.update","apigeeregistry.versions.get","apigeeregistry.versions.list","apigeeregistry.versions.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Apigee Registry Worker","roleName":"roles/apigeeregistry.worker","roleDescription":"The role used by Apigee Registry application workers to read and update Apigee Registry Artifacts."},"ja":{"roleTitle":"Cloud Apigee Registry ワーカー","roleName":"roles/apigeeregistry.worker","roleDescription":"Apigee Registry アプリケーション ワーカーが Apigee Registry アーティファクトの読み取りと更新に使用するロール。"}},"roles/appengine.appAdmin":{"permissions":["appengine.applications.get","appengine.applications.update","appengine.instances.*","appengine.operations.*","appengine.runtimes.*","appengine.services.*","appengine.versions.create","appengine.versions.delete","appengine.versions.get","appengine.versions.list","appengine.versions.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"App Engine Admin","roleName":"roles/appengine.appAdmin","roleDescription":"Read/Write/Modify access to all application configuration and settings.\nTo deploy new versions, a principal must have the\nService Account User\n(roles/iam.serviceAccountUser) role on the App Engine\ndefault service account, and the\nCloud Build Editor (roles/cloudbuild.builds.editor) and Cloud Storage Object\nAdmin (roles/storage.objectAdmin) roles on the project."},"ja":{"roleTitle":"App Engine 管理者","roleName":"roles/appengine.appAdmin","roleDescription":"すべてのアプリケーションの構成と設定に対する読み取り / 書き込み / 変更アクセス権。\n新しいバージョンをデプロイするには、プリンシパルが App Engine デフォルト サービス アカウントに対するサービス アカウント ユーザー(roles/iam.serviceAccountUser)ロール、プロジェクトに対する Cloud Build 編集者(roles/cloudbuild.builds.editor)ロールと Cloud ストレージ オブジェクト管理者(roles/storage.objectAdmin)ロールを持っている必要があります。"}},"roles/appengine.appCreator":{"permissions":["appengine.applications.create","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"App Engine Creator","roleName":"roles/appengine.appCreator","roleDescription":"Ability to create the App Engine resource for the project."},"ja":{"roleTitle":"App Engine 作成者","roleName":"roles/appengine.appCreator","roleDescription":"プロジェクトの App Engine リソースを作成できます。"}},"roles/appengine.appViewer":{"permissions":["appengine.applications.get","appengine.instances.get","appengine.instances.list","appengine.operations.*","appengine.services.get","appengine.services.list","appengine.versions.get","appengine.versions.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"App Engine Viewer","roleName":"roles/appengine.appViewer","roleDescription":"Read-only access to all application configuration and settings."},"ja":{"roleTitle":"App Engine 閲覧者","roleName":"roles/appengine.appViewer","roleDescription":"すべてのアプリケーションの構成と設定への読み取り専用アクセス権。"}},"roles/appengine.codeViewer":{"permissions":["appengine.applications.get","appengine.instances.get","appengine.instances.list","appengine.operations.*","appengine.services.get","appengine.services.list","appengine.versions.get","appengine.versions.getFileContents","appengine.versions.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"App Engine Code Viewer","roleName":"roles/appengine.codeViewer","roleDescription":"Read-only access to all application configuration, settings, and deployed\nsource code."},"ja":{"roleTitle":"App Engine コード閲覧者","roleName":"roles/appengine.codeViewer","roleDescription":"すべてのアプリケーションの構成と設定、デプロイされたソースコードに対する読み取り専用権限。"}},"roles/appengine.deployer":{"permissions":["appengine.applications.get","appengine.instances.get","appengine.instances.list","appengine.operations.*","appengine.services.get","appengine.services.list","appengine.versions.create","appengine.versions.delete","appengine.versions.get","appengine.versions.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"App Engine Deployer","roleName":"roles/appengine.deployer","roleDescription":"Read-only access to all application configuration and settings.\nTo deploy new versions, you must also have the\nService Account User\n(roles/iam.serviceAccountUser) role on the App Engine\ndefault service account, and the\nCloud Build Editor (roles/cloudbuild.builds.editor) and Cloud Storage Object\nAdmin (roles/storage.objectAdmin) roles on the project.\nCannot modify existing versions other than deleting versions that are not receiving traffic."},"ja":{"roleTitle":"App Engine デプロイ担当者","roleName":"roles/appengine.deployer","roleDescription":"すべてのアプリケーションの構成と設定への読み取り専用アクセス権。\n新しいバージョンをデプロイするには、App Engine デフォルト サービス アカウントに対するサービス アカウント ユーザー(roles/iam.serviceAccountUser)ロール、プロジェクトに対する Cloud Build 編集者(roles/cloudbuild.builds.editor)ロールと Cloud Storage オブジェクト管理者(roles/storage.objectAdmin)ロールも必要です。\n既存のバージョンに対しては、トラフィックを受信していないバージョンを削除する以外の変更は加えられません。"}},"roles/appengine.serviceAdmin":{"permissions":["appengine.applications.get","appengine.instances.*","appengine.operations.*","appengine.services.*","appengine.versions.delete","appengine.versions.get","appengine.versions.list","appengine.versions.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"App Engine Service Admin","roleName":"roles/appengine.serviceAdmin","roleDescription":"Read-only access to all application configuration and settings.\nWrite access to module-level and version-level settings. Cannot deploy a new version."},"ja":{"roleTitle":"App Engine サービス管理者","roleName":"roles/appengine.serviceAdmin","roleDescription":"すべてのアプリケーションの構成と設定への読み取り専用アクセス権。\nモジュール レベルおよびバージョン レベルの設定に対する書き込み権限。新しいバージョンをデプロイすることはできません。"}},"roles/artifactregistry.admin":{"permissions":["artifactregistry.*"],"en":{"roleTitle":"Artifact Registry Administrator","roleName":"roles/artifactregistry.admin","roleDescription":"Administrator access to create and manage repositories."},"ja":{"roleTitle":"Artifact Registry 管理者","roleName":"roles/artifactregistry.admin","roleDescription":"リポジトリを作成、管理するための管理者アクセス権。"}},"roles/artifactregistry.reader":{"permissions":["artifactregistry.dockerimages.*","artifactregistry.files.*","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.versions.get","artifactregistry.versions.list"],"en":{"roleTitle":"Artifact Registry Reader","roleName":"roles/artifactregistry.reader","roleDescription":"Access to read repository items."},"ja":{"roleTitle":"Artifact Registry 読み取り","roleName":"roles/artifactregistry.reader","roleDescription":"リポジトリ アイテムを読み取るためのアクセス権。"}},"roles/artifactregistry.repoAdmin":{"permissions":["artifactregistry.aptartifacts.*","artifactregistry.dockerimages.*","artifactregistry.files.*","artifactregistry.packages.*","artifactregistry.repositories.deleteArtifacts","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.repositories.uploadArtifacts","artifactregistry.tags.*","artifactregistry.versions.*","artifactregistry.yumartifacts.*"],"en":{"roleTitle":"Artifact Registry Repository Administrator","roleName":"roles/artifactregistry.repoAdmin","roleDescription":"Access to manage artifacts in repositories."},"ja":{"roleTitle":"Artifact Registry リポジトリ管理者","roleName":"roles/artifactregistry.repoAdmin","roleDescription":"リポジトリ内のアーティファクトを管理するためのアクセス権。"}},"roles/artifactregistry.writer":{"permissions":["artifactregistry.aptartifacts.*","artifactregistry.dockerimages.*","artifactregistry.files.*","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.repositories.uploadArtifacts","artifactregistry.tags.create","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.tags.update","artifactregistry.versions.get","artifactregistry.versions.list","artifactregistry.yumartifacts.*"],"en":{"roleTitle":"Artifact Registry Writer","roleName":"roles/artifactregistry.writer","roleDescription":"Access to read and write repository items."},"ja":{"roleTitle":"Artifact Registry 書き込み","roleName":"roles/artifactregistry.writer","roleDescription":"リポジトリ アイテムの読み取りと書き込みを行うためのアクセス権。"}},"roles/assuredworkloads.admin":{"permissions":["assuredworkloads.*","orgpolicy.policy.*","resourcemanager.folders.create","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.create","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Assured Workloads Administrator","roleName":"roles/assuredworkloads.admin","roleDescription":"Grants full access to Assured Workloads resources, CRM resources - project/folder and Organization Policy administration"},"ja":{"roleTitle":"Assured Workloads 管理者","roleName":"roles/assuredworkloads.admin","roleDescription":"Assured Workloads リソース、CRM リソース(プロジェクト / フォルダ、組織ポリシーの管理)に対する完全アクセス権を付与します。"}},"roles/assuredworkloads.editor":{"permissions":["assuredworkloads.*","orgpolicy.policy.*","resourcemanager.folders.create","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.create","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Assured Workloads Editor","roleName":"roles/assuredworkloads.editor","roleDescription":"Grants read, write access to Assured Workloads resources, CRM resources - project/folder and Organization Policy administration"},"ja":{"roleTitle":"Assured Workloads 編集者","roleName":"roles/assuredworkloads.editor","roleDescription":"Assured Workloads リソース、CRM リソース(プロジェクト / フォルダ、組織ポリシーの管理)に対する読み取り、書き込みアクセス権を付与します。"}},"roles/assuredworkloads.reader":{"permissions":["assuredworkloads.operations.*","assuredworkloads.violations.*","assuredworkloads.workload.get","assuredworkloads.workload.list","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Assured Workloads Reader","roleName":"roles/assuredworkloads.reader","roleDescription":"Grants read access to all Assured Workloads resources and CRM resources - project/folder"},"ja":{"roleTitle":"Assured Workloads 閲覧者","roleName":"roles/assuredworkloads.reader","roleDescription":"すべての Assured Workloads リソースと CRM リソース(プロジェクト / フォルダ)に対する読み取りアクセス権を付与します。"}},"roles/automl.admin":{"permissions":["automl.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.list"],"en":{"roleTitle":"AutoML Admin","roleName":"roles/automl.admin","roleDescription":"Full access to all AutoML resources"},"ja":{"roleTitle":"AutoML 管理者","roleName":"roles/automl.admin","roleDescription":"すべての AutoML リソースに対する完全アクセス権"}},"roles/automl.editor":{"permissions":["automl.annotationSpecs.*","automl.annotations.*","automl.columnSpecs.*","automl.datasets.create","automl.datasets.delete","automl.datasets.export","automl.datasets.get","automl.datasets.import","automl.datasets.list","automl.datasets.update","automl.examples.*","automl.humanAnnotationTasks.*","automl.locations.get","automl.locations.list","automl.modelEvaluations.*","automl.models.create","automl.models.delete","automl.models.deploy","automl.models.export","automl.models.get","automl.models.list","automl.models.predict","automl.models.undeploy","automl.operations.*","automl.tableSpecs.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.list"],"en":{"roleTitle":"AutoML Editor","roleName":"roles/automl.editor","roleDescription":"Editor of all AutoML resources"},"ja":{"roleTitle":"AutoML 編集者","roleName":"roles/automl.editor","roleDescription":"すべての AutoML リソースの編集者"}},"roles/automl.predictor":{"permissions":["automl.models.predict","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"AutoML Predictor","roleName":"roles/automl.predictor","roleDescription":"Predict using models"},"ja":{"roleTitle":"AutoML 予測者","roleName":"roles/automl.predictor","roleDescription":"モデルを使用して予測します"}},"roles/automl.viewer":{"permissions":["automl.annotationSpecs.get","automl.annotationSpecs.list","automl.annotations.list","automl.columnSpecs.get","automl.columnSpecs.list","automl.datasets.get","automl.datasets.list","automl.examples.get","automl.examples.list","automl.humanAnnotationTasks.get","automl.humanAnnotationTasks.list","automl.locations.get","automl.locations.list","automl.modelEvaluations.get","automl.modelEvaluations.list","automl.models.get","automl.models.list","automl.operations.get","automl.operations.list","automl.tableSpecs.get","automl.tableSpecs.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.list"],"en":{"roleTitle":"AutoML Viewer","roleName":"roles/automl.viewer","roleDescription":"Viewer of all AutoML resources"},"ja":{"roleTitle":"AutoML 閲覧者","roleName":"roles/automl.viewer","roleDescription":"すべての AutoML リソースの閲覧者"}},"roles/gkebackup.admin":{"permissions":["gkebackup.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Backup for GKE Admin","roleName":"roles/gkebackup.admin","roleDescription":"Full access to all Backup for GKE resources."},"ja":{"roleTitle":"Backup for GKE 管理者","roleName":"roles/gkebackup.admin","roleDescription":"すべての Backup for GKE リソースに対する完全アクセス権。"}},"roles/gkebackup.backupAdmin":{"permissions":["gkebackup.backupPlans.*","gkebackup.backups.*","gkebackup.locations.*","gkebackup.operations.get","gkebackup.operations.list","gkebackup.volumeBackups.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Backup for GKE Backup Admin","roleName":"roles/gkebackup.backupAdmin","roleDescription":"Allows administrators to manage all BackupPlan and Backup resources."},"ja":{"roleTitle":"Backup for GKE バックアップ管理者","roleName":"roles/gkebackup.backupAdmin","roleDescription":"管理者に BackupPlan と Backup のすべてのリソースの管理を許可します。"}},"roles/gkebackup.delegatedBackupAdmin":{"permissions":["gkebackup.backupPlans.get","gkebackup.backups.*","gkebackup.volumeBackups.*"],"en":{"roleTitle":"Backup for GKE Delegated Backup Admin","roleName":"roles/gkebackup.delegatedBackupAdmin","roleDescription":"Allows administrators to manage Backup resources for specific BackupPlans"},"ja":{"roleTitle":"Backup for GKE 代理バックアップ管理者","roleName":"roles/gkebackup.delegatedBackupAdmin","roleDescription":"管理者に特定の BackupPlan の Backup リソースの管理を許可します。"}},"roles/gkebackup.delegatedRestoreAdmin":{"permissions":["gkebackup.restorePlans.get","gkebackup.restores.*","gkebackup.volumeRestores.*"],"en":{"roleTitle":"Backup for GKE Delegated Restore Admin","roleName":"roles/gkebackup.delegatedRestoreAdmin","roleDescription":"Allows administrators to manage Restore resources for specific RestorePlans"},"ja":{"roleTitle":"Backup for GKE 代理復元管理者","roleName":"roles/gkebackup.delegatedRestoreAdmin","roleDescription":"管理者に特定の RestorePlan の Restore リソースの管理を許可します。"}},"roles/gkebackup.restoreAdmin":{"permissions":["gkebackup.backupPlans.get","gkebackup.backupPlans.list","gkebackup.backups.get","gkebackup.backups.list","gkebackup.locations.*","gkebackup.operations.get","gkebackup.operations.list","gkebackup.restorePlans.*","gkebackup.restores.*","gkebackup.volumeBackups.*","gkebackup.volumeRestores.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Backup for GKE Restore Admin","roleName":"roles/gkebackup.restoreAdmin","roleDescription":"Allows administrators to manage all RestorePlan and Restore resources."},"ja":{"roleTitle":"Backup for GKE 復元管理者","roleName":"roles/gkebackup.restoreAdmin","roleDescription":"管理者に RestorePlan と Restore のすべてのリソースの管理を許可します。"}},"roles/gkebackup.viewer":{"permissions":["gkebackup.backupPlans.get","gkebackup.backupPlans.getIamPolicy","gkebackup.backupPlans.list","gkebackup.backups.get","gkebackup.backups.list","gkebackup.locations.*","gkebackup.operations.get","gkebackup.operations.list","gkebackup.restorePlans.get","gkebackup.restorePlans.getIamPolicy","gkebackup.restorePlans.list","gkebackup.restores.get","gkebackup.restores.list","gkebackup.volumeBackups.*","gkebackup.volumeRestores.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Backup for GKE Viewer","roleName":"roles/gkebackup.viewer","roleDescription":"Read-only access to all Backup for GKE resources."},"ja":{"roleTitle":"Backup for GKE 閲覧者","roleName":"roles/gkebackup.viewer","roleDescription":"すべての Backup for GKE リソースに対する読み取り専用アクセス権。"}},"roles/bigquery.admin":{"permissions":["bigquery.bireservations.*","bigquery.capacityCommitments.*","bigquery.config.*","bigquery.connections.*","bigquery.dataPolicies.*","bigquery.datasets.*","bigquery.jobs.*","bigquery.models.*","bigquery.readsessions.*","bigquery.reservationAssignments.*","bigquery.reservations.*","bigquery.routines.*","bigquery.rowAccessPolicies.create","bigquery.rowAccessPolicies.delete","bigquery.rowAccessPolicies.getIamPolicy","bigquery.rowAccessPolicies.list","bigquery.rowAccessPolicies.overrideTimeTravelRestrictions","bigquery.rowAccessPolicies.setIamPolicy","bigquery.rowAccessPolicies.update","bigquery.savedqueries.*","bigquery.tables.*","bigquery.transfers.*","bigquerymigration.translation.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Admin","roleName":"roles/bigquery.admin","roleDescription":"Provides permissions to manage all resources within the project. Can manage\nall data within the project, and can cancel jobs from other users running\nwithin the project."},"ja":{"roleTitle":"BigQuery 管理者","roleName":"roles/bigquery.admin","roleDescription":"プロジェクト内のすべてのリソースを管理する権限を提供します。プロジェクト内のすべてのデータを管理でき、プロジェクト内で実行されている他のユーザーのジョブもキャンセルできます。"}},"roles/bigquery.connectionAdmin":{"permissions":["bigquery.connections.*"],"en":{"roleTitle":"BigQuery Connection Admin","roleName":"roles/bigquery.connectionAdmin","roleDescription":""},"ja":{"roleTitle":"BigQuery Connection 管理者","roleName":"roles/bigquery.connectionAdmin","roleDescription":""}},"roles/bigquery.connectionUser":{"permissions":["bigquery.connections.get","bigquery.connections.getIamPolicy","bigquery.connections.list","bigquery.connections.use"],"en":{"roleTitle":"BigQuery Connection User","roleName":"roles/bigquery.connectionUser","roleDescription":""},"ja":{"roleTitle":"BigQuery Connection ユーザー","roleName":"roles/bigquery.connectionUser","roleDescription":""}},"roles/bigquery.dataEditor":{"permissions":["bigquery.config.get","bigquery.datasets.create","bigquery.datasets.get","bigquery.datasets.getIamPolicy","bigquery.datasets.updateTag","bigquery.models.*","bigquery.routines.*","bigquery.tables.create","bigquery.tables.createIndex","bigquery.tables.createSnapshot","bigquery.tables.delete","bigquery.tables.deleteIndex","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.getIamPolicy","bigquery.tables.list","bigquery.tables.restoreSnapshot","bigquery.tables.update","bigquery.tables.updateData","bigquery.tables.updateTag","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Data Editor","roleName":"roles/bigquery.dataEditor","roleDescription":"When applied to a table or view, this role provides permissions to:\n\nRead and update data and metadata for the table or view.\nDelete the table or view.\n\nThis role cannot be applied to individual models or routines.\nWhen applied to a dataset, this role provides permissions to:\n\nRead the dataset's metadata and list tables in the dataset.\nCreate, update, get, and delete the dataset's tables.\n\n\nWhen applied at the project or organization level, this role can also\ncreate new datasets."},"ja":{"roleTitle":"BigQuery データ編集者","roleName":"roles/bigquery.dataEditor","roleDescription":"このロールをテーブルまたはビューに適用すると、次の権限が付与されます。\n\nテーブルまたはビューのデータとメタデータを読み取り、更新する。\nテーブルまたはビューを削除する。\n\nこのロールは、個々のモデルやルーティンに適用できません。\nこのロールをデータセットに適用すると、次の権限が付与されます。\n\nデータセットのメタデータを読み取り、データセット内のテーブルを一覧表示する。\nデータセットのテーブルを作成、更新、取得、削除する。\n\nプロジェクトまたは組織レベルで適用した場合、このロールは新しいデータセットを作成することもできます。"}},"roles/bigquery.dataOwner":{"permissions":["bigquery.config.get","bigquery.dataPolicies.*","bigquery.datasets.*","bigquery.models.*","bigquery.routines.*","bigquery.rowAccessPolicies.create","bigquery.rowAccessPolicies.delete","bigquery.rowAccessPolicies.getIamPolicy","bigquery.rowAccessPolicies.list","bigquery.rowAccessPolicies.setIamPolicy","bigquery.rowAccessPolicies.update","bigquery.tables.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Data Owner","roleName":"roles/bigquery.dataOwner","roleDescription":"When applied to a table or view, this role provides permissions to:\n\nRead and update data and metadata for the table or view.\nShare the table or view.\nDelete the table or view.\n\nThis role cannot be applied to individual models or routines.\nWhen applied to a dataset, this role provides permissions to:\n\nRead, update, and delete the dataset.\nCreate, update, get, and delete the dataset's tables.\n\n\nWhen applied at the project or organization level, this role can also\ncreate new datasets."},"ja":{"roleTitle":"BigQuery データオーナー","roleName":"roles/bigquery.dataOwner","roleDescription":"このロールをテーブルまたはビューに適用すると、次の権限が付与されます。\n\nテーブルまたはビューのデータとメタデータを読み取り、更新する。\nテーブルまたはビューを共有する。\nテーブルまたはビューを削除する。\n\nこのロールは、個々のモデルやルーティンに適用できません。\nこのロールをデータセットに適用すると、次の権限が付与されます。\n\nデータセットを読み取り、更新、削除する。\nデータセットのテーブルを作成、更新、取得、削除する。\n\nプロジェクトまたは組織レベルで適用した場合、このロールは新しいデータセットを作成することもできます。"}},"roles/bigquery.dataViewer":{"permissions":["bigquery.datasets.get","bigquery.datasets.getIamPolicy","bigquery.models.export","bigquery.models.getData","bigquery.models.getMetadata","bigquery.models.list","bigquery.routines.get","bigquery.routines.list","bigquery.tables.createSnapshot","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.getIamPolicy","bigquery.tables.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Data Viewer","roleName":"roles/bigquery.dataViewer","roleDescription":"When applied to a table or view, this role provides permissions to:\n\nRead data and metadata from the table or view.\n\nThis role cannot be applied to individual models or routines.\nWhen applied to a dataset, this role provides permissions to:\n\nRead the dataset's metadata and list tables in the dataset.\nRead data and metadata from the dataset's tables.\n\n\nWhen applied at the project or organization level, this role can also\nenumerate all datasets in the project. Additional roles, however, are\nnecessary to allow the running of jobs."},"ja":{"roleTitle":"BigQuery データ閲覧者","roleName":"roles/bigquery.dataViewer","roleDescription":"このロールをテーブルまたはビューに適用すると、次の権限が付与されます。\n\nテーブルまたはビューからデータとメタデータを読み取る。\n\nこのロールは、個々のモデルやルーティンに適用できません。\nこのロールをデータセットに適用すると、次の権限が付与されます。\n\nデータセットのメタデータを読み取り、データセット内のテーブルを一覧表示する。\nデータセットのテーブルからデータとメタデータを読み取る。\n\n\nプロジェクトまたは組織レベルで適用した場合、このロールは、プロジェクト内のすべてのデータセットを列挙することもできます。ただし、ジョブを実行するためには追加の役割が必要です。"}},"roles/bigquery.filteredDataViewer":{"permissions":["bigquery.rowAccessPolicies.getFilteredData"],"en":{"roleTitle":"BigQuery Filtered Data Viewer","roleName":"roles/bigquery.filteredDataViewer","roleDescription":"Access to view filtered table data defined by a row access policy"},"ja":{"roleTitle":"BigQuery フィルタ済みデータ閲覧者","roleName":"roles/bigquery.filteredDataViewer","roleDescription":"行アクセス ポリシーにより定義される、フィルタ済みテーブルデータを表示するためのアクセス権"}},"roles/bigquery.jobUser":{"permissions":["bigquery.config.get","bigquery.jobs.create","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Job User","roleName":"roles/bigquery.jobUser","roleDescription":"Provides permissions to run jobs, including queries, within the project."},"ja":{"roleTitle":"BigQuery ジョブユーザー","roleName":"roles/bigquery.jobUser","roleDescription":"プロジェクト内でジョブ(クエリを含む)を実行する権限を付与します。"}},"roles/bigquery.metadataViewer":{"permissions":["bigquery.datasets.get","bigquery.datasets.getIamPolicy","bigquery.models.getMetadata","bigquery.models.list","bigquery.routines.get","bigquery.routines.list","bigquery.tables.get","bigquery.tables.getIamPolicy","bigquery.tables.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Metadata Viewer","roleName":"roles/bigquery.metadataViewer","roleDescription":"When applied to a table or view, this role provides permissions to:\n\nRead metadata from the table or view.\n\nThis role cannot be applied to individual models or routines.\nWhen applied to a dataset, this role provides permissions to:\n\nList tables and views in the dataset.\nRead metadata from the dataset's tables and views.\n\nWhen applied at the project or organization level, this role provides permissions to:\n\nList all datasets and read metadata for all datasets in the project.\nList all tables and views and read metadata for all tables and views\nin the project.\n\n\nAdditional roles are necessary to allow the running of jobs."},"ja":{"roleTitle":"BigQuery メタデータ閲覧者","roleName":"roles/bigquery.metadataViewer","roleDescription":"このロールをテーブルまたはビューに適用すると、次の権限が付与されます。\n\nテーブルまたはビューからメタデータを読み取る。\n\nこのロールは、個々のモデルやルーティンに適用できません。\nこのロールをデータセットに適用すると、次の権限が付与されます。\n\nデータセット内のテーブルとビューを一覧表示する。\nデータセットのテーブルとビューからメタデータを読み取る。\n\nこのロールをプロジェクト レベルまたは組織レベルで適用すると、次の権限が付与されます。\n\nプロジェクト内のすべてのデータセットを一覧表示し、すべてのデータセットのメタデータを読み込む。\nプロジェクト内のすべてのテーブルとビューを一覧表示し、すべてのテーブルとビューのメタデータを読み込みます。\n\nジョブを実行する場合は追加の役割が必要です。"}},"roles/bigquery.readSessionUser":{"permissions":["bigquery.readsessions.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Read Session User","roleName":"roles/bigquery.readSessionUser","roleDescription":"Access to create and use read sessions"},"ja":{"roleTitle":"BigQuery 読み取りセッション ユーザー","roleName":"roles/bigquery.readSessionUser","roleDescription":"読み取りセッションを作成および使用するためのアクセス権"}},"roles/bigquery.resourceAdmin":{"permissions":["bigquery.bireservations.*","bigquery.capacityCommitments.*","bigquery.jobs.get","bigquery.jobs.list","bigquery.jobs.listAll","bigquery.jobs.listExecutionMetadata","bigquery.reservationAssignments.*","bigquery.reservations.*","recommender.bigqueryCapacityCommitmentsInsights.*","recommender.bigqueryCapacityCommitmentsRecommendations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Resource Admin","roleName":"roles/bigquery.resourceAdmin","roleDescription":"Administer all BigQuery resources."},"ja":{"roleTitle":"BigQuery リソース管理者","roleName":"roles/bigquery.resourceAdmin","roleDescription":"BigQuery のすべてのリソースを管理します。"}},"roles/bigquery.resourceEditor":{"permissions":["bigquery.bireservations.get","bigquery.capacityCommitments.get","bigquery.capacityCommitments.list","bigquery.jobs.get","bigquery.jobs.list","bigquery.jobs.listAll","bigquery.jobs.listExecutionMetadata","bigquery.reservationAssignments.*","bigquery.reservations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Resource Editor","roleName":"roles/bigquery.resourceEditor","roleDescription":"Manage all BigQuery resources, but cannot make purchasing decisions."},"ja":{"roleTitle":"BigQuery リソース編集者","roleName":"roles/bigquery.resourceEditor","roleDescription":"すべての BigQuery リソースを管理しますが、購入意思決定はできません。"}},"roles/bigquery.resourceViewer":{"permissions":["bigquery.bireservations.get","bigquery.capacityCommitments.get","bigquery.capacityCommitments.list","bigquery.jobs.get","bigquery.jobs.list","bigquery.jobs.listAll","bigquery.jobs.listExecutionMetadata","bigquery.reservationAssignments.list","bigquery.reservationAssignments.search","bigquery.reservations.get","bigquery.reservations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Resource Viewer","roleName":"roles/bigquery.resourceViewer","roleDescription":"View all BigQuery resources but cannot make changes or purchasing decisions."},"ja":{"roleTitle":"BigQuery リソース閲覧者","roleName":"roles/bigquery.resourceViewer","roleDescription":"すべての BigQuery リソースを表示できますが、変更や購入意思決定はできません。"}},"roles/bigquery.user":{"permissions":["bigquery.bireservations.get","bigquery.capacityCommitments.get","bigquery.capacityCommitments.list","bigquery.config.get","bigquery.datasets.create","bigquery.datasets.get","bigquery.datasets.getIamPolicy","bigquery.jobs.create","bigquery.jobs.list","bigquery.models.list","bigquery.readsessions.*","bigquery.reservationAssignments.list","bigquery.reservationAssignments.search","bigquery.reservations.get","bigquery.reservations.list","bigquery.routines.list","bigquery.savedqueries.get","bigquery.savedqueries.list","bigquery.tables.list","bigquery.transfers.get","bigquerymigration.translation.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery User","roleName":"roles/bigquery.user","roleDescription":"When applied to a dataset, this role provides the ability to read the dataset's metadata and list\ntables in the dataset.\nWhen applied to a project, this role also provides the ability to run jobs, including queries,\nwithin the project. A principal with this role can enumerate their own jobs, cancel their own jobs, and\nenumerate datasets within a project. Additionally, allows the creation of new datasets within the\nproject; the creator is granted the BigQuery Data Owner role (roles/bigquery.dataOwner)\non these new datasets."},"ja":{"roleTitle":"BigQuery ユーザー","roleName":"roles/bigquery.user","roleDescription":"このロールをデータセットに適用すると、データセットのメタデータを読み取り、データセット内のテーブルを一覧表示できます。\nプロジェクトに適用すると、プロジェクト内でクエリなどのジョブを実行することもできるようになります。このロールを持つプリンシパルは、所有するジョブの列挙、所有するジョブのキャンセル、プロジェクト内のデータセットの列挙を行えます。また、プロジェクト内に新しいデータセットを作成することもできます。作成者には新しいデータセットに対する BigQuery データオーナーのロール(roles/bigquery.dataOwner)が付与されます。"}},"roles/billing.admin":{"permissions":["billing.accounts.close","billing.accounts.get","billing.accounts.getIamPolicy","billing.accounts.getPaymentInfo","billing.accounts.getPricing","billing.accounts.getSpendingInformation","billing.accounts.getUsageExportSpec","billing.accounts.list","billing.accounts.move","billing.accounts.redeemPromotion","billing.accounts.removeFromOrganization","billing.accounts.reopen","billing.accounts.setIamPolicy","billing.accounts.update","billing.accounts.updatePaymentInfo","billing.accounts.updateUsageExportSpec","billing.budgets.*","billing.credits.*","billing.resourceAssociations.*","billing.subscriptions.*","cloudnotifications.*","commerceoffercatalog.*","consumerprocurement.accounts.*","consumerprocurement.orderAttributions.*","consumerprocurement.orders.*","dataprocessing.datasources.get","dataprocessing.datasources.list","dataprocessing.groupcontrols.get","dataprocessing.groupcontrols.list","logging.logEntries.list","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.privateLogEntries.*","recommender.commitmentUtilizationInsights.*","recommender.usageCommitmentRecommendations.*","resourcemanager.projects.createBillingAssignment","resourcemanager.projects.deleteBillingAssignment"],"en":{"roleTitle":"Billing Account Administrator","roleName":"roles/billing.admin","roleDescription":"Provides access to see and manage all aspects of billing accounts."},"ja":{"roleTitle":"請求先アカウント管理者","roleName":"roles/billing.admin","roleDescription":"請求先アカウントを表示、管理できる権限を付与します。"}},"roles/billing.costsManager":{"permissions":["billing.accounts.get","billing.accounts.getIamPolicy","billing.accounts.getSpendingInformation","billing.accounts.getUsageExportSpec","billing.accounts.list","billing.accounts.updateUsageExportSpec","billing.budgets.*","billing.resourceAssociations.list"],"en":{"roleTitle":"Billing Account Costs Manager","roleName":"roles/billing.costsManager","roleDescription":"Manage budgets for a billing account, and view, analyze, and export cost information of a billing\naccount."},"ja":{"roleTitle":"請求先アカウントの費用管理者","roleName":"roles/billing.costsManager","roleDescription":"請求先アカウントの費用情報を表示、エクスポートできます。"}},"roles/billing.creator":{"permissions":["billing.accounts.create","resourcemanager.organizations.get"],"en":{"roleTitle":"Billing Account Creator","roleName":"roles/billing.creator","roleDescription":"Provides access to create billing accounts."},"ja":{"roleTitle":"請求先アカウント作成者","roleName":"roles/billing.creator","roleDescription":"請求先アカウントを作成するための権限を付与します。"}},"roles/billing.projectManager":{"permissions":["resourcemanager.projects.createBillingAssignment","resourcemanager.projects.deleteBillingAssignment"],"en":{"roleTitle":"Project Billing Manager","roleName":"roles/billing.projectManager","roleDescription":"When granted in conjunction with the Billing Account User role, provides access to assign a\nproject's billing account or disable its billing."},"ja":{"roleTitle":"プロジェクト支払い管理者","roleName":"roles/billing.projectManager","roleDescription":"プロジェクトの請求先アカウントの割り当てと、請求の無効化を行う権限を付与します。"}},"roles/billing.user":{"permissions":["billing.accounts.get","billing.accounts.getIamPolicy","billing.accounts.list","billing.accounts.redeemPromotion","billing.credits.*","billing.resourceAssociations.create"],"en":{"roleTitle":"Billing Account User","roleName":"roles/billing.user","roleDescription":"When granted in conjunction with the Project Owner role or Project Billing Manager role, provides\naccess to associate projects with billing accounts."},"ja":{"roleTitle":"請求先アカウント ユーザー","roleName":"roles/billing.user","roleDescription":"プロジェクトに請求先アカウントを関連付けるための権限を付与します。"}},"roles/billing.viewer":{"permissions":["billing.accounts.get","billing.accounts.getIamPolicy","billing.accounts.getPaymentInfo","billing.accounts.getPricing","billing.accounts.getSpendingInformation","billing.accounts.getUsageExportSpec","billing.accounts.list","billing.budgets.get","billing.budgets.list","billing.credits.*","billing.resourceAssociations.list","billing.subscriptions.get","billing.subscriptions.list","commerceoffercatalog.*","consumerprocurement.accounts.get","consumerprocurement.accounts.list","consumerprocurement.orderAttributions.get","consumerprocurement.orderAttributions.list","consumerprocurement.orders.get","consumerprocurement.orders.list","dataprocessing.datasources.get","dataprocessing.datasources.list","dataprocessing.groupcontrols.get","dataprocessing.groupcontrols.list","recommender.commitmentUtilizationInsights.get","recommender.commitmentUtilizationInsights.list","recommender.usageCommitmentRecommendations.get","recommender.usageCommitmentRecommendations.list"],"en":{"roleTitle":"Billing Account Viewer","roleName":"roles/billing.viewer","roleDescription":"View billing account cost and pricing information, transactions, and billing and commitment\nrecommendations."},"ja":{"roleTitle":"請求先アカウント閲覧者","roleName":"roles/billing.viewer","roleDescription":"請求先アカウントの費用情報とトランザクションを表示します。"}},"roles/binaryauthorization.attestorsAdmin":{"permissions":["binaryauthorization.attestors.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Binary Authorization Attestor Admin","roleName":"roles/binaryauthorization.attestorsAdmin","roleDescription":"Administrator of Binary Authorization Attestors"},"ja":{"roleTitle":"Binary Authorization 認証者管理者","roleName":"roles/binaryauthorization.attestorsAdmin","roleDescription":"Binary Authorization 認証者の管理者"}},"roles/binaryauthorization.attestorsEditor":{"permissions":["binaryauthorization.attestors.create","binaryauthorization.attestors.delete","binaryauthorization.attestors.get","binaryauthorization.attestors.list","binaryauthorization.attestors.update","binaryauthorization.attestors.verifyImageAttested","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Binary Authorization Attestor Editor","roleName":"roles/binaryauthorization.attestorsEditor","roleDescription":"Editor of Binary Authorization Attestors"},"ja":{"roleTitle":"Binary Authorization 認証者編集者","roleName":"roles/binaryauthorization.attestorsEditor","roleDescription":"Binary Authorization 認証者の編集者"}},"roles/binaryauthorization.attestorsVerifier":{"permissions":["binaryauthorization.attestors.get","binaryauthorization.attestors.list","binaryauthorization.attestors.verifyImageAttested","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Binary Authorization Attestor Image Verifier","roleName":"roles/binaryauthorization.attestorsVerifier","roleDescription":"Caller of Binary Authorization Attestors VerifyImageAttested"},"ja":{"roleTitle":"Binary Authorization 認証者イメージ検証者","roleName":"roles/binaryauthorization.attestorsVerifier","roleDescription":"Binary Authorization 認証者の VerifyImageAttested の呼び出し担当者"}},"roles/binaryauthorization.attestorsViewer":{"permissions":["binaryauthorization.attestors.get","binaryauthorization.attestors.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Binary Authorization Attestor Viewer","roleName":"roles/binaryauthorization.attestorsViewer","roleDescription":"Viewer of Binary Authorization Attestors"},"ja":{"roleTitle":"Binary Authorization 認証者閲覧者","roleName":"roles/binaryauthorization.attestorsViewer","roleDescription":"Binary Authorization 認証者の閲覧者"}},"roles/binaryauthorization.policyAdmin":{"permissions":["binaryauthorization.continuousValidationConfig.*","binaryauthorization.platformPolicies.*","binaryauthorization.policy.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Binary Authorization Policy Administrator","roleName":"roles/binaryauthorization.policyAdmin","roleDescription":"Administrator of Binary Authorization Policy"},"ja":{"roleTitle":"Binary Authorization ポリシー管理者","roleName":"roles/binaryauthorization.policyAdmin","roleDescription":"Binary Authorization ポリシーの管理者"}},"roles/binaryauthorization.policyEditor":{"permissions":["binaryauthorization.continuousValidationConfig.get","binaryauthorization.continuousValidationConfig.update","binaryauthorization.platformPolicies.*","binaryauthorization.policy.evaluatePolicy","binaryauthorization.policy.get","binaryauthorization.policy.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Binary Authorization Policy Editor","roleName":"roles/binaryauthorization.policyEditor","roleDescription":"Editor of Binary Authorization Policy"},"ja":{"roleTitle":"Binary Authorization ポリシー編集者","roleName":"roles/binaryauthorization.policyEditor","roleDescription":"Binary Authorization ポリシーの編集者"}},"roles/binaryauthorization.policyEvaluator":{"permissions":["binaryauthorization.platformPolicies.evaluatePolicy","binaryauthorization.platformPolicies.get","binaryauthorization.platformPolicies.list","binaryauthorization.policy.evaluatePolicy","binaryauthorization.policy.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Binary Authorization Policy Evaluator","roleName":"roles/binaryauthorization.policyEvaluator","roleDescription":"Evaluator of Binary Authorization Policy"},"ja":{"roleTitle":"Binary Authorization ポリシー評価者","roleName":"roles/binaryauthorization.policyEvaluator","roleDescription":"Binary Authorization ポリシーの評価者"}},"roles/binaryauthorization.policyViewer":{"permissions":["binaryauthorization.continuousValidationConfig.get","binaryauthorization.platformPolicies.get","binaryauthorization.platformPolicies.list","binaryauthorization.policy.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Binary Authorization Policy Viewer","roleName":"roles/binaryauthorization.policyViewer","roleDescription":"Viewer of Binary Authorization Policy"},"ja":{"roleTitle":"Binary Authorization ポリシー閲覧者","roleName":"roles/binaryauthorization.policyViewer","roleDescription":"Binary Authorization ポリシーの閲覧者"}},"roles/privateca.admin":{"permissions":["privateca.*","resourcemanager.projects.get","resourcemanager.projects.list","storage.buckets.create"],"en":{"roleTitle":"CA Service Admin","roleName":"roles/privateca.admin","roleDescription":"Full access to all CA Service resources."},"ja":{"roleTitle":"CA サービス管理者","roleName":"roles/privateca.admin","roleDescription":"すべての CA サービスのリソースへの完全アクセス権。"}},"roles/privateca.auditor":{"permissions":["privateca.caPools.get","privateca.caPools.getIamPolicy","privateca.caPools.list","privateca.certificateAuthorities.get","privateca.certificateAuthorities.getIamPolicy","privateca.certificateAuthorities.list","privateca.certificateRevocationLists.get","privateca.certificateRevocationLists.getIamPolicy","privateca.certificateRevocationLists.list","privateca.certificateTemplates.get","privateca.certificateTemplates.getIamPolicy","privateca.certificateTemplates.list","privateca.certificates.get","privateca.certificates.getIamPolicy","privateca.certificates.list","privateca.locations.*","privateca.operations.get","privateca.operations.list","privateca.reusableConfigs.get","privateca.reusableConfigs.getIamPolicy","privateca.reusableConfigs.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"CA Service Auditor","roleName":"roles/privateca.auditor","roleDescription":"Read-only access to all CA Service resources."},"ja":{"roleTitle":"CA サービス監査者","roleName":"roles/privateca.auditor","roleDescription":"すべての CA サービスのリソースの読み取り専用アクセス権。"}},"roles/privateca.caManager":{"permissions":["privateca.caPools.create","privateca.caPools.delete","privateca.caPools.get","privateca.caPools.getIamPolicy","privateca.caPools.list","privateca.caPools.update","privateca.certificateAuthorities.create","privateca.certificateAuthorities.delete","privateca.certificateAuthorities.get","privateca.certificateAuthorities.getIamPolicy","privateca.certificateAuthorities.list","privateca.certificateAuthorities.update","privateca.certificateRevocationLists.get","privateca.certificateRevocationLists.getIamPolicy","privateca.certificateRevocationLists.list","privateca.certificateRevocationLists.update","privateca.certificateTemplates.create","privateca.certificateTemplates.delete","privateca.certificateTemplates.get","privateca.certificateTemplates.getIamPolicy","privateca.certificateTemplates.list","privateca.certificateTemplates.update","privateca.certificates.get","privateca.certificates.getIamPolicy","privateca.certificates.list","privateca.certificates.update","privateca.locations.*","privateca.operations.get","privateca.operations.list","privateca.reusableConfigs.create","privateca.reusableConfigs.delete","privateca.reusableConfigs.get","privateca.reusableConfigs.getIamPolicy","privateca.reusableConfigs.list","privateca.reusableConfigs.update","resourcemanager.projects.get","resourcemanager.projects.list","storage.buckets.create"],"en":{"roleTitle":"CA Service Operation Manager","roleName":"roles/privateca.caManager","roleDescription":"Create and manage CAs, revoke certificates, create certificates templates, and read-only access for CA Service resources."},"ja":{"roleTitle":"CA サービス オペレーション マネージャー","roleName":"roles/privateca.caManager","roleDescription":"CA の作成と管理、証明書の失効、証明書テンプレートの作成、CA サービスのリソースの読み取り専用アクセス。"}},"roles/privateca.certificateManager":{"permissions":["privateca.caPools.get","privateca.caPools.getIamPolicy","privateca.caPools.list","privateca.certificateAuthorities.get","privateca.certificateAuthorities.getIamPolicy","privateca.certificateAuthorities.list","privateca.certificateRevocationLists.get","privateca.certificateRevocationLists.getIamPolicy","privateca.certificateRevocationLists.list","privateca.certificateTemplates.get","privateca.certificateTemplates.getIamPolicy","privateca.certificateTemplates.list","privateca.certificates.create","privateca.certificates.get","privateca.certificates.getIamPolicy","privateca.certificates.list","privateca.locations.*","privateca.operations.get","privateca.operations.list","privateca.reusableConfigs.get","privateca.reusableConfigs.getIamPolicy","privateca.reusableConfigs.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"CA Service Certificate Manager","roleName":"roles/privateca.certificateManager","roleDescription":"Create certificates and read-only access for CA Service resources."},"ja":{"roleTitle":"CA サービス証明書管理者","roleName":"roles/privateca.certificateManager","roleDescription":"証明書の作成と CA サービスのリソースに対する読み取り専用アクセス権。"}},"roles/privateca.certificateRequester":{"permissions":["privateca.certificates.create"],"en":{"roleTitle":"CA Service Certificate Requester","roleName":"roles/privateca.certificateRequester","roleDescription":"Request certificates from CA Service."},"ja":{"roleTitle":"CA サービス証明書リクエスト元","roleName":"roles/privateca.certificateRequester","roleDescription":"CA サービスから証明書をリクエストします。"}},"roles/privateca.templateUser":{"permissions":["privateca.certificateTemplates.get","privateca.certificateTemplates.list","privateca.certificateTemplates.use"],"en":{"roleTitle":"CA Service Certificate Template User","roleName":"roles/privateca.templateUser","roleDescription":"Read, list and use certificate templates."},"ja":{"roleTitle":"CA サービス証明書テンプレート ユーザー","roleName":"roles/privateca.templateUser","roleDescription":"証明書テンプレートの読み取り、一覧表示、使用。"}},"roles/privateca.workloadCertificateRequester":{"permissions":["privateca.certificates.createForSelf"],"en":{"roleTitle":"CA Service Workload Certificate Requester","roleName":"roles/privateca.workloadCertificateRequester","roleDescription":"Request certificates from CA Service with caller's identity."},"ja":{"roleTitle":"CA サービス ワークロード証明書リクエスト元","roleName":"roles/privateca.workloadCertificateRequester","roleDescription":"呼び出し元の ID を使用して CA サービスから証明書をリクエストします。"}},"roles/certificatemanager.editor":{"permissions":["certificatemanager.certmapentries.create","certificatemanager.certmapentries.get","certificatemanager.certmapentries.getIamPolicy","certificatemanager.certmapentries.list","certificatemanager.certmapentries.update","certificatemanager.certmaps.create","certificatemanager.certmaps.get","certificatemanager.certmaps.getIamPolicy","certificatemanager.certmaps.list","certificatemanager.certmaps.update","certificatemanager.certmaps.use","certificatemanager.certs.create","certificatemanager.certs.get","certificatemanager.certs.getIamPolicy","certificatemanager.certs.list","certificatemanager.certs.update","certificatemanager.certs.use","certificatemanager.dnsauthorizations.create","certificatemanager.dnsauthorizations.get","certificatemanager.dnsauthorizations.getIamPolicy","certificatemanager.dnsauthorizations.list","certificatemanager.dnsauthorizations.update","certificatemanager.dnsauthorizations.use","certificatemanager.locations.*","certificatemanager.operations.get","certificatemanager.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Certificate Manager Editor","roleName":"roles/certificatemanager.editor","roleDescription":"Edit access to Certificate Manager all resources."},"ja":{"roleTitle":"Certificate Manager 編集者","roleName":"roles/certificatemanager.editor","roleDescription":"すべての Certificate Manager リソースに対する編集アクセス権。"}},"roles/certificatemanager.owner":{"permissions":["certificatemanager.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Certificate Manager Owner","roleName":"roles/certificatemanager.owner","roleDescription":"Full access to Certificate Manager all resources."},"ja":{"roleTitle":"Certificate Manager オーナー","roleName":"roles/certificatemanager.owner","roleDescription":"すべての Certificate Manager リソースに対する完全アクセス権。"}},"roles/certificatemanager.viewer":{"permissions":["certificatemanager.certmapentries.get","certificatemanager.certmapentries.getIamPolicy","certificatemanager.certmapentries.list","certificatemanager.certmaps.get","certificatemanager.certmaps.getIamPolicy","certificatemanager.certmaps.list","certificatemanager.certs.get","certificatemanager.certs.getIamPolicy","certificatemanager.certs.list","certificatemanager.dnsauthorizations.get","certificatemanager.dnsauthorizations.getIamPolicy","certificatemanager.dnsauthorizations.list","certificatemanager.locations.*","certificatemanager.operations.get","certificatemanager.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Certificate Manager Viewer","roleName":"roles/certificatemanager.viewer","roleDescription":"Read-only access to Certificate Manager all resources."},"ja":{"roleTitle":"Certificate Manager 閲覧者","roleName":"roles/certificatemanager.viewer","roleDescription":"すべての Certificate Manager リソースに対する読み取り専用アクセス権。"}},"roles/cloudasset.owner":{"permissions":["cloudasset.*","recommender.cloudAssetInsights.*","recommender.locations.*"],"en":{"roleTitle":"Cloud Asset Owner","roleName":"roles/cloudasset.owner","roleDescription":"Full access to cloud assets metadata"},"ja":{"roleTitle":"Cloud Asset オーナー","roleName":"roles/cloudasset.owner","roleDescription":"Cloud Asset メタデータへの完全アクセス権"}},"roles/cloudasset.viewer":{"permissions":["cloudasset.assets.*","recommender.cloudAssetInsights.get","recommender.cloudAssetInsights.list","recommender.locations.*"],"en":{"roleTitle":"Cloud Asset Viewer","roleName":"roles/cloudasset.viewer","roleDescription":"Read only access to cloud assets metadata"},"ja":{"roleTitle":"Cloud Asset 閲覧者","roleName":"roles/cloudasset.viewer","roleDescription":"Cloud Asset メタデータに対する読み取り権限"}},"roles/bigtable.admin":{"permissions":["bigtable.*","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.timeSeries.list","resourcemanager.projects.get"],"en":{"roleTitle":"Bigtable Administrator","roleName":"roles/bigtable.admin","roleDescription":"Administers all instances within a project, including the data stored within\ntables. Can create new instances. Intended for project administrators."},"ja":{"roleTitle":"Bigtable 管理者","roleName":"roles/bigtable.admin","roleDescription":"テーブル内に保存されているデータなど、プロジェクト内のすべてのインスタンスを管理します。新しいインスタンスを作成できます。プロジェクト管理者向け。"}},"roles/bigtable.reader":{"permissions":["bigtable.appProfiles.get","bigtable.appProfiles.list","bigtable.backups.get","bigtable.backups.list","bigtable.clusters.get","bigtable.clusters.list","bigtable.instances.get","bigtable.instances.list","bigtable.keyvisualizer.*","bigtable.locations.*","bigtable.tables.checkConsistency","bigtable.tables.generateConsistencyToken","bigtable.tables.get","bigtable.tables.list","bigtable.tables.readRows","bigtable.tables.sampleRowKeys","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.timeSeries.list","resourcemanager.projects.get"],"en":{"roleTitle":"Bigtable Reader","roleName":"roles/bigtable.reader","roleDescription":"Provides read-only access to the data stored within tables. Intended for\ndata scientists, dashboard generators, and other data-analysis scenarios."},"ja":{"roleTitle":"Bigtable Reader","roleName":"roles/bigtable.reader","roleDescription":"テーブル内に保存されたデータへの読み取りアクセス権を提供します。データ科学者、ダッシュボード生成ツール、その他のデータ分析シナリオ向け。"}},"roles/bigtable.user":{"permissions":["bigtable.appProfiles.get","bigtable.appProfiles.list","bigtable.backups.get","bigtable.backups.list","bigtable.clusters.get","bigtable.clusters.list","bigtable.instances.get","bigtable.instances.list","bigtable.keyvisualizer.*","bigtable.locations.*","bigtable.tables.checkConsistency","bigtable.tables.generateConsistencyToken","bigtable.tables.get","bigtable.tables.list","bigtable.tables.mutateRows","bigtable.tables.readRows","bigtable.tables.sampleRowKeys","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.timeSeries.list","resourcemanager.projects.get"],"en":{"roleTitle":"Bigtable User","roleName":"roles/bigtable.user","roleDescription":"Provides read-write access to the data stored within tables. Intended for\napplication developers or service accounts."},"ja":{"roleTitle":"Bigtable ユーザー","roleName":"roles/bigtable.user","roleDescription":"テーブル内に保存されたデータへの読み取り / 書き込みアクセス権を提供します。アプリケーション デベロッパーやサービス アカウント向け。"}},"roles/bigtable.viewer":{"permissions":["bigtable.appProfiles.get","bigtable.appProfiles.list","bigtable.backups.get","bigtable.backups.list","bigtable.clusters.get","bigtable.clusters.list","bigtable.instances.get","bigtable.instances.list","bigtable.locations.*","bigtable.tables.checkConsistency","bigtable.tables.generateConsistencyToken","bigtable.tables.get","bigtable.tables.list","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.timeSeries.list","resourcemanager.projects.get"],"en":{"roleTitle":"Bigtable Viewer","roleName":"roles/bigtable.viewer","roleDescription":"Provides no data access. Intended as a minimal set of permissions to access\nthe Cloud Console for Bigtable."},"ja":{"roleTitle":"Bigtable 閲覧者","roleName":"roles/bigtable.viewer","roleDescription":"データにはアクセスできません。Bigtable の Cloud Console にアクセスするための最小権限セットとして使用されます。"}},"roles/cloudbuild.builds.approver":{"permissions":["cloudbuild.builds.approve","cloudbuild.builds.get","cloudbuild.builds.list","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Build Approver","roleName":"roles/cloudbuild.builds.approver","roleDescription":"Can approve or reject pending builds."},"ja":{"roleTitle":"Cloud Build 承認者","roleName":"roles/cloudbuild.builds.approver","roleDescription":"保留中のビルドを承認または却下できます。"}},"roles/cloudbuild.builds.builder":{"permissions":["artifactregistry.aptartifacts.*","artifactregistry.dockerimages.*","artifactregistry.files.*","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.repositories.uploadArtifacts","artifactregistry.tags.create","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.tags.update","artifactregistry.versions.get","artifactregistry.versions.list","artifactregistry.yumartifacts.*","cloudbuild.builds.create","cloudbuild.builds.get","cloudbuild.builds.list","cloudbuild.builds.update","cloudbuild.workerpools.use","containeranalysis.occurrences.create","containeranalysis.occurrences.delete","containeranalysis.occurrences.get","containeranalysis.occurrences.list","containeranalysis.occurrences.update","logging.logEntries.create","logging.logEntries.list","logging.privateLogEntries.*","logging.views.access","pubsub.topics.create","pubsub.topics.publish","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.list","source.repos.get","source.repos.list","storage.buckets.create","storage.buckets.get","storage.buckets.list","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Cloud Build Service Account","roleName":"roles/cloudbuild.builds.builder","roleDescription":"Provides access to perform builds."},"ja":{"roleTitle":"Cloud Build サービス アカウント","roleName":"roles/cloudbuild.builds.builder","roleDescription":"ビルドを実行するためのアクセス権を提供します。"}},"roles/cloudbuild.builds.editor":{"permissions":["cloudbuild.builds.create","cloudbuild.builds.get","cloudbuild.builds.list","cloudbuild.builds.update","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Build Editor","roleName":"roles/cloudbuild.builds.editor","roleDescription":"Provides access to create and cancel builds."},"ja":{"roleTitle":"Cloud Build 編集者","roleName":"roles/cloudbuild.builds.editor","roleDescription":"ビルドを作成、キャンセルするためのアクセス権を付与します。"}},"roles/cloudbuild.builds.viewer":{"permissions":["cloudbuild.builds.get","cloudbuild.builds.list","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Build Viewer","roleName":"roles/cloudbuild.builds.viewer","roleDescription":"Provides access to view builds."},"ja":{"roleTitle":"Cloud Build 閲覧者","roleName":"roles/cloudbuild.builds.viewer","roleDescription":"ビルドを表示するための権限を付与します。"}},"roles/cloudbuild.integrationsEditor":{"permissions":["cloudbuild.integrations.get","cloudbuild.integrations.list","cloudbuild.integrations.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Build Integrations Editor","roleName":"roles/cloudbuild.integrationsEditor","roleDescription":"Can update Integrations"},"ja":{"roleTitle":"Cloud Build 統合編集者","roleName":"roles/cloudbuild.integrationsEditor","roleDescription":"統合を更新できます。"}},"roles/cloudbuild.integrationsOwner":{"permissions":["cloudbuild.integrations.*","compute.firewalls.create","compute.firewalls.get","compute.firewalls.list","compute.networks.get","compute.networks.updatePolicy","compute.regions.get","compute.subnetworks.get","compute.subnetworks.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Build Integrations Owner","roleName":"roles/cloudbuild.integrationsOwner","roleDescription":"Can create/delete Integrations"},"ja":{"roleTitle":"Cloud Build 統合オーナー","roleName":"roles/cloudbuild.integrationsOwner","roleDescription":"統合の作成と削除を行うことができます。"}},"roles/cloudbuild.integrationsViewer":{"permissions":["cloudbuild.integrations.get","cloudbuild.integrations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Build Integrations Viewer","roleName":"roles/cloudbuild.integrationsViewer","roleDescription":"Can view Integrations"},"ja":{"roleTitle":"Cloud Build 統合閲覧者","roleName":"roles/cloudbuild.integrationsViewer","roleDescription":"統合を表示できます。"}},"roles/cloudbuild.workerPoolEditor":{"permissions":["cloudbuild.workerpools.get","cloudbuild.workerpools.list","cloudbuild.workerpools.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Build WorkerPool Editor","roleName":"roles/cloudbuild.workerPoolEditor","roleDescription":"Can update and view WorkerPools"},"ja":{"roleTitle":"Cloud Build WorkerPool 編集者","roleName":"roles/cloudbuild.workerPoolEditor","roleDescription":"WorkerPool の更新と表示を行うことができます。"}},"roles/cloudbuild.workerPoolOwner":{"permissions":["cloudbuild.workerpools.create","cloudbuild.workerpools.delete","cloudbuild.workerpools.get","cloudbuild.workerpools.list","cloudbuild.workerpools.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Build WorkerPool Owner","roleName":"roles/cloudbuild.workerPoolOwner","roleDescription":"Can create, delete, update, and view WorkerPools"},"ja":{"roleTitle":"Cloud Build WorkerPool オーナー","roleName":"roles/cloudbuild.workerPoolOwner","roleDescription":"WorkerPool を作成、削除、更新、表示できます。"}},"roles/cloudbuild.workerPoolUser":{"permissions":["cloudbuild.workerpools.use"],"en":{"roleTitle":"Cloud Build WorkerPool User","roleName":"roles/cloudbuild.workerPoolUser","roleDescription":"Can run builds in the WorkerPool"},"ja":{"roleTitle":"Cloud Build WorkerPool ユーザー","roleName":"roles/cloudbuild.workerPoolUser","roleDescription":"WorkerPool 内でビルドを実行できます。"}},"roles/cloudbuild.workerPoolViewer":{"permissions":["cloudbuild.workerpools.get","cloudbuild.workerpools.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Build WorkerPool Viewer","roleName":"roles/cloudbuild.workerPoolViewer","roleDescription":"Can view WorkerPools"},"ja":{"roleTitle":"Cloud Build WorkerPool 閲覧者","roleName":"roles/cloudbuild.workerPoolViewer","roleDescription":"WorkerPool を表示できます。"}},"roles/composer.ServiceAgentV2Ext":{"permissions":["iam.serviceAccounts.getIamPolicy","iam.serviceAccounts.setIamPolicy"],"en":{"roleTitle":"Cloud Composer v2 API Service Agent Extension","roleName":"roles/composer.ServiceAgentV2Ext","roleDescription":"Cloud Composer v2 API Service Agent Extension is a supplementary role required to manage Composer v2 environments."},"ja":{"roleTitle":"Cloud Composer v2 API サービス エージェント拡張機能","roleName":"roles/composer.ServiceAgentV2Ext","roleDescription":"Cloud Composer v2 API サービス エージェント拡張機能は、Composer v2 環境を管理するために必要な補助的ロールです。"}},"roles/composer.admin":{"permissions":["composer.*","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Composer Administrator","roleName":"roles/composer.admin","roleDescription":"Provides full control of Cloud Composer resources."},"ja":{"roleTitle":"Composer 管理者","roleName":"roles/composer.admin","roleDescription":"Cloud Composer リソースのすべてを管理できます。"}},"roles/composer.environmentAndStorageObjectAdmin":{"permissions":["composer.*","orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Environment and Storage Object Administrator","roleName":"roles/composer.environmentAndStorageObjectAdmin","roleDescription":"Provides full control of Cloud Composer resources and of the objects in all project buckets."},"ja":{"roleTitle":"環境とストレージ オブジェクトの管理者","roleName":"roles/composer.environmentAndStorageObjectAdmin","roleDescription":"Cloud Composer のリソースとすべてのプロジェクト バケットのオブジェクトを管理できる権限を付与します。"}},"roles/composer.environmentAndStorageObjectViewer":{"permissions":["composer.dags.*","composer.environments.get","composer.environments.list","composer.imageversions.*","composer.operations.get","composer.operations.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Environment User and Storage Object Viewer","roleName":"roles/composer.environmentAndStorageObjectViewer","roleDescription":"Provides the permissions necessary to list and get Cloud Composer environments and operations.\nProvides read-only access to objects in all project buckets."},"ja":{"roleTitle":"環境ユーザーとストレージ オブジェクトの閲覧者","roleName":"roles/composer.environmentAndStorageObjectViewer","roleDescription":"Cloud Composer 環境とオペレーションを一覧表示して取得するために必要な権限を付与します。すべてのプロジェクト バケットのオブジェクトに対して読み取り専用アクセスを許可します。"}},"roles/composer.sharedVpcAgent":{"permissions":["compute.networks.access","compute.networks.addPeering","compute.networks.get","compute.networks.list","compute.networks.listPeeringRoutes","compute.networks.removePeering","compute.networks.updatePeering","compute.networks.use","compute.networks.useExternalIp","compute.projects.get","compute.regions.*","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.zones.*"],"en":{"roleTitle":"Composer Shared VPC Agent","roleName":"roles/composer.sharedVpcAgent","roleDescription":"Role that should be assigned to Composer Agent service account in Shared VPC host project"},"ja":{"roleTitle":"Composer の共有 VPC エージェント","roleName":"roles/composer.sharedVpcAgent","roleDescription":"共有 VPC ホスト プロジェクトで Composer Agent のサービス アカウントに割り当てる必要があるロール"}},"roles/composer.user":{"permissions":["composer.dags.*","composer.environments.get","composer.environments.list","composer.imageversions.*","composer.operations.get","composer.operations.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Composer User","roleName":"roles/composer.user","roleDescription":"Provides the permissions necessary to list and get Cloud Composer environments and operations."},"ja":{"roleTitle":"Composer ユーザー","roleName":"roles/composer.user","roleDescription":"Cloud Composer 環境とオペレーションを一覧表示して取得するために必要な権限を付与します。"}},"roles/composer.worker":{"permissions":["artifactregistry.*","cloudbuild.builds.create","cloudbuild.builds.get","cloudbuild.builds.list","cloudbuild.builds.update","cloudbuild.workerpools.use","composer.environments.get","container.*","containeranalysis.occurrences.create","containeranalysis.occurrences.delete","containeranalysis.occurrences.get","containeranalysis.occurrences.list","containeranalysis.occurrences.update","logging.logEntries.create","logging.logEntries.list","logging.privateLogEntries.*","logging.views.access","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.*","orgpolicy.policy.get","pubsub.schemas.attach","pubsub.schemas.create","pubsub.schemas.delete","pubsub.schemas.get","pubsub.schemas.list","pubsub.schemas.validate","pubsub.snapshots.create","pubsub.snapshots.delete","pubsub.snapshots.get","pubsub.snapshots.list","pubsub.snapshots.seek","pubsub.snapshots.update","pubsub.subscriptions.consume","pubsub.subscriptions.create","pubsub.subscriptions.delete","pubsub.subscriptions.get","pubsub.subscriptions.list","pubsub.subscriptions.update","pubsub.topics.attachSubscription","pubsub.topics.create","pubsub.topics.delete","pubsub.topics.detachSubscription","pubsub.topics.get","pubsub.topics.list","pubsub.topics.publish","pubsub.topics.update","pubsub.topics.updateTag","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","source.repos.get","source.repos.list","storage.buckets.create","storage.buckets.get","storage.buckets.list","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Composer Worker","roleName":"roles/composer.worker","roleDescription":"Provides the permissions necessary to run a Cloud Composer environment VM. Intended for service accounts."},"ja":{"roleTitle":"Composer ワーカー","roleName":"roles/composer.worker","roleDescription":"Cloud Composer 環境 VM の実行に必要な権限を付与します(サービス アカウント向け)。"}},"roles/connectors.admin":{"permissions":["connectors.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Connector Admin","roleName":"roles/connectors.admin","roleDescription":"Full access to all resources of Connectors Service."},"ja":{"roleTitle":"Connectors 管理者","roleName":"roles/connectors.admin","roleDescription":"Connectors サービスのすべてのリソースに対する完全アクセス権。"}},"roles/connectors.viewer":{"permissions":["connectors.connections.get","connectors.connections.getConnectionSchemaMetadata","connectors.connections.getIamPolicy","connectors.connections.getRuntimeActionSchema","connectors.connections.getRuntimeEntitySchema","connectors.connections.list","connectors.connectors.*","connectors.locations.*","connectors.operations.get","connectors.operations.list","connectors.providers.*","connectors.runtimeconfig.*","connectors.versions.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Connectors Viewer","roleName":"roles/connectors.viewer","roleDescription":"Read-only access to Connectors all resources."},"ja":{"roleTitle":"Connectors 閲覧者","roleName":"roles/connectors.viewer","roleDescription":"Connectors のすべてのリソースに対する読み取り専用アクセス権。"}},"roles/datafusion.admin":{"permissions":["datafusion.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Data Fusion Admin","roleName":"roles/datafusion.admin","roleDescription":"Full access to Cloud Data Fusion Instances, Namespaces and related resources."},"ja":{"roleTitle":"Cloud Data Fusion 管理者","roleName":"roles/datafusion.admin","roleDescription":"Cloud Data Fusion インスタンス、名前空間、関連リソースに対する完全アクセス権。"}},"roles/datafusion.runner":{"permissions":["datafusion.instances.runtime"],"en":{"roleTitle":"Cloud Data Fusion Runner","roleName":"roles/datafusion.runner","roleDescription":"Access to Cloud Data Fusion runtime resources."},"ja":{"roleTitle":"Cloud Data Fusion ランナー","roleName":"roles/datafusion.runner","roleDescription":"Cloud Data Fusion ランタイム リソースに対するアクセス権。"}},"roles/datafusion.viewer":{"permissions":["datafusion.instances.get","datafusion.instances.getIamPolicy","datafusion.instances.list","datafusion.instances.runtime","datafusion.locations.*","datafusion.operations.get","datafusion.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Data Fusion Viewer","roleName":"roles/datafusion.viewer","roleDescription":"Read-only access to Cloud Data Fusion Instances, Namespaces and related resources."},"ja":{"roleTitle":"Cloud Data Fusion 閲覧者","roleName":"roles/datafusion.viewer","roleDescription":"Cloud Data Fusion インスタンス、名前空間、関連リソースに対する読み取り専用アクセス権。"}},"roles/datalabeling.admin":{"permissions":["datalabeling.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data Labeling Service Admin","roleName":"roles/datalabeling.admin","roleDescription":"Full access to all Data Labeling resources"},"ja":{"roleTitle":"Data Labeling Service 管理者","roleName":"roles/datalabeling.admin","roleDescription":"すべての Data Labeling リソースに対する完全アクセス権"}},"roles/datalabeling.editor":{"permissions":["datalabeling.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data Labeling Service Editor","roleName":"roles/datalabeling.editor","roleDescription":"Editor of all Data Labeling resources"},"ja":{"roleTitle":"Data Labeling Service 編集者","roleName":"roles/datalabeling.editor","roleDescription":"すべての Data Labeling リソースの編集者"}},"roles/datalabeling.viewer":{"permissions":["datalabeling.annotateddatasets.get","datalabeling.annotateddatasets.list","datalabeling.annotationspecsets.get","datalabeling.annotationspecsets.list","datalabeling.dataitems.*","datalabeling.datasets.get","datalabeling.datasets.list","datalabeling.examples.*","datalabeling.instructions.get","datalabeling.instructions.list","datalabeling.operations.get","datalabeling.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data Labeling Service Viewer","roleName":"roles/datalabeling.viewer","roleDescription":"Viewer of all Data Labeling resources"},"ja":{"roleTitle":"Data Labeling Service 閲覧者","roleName":"roles/datalabeling.viewer","roleDescription":"すべての Data Labeling リソースの閲覧者"}},"roles/dataplex.admin":{"permissions":["dataplex.assetActions.*","dataplex.assets.create","dataplex.assets.delete","dataplex.assets.get","dataplex.assets.getIamPolicy","dataplex.assets.list","dataplex.assets.setIamPolicy","dataplex.assets.update","dataplex.content.*","dataplex.entities.*","dataplex.environments.*","dataplex.lakeActions.*","dataplex.lakes.*","dataplex.locations.*","dataplex.operations.*","dataplex.partitions.*","dataplex.tasks.*","dataplex.zoneActions.*","dataplex.zones.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataplex Administrator","roleName":"roles/dataplex.admin","roleDescription":"Full access to all Dataplex resources."},"ja":{"roleTitle":"Dataplex 管理者","roleName":"roles/dataplex.admin","roleDescription":"すべての Dataplex リソースに対する完全アクセス権。"}},"roles/dataplex.dataOwner":{"permissions":["dataplex.assets.ownData","dataplex.assets.readData","dataplex.assets.writeData"],"en":{"roleTitle":"Dataplex Data Owner","roleName":"roles/dataplex.dataOwner","roleDescription":"Owner access to data. To be granted to Dataplex resources Lake, Zone or Asset only."},"ja":{"roleTitle":"Dataplex データオーナー","roleName":"roles/dataplex.dataOwner","roleDescription":"データに対するオーナー アクセス権。Dataplex リソース(Lake、Zone、Asset)のみに付与されます。"}},"roles/dataplex.dataReader":{"permissions":["dataplex.assets.readData"],"en":{"roleTitle":"Dataplex Data Reader","roleName":"roles/dataplex.dataReader","roleDescription":"Read only access to data. To be granted to Dataplex resources Lake, Zone or Asset only."},"ja":{"roleTitle":"Dataplex データリーダー","roleName":"roles/dataplex.dataReader","roleDescription":"データに対する読み取り専用アクセス権。Dataplex リソース(Lake、Zone、Asset)のみに付与されます。"}},"roles/dataplex.dataWriter":{"permissions":["dataplex.assets.writeData"],"en":{"roleTitle":"Dataplex Data Writer","roleName":"roles/dataplex.dataWriter","roleDescription":"Write access to data. To be granted to Dataplex resources Lake, Zone or Asset only."},"ja":{"roleTitle":"Dataplex データライター","roleName":"roles/dataplex.dataWriter","roleDescription":"データへの書き込みアクセス権。Dataplex リソース(Lake、Zone、Asset)のみに付与されます。"}},"roles/dataplex.developer":{"permissions":["dataplex.content.*","dataplex.environments.execute","dataplex.environments.get","dataplex.environments.list","dataplex.tasks.cancel","dataplex.tasks.create","dataplex.tasks.delete","dataplex.tasks.get","dataplex.tasks.list","dataplex.tasks.update"],"en":{"roleTitle":"Dataplex Developer","roleName":"roles/dataplex.developer","roleDescription":"Allows running data analytics workloads in a lake."},"ja":{"roleTitle":"Dataplex デベロッパー","roleName":"roles/dataplex.developer","roleDescription":"レイクでデータ分析ワークロードを実行できます。"}},"roles/dataplex.editor":{"permissions":["dataplex.assetActions.*","dataplex.assets.create","dataplex.assets.delete","dataplex.assets.get","dataplex.assets.getIamPolicy","dataplex.assets.list","dataplex.assets.update","dataplex.content.delete","dataplex.content.get","dataplex.content.getIamPolicy","dataplex.content.list","dataplex.environments.create","dataplex.environments.delete","dataplex.environments.get","dataplex.environments.getIamPolicy","dataplex.environments.list","dataplex.environments.update","dataplex.lakeActions.*","dataplex.lakes.create","dataplex.lakes.delete","dataplex.lakes.get","dataplex.lakes.getIamPolicy","dataplex.lakes.list","dataplex.lakes.update","dataplex.operations.*","dataplex.tasks.cancel","dataplex.tasks.create","dataplex.tasks.delete","dataplex.tasks.get","dataplex.tasks.getIamPolicy","dataplex.tasks.list","dataplex.tasks.update","dataplex.zoneActions.*","dataplex.zones.create","dataplex.zones.delete","dataplex.zones.get","dataplex.zones.getIamPolicy","dataplex.zones.list","dataplex.zones.update"],"en":{"roleTitle":"Dataplex Editor","roleName":"roles/dataplex.editor","roleDescription":"Write access to Dataplex resources."},"ja":{"roleTitle":"Dataplex 編集者","roleName":"roles/dataplex.editor","roleDescription":"Dataplex リソースに対する書き込みアクセス権。"}},"roles/dataplex.metadataReader":{"permissions":["dataplex.assets.get","dataplex.assets.list","dataplex.entities.get","dataplex.entities.list","dataplex.partitions.get","dataplex.partitions.list","dataplex.zones.get","dataplex.zones.list"],"en":{"roleTitle":"Dataplex Metadata Reader","roleName":"roles/dataplex.metadataReader","roleDescription":"Read only access to metadata."},"ja":{"roleTitle":"Dataplex メタデータ読み取り","roleName":"roles/dataplex.metadataReader","roleDescription":"メタデータに対する読み取り専用アクセス権。"}},"roles/dataplex.metadataWriter":{"permissions":["dataplex.assets.get","dataplex.assets.list","dataplex.entities.*","dataplex.partitions.*","dataplex.zones.get","dataplex.zones.list"],"en":{"roleTitle":"Dataplex Metadata Writer","roleName":"roles/dataplex.metadataWriter","roleDescription":"Read and write access to metadata."},"ja":{"roleTitle":"Dataplex メタデータ ライター","roleName":"roles/dataplex.metadataWriter","roleDescription":"メタデータに対する読み取りおよび書き込みアクセス権。"}},"roles/dataplex.storageDataOwner":{"permissions":["bigquery.datasets.get","bigquery.models.create","bigquery.models.delete","bigquery.models.export","bigquery.models.getData","bigquery.models.getMetadata","bigquery.models.list","bigquery.models.updateData","bigquery.models.updateMetadata","bigquery.routines.create","bigquery.routines.delete","bigquery.routines.get","bigquery.routines.list","bigquery.routines.update","bigquery.tables.create","bigquery.tables.createSnapshot","bigquery.tables.delete","bigquery.tables.deleteSnapshot","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.list","bigquery.tables.restoreSnapshot","bigquery.tables.update","bigquery.tables.updateData","storage.buckets.get","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Dataplex Storage Data Owner","roleName":"roles/dataplex.storageDataOwner","roleDescription":"Owner access to data. Should not be used directly. This role is granted by Dataplex to managed resources like Cloud Storage buckets, BigQuery datasets etc."},"ja":{"roleTitle":"Dataplex ストレージ データオーナー","roleName":"roles/dataplex.storageDataOwner","roleDescription":"データに対するオーナー アクセス権。直接使用しないでください。このロールは、Dataplex によって GCS バケット、BigQuery データセットなどのマネージド リソースに付与されます。"}},"roles/dataplex.storageDataReader":{"permissions":["bigquery.datasets.get","bigquery.models.export","bigquery.models.getData","bigquery.models.getMetadata","bigquery.models.list","bigquery.routines.get","bigquery.routines.list","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.list","storage.buckets.get","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Dataplex Storage Data Reader","roleName":"roles/dataplex.storageDataReader","roleDescription":"Read only access to data. Should not be used directly. This role is granted by Dataplex to managed resources like Cloud Storage buckets, BigQuery datasets etc."},"ja":{"roleTitle":"Dataplex ストレージ データ リーダー","roleName":"roles/dataplex.storageDataReader","roleDescription":"データに対する読み取り専用アクセス権。直接使用しないでください。このロールは、Dataplex によって GCS バケット、BigQuery データセットなどのマネージド リソースに付与されます。"}},"roles/dataplex.storageDataWriter":{"permissions":["bigquery.tables.updateData","storage.objects.create","storage.objects.delete","storage.objects.update"],"en":{"roleTitle":"Dataplex Storage Data Writer","roleName":"roles/dataplex.storageDataWriter","roleDescription":"Write access to data. Should not be used directly. This role is granted by Dataplex to managed resources like Cloud Storage buckets, BigQuery datasets etc."},"ja":{"roleTitle":"Dataplex ストレージ データライター","roleName":"roles/dataplex.storageDataWriter","roleDescription":"データへの書き込みアクセス権。直接使用しないでください。このロールは、Dataplex によって GCS バケット、BigQuery データセットなどのマネージド リソースに付与されます。"}},"roles/dataplex.viewer":{"permissions":["dataplex.assetActions.*","dataplex.assets.get","dataplex.assets.getIamPolicy","dataplex.assets.list","dataplex.content.get","dataplex.content.getIamPolicy","dataplex.content.list","dataplex.environments.get","dataplex.environments.getIamPolicy","dataplex.environments.list","dataplex.lakeActions.*","dataplex.lakes.get","dataplex.lakes.getIamPolicy","dataplex.lakes.list","dataplex.operations.get","dataplex.operations.list","dataplex.tasks.get","dataplex.tasks.getIamPolicy","dataplex.tasks.list","dataplex.zoneActions.*","dataplex.zones.get","dataplex.zones.getIamPolicy","dataplex.zones.list"],"en":{"roleTitle":"Dataplex Viewer","roleName":"roles/dataplex.viewer","roleDescription":"Read access to Dataplex resources."},"ja":{"roleTitle":"Dataplex 閲覧者","roleName":"roles/dataplex.viewer","roleDescription":"Dataplex リソースに対する読み取りアクセス権。"}},"roles/clouddebugger.agent":{"permissions":["clouddebugger.breakpoints.list","clouddebugger.breakpoints.listActive","clouddebugger.breakpoints.update","clouddebugger.debuggees.create"],"en":{"roleTitle":"Cloud Debugger Agent","roleName":"roles/clouddebugger.agent","roleDescription":"Provides permissions to register the debug target, read active breakpoints,\nand report breakpoint results."},"ja":{"roleTitle":"Cloud デバッガ エージェント","roleName":"roles/clouddebugger.agent","roleDescription":"デバッグ ターゲットの登録、アクティブなブレーク ポイントの読み取り、ブレーク ポイントの結果の報告を行うアクセス権を付与します。"}},"roles/clouddebugger.user":{"permissions":["clouddebugger.breakpoints.create","clouddebugger.breakpoints.delete","clouddebugger.breakpoints.get","clouddebugger.breakpoints.list","clouddebugger.debuggees.list"],"en":{"roleTitle":"Cloud Debugger User","roleName":"roles/clouddebugger.user","roleDescription":"Provides permissions to create, view, list, and delete breakpoints\n(snapshots & logpoints) as well as list debug targets (debuggees)."},"ja":{"roleTitle":"Cloud デバッガ ユーザー","roleName":"roles/clouddebugger.user","roleDescription":"ブレークポイント(スナップショットとログポイント)の作成、表示、一覧表示、削除に加え、デバッグ ターゲット(デバッグ対象)の一覧表示を行うアクセス権を付与します。"}},"roles/clouddeploy.admin":{"permissions":["clouddeploy.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Deploy Admin","roleName":"roles/clouddeploy.admin","roleDescription":"Full control of Cloud Deploy resources."},"ja":{"roleTitle":"Cloud Deploy 管理者","roleName":"roles/clouddeploy.admin","roleDescription":"Cloud Deploy のリソースをすべて管理できる権限。"}},"roles/clouddeploy.approver":{"permissions":["clouddeploy.locations.*","clouddeploy.operations.*","clouddeploy.rollouts.approve","clouddeploy.rollouts.get","clouddeploy.rollouts.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Deploy Approver","roleName":"roles/clouddeploy.approver","roleDescription":"Permission to approve or reject rollouts."},"ja":{"roleTitle":"Cloud Deploy 承認者","roleName":"roles/clouddeploy.approver","roleDescription":"ロールアウトを承認または拒否する権限。"}},"roles/clouddeploy.developer":{"permissions":["clouddeploy.deliveryPipelines.create","clouddeploy.deliveryPipelines.get","clouddeploy.deliveryPipelines.getIamPolicy","clouddeploy.deliveryPipelines.list","clouddeploy.deliveryPipelines.update","clouddeploy.locations.*","clouddeploy.operations.*","clouddeploy.releases.*","clouddeploy.rollouts.get","clouddeploy.rollouts.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Deploy Developer","roleName":"roles/clouddeploy.developer","roleDescription":"Permission to manage deployment configuration without permission to access operational resources, such as targets."},"ja":{"roleTitle":"Cloud Deploy デベロッパー","roleName":"roles/clouddeploy.developer","roleDescription":"デプロイ構成を管理する権限。ターゲットなどの運用リソースにアクセスする権限はありません。"}},"roles/clouddeploy.jobRunner":{"permissions":["logging.logEntries.create","storage.objects.create","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Cloud Deploy Runner","roleName":"roles/clouddeploy.jobRunner","roleDescription":"Permission to execute Cloud Deploy work without permission to deliver to a target."},"ja":{"roleTitle":"Cloud Deploy ランナー","roleName":"roles/clouddeploy.jobRunner","roleDescription":"Cloud Deploy の作業を実行する権限です。ターゲットに提供する権限はありません。"}},"roles/clouddeploy.operator":{"permissions":["clouddeploy.deliveryPipelines.create","clouddeploy.deliveryPipelines.get","clouddeploy.deliveryPipelines.getIamPolicy","clouddeploy.deliveryPipelines.list","clouddeploy.deliveryPipelines.update","clouddeploy.locations.*","clouddeploy.operations.*","clouddeploy.releases.*","clouddeploy.rollouts.create","clouddeploy.rollouts.get","clouddeploy.rollouts.list","clouddeploy.targets.create","clouddeploy.targets.get","clouddeploy.targets.getIamPolicy","clouddeploy.targets.list","clouddeploy.targets.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Deploy Operator","roleName":"roles/clouddeploy.operator","roleDescription":"Permission to manage deployment configuration."},"ja":{"roleTitle":"Cloud Deploy オペレータ","roleName":"roles/clouddeploy.operator","roleDescription":"デプロイ構成を管理する権限。"}},"roles/clouddeploy.releaser":{"permissions":["clouddeploy.deliveryPipelines.get","clouddeploy.locations.*","clouddeploy.operations.*","clouddeploy.releases.create","clouddeploy.releases.get","clouddeploy.releases.list","clouddeploy.rollouts.create","clouddeploy.rollouts.get","clouddeploy.rollouts.list","clouddeploy.targets.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Deploy Releaser","roleName":"roles/clouddeploy.releaser","roleDescription":"Permission to create Cloud Deploy releases and rollouts."},"ja":{"roleTitle":"Cloud Deploy リリース担当者","roleName":"roles/clouddeploy.releaser","roleDescription":"Cloud Deploy のリリースとロールアウトを作成する権限。"}},"roles/clouddeploy.viewer":{"permissions":["clouddeploy.config.*","clouddeploy.deliveryPipelines.get","clouddeploy.deliveryPipelines.getIamPolicy","clouddeploy.deliveryPipelines.list","clouddeploy.locations.*","clouddeploy.operations.get","clouddeploy.operations.list","clouddeploy.releases.get","clouddeploy.releases.list","clouddeploy.rollouts.get","clouddeploy.rollouts.list","clouddeploy.targets.get","clouddeploy.targets.getIamPolicy","clouddeploy.targets.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Deploy Viewer","roleName":"roles/clouddeploy.viewer","roleDescription":"Can view Cloud Deploy resources."},"ja":{"roleTitle":"Cloud Deploy 閲覧者","roleName":"roles/clouddeploy.viewer","roleDescription":"Cloud Deploy リソースを閲覧できます。"}},"roles/dlp.admin":{"permissions":["dlp.*","serviceusage.services.use"],"en":{"roleTitle":"DLP Administrator","roleName":"roles/dlp.admin","roleDescription":"Administer DLP including jobs and templates."},"ja":{"roleTitle":"DLP 管理者","roleName":"roles/dlp.admin","roleDescription":"ジョブやテンプレートを含む DLP の管理権限。"}},"roles/dlp.analyzeRiskTemplatesEditor":{"permissions":["dlp.analyzeRiskTemplates.*"],"en":{"roleTitle":"DLP Analyze Risk Templates Editor","roleName":"roles/dlp.analyzeRiskTemplatesEditor","roleDescription":"Edit DLP analyze risk templates."},"ja":{"roleTitle":"DLP 分析リスク テンプレート編集者","roleName":"roles/dlp.analyzeRiskTemplatesEditor","roleDescription":"DLP 分析リスク テンプレートの編集権限。"}},"roles/dlp.analyzeRiskTemplatesReader":{"permissions":["dlp.analyzeRiskTemplates.get","dlp.analyzeRiskTemplates.list"],"en":{"roleTitle":"DLP Analyze Risk Templates Reader","roleName":"roles/dlp.analyzeRiskTemplatesReader","roleDescription":"Read DLP analyze risk templates."},"ja":{"roleTitle":"DLP 分析リスク テンプレート読み取り","roleName":"roles/dlp.analyzeRiskTemplatesReader","roleDescription":"DLP 分析リスク テンプレートの読み取り権限。"}},"roles/dlp.columnDataProfilesReader":{"permissions":["dlp.columnDataProfiles.*"],"en":{"roleTitle":"DLP Column Data Profiles Reader","roleName":"roles/dlp.columnDataProfilesReader","roleDescription":"Read DLP column profiles."},"ja":{"roleTitle":"DLP 列データ プロファイル読み取り","roleName":"roles/dlp.columnDataProfilesReader","roleDescription":"DLP 列プロファイルを読み取ります。"}},"roles/dlp.dataProfilesReader":{"permissions":["dlp.columnDataProfiles.*","dlp.projectDataProfiles.*","dlp.tableDataProfiles.*"],"en":{"roleTitle":"DLP Data Profiles Reader","roleName":"roles/dlp.dataProfilesReader","roleDescription":"Read DLP profiles."},"ja":{"roleTitle":"DLP データ プロファイル読み取り","roleName":"roles/dlp.dataProfilesReader","roleDescription":"DLP プロファイルを読み取ります。"}},"roles/dlp.deidentifyTemplatesEditor":{"permissions":["dlp.deidentifyTemplates.*"],"en":{"roleTitle":"DLP De-identify Templates Editor","roleName":"roles/dlp.deidentifyTemplatesEditor","roleDescription":"Edit DLP de-identify templates."},"ja":{"roleTitle":"DLP 匿名化テンプレート編集者","roleName":"roles/dlp.deidentifyTemplatesEditor","roleDescription":"DLP 匿名化テンプレートの編集。"}},"roles/dlp.deidentifyTemplatesReader":{"permissions":["dlp.deidentifyTemplates.get","dlp.deidentifyTemplates.list"],"en":{"roleTitle":"DLP De-identify Templates Reader","roleName":"roles/dlp.deidentifyTemplatesReader","roleDescription":"Read DLP de-identify templates."},"ja":{"roleTitle":"DLP 匿名化テンプレート読み取り","roleName":"roles/dlp.deidentifyTemplatesReader","roleDescription":"DLP 匿名化テンプレートの読み取り権限。"}},"roles/dlp.estimatesAdmin":{"permissions":["dlp.estimates.*"],"en":{"roleTitle":"DLP Cost Estimation","roleName":"roles/dlp.estimatesAdmin","roleDescription":"Manage DLP Cost Estimates."},"ja":{"roleTitle":"DLP 費用の見積もり","roleName":"roles/dlp.estimatesAdmin","roleDescription":"DLP 費用の見積もりを管理します。"}},"roles/dlp.inspectFindingsReader":{"permissions":["dlp.inspectFindings.*"],"en":{"roleTitle":"DLP Inspect Findings Reader","roleName":"roles/dlp.inspectFindingsReader","roleDescription":"Read DLP stored findings."},"ja":{"roleTitle":"DLP 検査結果読み取り","roleName":"roles/dlp.inspectFindingsReader","roleDescription":"DLP 保存済み検査結果の読み取り権限。"}},"roles/dlp.inspectTemplatesEditor":{"permissions":["dlp.inspectTemplates.*"],"en":{"roleTitle":"DLP Inspect Templates Editor","roleName":"roles/dlp.inspectTemplatesEditor","roleDescription":"Edit DLP inspect templates."},"ja":{"roleTitle":"DLP 検査テンプレート編集者","roleName":"roles/dlp.inspectTemplatesEditor","roleDescription":"DLP 検査テンプレートの編集権限。"}},"roles/dlp.inspectTemplatesReader":{"permissions":["dlp.inspectTemplates.get","dlp.inspectTemplates.list"],"en":{"roleTitle":"DLP Inspect Templates Reader","roleName":"roles/dlp.inspectTemplatesReader","roleDescription":"Read DLP inspect templates."},"ja":{"roleTitle":"DLP 検査テンプレート読み取り","roleName":"roles/dlp.inspectTemplatesReader","roleDescription":"DLP 検査テンプレートの読み取り。"}},"roles/dlp.jobTriggersEditor":{"permissions":["dlp.jobTriggers.*"],"en":{"roleTitle":"DLP Job Triggers Editor","roleName":"roles/dlp.jobTriggersEditor","roleDescription":"Edit job triggers configurations."},"ja":{"roleTitle":"DLP ジョブトリガー編集者","roleName":"roles/dlp.jobTriggersEditor","roleDescription":"ジョブトリガー構成の編集。"}},"roles/dlp.jobTriggersReader":{"permissions":["dlp.jobTriggers.get","dlp.jobTriggers.list"],"en":{"roleTitle":"DLP Job Triggers Reader","roleName":"roles/dlp.jobTriggersReader","roleDescription":"Read job triggers."},"ja":{"roleTitle":"DLP ジョブトリガー読み取り","roleName":"roles/dlp.jobTriggersReader","roleDescription":"ジョブトリガーの読み取り権限。"}},"roles/dlp.jobsEditor":{"permissions":["dlp.jobs.*","dlp.kms.*"],"en":{"roleTitle":"DLP Jobs Editor","roleName":"roles/dlp.jobsEditor","roleDescription":"Edit and create jobs"},"ja":{"roleTitle":"DLP ジョブ編集者","roleName":"roles/dlp.jobsEditor","roleDescription":"ジョブを編集および作成する権限"}},"roles/dlp.jobsReader":{"permissions":["dlp.jobs.get","dlp.jobs.list"],"en":{"roleTitle":"DLP Jobs Reader","roleName":"roles/dlp.jobsReader","roleDescription":"Read jobs"},"ja":{"roleTitle":"DLP ジョブ読み取り","roleName":"roles/dlp.jobsReader","roleDescription":"ジョブの読み取り権限"}},"roles/dlp.orgdriver":{"permissions":["bigquery.bireservations.get","bigquery.capacityCommitments.get","bigquery.capacityCommitments.list","bigquery.config.get","bigquery.connections.updateTag","bigquery.datasets.create","bigquery.datasets.get","bigquery.datasets.getIamPolicy","bigquery.datasets.updateTag","bigquery.jobs.create","bigquery.jobs.get","bigquery.jobs.list","bigquery.jobs.listAll","bigquery.jobs.listExecutionMetadata","bigquery.models.*","bigquery.readsessions.*","bigquery.reservationAssignments.list","bigquery.reservationAssignments.search","bigquery.reservations.get","bigquery.reservations.list","bigquery.routines.*","bigquery.savedqueries.get","bigquery.savedqueries.list","bigquery.tables.create","bigquery.tables.createIndex","bigquery.tables.createSnapshot","bigquery.tables.delete","bigquery.tables.deleteIndex","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.getIamPolicy","bigquery.tables.list","bigquery.tables.restoreSnapshot","bigquery.tables.update","bigquery.tables.updateData","bigquery.tables.updateTag","bigquery.transfers.get","bigquerymigration.translation.*","cloudasset.assets.*","datacatalog.categories.fineGrainedGet","datacatalog.entries.updateTag","datacatalog.tagTemplates.create","datacatalog.tagTemplates.get","datacatalog.tagTemplates.getTag","datacatalog.tagTemplates.use","dlp.*","pubsub.topics.updateTag","recommender.cloudAssetInsights.get","recommender.cloudAssetInsights.list","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use"],"en":{"roleTitle":"DLP Organization Data Profiles Driver","roleName":"roles/dlp.orgdriver","roleDescription":"Permissions needed by the DLP service account to generate data profiles within an organization or folder."},"ja":{"roleTitle":"DLP 組織データ プロファイル ドライバ","roleName":"roles/dlp.orgdriver","roleDescription":"DLP サービス アカウントが組織またはフォルダ内でデータ プロファイルを生成するために必要な権限。"}},"roles/dlp.projectDataProfilesReader":{"permissions":["dlp.projectDataProfiles.*"],"en":{"roleTitle":"DLP Project Data Profiles Reader","roleName":"roles/dlp.projectDataProfilesReader","roleDescription":"Read DLP project profiles."},"ja":{"roleTitle":"DLP プロジェクト データ プロファイル読み取り","roleName":"roles/dlp.projectDataProfilesReader","roleDescription":"DLP プロジェクト プロファイルを読み取ります。"}},"roles/dlp.projectdriver":{"permissions":["bigquery.bireservations.get","bigquery.capacityCommitments.get","bigquery.capacityCommitments.list","bigquery.config.get","bigquery.connections.updateTag","bigquery.datasets.create","bigquery.datasets.get","bigquery.datasets.getIamPolicy","bigquery.datasets.updateTag","bigquery.jobs.create","bigquery.jobs.get","bigquery.jobs.list","bigquery.jobs.listAll","bigquery.jobs.listExecutionMetadata","bigquery.models.*","bigquery.readsessions.*","bigquery.reservationAssignments.list","bigquery.reservationAssignments.search","bigquery.reservations.get","bigquery.reservations.list","bigquery.routines.*","bigquery.savedqueries.get","bigquery.savedqueries.list","bigquery.tables.create","bigquery.tables.createIndex","bigquery.tables.createSnapshot","bigquery.tables.delete","bigquery.tables.deleteIndex","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.getIamPolicy","bigquery.tables.list","bigquery.tables.restoreSnapshot","bigquery.tables.update","bigquery.tables.updateData","bigquery.tables.updateTag","bigquery.transfers.get","bigquerymigration.translation.*","cloudasset.assets.*","datacatalog.categories.fineGrainedGet","datacatalog.entries.updateTag","datacatalog.tagTemplates.create","datacatalog.tagTemplates.get","datacatalog.tagTemplates.getTag","datacatalog.tagTemplates.use","dlp.*","pubsub.topics.updateTag","recommender.cloudAssetInsights.get","recommender.cloudAssetInsights.list","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use"],"en":{"roleTitle":"DLP Project Data Profiles Driver","roleName":"roles/dlp.projectdriver","roleDescription":"Permissions needed by the DLP service account to generate data profiles within a project."},"ja":{"roleTitle":"DLP プロジェクト データ プロファイル ドライバ","roleName":"roles/dlp.projectdriver","roleDescription":"DLP サービス アカウントがプロジェクト内でデータ プロファイルを生成するために必要な権限。"}},"roles/dlp.reader":{"permissions":["dlp.analyzeRiskTemplates.get","dlp.analyzeRiskTemplates.list","dlp.deidentifyTemplates.get","dlp.deidentifyTemplates.list","dlp.inspectFindings.*","dlp.inspectTemplates.get","dlp.inspectTemplates.list","dlp.jobTriggers.get","dlp.jobTriggers.list","dlp.jobs.get","dlp.jobs.list","dlp.locations.*","dlp.storedInfoTypes.get","dlp.storedInfoTypes.list"],"en":{"roleTitle":"DLP Reader","roleName":"roles/dlp.reader","roleDescription":"Read DLP entities, such as jobs and templates."},"ja":{"roleTitle":"DLP 読み取り","roleName":"roles/dlp.reader","roleDescription":"ジョブやテンプレートなどの DLP エンティティを読み取ります。"}},"roles/dlp.storedInfoTypesEditor":{"permissions":["dlp.storedInfoTypes.*"],"en":{"roleTitle":"DLP Stored InfoTypes Editor","roleName":"roles/dlp.storedInfoTypesEditor","roleDescription":"Edit DLP stored info types."},"ja":{"roleTitle":"DLP Stored InfoTypes 編集者","roleName":"roles/dlp.storedInfoTypesEditor","roleDescription":"DLP に格納された情報タイプの編集権限。"}},"roles/dlp.storedInfoTypesReader":{"permissions":["dlp.storedInfoTypes.get","dlp.storedInfoTypes.list"],"en":{"roleTitle":"DLP Stored InfoTypes Reader","roleName":"roles/dlp.storedInfoTypesReader","roleDescription":"Read DLP stored info types."},"ja":{"roleTitle":"DLP Stored InfoTypes 読み取り","roleName":"roles/dlp.storedInfoTypesReader","roleDescription":"DLP に格納された情報タイプの読み取り権限。"}},"roles/dlp.tableDataProfilesReader":{"permissions":["dlp.tableDataProfiles.*"],"en":{"roleTitle":"DLP Table Data Profiles Reader","roleName":"roles/dlp.tableDataProfilesReader","roleDescription":"Read DLP table profiles."},"ja":{"roleTitle":"DLP テーブルデータ プロファイル読み取り","roleName":"roles/dlp.tableDataProfilesReader","roleDescription":"DLP テーブル プロファイルを読み取ります。"}},"roles/dlp.user":{"permissions":["dlp.kms.*","dlp.locations.*","serviceusage.services.use"],"en":{"roleTitle":"DLP User","roleName":"roles/dlp.user","roleDescription":"Inspect, Redact, and De-identify Content"},"ja":{"roleTitle":"DLP ユーザー","roleName":"roles/dlp.user","roleDescription":"コンテンツの検索、削除、匿名化"}},"roles/domains.admin":{"permissions":["domains.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Domains Admin","roleName":"roles/domains.admin","roleDescription":"Full access to Cloud Domains Registrations and related resources."},"ja":{"roleTitle":"Cloud Domains 管理者","roleName":"roles/domains.admin","roleDescription":"Cloud Domains レジストリと関連リソースに対する完全アクセス権。"}},"roles/domains.viewer":{"permissions":["domains.locations.*","domains.operations.get","domains.operations.list","domains.registrations.get","domains.registrations.getIamPolicy","domains.registrations.list","domains.registrations.listTagBindings","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Domains Viewer","roleName":"roles/domains.viewer","roleDescription":"Read-only access to Cloud Domains Registrations and related resources."},"ja":{"roleTitle":"Cloud Domains 閲覧者","roleName":"roles/domains.viewer","roleDescription":"Cloud Domains レジストリと関連リソースに対する読み取り専用アクセス権。"}},"roles/file.editor":{"permissions":["file.*"],"en":{"roleTitle":"Cloud Filestore Editor","roleName":"roles/file.editor","roleDescription":"Read-write access to Filestore instances and related resources."},"ja":{"roleTitle":"Cloud Filestore 編集者","roleName":"roles/file.editor","roleDescription":"Filestore インスタンスと関連リソースに対する読み取り / 書き込み権限。"}},"roles/file.viewer":{"permissions":["file.backups.get","file.backups.list","file.backups.listTagBindings","file.instances.get","file.instances.list","file.instances.listTagBindings","file.locations.*","file.operations.get","file.operations.list","file.snapshots.listTagBindings"],"en":{"roleTitle":"Cloud Filestore Viewer","roleName":"roles/file.viewer","roleDescription":"Read-only access to Filestore instances and related resources."},"ja":{"roleTitle":"Cloud Filestore 閲覧者","roleName":"roles/file.viewer","roleDescription":"Filestore インスタンスと関連リソースに対する読み取り専用権限。"}},"roles/cloudfunctions.admin":{"permissions":["cloudbuild.builds.get","cloudbuild.builds.list","cloudfunctions.*","eventarc.*","recommender.locations.*","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.list","run.*","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud Functions Admin","roleName":"roles/cloudfunctions.admin","roleDescription":"Full access to functions, operations and locations."},"ja":{"roleTitle":"Cloud Functions 管理者","roleName":"roles/cloudfunctions.admin","roleDescription":"関数、演算、場所に対する完全アクセス権。"}},"roles/cloudfunctions.developer":{"permissions":["cloudbuild.builds.get","cloudbuild.builds.list","cloudfunctions.functions.call","cloudfunctions.functions.create","cloudfunctions.functions.delete","cloudfunctions.functions.get","cloudfunctions.functions.invoke","cloudfunctions.functions.list","cloudfunctions.functions.sourceCodeGet","cloudfunctions.functions.sourceCodeSet","cloudfunctions.functions.update","cloudfunctions.locations.*","cloudfunctions.operations.*","cloudfunctions.runtimes.*","eventarc.locations.*","eventarc.operations.*","eventarc.triggers.create","eventarc.triggers.delete","eventarc.triggers.get","eventarc.triggers.getIamPolicy","eventarc.triggers.list","eventarc.triggers.undelete","eventarc.triggers.update","recommender.locations.*","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.list","run.configurations.*","run.locations.*","run.revisions.*","run.routes.*","run.services.create","run.services.delete","run.services.get","run.services.getIamPolicy","run.services.list","run.services.listEffectiveTags","run.services.listTagBindings","run.services.update","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud Functions Developer","roleName":"roles/cloudfunctions.developer","roleDescription":"Read and write access to all functions-related resources."},"ja":{"roleTitle":"Cloud Functions デベロッパー","roleName":"roles/cloudfunctions.developer","roleDescription":"すべての Functions 関連リソースに対する読み取り / 書き込み権限。"}},"roles/cloudfunctions.invoker":{"permissions":["cloudfunctions.functions.invoke"],"en":{"roleTitle":"Cloud Functions Invoker","roleName":"roles/cloudfunctions.invoker","roleDescription":"Ability to invoke HTTP functions with restricted access."},"ja":{"roleTitle":"Cloud Functions 起動元","roleName":"roles/cloudfunctions.invoker","roleDescription":"アクセスが制限されている HTTP 関数を呼び出せます。"}},"roles/cloudfunctions.viewer":{"permissions":["cloudbuild.builds.get","cloudbuild.builds.list","cloudfunctions.functions.get","cloudfunctions.functions.list","cloudfunctions.locations.*","cloudfunctions.operations.*","cloudfunctions.runtimes.*","eventarc.locations.*","eventarc.operations.get","eventarc.operations.list","eventarc.providers.*","eventarc.triggers.get","eventarc.triggers.getIamPolicy","eventarc.triggers.list","recommender.locations.*","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.list","run.configurations.*","run.locations.*","run.operations.get","run.operations.list","run.revisions.get","run.revisions.list","run.routes.get","run.routes.list","run.services.get","run.services.getIamPolicy","run.services.list","run.services.listEffectiveTags","run.services.listTagBindings","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud Functions Viewer","roleName":"roles/cloudfunctions.viewer","roleDescription":"Read-only access to functions and locations."},"ja":{"roleTitle":"Cloud Functions 閲覧者","roleName":"roles/cloudfunctions.viewer","roleDescription":"関数と場所に対する読み取り専用権限。"}},"roles/gameservices.admin":{"permissions":["gameservices.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Game Services API Admin","roleName":"roles/gameservices.admin","roleDescription":"Full access to Game Services API and related resources."},"ja":{"roleTitle":"Game Services API 管理者","roleName":"roles/gameservices.admin","roleDescription":"Game Services API と関連リソースに対する完全アクセス権。"}},"roles/gameservices.viewer":{"permissions":["gameservices.gameServerClusters.get","gameservices.gameServerClusters.list","gameservices.gameServerConfigs.get","gameservices.gameServerConfigs.list","gameservices.gameServerDeployments.get","gameservices.gameServerDeployments.list","gameservices.locations.*","gameservices.operations.get","gameservices.operations.list","gameservices.realms.get","gameservices.realms.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Game Services API Viewer","roleName":"roles/gameservices.viewer","roleDescription":"Read-only access to Game Services API and related resources."},"ja":{"roleTitle":"Game Services API 閲覧者","roleName":"roles/gameservices.viewer","roleDescription":"Game Services API と関連リソースに対する読み取り専用アクセス権。"}},"roles/healthcare.annotationEditor":{"permissions":["healthcare.annotationStores.get","healthcare.annotationStores.list","healthcare.annotations.*","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Annotation Editor","roleName":"roles/healthcare.annotationEditor","roleDescription":"Create, delete, update, read and list annotations."},"ja":{"roleTitle":"Healthcare Annotation 編集者","roleName":"roles/healthcare.annotationEditor","roleDescription":"アノテーションの作成、削除、更新、読み取り、一覧表示。"}},"roles/healthcare.annotationReader":{"permissions":["healthcare.annotationStores.get","healthcare.annotationStores.list","healthcare.annotations.get","healthcare.annotations.list","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Annotation Reader","roleName":"roles/healthcare.annotationReader","roleDescription":"Read and list annotations in an Annotation store."},"ja":{"roleTitle":"Healthcare Annotation 読み取り","roleName":"roles/healthcare.annotationReader","roleDescription":"Annotation ストアのアノテーションの読み取りと一覧表示。"}},"roles/healthcare.annotationStoreAdmin":{"permissions":["healthcare.annotationStores.*","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Annotation Administrator","roleName":"roles/healthcare.annotationStoreAdmin","roleDescription":"Administer Annotation stores."},"ja":{"roleTitle":"Healthcare Annotation 管理者","roleName":"roles/healthcare.annotationStoreAdmin","roleDescription":"Annotation ストアの管理。"}},"roles/healthcare.annotationStoreViewer":{"permissions":["healthcare.annotationStores.get","healthcare.annotationStores.list","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Annotation Store Viewer","roleName":"roles/healthcare.annotationStoreViewer","roleDescription":"List Annotation Stores in a dataset."},"ja":{"roleTitle":"Healthcare Annotation ストア閲覧者","roleName":"roles/healthcare.annotationStoreViewer","roleDescription":"データセット内の Annotation ストアの一覧表示。"}},"roles/healthcare.attributeDefinitionEditor":{"permissions":["healthcare.attributeDefinitions.*","healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Attribute Definition Editor","roleName":"roles/healthcare.attributeDefinitionEditor","roleDescription":"Edit AttributeDefinition objects."},"ja":{"roleTitle":"Healthcare Attribute Definition 編集者","roleName":"roles/healthcare.attributeDefinitionEditor","roleDescription":"AttributeDefinition オブジェクトの編集。"}},"roles/healthcare.attributeDefinitionReader":{"permissions":["healthcare.attributeDefinitions.get","healthcare.attributeDefinitions.list","healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Attribute Definition Reader","roleName":"roles/healthcare.attributeDefinitionReader","roleDescription":"Read AttributeDefinition objects in a consent store."},"ja":{"roleTitle":"Healthcare Attribute Definition 読み取り","roleName":"roles/healthcare.attributeDefinitionReader","roleDescription":"Consent Store 内の AttributeDefinition オブジェクトの読み取り。"}},"roles/healthcare.consentArtifactAdmin":{"permissions":["healthcare.consentArtifacts.*","healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Consent Artifact Administrator","roleName":"roles/healthcare.consentArtifactAdmin","roleDescription":"Administer ConsentArtifact objects."},"ja":{"roleTitle":"Healthcare Consent Artifact 管理者","roleName":"roles/healthcare.consentArtifactAdmin","roleDescription":"ConsentArtifact オブジェクトの管理。"}},"roles/healthcare.consentArtifactEditor":{"permissions":["healthcare.consentArtifacts.create","healthcare.consentArtifacts.get","healthcare.consentArtifacts.list","healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Consent Artifact Editor","roleName":"roles/healthcare.consentArtifactEditor","roleDescription":"Edit ConsentArtifact objects."},"ja":{"roleTitle":"Healthcare Consent Artifact 編集者","roleName":"roles/healthcare.consentArtifactEditor","roleDescription":"ConsentArtifact オブジェクトの編集。"}},"roles/healthcare.consentArtifactReader":{"permissions":["healthcare.consentArtifacts.get","healthcare.consentArtifacts.list","healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Consent Artifact Reader","roleName":"roles/healthcare.consentArtifactReader","roleDescription":"Read ConsentArtifact objects in a consent store."},"ja":{"roleTitle":"Healthcare Consent Artifact 読み取り","roleName":"roles/healthcare.consentArtifactReader","roleDescription":"Consent Store 内の ConsentArtifact オブジェクトの読み取り。"}},"roles/healthcare.consentEditor":{"permissions":["healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.consents.*","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Consent Editor","roleName":"roles/healthcare.consentEditor","roleDescription":"Edit Consent objects."},"ja":{"roleTitle":"Healthcare Consent 編集者","roleName":"roles/healthcare.consentEditor","roleDescription":"Consent オブジェクトの編集。"}},"roles/healthcare.consentReader":{"permissions":["healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.consents.get","healthcare.consents.list","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Consent Reader","roleName":"roles/healthcare.consentReader","roleDescription":"Read Consent objects in a consent store."},"ja":{"roleTitle":"Healthcare Consent 読み取り","roleName":"roles/healthcare.consentReader","roleDescription":"Consent Store 内の Consent オブジェクトの読み取り。"}},"roles/healthcare.consentStoreAdmin":{"permissions":["healthcare.consentStores.*","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Consent Store Administrator","roleName":"roles/healthcare.consentStoreAdmin","roleDescription":"Administer Consent stores."},"ja":{"roleTitle":"Healthcare Consent Store 管理者","roleName":"roles/healthcare.consentStoreAdmin","roleDescription":"Consent Store の管理。"}},"roles/healthcare.consentStoreViewer":{"permissions":["healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Consent Store Viewer","roleName":"roles/healthcare.consentStoreViewer","roleDescription":"List Consent Stores in a dataset."},"ja":{"roleTitle":"Healthcare Consent Store 閲覧者","roleName":"roles/healthcare.consentStoreViewer","roleDescription":"データセット内の Consent Store の一覧表示。"}},"roles/healthcare.datasetAdmin":{"permissions":["healthcare.datasets.*","healthcare.locations.*","healthcare.operations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Dataset Administrator","roleName":"roles/healthcare.datasetAdmin","roleDescription":"Administer Healthcare Datasets."},"ja":{"roleTitle":"Healthcare Dataset 管理者","roleName":"roles/healthcare.datasetAdmin","roleDescription":"Healthcare Dataset の管理。"}},"roles/healthcare.datasetViewer":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare Dataset Viewer","roleName":"roles/healthcare.datasetViewer","roleDescription":"List the Healthcare Datasets in a project."},"ja":{"roleTitle":"Healthcare Dataset 閲覧者","roleName":"roles/healthcare.datasetViewer","roleDescription":"プロジェクト内の Healthcare Datasets の一覧表示。"}},"roles/healthcare.dicomEditor":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.dicomStores.dicomWebDelete","healthcare.dicomStores.dicomWebRead","healthcare.dicomStores.dicomWebWrite","healthcare.dicomStores.export","healthcare.dicomStores.get","healthcare.dicomStores.import","healthcare.dicomStores.list","healthcare.locations.*","healthcare.operations.cancel","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare DICOM Editor","roleName":"roles/healthcare.dicomEditor","roleDescription":"Edit DICOM images individually and in bulk."},"ja":{"roleTitle":"Healthcare DICOM 編集者","roleName":"roles/healthcare.dicomEditor","roleDescription":"DICOM イメージの個別編集または一括編集。"}},"roles/healthcare.dicomStoreAdmin":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.dicomStores.create","healthcare.dicomStores.deidentify","healthcare.dicomStores.delete","healthcare.dicomStores.dicomWebDelete","healthcare.dicomStores.get","healthcare.dicomStores.getIamPolicy","healthcare.dicomStores.list","healthcare.dicomStores.setIamPolicy","healthcare.dicomStores.update","healthcare.locations.*","healthcare.operations.cancel","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare DICOM Store Administrator","roleName":"roles/healthcare.dicomStoreAdmin","roleDescription":"Administer DICOM stores."},"ja":{"roleTitle":"Healthcare DICOM ストア管理者","roleName":"roles/healthcare.dicomStoreAdmin","roleDescription":"DICOM ストアの管理。"}},"roles/healthcare.dicomStoreViewer":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.dicomStores.get","healthcare.dicomStores.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare DICOM Store Viewer","roleName":"roles/healthcare.dicomStoreViewer","roleDescription":"List DICOM Stores in a dataset."},"ja":{"roleTitle":"Healthcare DICOM ストア閲覧者","roleName":"roles/healthcare.dicomStoreViewer","roleDescription":"データセット内の DICOM ストアの一覧表示。"}},"roles/healthcare.dicomViewer":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.dicomStores.dicomWebRead","healthcare.dicomStores.export","healthcare.dicomStores.get","healthcare.dicomStores.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare DICOM Viewer","roleName":"roles/healthcare.dicomViewer","roleDescription":"Retrieve DICOM images from a DICOM store."},"ja":{"roleTitle":"Healthcare DICOM 閲覧者","roleName":"roles/healthcare.dicomViewer","roleDescription":"DICOM ストアからの DICOM イメージの取得。"}},"roles/healthcare.fhirResourceEditor":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.fhirResources.create","healthcare.fhirResources.delete","healthcare.fhirResources.get","healthcare.fhirResources.patch","healthcare.fhirResources.translateConceptMap","healthcare.fhirResources.update","healthcare.fhirStores.executeBundle","healthcare.fhirStores.get","healthcare.fhirStores.list","healthcare.fhirStores.searchResources","healthcare.locations.*","healthcare.operations.cancel","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare FHIR Resource Editor","roleName":"roles/healthcare.fhirResourceEditor","roleDescription":"Create, delete, update, read and search FHIR resources."},"ja":{"roleTitle":"Healthcare FHIR リソース編集者","roleName":"roles/healthcare.fhirResourceEditor","roleDescription":"FHIR リソースの作成、削除、更新、読み取り、検索。"}},"roles/healthcare.fhirResourceReader":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.fhirResources.get","healthcare.fhirResources.translateConceptMap","healthcare.fhirStores.executeBundle","healthcare.fhirStores.get","healthcare.fhirStores.list","healthcare.fhirStores.searchResources","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare FHIR Resource Reader","roleName":"roles/healthcare.fhirResourceReader","roleDescription":"Read and search FHIR resources."},"ja":{"roleTitle":"Healthcare FHIR リソース読み取り","roleName":"roles/healthcare.fhirResourceReader","roleDescription":"FHIR リソースの読み取りと検索。"}},"roles/healthcare.fhirStoreAdmin":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.fhirResources.purge","healthcare.fhirStores.configureSearch","healthcare.fhirStores.create","healthcare.fhirStores.deidentify","healthcare.fhirStores.delete","healthcare.fhirStores.export","healthcare.fhirStores.get","healthcare.fhirStores.getIamPolicy","healthcare.fhirStores.import","healthcare.fhirStores.list","healthcare.fhirStores.setIamPolicy","healthcare.fhirStores.update","healthcare.locations.*","healthcare.operations.cancel","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare FHIR Store Administrator","roleName":"roles/healthcare.fhirStoreAdmin","roleDescription":"Administer FHIR resource stores."},"ja":{"roleTitle":"Healthcare FHIR ストア管理者","roleName":"roles/healthcare.fhirStoreAdmin","roleDescription":"FHIR リソースストアの管理権限。"}},"roles/healthcare.fhirStoreViewer":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.fhirStores.get","healthcare.fhirStores.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare FHIR Store Viewer","roleName":"roles/healthcare.fhirStoreViewer","roleDescription":"List FHIR Stores in a dataset."},"ja":{"roleTitle":"Healthcare FHIR ストア閲覧者","roleName":"roles/healthcare.fhirStoreViewer","roleDescription":"データセット内の FHIR ストアの一覧表示。"}},"roles/healthcare.hl7V2Consumer":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.hl7V2Messages.create","healthcare.hl7V2Messages.get","healthcare.hl7V2Messages.list","healthcare.hl7V2Messages.update","healthcare.hl7V2Stores.get","healthcare.hl7V2Stores.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare HL7v2 Message Consumer","roleName":"roles/healthcare.hl7V2Consumer","roleDescription":"List and read HL7v2 messages, update message labels, and publish new messages."},"ja":{"roleTitle":"Healthcare HL7v2 メッセージ コンシューマー","roleName":"roles/healthcare.hl7V2Consumer","roleDescription":"HL7v2 メッセージの一覧表示と読み取り、メッセージ ラベルの更新、新しいメッセージの公開。"}},"roles/healthcare.hl7V2Editor":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.hl7V2Messages.*","healthcare.hl7V2Stores.get","healthcare.hl7V2Stores.list","healthcare.locations.*","healthcare.operations.cancel","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare HL7v2 Message Editor","roleName":"roles/healthcare.hl7V2Editor","roleDescription":"Read, write, and delete access to HL7v2 messages."},"ja":{"roleTitle":"Healthcare HL7v2 メッセージ編集者","roleName":"roles/healthcare.hl7V2Editor","roleDescription":"HL7v2 メッセージの読み取り、書き込み、削除。"}},"roles/healthcare.hl7V2Ingest":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.hl7V2Messages.ingest","healthcare.hl7V2Stores.get","healthcare.hl7V2Stores.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare HL7v2 Message Ingest","roleName":"roles/healthcare.hl7V2Ingest","roleDescription":"Ingest HL7v2 messages received from a source network."},"ja":{"roleTitle":"Healthcare HL7v2 メッセージ取り込み","roleName":"roles/healthcare.hl7V2Ingest","roleDescription":"ソース ネットワークから受信した HL7v2 メッセージの取り込み。"}},"roles/healthcare.hl7V2StoreAdmin":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.hl7V2Stores.*","healthcare.locations.*","healthcare.operations.cancel","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare HL7v2 Store Administrator","roleName":"roles/healthcare.hl7V2StoreAdmin","roleDescription":"Administer HL7v2 Stores."},"ja":{"roleTitle":"Healthcare HL7v2 ストア管理者","roleName":"roles/healthcare.hl7V2StoreAdmin","roleDescription":"HL7v2 ストアの管理。"}},"roles/healthcare.hl7V2StoreViewer":{"permissions":["healthcare.datasets.get","healthcare.datasets.list","healthcare.hl7V2Stores.get","healthcare.hl7V2Stores.list","healthcare.locations.*","healthcare.operations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare HL7v2 Store Viewer","roleName":"roles/healthcare.hl7V2StoreViewer","roleDescription":"View HL7v2 Stores in a dataset."},"ja":{"roleTitle":"Healthcare HL7v2 ストア閲覧者","roleName":"roles/healthcare.hl7V2StoreViewer","roleDescription":"データセット内の HL7v2 ストアの表示。"}},"roles/healthcare.nlpServiceViewer":{"permissions":["healthcare.locations.*","healthcare.nlpservice.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare NLP Service Viewer","roleName":"roles/healthcare.nlpServiceViewer","roleDescription":"Extract and analyze medical entities from a given text."},"ja":{"roleTitle":"Healthcare NLP サービス閲覧者","roleName":"roles/healthcare.nlpServiceViewer","roleDescription":"指定されたテキストから医療エンティティを抽出し、分析します。"}},"roles/healthcare.userDataMappingEditor":{"permissions":["healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","healthcare.userDataMappings.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare User Data Mapping Editor","roleName":"roles/healthcare.userDataMappingEditor","roleDescription":"Edit UserDataMapping objects."},"ja":{"roleTitle":"Healthcare User Data Mapping 編集者","roleName":"roles/healthcare.userDataMappingEditor","roleDescription":"UserDataMapping オブジェクトを編集します。"}},"roles/healthcare.userDataMappingReader":{"permissions":["healthcare.consentStores.checkDataAccess","healthcare.consentStores.evaluateUserConsents","healthcare.consentStores.get","healthcare.consentStores.list","healthcare.consentStores.queryAccessibleData","healthcare.datasets.get","healthcare.datasets.list","healthcare.locations.*","healthcare.operations.get","healthcare.userDataMappings.get","healthcare.userDataMappings.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Healthcare User Data Mapping Reader","roleName":"roles/healthcare.userDataMappingReader","roleDescription":"Read UserDataMapping objects in a consent store."},"ja":{"roleTitle":"Healthcare User Data Mapping 読み取り","roleName":"roles/healthcare.userDataMappingReader","roleDescription":"Consent Store 内の UserDataMapping オブジェクトの読み取り。"}},"roles/iap.admin":{"permissions":["iap.tunnel.*","iap.tunnelInstances.getIamPolicy","iap.tunnelInstances.setIamPolicy","iap.tunnelZones.*","iap.web.getIamPolicy","iap.web.setIamPolicy","iap.webServiceVersions.getIamPolicy","iap.webServiceVersions.setIamPolicy","iap.webServices.getIamPolicy","iap.webServices.setIamPolicy","iap.webTypes.getIamPolicy","iap.webTypes.setIamPolicy"],"en":{"roleTitle":"IAP Policy Admin","roleName":"roles/iap.admin","roleDescription":"Provides full access to Identity-Aware Proxy resources."},"ja":{"roleTitle":"IAP ポリシー管理者","roleName":"roles/iap.admin","roleDescription":"Identity-Aware Proxy のリソースに対する完全アクセス権を付与します。"}},"roles/iap.httpsResourceAccessor":{"permissions":["iap.webServiceVersions.accessViaIAP"],"en":{"roleTitle":"IAP-secured Web App User","roleName":"roles/iap.httpsResourceAccessor","roleDescription":"Provides permission to access HTTPS resources which use Identity-Aware Proxy."},"ja":{"roleTitle":"IAP で保護されたウェブアプリ ユーザー","roleName":"roles/iap.httpsResourceAccessor","roleDescription":"Identity-Aware Proxy を使用する HTTPS リソースへのアクセス権を付与します。"}},"roles/iap.settingsAdmin":{"permissions":["iap.projects.*","iap.web.getSettings","iap.web.updateSettings","iap.webServiceVersions.getSettings","iap.webServiceVersions.updateSettings","iap.webServices.getSettings","iap.webServices.updateSettings","iap.webTypes.getSettings","iap.webTypes.updateSettings"],"en":{"roleTitle":"IAP Settings Admin","roleName":"roles/iap.settingsAdmin","roleDescription":"Administrator of IAP Settings."},"ja":{"roleTitle":"IAP 設定管理者","roleName":"roles/iap.settingsAdmin","roleDescription":"IAP 設定の管理者。"}},"roles/iap.tunnelResourceAccessor":{"permissions":["iap.tunnelInstances.accessViaIAP"],"en":{"roleTitle":"IAP-secured Tunnel User","roleName":"roles/iap.tunnelResourceAccessor","roleDescription":"Access Tunnel resources which use Identity-Aware Proxy"},"ja":{"roleTitle":"IAP で保護されたトンネル ユーザー","roleName":"roles/iap.tunnelResourceAccessor","roleDescription":"Identity-Aware Proxy を使用するトンネル リソースのアクセス権"}},"roles/ids.admin":{"permissions":["ids.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud IDS Admin","roleName":"roles/ids.admin","roleDescription":"Full access to Cloud IDS all resources."},"ja":{"roleTitle":"Cloud IDS 管理者","roleName":"roles/ids.admin","roleDescription":"Cloud IDS のすべてのリソースに対する完全アクセス権。"}},"roles/ids.viewer":{"permissions":["ids.endpoints.get","ids.endpoints.getIamPolicy","ids.endpoints.list","ids.locations.*","ids.operations.get","ids.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud IDS Viewer","roleName":"roles/ids.viewer","roleDescription":"Read-only access to Cloud IDS all resources."},"ja":{"roleTitle":"Cloud IDS 閲覧者","roleName":"roles/ids.viewer","roleDescription":"Cloud IDS のすべてのリソースに対する読み取り専用アクセス権。"}},"roles/cloudiot.admin":{"permissions":["cloudiot.*","cloudiottoken.*"],"en":{"roleTitle":"Cloud IoT Admin","roleName":"roles/cloudiot.admin","roleDescription":"Full control of all Cloud IoT resources and permissions."},"ja":{"roleTitle":"Cloud IoT 管理者","roleName":"roles/cloudiot.admin","roleDescription":"すべての Cloud IoT リソースと権限を完全に管理できる権限。"}},"roles/cloudiot.deviceController":{"permissions":["cloudiot.devices.get","cloudiot.devices.list","cloudiot.devices.sendCommand","cloudiot.devices.updateConfig","cloudiot.registries.get","cloudiot.registries.list","cloudiottoken.tokensettings.get"],"en":{"roleTitle":"Cloud IoT Device Controller","roleName":"roles/cloudiot.deviceController","roleDescription":"Access to update the device configuration, but not to create or delete devices."},"ja":{"roleTitle":"Cloud IoT デバイス コントローラ","roleName":"roles/cloudiot.deviceController","roleDescription":"デバイス構成を更新するためのアクセス権。デバイスの作成や削除はできません。"}},"roles/cloudiot.editor":{"permissions":["cloudiot.devices.*","cloudiot.registries.create","cloudiot.registries.delete","cloudiot.registries.get","cloudiot.registries.list","cloudiot.registries.update","cloudiottoken.*"],"en":{"roleTitle":"Cloud IoT Editor","roleName":"roles/cloudiot.editor","roleDescription":"Read-write access to all Cloud IoT resources."},"ja":{"roleTitle":"Cloud IoT 編集者","roleName":"roles/cloudiot.editor","roleDescription":"すべての Cloud IoT リソースに対する読み取り / 書き込みアクセス権。"}},"roles/cloudiot.provisioner":{"permissions":["cloudiot.devices.*","cloudiot.registries.get","cloudiot.registries.list","cloudiottoken.tokensettings.get"],"en":{"roleTitle":"Cloud IoT Provisioner","roleName":"roles/cloudiot.provisioner","roleDescription":"Access to create and delete devices from registries, but not to modify the registries, and enable devices to publish to topics associated with IoT registry."},"ja":{"roleTitle":"Cloud IoT プロビジョナー","roleName":"roles/cloudiot.provisioner","roleDescription":"レジストリに対してデバイスを作成および削除する権限(レジストリを変更する権限は除く)と、IoT レジストリに関連付けられたトピックにデバイスを公開する権限。"}},"roles/cloudiot.viewer":{"permissions":["cloudiot.devices.get","cloudiot.devices.list","cloudiot.registries.get","cloudiot.registries.list","cloudiottoken.tokensettings.get"],"en":{"roleTitle":"Cloud IoT Viewer","roleName":"roles/cloudiot.viewer","roleDescription":"Read-only access to all Cloud IoT resources."},"ja":{"roleTitle":"Cloud IoT 閲覧者","roleName":"roles/cloudiot.viewer","roleDescription":"すべての Cloud IoT リソースに対する読み取り専用アクセス権。"}},"roles/cloudkms.admin":{"permissions":["cloudkms.cryptoKeyVersions.create","cloudkms.cryptoKeyVersions.destroy","cloudkms.cryptoKeyVersions.get","cloudkms.cryptoKeyVersions.list","cloudkms.cryptoKeyVersions.restore","cloudkms.cryptoKeyVersions.update","cloudkms.cryptoKeyVersions.useToDecryptViaDelegation","cloudkms.cryptoKeyVersions.useToEncryptViaDelegation","cloudkms.cryptoKeys.*","cloudkms.ekmConnections.*","cloudkms.importJobs.*","cloudkms.keyRings.*","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS Admin","roleName":"roles/cloudkms.admin","roleDescription":"Provides full access to Cloud KMS resources, except encrypt and decrypt\noperations."},"ja":{"roleTitle":"Cloud KMS 管理者","roleName":"roles/cloudkms.admin","roleDescription":"暗号化と復号を除く、Cloud KMS リソースに対する完全アクセス権を付与します。"}},"roles/cloudkms.cryptoKeyDecrypter":{"permissions":["cloudkms.cryptoKeyVersions.useToDecrypt","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS CryptoKey Decrypter","roleName":"roles/cloudkms.cryptoKeyDecrypter","roleDescription":"Provides ability to use Cloud KMS resources for decrypt operations\nonly."},"ja":{"roleTitle":"Cloud KMS 暗号鍵の復号","roleName":"roles/cloudkms.cryptoKeyDecrypter","roleDescription":"復号の場合のみ、Cloud KMS リソースの使用を許可します。"}},"roles/cloudkms.cryptoKeyDecrypterViaDelegation":{"permissions":["cloudkms.cryptoKeyVersions.useToDecryptViaDelegation","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud KMS CryptoKey Decrypter Via Delegation","roleName":"roles/cloudkms.cryptoKeyDecrypterViaDelegation","roleDescription":"Enables Decrypt operations via other GCP services"},"ja":{"roleTitle":"委任による Cloud KMS 暗号鍵の復号","roleName":"roles/cloudkms.cryptoKeyDecrypterViaDelegation","roleDescription":"他の GCP サービスを介した複合操作を有効にします"}},"roles/cloudkms.cryptoKeyEncrypter":{"permissions":["cloudkms.cryptoKeyVersions.useToEncrypt","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS CryptoKey Encrypter","roleName":"roles/cloudkms.cryptoKeyEncrypter","roleDescription":"Provides ability to use Cloud KMS resources for encrypt operations\nonly."},"ja":{"roleTitle":"Cloud KMS 暗号鍵の暗号化","roleName":"roles/cloudkms.cryptoKeyEncrypter","roleDescription":"暗号化の場合にのみ、Cloud KMS リソースの使用を許可します。"}},"roles/cloudkms.cryptoKeyEncrypterDecrypter":{"permissions":["cloudkms.cryptoKeyVersions.useToDecrypt","cloudkms.cryptoKeyVersions.useToEncrypt","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS CryptoKey Encrypter/Decrypter","roleName":"roles/cloudkms.cryptoKeyEncrypterDecrypter","roleDescription":"Provides ability to use Cloud KMS resources for encrypt and decrypt\noperations only."},"ja":{"roleTitle":"Cloud KMS 暗号鍵の暗号化 / 復号","roleName":"roles/cloudkms.cryptoKeyEncrypterDecrypter","roleDescription":"暗号化と復号の場合のみ、Cloud KMS リソースの使用を許可します。"}},"roles/cloudkms.cryptoKeyEncrypterDecrypterViaDelegation":{"permissions":["cloudkms.cryptoKeyVersions.useToDecryptViaDelegation","cloudkms.cryptoKeyVersions.useToEncryptViaDelegation","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation","roleName":"roles/cloudkms.cryptoKeyEncrypterDecrypterViaDelegation","roleDescription":"Enables Encrypt and Decrypt operations via other GCP services"},"ja":{"roleTitle":"委任による Cloud KMS 暗号鍵の暗号化 / 復号","roleName":"roles/cloudkms.cryptoKeyEncrypterDecrypterViaDelegation","roleDescription":"他の GCP サービスを介した暗号化操作と復号操作を有効にします"}},"roles/cloudkms.cryptoKeyEncrypterViaDelegation":{"permissions":["cloudkms.cryptoKeyVersions.useToEncryptViaDelegation","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud KMS CryptoKey Encrypter Via Delegation","roleName":"roles/cloudkms.cryptoKeyEncrypterViaDelegation","roleDescription":"Enables Encrypt operations via other GCP services"},"ja":{"roleTitle":"委任による Cloud KMS 暗号鍵の暗号化","roleName":"roles/cloudkms.cryptoKeyEncrypterViaDelegation","roleDescription":"他の GCP サービスを介した暗号化操作を有効にします"}},"roles/cloudkms.cryptoOperator":{"permissions":["cloudkms.cryptoKeyVersions.useToDecrypt","cloudkms.cryptoKeyVersions.useToEncrypt","cloudkms.cryptoKeyVersions.useToSign","cloudkms.cryptoKeyVersions.useToVerify","cloudkms.cryptoKeyVersions.viewPublicKey","cloudkms.locations.*","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS Crypto Operator","roleName":"roles/cloudkms.cryptoOperator","roleDescription":"Enables all Crypto Operations."},"ja":{"roleTitle":"Cloud KMS 暗号オペレータ","roleName":"roles/cloudkms.cryptoOperator","roleDescription":"すべての暗号オペレーションを有効にします。"}},"roles/cloudkms.expertRawPKCS1":{"permissions":["cloudkms.cryptoKeyVersions.manageRawPKCS1Keys","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud KMS Expert Raw PKCS#1 Key Manager","roleName":"roles/cloudkms.expertRawPKCS1","roleDescription":"Enables raw PKCS#1 keys management."},"ja":{"roleTitle":"Cloud KMS エキスパート未加工 PKCS#1 鍵マネージャー","roleName":"roles/cloudkms.expertRawPKCS1","roleDescription":"未加工の PKCS#1 鍵の管理を有効にします。"}},"roles/cloudkms.importer":{"permissions":["cloudkms.importJobs.create","cloudkms.importJobs.get","cloudkms.importJobs.list","cloudkms.importJobs.useToImport","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS Importer","roleName":"roles/cloudkms.importer","roleDescription":"Enables ImportCryptoKeyVersion, CreateImportJob, ListImportJobs, and GetImportJob operations"},"ja":{"roleTitle":"Cloud KMS インポータ","roleName":"roles/cloudkms.importer","roleDescription":"ImportCryptoKeyVersion、CreateImportJob、ListImportJobs、GetImportJob の各オペレーションを有効にします。"}},"roles/cloudkms.publicKeyViewer":{"permissions":["cloudkms.cryptoKeyVersions.viewPublicKey","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS CryptoKey Public Key Viewer","roleName":"roles/cloudkms.publicKeyViewer","roleDescription":"Enables GetPublicKey operations"},"ja":{"roleTitle":"Cloud KMS 暗号鍵の公開鍵閲覧者","roleName":"roles/cloudkms.publicKeyViewer","roleDescription":"GetPublicKey オペレーションを有効にします。"}},"roles/cloudkms.signer":{"permissions":["cloudkms.cryptoKeyVersions.useToSign","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS CryptoKey Signer","roleName":"roles/cloudkms.signer","roleDescription":"Enables Sign operations"},"ja":{"roleTitle":"Cloud KMS 暗号鍵の署名者","roleName":"roles/cloudkms.signer","roleDescription":"Sign オペレーションを有効にします。"}},"roles/cloudkms.signerVerifier":{"permissions":["cloudkms.cryptoKeyVersions.useToSign","cloudkms.cryptoKeyVersions.useToVerify","cloudkms.cryptoKeyVersions.viewPublicKey","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS CryptoKey Signer/Verifier","roleName":"roles/cloudkms.signerVerifier","roleDescription":"Enables Sign, Verify, and GetPublicKey operations"},"ja":{"roleTitle":"Cloud KMS 暗号鍵の署名者 / 検証者","roleName":"roles/cloudkms.signerVerifier","roleDescription":"Sign、Verify、GetPublicKey の各オペレーションを有効にします。"}},"roles/cloudkms.verifier":{"permissions":["cloudkms.cryptoKeyVersions.useToVerify","cloudkms.cryptoKeyVersions.viewPublicKey","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS CryptoKey Verifier","roleName":"roles/cloudkms.verifier","roleDescription":"Enables Verify and GetPublicKey operations"},"ja":{"roleTitle":"Cloud KMS 暗号鍵検証者","roleName":"roles/cloudkms.verifier","roleDescription":"Verify と GetPublicKey のオペレーションを有効にします。"}},"roles/cloudkms.viewer":{"permissions":["cloudkms.cryptoKeyVersions.get","cloudkms.cryptoKeyVersions.list","cloudkms.cryptoKeys.get","cloudkms.cryptoKeys.list","cloudkms.ekmConnections.get","cloudkms.ekmConnections.list","cloudkms.importJobs.get","cloudkms.importJobs.list","cloudkms.keyRings.get","cloudkms.keyRings.list","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"en":{"roleTitle":"Cloud KMS Viewer","roleName":"roles/cloudkms.viewer","roleDescription":"Enables Get and List operations."},"ja":{"roleTitle":"Cloud KMS 閲覧者","roleName":"roles/cloudkms.viewer","roleDescription":"get オペレーションと list オペレーションを有効にします。"}},"roles/lifesciences.admin":{"permissions":["lifesciences.*"],"en":{"roleTitle":"Cloud Life Sciences Admin","roleName":"roles/lifesciences.admin","roleDescription":"Full control of Cloud Life Sciences resources."},"ja":{"roleTitle":"Cloud Life Sciences 管理者","roleName":"roles/lifesciences.admin","roleDescription":"Cloud Life Sciences リソースのフル コントロール。"}},"roles/lifesciences.editor":{"permissions":["lifesciences.*"],"en":{"roleTitle":"Cloud Life Sciences Editor","roleName":"roles/lifesciences.editor","roleDescription":"Access to read and edit Cloud Life Sciences resources."},"ja":{"roleTitle":"Cloud Life Sciences 編集者","roleName":"roles/lifesciences.editor","roleDescription":"Cloud Life Sciences のリソースへの読み取り / 編集アクセス権。"}},"roles/lifesciences.viewer":{"permissions":["lifesciences.operations.get","lifesciences.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Life Sciences Viewer","roleName":"roles/lifesciences.viewer","roleDescription":"Access to read Cloud Life Sciences resources."},"ja":{"roleTitle":"Cloud Life Sciences 閲覧者","roleName":"roles/lifesciences.viewer","roleDescription":"Cloud Life Sciences リソースの読み取りアクセス権。"}},"roles/lifesciences.workflowsRunner":{"permissions":["lifesciences.*"],"en":{"roleTitle":"Cloud Life Sciences Workflows Runner","roleName":"roles/lifesciences.workflowsRunner","roleDescription":"Full access to operate on Cloud Life Sciences workflows."},"ja":{"roleTitle":"Cloud Life Sciences ワークフロー実行者","roleName":"roles/lifesciences.workflowsRunner","roleDescription":"Cloud Life Sciences ワークフローに関する操作への完全アクセス権。"}},"roles/managedidentities.admin":{"permissions":["managedidentities.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Cloud Managed Identities Admin","roleName":"roles/managedidentities.admin","roleDescription":"Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level."},"ja":{"roleTitle":"Google Cloud Managed Identities 管理者","roleName":"roles/managedidentities.admin","roleDescription":"Google Cloud Managed Identities のドメインと関連リソースに対する完全アクセス権。プロジェクト レベルで付与することを前提としています。"}},"roles/managedidentities.backupAdmin":{"permissions":["managedidentities.backups.*","managedidentities.domains.get","managedidentities.locations.*","managedidentities.operations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Cloud Managed Identities Backup Admin","roleName":"roles/managedidentities.backupAdmin","roleDescription":"Full access to Google Cloud Managed Identities Backup and related resources. Intended to be granted on a project-level"},"ja":{"roleTitle":"Google Cloud Managed Identities バックアップ管理者","roleName":"roles/managedidentities.backupAdmin","roleDescription":"Google Cloud Managed Identities のバックアップと関連リソースに対する完全アクセス権。プロジェクト レベルで付与することを前提としています"}},"roles/managedidentities.backupViewer":{"permissions":["managedidentities.backups.get","managedidentities.backups.getIamPolicy","managedidentities.backups.list","managedidentities.domains.get","managedidentities.locations.*","managedidentities.operations.get","managedidentities.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Cloud Managed Identities Backup Viewer","roleName":"roles/managedidentities.backupViewer","roleDescription":"Read-only access to Google Cloud Managed Identities Backup and related resources."},"ja":{"roleTitle":"Google Cloud Managed Identities バックアップ閲覧者","roleName":"roles/managedidentities.backupViewer","roleDescription":"Google Cloud Managed Identities のバックアップと関連リソースに対する読み取り専用アクセス権。"}},"roles/managedidentities.domainAdmin":{"permissions":["managedidentities.backups.*","managedidentities.domains.attachTrust","managedidentities.domains.createTagBinding","managedidentities.domains.delete","managedidentities.domains.deleteTagBinding","managedidentities.domains.detachTrust","managedidentities.domains.get","managedidentities.domains.getIamPolicy","managedidentities.domains.listTagBindings","managedidentities.domains.reconfigureTrust","managedidentities.domains.resetpassword","managedidentities.domains.restore","managedidentities.domains.update","managedidentities.domains.updateLDAPSSettings","managedidentities.domains.validateTrust","managedidentities.locations.*","managedidentities.operations.get","managedidentities.operations.list","managedidentities.sqlintegrations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Cloud Managed Identities Domain Admin","roleName":"roles/managedidentities.domainAdmin","roleDescription":"Read-Update-Delete to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a resource (domain) level."},"ja":{"roleTitle":"Google Cloud Managed Identities ドメイン管理者","roleName":"roles/managedidentities.domainAdmin","roleDescription":"Google Cloud Managed Identities のドメインと関連リソースに対する読み取り / 更新 / 削除権限。リソース(ドメイン)レベルで付与することを前提としています。"}},"roles/managedidentities.domaincontrollerOperator":{"permissions":["pubsub.schemas.attach","pubsub.schemas.create","pubsub.schemas.delete","pubsub.schemas.get","pubsub.schemas.list","pubsub.schemas.validate","pubsub.snapshots.create","pubsub.snapshots.delete","pubsub.snapshots.get","pubsub.snapshots.list","pubsub.snapshots.seek","pubsub.snapshots.update","pubsub.subscriptions.consume","pubsub.subscriptions.create","pubsub.subscriptions.delete","pubsub.subscriptions.get","pubsub.subscriptions.list","pubsub.subscriptions.update","pubsub.topics.attachSubscription","pubsub.topics.create","pubsub.topics.delete","pubsub.topics.detachSubscription","pubsub.topics.get","pubsub.topics.list","pubsub.topics.publish","pubsub.topics.update","pubsub.topics.updateTag","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Google Cloud Managed Identities Domain Controller Operator","roleName":"roles/managedidentities.domaincontrollerOperator","roleDescription":"Operator access for Managed AD Domain Controllers"},"ja":{"roleTitle":"Google Cloud Managed Identities ドメイン コントローラのオペレータ","roleName":"roles/managedidentities.domaincontrollerOperator","roleDescription":"Managed AD ドメイン コントローラへのオペレータ アクセス権"}},"roles/managedidentities.peeringAdmin":{"permissions":["managedidentities.locations.*","managedidentities.operations.*","managedidentities.peerings.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Cloud Managed Identities Peering Admin","roleName":"roles/managedidentities.peeringAdmin","roleDescription":"Full access to Google Cloud Managed Identities Domains and related resources. Intended to be granted on a project-level"},"ja":{"roleTitle":"Google Cloud Managed Identities ピアリング管理者","roleName":"roles/managedidentities.peeringAdmin","roleDescription":"Google Cloud Managed Identities のドメインと関連リソースに対する完全アクセス権。プロジェクト レベルで付与することを前提としています"}},"roles/managedidentities.peeringViewer":{"permissions":["managedidentities.locations.*","managedidentities.operations.get","managedidentities.operations.list","managedidentities.peerings.get","managedidentities.peerings.getIamPolicy","managedidentities.peerings.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Cloud Managed Identities Peering Viewer","roleName":"roles/managedidentities.peeringViewer","roleDescription":"Read-only access to Google Cloud Managed Identities Peering and related resources."},"ja":{"roleTitle":"Google Cloud Managed Identities ピアリング閲覧者","roleName":"roles/managedidentities.peeringViewer","roleDescription":"Google Cloud Managed Identities のピアリングと関連リソースに対する読み取り専用アクセス権。"}},"roles/managedidentities.viewer":{"permissions":["managedidentities.backups.get","managedidentities.backups.getIamPolicy","managedidentities.backups.list","managedidentities.domains.get","managedidentities.domains.getIamPolicy","managedidentities.domains.list","managedidentities.domains.listTagBindings","managedidentities.locations.*","managedidentities.operations.get","managedidentities.operations.list","managedidentities.peerings.get","managedidentities.peerings.getIamPolicy","managedidentities.peerings.list","managedidentities.sqlintegrations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Cloud Managed Identities Viewer","roleName":"roles/managedidentities.viewer","roleDescription":"Read-only access to Google Cloud Managed Identities Domains and related resources."},"ja":{"roleTitle":"Google Cloud Managed Identities 閲覧者","roleName":"roles/managedidentities.viewer","roleDescription":"Google Cloud Managed Identities のドメインと関連リソースに対する読み取り専用アクセス権。"}},"roles/commerceoffercatalog.offersViewer":{"permissions":["commerceoffercatalog.*"],"en":{"roleTitle":"Commerce Offer Catalog Offers Viewer","roleName":"roles/commerceoffercatalog.offersViewer","roleDescription":"Allows viewing offers"},"ja":{"roleTitle":"コマース オファー カタログ オファー閲覧者","roleName":"roles/commerceoffercatalog.offersViewer","roleDescription":"オファーを表示できます。"}},"roles/commercepricemanagement.privateOffersAdmin":{"permissions":["commerceprice.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Commerce Price Management Private Offers Admin","roleName":"roles/commercepricemanagement.privateOffersAdmin","roleDescription":"Allows managing private offers"},"ja":{"roleTitle":"Commerce Price Management Private Offers 管理者","roleName":"roles/commercepricemanagement.privateOffersAdmin","roleDescription":"Private Offers を管理できます。"}},"roles/commercepricemanagement.viewer":{"permissions":["commerceprice.privateoffers.get","commerceprice.privateoffers.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Commerce Price Management Viewer","roleName":"roles/commercepricemanagement.viewer","roleDescription":"Allows viewing offers, free trials, skus"},"ja":{"roleTitle":"Commerce Price Management 閲覧者","roleName":"roles/commercepricemanagement.viewer","roleDescription":"クーポン、無料トライアル、SKU を表示できます。"}},"roles/consumerprocurement.entitlementManager":{"permissions":["consumerprocurement.entitlements.*","consumerprocurement.freeTrials.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.operations.get","serviceusage.services.disable","serviceusage.services.enable","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Consumer Procurement Entitlement Manager","roleName":"roles/consumerprocurement.entitlementManager","roleDescription":"Allows managing entitlements and enabling, disabling, and inspecting service states for a consumer\nproject."},"ja":{"roleTitle":"Consumer Procurement Entitlement 管理者","roleName":"roles/consumerprocurement.entitlementManager","roleDescription":"エンタイトルメントを管理し、ユーザー プロジェクトのサービス状態の有効化、無効化、検査を行うことができます。"}},"roles/consumerprocurement.entitlementViewer":{"permissions":["consumerprocurement.entitlements.*","consumerprocurement.freeTrials.get","consumerprocurement.freeTrials.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Consumer Procurement Entitlement Viewer","roleName":"roles/consumerprocurement.entitlementViewer","roleDescription":"Allows inspecting entitlements and service states for a consumer project."},"ja":{"roleTitle":"Consumer Procurement Entitlement 閲覧者","roleName":"roles/consumerprocurement.entitlementViewer","roleDescription":"ユーザー プロジェクトのエンタイトルメントとサービスの状態を検査できます。"}},"roles/consumerprocurement.orderAdmin":{"permissions":["commerceoffercatalog.*","consumerprocurement.accounts.*","consumerprocurement.orderAttributions.*","consumerprocurement.orders.*"],"en":{"roleTitle":"Consumer Procurement Order Administrator","roleName":"roles/consumerprocurement.orderAdmin","roleDescription":"Allows managing purchases."},"ja":{"roleTitle":"Consumer Procurement Order 管理者","roleName":"roles/consumerprocurement.orderAdmin","roleDescription":"購入を管理できます。"}},"roles/consumerprocurement.orderViewer":{"permissions":["commerceoffercatalog.*","consumerprocurement.accounts.get","consumerprocurement.accounts.list","consumerprocurement.orderAttributions.get","consumerprocurement.orderAttributions.list","consumerprocurement.orders.get","consumerprocurement.orders.list"],"en":{"roleTitle":"Consumer Procurement Order Viewer","roleName":"roles/consumerprocurement.orderViewer","roleDescription":"Allows inspecting purchases."},"ja":{"roleTitle":"Consumer Procurement Order 閲覧者","roleName":"roles/consumerprocurement.orderViewer","roleDescription":"購入を検査できます。"}},"roles/cloudmigration.inframanager":{"permissions":["cloudmigration.*","compute.addresses.*","compute.diskTypes.*","compute.disks.create","compute.disks.createSnapshot","compute.disks.delete","compute.disks.get","compute.disks.list","compute.disks.setLabels","compute.disks.update","compute.disks.use","compute.disks.useReadOnly","compute.globalOperations.get","compute.images.get","compute.images.list","compute.images.useReadOnly","compute.instances.attachDisk","compute.instances.create","compute.instances.delete","compute.instances.detachDisk","compute.instances.get","compute.instances.getSerialPortOutput","compute.instances.list","compute.instances.reset","compute.instances.setDiskAutoDelete","compute.instances.setLabels","compute.instances.setMachineType","compute.instances.setMetadata","compute.instances.setMinCpuPlatform","compute.instances.setScheduling","compute.instances.setServiceAccount","compute.instances.setTags","compute.instances.start","compute.instances.startWithEncryptionKey","compute.instances.stop","compute.instances.update","compute.instances.updateNetworkInterface","compute.instances.updateShieldedInstanceConfig","compute.instances.use","compute.licenseCodes.get","compute.licenseCodes.list","compute.licenseCodes.update","compute.licenseCodes.use","compute.licenses.get","compute.licenses.list","compute.machineTypes.*","compute.networks.get","compute.networks.list","compute.networks.use","compute.networks.useExternalIp","compute.nodeGroups.get","compute.nodeGroups.list","compute.nodeTemplates.list","compute.projects.get","compute.regionOperations.get","compute.regions.*","compute.snapshots.create","compute.snapshots.delete","compute.snapshots.get","compute.snapshots.setLabels","compute.snapshots.useReadOnly","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.zoneOperations.get","compute.zones.*","gkehub.endpoints.*","iam.serviceAccounts.get","iam.serviceAccounts.list","resourcemanager.projects.get","storage.buckets.create","storage.buckets.delete","storage.buckets.get","storage.buckets.list","storage.buckets.update"],"en":{"roleTitle":"Velostrata Manager","roleName":"roles/cloudmigration.inframanager","roleDescription":"Ability to create and manage Compute VMs to run Velostrata Infrastructure"},"ja":{"roleTitle":"Velostrata Manager","roleName":"roles/cloudmigration.inframanager","roleDescription":"Compute VM を作成、管理して Velostrata インフラストラクチャを運用できる権限"}},"roles/cloudmigration.storageaccess":{"permissions":["storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Velostrata Storage Access","roleName":"roles/cloudmigration.storageaccess","roleDescription":"Ability to access migration storage"},"ja":{"roleTitle":"Velostrata ストレージ アクセス","roleName":"roles/cloudmigration.storageaccess","roleDescription":"移行ストレージにアクセスできる権限"}},"roles/cloudmigration.velostrataconnect":{"permissions":["cloudmigration.*","gkehub.endpoints.*"],"en":{"roleTitle":"Velostrata Manager Connection Agent","roleName":"roles/cloudmigration.velostrataconnect","roleDescription":"Ability to set up connection between Velostrata Manager and Google"},"ja":{"roleTitle":"Velostrata Manager 接続エージェント","roleName":"roles/cloudmigration.velostrataconnect","roleDescription":"Velostrata Manager と Google の間の接続を設定できる権限"}},"roles/vmmigration.admin":{"permissions":["vmmigration.*"],"en":{"roleTitle":"VM Migration Administrator","roleName":"roles/vmmigration.admin","roleDescription":"Ability to view and edit all VM Migration objects"},"ja":{"roleTitle":"VM Migration 管理者","roleName":"roles/vmmigration.admin","roleDescription":"すべての VM Migration オブジェクトの表示と編集の権限"}},"roles/vmmigration.viewer":{"permissions":["vmmigration.cloneJobs.get","vmmigration.cloneJobs.list","vmmigration.cutoverJobs.get","vmmigration.cutoverJobs.list","vmmigration.datacenterConnectors.get","vmmigration.datacenterConnectors.list","vmmigration.deployments.get","vmmigration.deployments.list","vmmigration.groups.get","vmmigration.groups.list","vmmigration.locations.*","vmmigration.migratingVms.get","vmmigration.migratingVms.list","vmmigration.operations.get","vmmigration.operations.list","vmmigration.sources.get","vmmigration.sources.list","vmmigration.targets.get","vmmigration.targets.list","vmmigration.utilizationReports.get","vmmigration.utilizationReports.list"],"en":{"roleTitle":"VM Migration Viewer","roleName":"roles/vmmigration.viewer","roleDescription":"Ability to view all VM Migration objects"},"ja":{"roleTitle":"VM Migration 閲覧者","roleName":"roles/vmmigration.viewer","roleDescription":"すべての VM Migration オブジェクトを表示できる権限"}},"roles/cloudprivatecatalog.consumer":{"permissions":["cloudprivatecatalog.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Catalog Consumer","roleName":"roles/cloudprivatecatalog.consumer","roleDescription":"Can browse catalogs in the target resource context."},"ja":{"roleTitle":"カタログ ユーザー","roleName":"roles/cloudprivatecatalog.consumer","roleDescription":"ターゲット リソース コンテキストでカタログを参照できます。"}},"roles/cloudprivatecatalogproducer.admin":{"permissions":["cloudprivatecatalog.*","cloudprivatecatalogproducer.associations.*","cloudprivatecatalogproducer.catalogAssociations.*","cloudprivatecatalogproducer.catalogs.*","cloudprivatecatalogproducer.producerCatalogs.*","cloudprivatecatalogproducer.products.*","cloudprivatecatalogproducer.targets.*","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Catalog Admin","roleName":"roles/cloudprivatecatalogproducer.admin","roleDescription":"Can manage catalog and view its associations."},"ja":{"roleTitle":"カタログ管理者","roleName":"roles/cloudprivatecatalogproducer.admin","roleDescription":"カタログを管理し、カタログの関連付けを表示できます。"}},"roles/cloudprivatecatalogproducer.manager":{"permissions":["cloudprivatecatalog.*","cloudprivatecatalogproducer.associations.*","cloudprivatecatalogproducer.catalogAssociations.*","cloudprivatecatalogproducer.catalogs.get","cloudprivatecatalogproducer.catalogs.list","cloudprivatecatalogproducer.producerCatalogs.get","cloudprivatecatalogproducer.producerCatalogs.list","cloudprivatecatalogproducer.targets.*","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Catalog Manager","roleName":"roles/cloudprivatecatalogproducer.manager","roleDescription":"Can manage associations between a catalog and a target resource."},"ja":{"roleTitle":"カタログ マネージャー","roleName":"roles/cloudprivatecatalogproducer.manager","roleDescription":"カタログとターゲット リソース間の関連付けを管理できます。"}},"roles/cloudprivatecatalogproducer.orgAdmin":{"permissions":["cloudprivatecatalog.*","cloudprivatecatalogproducer.*","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Catalog Org Admin","roleName":"roles/cloudprivatecatalogproducer.orgAdmin","roleDescription":"Can manage catalog org settings."},"ja":{"roleTitle":"カタログ組織管理者","roleName":"roles/cloudprivatecatalogproducer.orgAdmin","roleDescription":"カタログ組織の設定を管理できます。"}},"roles/cloudprofiler.agent":{"permissions":["cloudprofiler.profiles.create","cloudprofiler.profiles.update"],"en":{"roleTitle":"Cloud Profiler Agent","roleName":"roles/cloudprofiler.agent","roleDescription":"Cloud Profiler agents are allowed to register and provide the profiling data."},"ja":{"roleTitle":"Cloud Profiler エージェント","roleName":"roles/cloudprofiler.agent","roleDescription":"Cloud Profiler エージェントは、プロファイリング データの登録と出力が可能です。"}},"roles/cloudprofiler.user":{"permissions":["cloudprofiler.profiles.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud Profiler User","roleName":"roles/cloudprofiler.user","roleDescription":"Cloud Profiler users are allowed to query and view the profiling data."},"ja":{"roleTitle":"Cloud Profiler ユーザー","roleName":"roles/cloudprofiler.user","roleDescription":"Cloud Profiler ユーザーは、プロファイリング データのクエリと表示が可能です。"}},"roles/run.admin":{"permissions":["recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list","run.*"],"en":{"roleTitle":"Cloud Run Admin","roleName":"roles/run.admin","roleDescription":"Full control over all Cloud Run resources."},"ja":{"roleTitle":"Cloud Run 管理者","roleName":"roles/run.admin","roleDescription":"すべての Cloud Run リソースを完全に管理できます。"}},"roles/run.developer":{"permissions":["recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list","run.configurations.*","run.locations.*","run.revisions.*","run.routes.*","run.services.create","run.services.delete","run.services.get","run.services.getIamPolicy","run.services.list","run.services.listEffectiveTags","run.services.listTagBindings","run.services.update"],"en":{"roleTitle":"Cloud Run Developer","roleName":"roles/run.developer","roleDescription":"Read and write access to all Cloud Run resources."},"ja":{"roleTitle":"Cloud Run デベロッパー","roleName":"roles/run.developer","roleDescription":"すべての Cloud Run リソースに対する読み取りと書き込みのアクセス権。"}},"roles/run.invoker":{"permissions":["run.routes.invoke"],"en":{"roleTitle":"Cloud Run Invoker","roleName":"roles/run.invoker","roleDescription":"Can invoke a Cloud Run service."},"ja":{"roleTitle":"Cloud Run 起動元","roleName":"roles/run.invoker","roleDescription":"Cloud Run サービスを起動できます。"}},"roles/run.viewer":{"permissions":["recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list","run.configurations.*","run.locations.*","run.operations.get","run.operations.list","run.revisions.get","run.revisions.list","run.routes.get","run.routes.list","run.services.get","run.services.getIamPolicy","run.services.list","run.services.listEffectiveTags","run.services.listTagBindings"],"en":{"roleTitle":"Cloud Run Viewer","roleName":"roles/run.viewer","roleDescription":"Can view the state of all Cloud Run resources, including IAM policies."},"ja":{"roleTitle":"Cloud Run 閲覧者","roleName":"roles/run.viewer","roleDescription":"IAM ポリシーを含む、すべての Cloud Run リソースの状態を閲覧できます。"}},"roles/cloudscheduler.admin":{"permissions":["appengine.applications.get","cloudscheduler.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud Scheduler Admin","roleName":"roles/cloudscheduler.admin","roleDescription":"Full access to jobs and executions.\n\n\nNote that a Cloud Scheduler Admin (or any custom role with the permission\ncloudscheduler.jobs.create) can create jobs that publish to any Pub/Sub topics within the\nproject."},"ja":{"roleTitle":"Cloud Scheduler 管理者","roleName":"roles/cloudscheduler.admin","roleDescription":"ジョブと実行に対する完全アクセス権。\nCloud Scheduler 管理者(または cloudscheduler.jobs.create 権限を持つカスタムロール)は、プロジェクト内のすべての Pub/Sub トピックにパブリッシュするジョブを作成できます。"}},"roles/cloudscheduler.jobRunner":{"permissions":["appengine.applications.get","cloudscheduler.jobs.fullView","cloudscheduler.jobs.run","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud Scheduler Job Runner","roleName":"roles/cloudscheduler.jobRunner","roleDescription":"Access to run jobs."},"ja":{"roleTitle":"Cloud Scheduler ジョブ実行者","roleName":"roles/cloudscheduler.jobRunner","roleDescription":"ジョブを実行するためのアクセス権。"}},"roles/cloudscheduler.viewer":{"permissions":["appengine.applications.get","cloudscheduler.jobs.fullView","cloudscheduler.jobs.get","cloudscheduler.jobs.list","cloudscheduler.locations.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud Scheduler Viewer","roleName":"roles/cloudscheduler.viewer","roleDescription":"Get and list access to jobs, executions, and locations."},"ja":{"roleTitle":"Cloud Scheduler 閲覧者","roleName":"roles/cloudscheduler.viewer","roleDescription":"ジョブ、実行、位置の取得、一覧表示に必要な権限。"}},"roles/cloudsecurityscanner.editor":{"permissions":["appengine.applications.get","cloudsecurityscanner.*","compute.addresses.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Web Security Scanner Editor","roleName":"roles/cloudsecurityscanner.editor","roleDescription":"Full access to all Web Security Scanner resources"},"ja":{"roleTitle":"Web Security Scanner 編集者","roleName":"roles/cloudsecurityscanner.editor","roleDescription":"すべての Web Security Scanner リソースに対する完全アクセス権"}},"roles/cloudsecurityscanner.runner":{"permissions":["cloudsecurityscanner.crawledurls.*","cloudsecurityscanner.scanruns.get","cloudsecurityscanner.scanruns.list","cloudsecurityscanner.scanruns.stop","cloudsecurityscanner.scans.get","cloudsecurityscanner.scans.list","cloudsecurityscanner.scans.run"],"en":{"roleTitle":"Web Security Scanner Runner","roleName":"roles/cloudsecurityscanner.runner","roleDescription":"Read access to Scan and ScanRun, plus the ability to start scans"},"ja":{"roleTitle":"Web Security Scanner 実行者","roleName":"roles/cloudsecurityscanner.runner","roleDescription":"スキャンとスキャン実行に対する読み取りアクセス権、およびスキャンを開始する権限"}},"roles/cloudsecurityscanner.viewer":{"permissions":["cloudsecurityscanner.crawledurls.*","cloudsecurityscanner.results.*","cloudsecurityscanner.scanruns.get","cloudsecurityscanner.scanruns.getSummary","cloudsecurityscanner.scanruns.list","cloudsecurityscanner.scans.get","cloudsecurityscanner.scans.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Web Security Scanner Viewer","roleName":"roles/cloudsecurityscanner.viewer","roleDescription":"Read access to all Web Security Scanner resources"},"ja":{"roleTitle":"Web Security Scanner 閲覧者","roleName":"roles/cloudsecurityscanner.viewer","roleDescription":"すべての Web Security Scanner リソースに対する読み取りアクセス権"}},"roles/servicebroker.admin":{"permissions":["servicebroker.*"],"en":{"roleTitle":"Service Broker Admin","roleName":"roles/servicebroker.admin","roleDescription":"Full access to ServiceBroker resources."},"ja":{"roleTitle":"サービス ブローカー管理者","roleName":"roles/servicebroker.admin","roleDescription":"サービス ブローカー リソースへの完全アクセス権。"}},"roles/servicebroker.operator":{"permissions":["servicebroker.bindingoperations.*","servicebroker.bindings.create","servicebroker.bindings.delete","servicebroker.bindings.get","servicebroker.bindings.list","servicebroker.catalogs.create","servicebroker.catalogs.delete","servicebroker.catalogs.get","servicebroker.catalogs.list","servicebroker.instanceoperations.*","servicebroker.instances.create","servicebroker.instances.delete","servicebroker.instances.get","servicebroker.instances.list","servicebroker.instances.update"],"en":{"roleTitle":"Service Broker Operator","roleName":"roles/servicebroker.operator","roleDescription":"Operational access to the ServiceBroker resources."},"ja":{"roleTitle":"サービス ブローカー オペレータ","roleName":"roles/servicebroker.operator","roleDescription":"サービス ブローカー リソースに対する操作アクセス権。"}},"roles/spanner.admin":{"permissions":["monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.list","spanner.*"],"en":{"roleTitle":"Cloud Spanner Admin","roleName":"roles/spanner.admin","roleDescription":"Has complete access to all Cloud Spanner\nresources in a Google Cloud project. A principal with this role can:\n\n\nGrant and revoke permissions to other principals for all Cloud Spanner resources in the project.\n\nAllocate and delete chargeable Cloud Spanner resources.\nIssue get/list/modify operations on Cloud Spanner resources.\nRead from and write to all Cloud Spanner databases in the project.\nFetch project metadata."},"ja":{"roleTitle":"Cloud Spanner 管理者","roleName":"roles/spanner.admin","roleDescription":"Google Cloud プロジェクト内のすべての Cloud Spanner リソースへのすべてのアクセス権があります。このロールを持つプリンシパルは次のことができます。\n\n他のプリンシパルにプロジェクト内のすべての Cloud Spanner リソースに対する権限を付与または取り消す。\n請求対象の Cloud Spanner リソースの割り振りと削除を行う。\nCloud Spanner リソースに取得 / 一覧取得 / 変更オペレーションを実行する。\nプロジェクト内の Cloud Spanner データベースに対して読み取り / 書き込みを行う。\nプロジェクトのメタデータを取得する。"}},"roles/spanner.backupAdmin":{"permissions":["monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.list","spanner.backupOperations.*","spanner.backups.create","spanner.backups.delete","spanner.backups.get","spanner.backups.getIamPolicy","spanner.backups.list","spanner.backups.setIamPolicy","spanner.backups.update","spanner.databases.createBackup","spanner.databases.get","spanner.databases.list","spanner.instances.get","spanner.instances.list"],"en":{"roleTitle":"Cloud Spanner Backup Admin","roleName":"roles/spanner.backupAdmin","roleDescription":"A principal with this role can:\n\nCreate, view, update, and delete backups.\nView and manage a backup's IAM policy.\n\nThis role cannot restore a database from a backup."},"ja":{"roleTitle":"Cloud Spanner バックアップ管理者","roleName":"roles/spanner.backupAdmin","roleDescription":"このロールを持つプリンシパルは次のことができます。\n\nバックアップを作成、表示、更新、削除する。\nバックアップの IAM ポリシーの表示と管理を行う。\n\nこのロールはバックアップからデータベースを復元できません。"}},"roles/spanner.backupWriter":{"permissions":["spanner.backupOperations.get","spanner.backupOperations.list","spanner.backups.create","spanner.backups.get","spanner.backups.list","spanner.databases.createBackup","spanner.databases.get","spanner.databases.list","spanner.instances.get"],"en":{"roleTitle":"Cloud Spanner Backup Writer","roleName":"roles/spanner.backupWriter","roleDescription":"This role is intended to be used by scripts that automate backup creation.\nA principal with this role can create backups, but cannot update or delete them."},"ja":{"roleTitle":"Cloud Spanner バックアップ書き込み","roleName":"roles/spanner.backupWriter","roleDescription":"このロールは、バックアップの作成を自動化するスクリプトで使用されます。このロールを持つプリンシパルはバックアップを作成できますが、バックアップの更新や削除はできません。"}},"roles/spanner.databaseAdmin":{"permissions":["monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.list","spanner.databaseOperations.*","spanner.databases.beginOrRollbackReadWriteTransaction","spanner.databases.beginPartitionedDmlTransaction","spanner.databases.beginReadOnlyTransaction","spanner.databases.create","spanner.databases.drop","spanner.databases.get","spanner.databases.getDdl","spanner.databases.getIamPolicy","spanner.databases.list","spanner.databases.partitionQuery","spanner.databases.partitionRead","spanner.databases.read","spanner.databases.select","spanner.databases.setIamPolicy","spanner.databases.update","spanner.databases.updateDdl","spanner.databases.write","spanner.instances.get","spanner.instances.getIamPolicy","spanner.instances.list","spanner.sessions.*"],"en":{"roleTitle":"Cloud Spanner Database Admin","roleName":"roles/spanner.databaseAdmin","roleDescription":"A principal with this role can:\n\nGet/list all Cloud Spanner instances in the project.\nCreate/list/drop databases in an instance.\nGrant/revoke access to databases in the project.\nRead from and write to all Cloud Spanner databases in the project."},"ja":{"roleTitle":"Cloud Spanner データベース管理者","roleName":"roles/spanner.databaseAdmin","roleDescription":"このロールを持つプリンシパルは次のことができます。\n\nプロジェクト内の Cloud Spanner インスタンスを取得 / 一覧取得する。\nインスタンス内でデータベースを作成 / 一覧表示 / 削除する。\nプロジェクト内のデータベースに対する権限を付与 / 取り消す。\nプロジェクト内の Cloud Spanner データベースに対して読み取り / 書き込みを行う。"}},"roles/spanner.databaseReader":{"permissions":["spanner.databases.beginReadOnlyTransaction","spanner.databases.getDdl","spanner.databases.partitionQuery","spanner.databases.partitionRead","spanner.databases.read","spanner.databases.select","spanner.instances.get","spanner.sessions.*"],"en":{"roleTitle":"Cloud Spanner Database Reader","roleName":"roles/spanner.databaseReader","roleDescription":"A principal with this role can:\n\nRead from the Cloud Spanner database.\nExecute SQL queries on the database.\nView schema for the database."},"ja":{"roleTitle":"Cloud Spanner データベース読み取り","roleName":"roles/spanner.databaseReader","roleDescription":"このロールを持つプリンシパルは次のことができます。\n\nCloud Spanner データベースから読み取る。\nデータベースに SQL クエリを実行する。\nデータベースのスキーマを表示する。"}},"roles/spanner.databaseUser":{"permissions":["spanner.databaseOperations.*","spanner.databases.beginOrRollbackReadWriteTransaction","spanner.databases.beginPartitionedDmlTransaction","spanner.databases.beginReadOnlyTransaction","spanner.databases.getDdl","spanner.databases.partitionQuery","spanner.databases.partitionRead","spanner.databases.read","spanner.databases.select","spanner.databases.updateDdl","spanner.databases.write","spanner.instances.get","spanner.sessions.*"],"en":{"roleTitle":"Cloud Spanner Database User","roleName":"roles/spanner.databaseUser","roleDescription":"A principal with this role can:\n\nRead from and write to the Cloud Spanner database.\nExecute SQL queries on the database, including DML and Partitioned DML.\nView and update schema for the database."},"ja":{"roleTitle":"Cloud Spanner データベース ユーザー","roleName":"roles/spanner.databaseUser","roleDescription":"このロールを持つプリンシパルは次のことができます。\n\nCloud Spanner データベースに読み取り / 書き込みを行う。\nデータベースに SQL クエリを実行する(DML、パーティション化された DML を含む)。\nデータベースのスキーマを表示 / 更新する。"}},"roles/spanner.restoreAdmin":{"permissions":["monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.list","spanner.backups.get","spanner.backups.list","spanner.backups.restoreDatabase","spanner.databaseOperations.cancel","spanner.databaseOperations.get","spanner.databaseOperations.list","spanner.databases.create","spanner.databases.get","spanner.databases.list","spanner.instances.get","spanner.instances.list"],"en":{"roleTitle":"Cloud Spanner Restore Admin","roleName":"roles/spanner.restoreAdmin","roleDescription":"A principal with this role can restore databases from backups.\nIf you need to restore a backup to a different instance, apply this\nrole at the project level or to both instances. This role cannot create backups."},"ja":{"roleTitle":"Cloud Spanner 復元管理者","roleName":"roles/spanner.restoreAdmin","roleDescription":"このロールを持つプリンシパルは、バックアップからデータベースを復元できます。\nバックアップを別のインスタンスに復元する必要がある場合は、このロールをプロジェクト レベルまたは両方のインスタンスに適用します。このロールはバックアップを作成できません。"}},"roles/spanner.viewer":{"permissions":["monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.list","spanner.databases.list","spanner.instanceConfigs.*","spanner.instances.get","spanner.instances.list"],"en":{"roleTitle":"Cloud Spanner Viewer","roleName":"roles/spanner.viewer","roleDescription":"A principal with this role can:\n\nView all Cloud Spanner instances (but cannot modify instances).\nView all Cloud Spanner databases (but cannot modify or read from databases).\n\nFor example, you can combine this role with the roles/spanner.databaseUser role to\ngrant a user with access to a specific database, but only view access to other instances and\ndatabases.\n\nThis role is recommended at the Google Cloud project level for users interacting with Cloud\nSpanner resources in the Google Cloud Console."},"ja":{"roleTitle":"Cloud Spanner 閲覧者","roleName":"roles/spanner.viewer","roleDescription":"このロールを持つプリンシパルは次のことができます。\n\nすべての Cloud Spanner インスタンスを表示する(ただし、インスタンスの変更はできません)。\nすべての Cloud Spanner データベースを表示する(ただし、データベースの変更や読み取りはできません)。\n\nたとえば、このロールと roles/spanner.databaseUser ロールを組み合わせると、特定のデータベースに対するアクセスがユーザーに許可されますが、他のインスタンスとデータベースに対しては表示のみが許可されます。\nこのロールは、Google Cloud プロジェクト レベルで Google Cloud Console の Cloud Spanner リソースを操作するユーザーに対して推奨されます。"}},"roles/cloudsql.admin":{"permissions":["cloudsql.*","recommender.cloudsqlIdleInstanceRecommendations.*","recommender.cloudsqlInstanceActivityInsights.*","recommender.cloudsqlInstanceCpuUsageInsights.*","recommender.cloudsqlInstanceDiskUsageTrendInsights.*","recommender.cloudsqlInstanceMemoryUsageInsights.*","recommender.cloudsqlInstanceOutOfDiskRecommendations.*","recommender.cloudsqlOverprovisionedInstanceRecommendations.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud SQL Admin","roleName":"roles/cloudsql.admin","roleDescription":"Provides full control of Cloud SQL resources."},"ja":{"roleTitle":"Cloud SQL 管理者","roleName":"roles/cloudsql.admin","roleDescription":"Cloud SQL リソースのすべてを管理できます。"}},"roles/cloudsql.client":{"permissions":["cloudsql.instances.connect","cloudsql.instances.get"],"en":{"roleTitle":"Cloud SQL Client","roleName":"roles/cloudsql.client","roleDescription":"Provides connectivity access to Cloud SQL instances."},"ja":{"roleTitle":"Cloud SQL クライアント","roleName":"roles/cloudsql.client","roleDescription":"Cloud SQL インスタンスへの接続アクセス権を付与します。"}},"roles/cloudsql.editor":{"permissions":["cloudsql.backupRuns.create","cloudsql.backupRuns.get","cloudsql.backupRuns.list","cloudsql.databases.create","cloudsql.databases.get","cloudsql.databases.list","cloudsql.databases.update","cloudsql.instances.addServerCa","cloudsql.instances.connect","cloudsql.instances.export","cloudsql.instances.failover","cloudsql.instances.get","cloudsql.instances.list","cloudsql.instances.listServerCas","cloudsql.instances.listTagBindings","cloudsql.instances.restart","cloudsql.instances.rotateServerCa","cloudsql.instances.truncateLog","cloudsql.instances.update","cloudsql.sslCerts.get","cloudsql.sslCerts.list","cloudsql.users.list","recommender.cloudsqlIdleInstanceRecommendations.*","recommender.cloudsqlInstanceActivityInsights.*","recommender.cloudsqlInstanceCpuUsageInsights.*","recommender.cloudsqlInstanceDiskUsageTrendInsights.*","recommender.cloudsqlInstanceMemoryUsageInsights.*","recommender.cloudsqlInstanceOutOfDiskRecommendations.*","recommender.cloudsqlOverprovisionedInstanceRecommendations.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud SQL Editor","roleName":"roles/cloudsql.editor","roleDescription":"Provides full control of existing Cloud SQL instances excluding\nmodifying users, SSL certificates or deleting resources."},"ja":{"roleTitle":"Cloud SQL 編集者","roleName":"roles/cloudsql.editor","roleDescription":"ユーザー、SSL 証明書の変更、またはリソースの削除を除いて、既存の Cloud SQL インスタンスのすべてを管理できます。"}},"roles/cloudsql.instanceUser":{"permissions":["cloudsql.instances.get","cloudsql.instances.login"],"en":{"roleTitle":"Cloud SQL Instance User","roleName":"roles/cloudsql.instanceUser","roleDescription":"Role allowing access to a Cloud SQL instance"},"ja":{"roleTitle":"Cloud SQL インスタンス ユーザー","roleName":"roles/cloudsql.instanceUser","roleDescription":"Cloud SQL インスタンスへのアクセスを許可するロール"}},"roles/cloudsql.viewer":{"permissions":["cloudsql.backupRuns.get","cloudsql.backupRuns.list","cloudsql.databases.get","cloudsql.databases.list","cloudsql.instances.export","cloudsql.instances.get","cloudsql.instances.list","cloudsql.instances.listServerCas","cloudsql.instances.listTagBindings","cloudsql.sslCerts.get","cloudsql.sslCerts.list","cloudsql.users.list","recommender.cloudsqlIdleInstanceRecommendations.get","recommender.cloudsqlIdleInstanceRecommendations.list","recommender.cloudsqlInstanceActivityInsights.get","recommender.cloudsqlInstanceActivityInsights.list","recommender.cloudsqlInstanceCpuUsageInsights.get","recommender.cloudsqlInstanceCpuUsageInsights.list","recommender.cloudsqlInstanceDiskUsageTrendInsights.get","recommender.cloudsqlInstanceDiskUsageTrendInsights.list","recommender.cloudsqlInstanceMemoryUsageInsights.get","recommender.cloudsqlInstanceMemoryUsageInsights.list","recommender.cloudsqlInstanceOutOfDiskRecommendations.get","recommender.cloudsqlInstanceOutOfDiskRecommendations.list","recommender.cloudsqlOverprovisionedInstanceRecommendations.get","recommender.cloudsqlOverprovisionedInstanceRecommendations.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Cloud SQL Viewer","roleName":"roles/cloudsql.viewer","roleDescription":"Provides read-only access to Cloud SQL resources."},"ja":{"roleTitle":"Cloud SQL 閲覧者","roleName":"roles/cloudsql.viewer","roleDescription":"Cloud SQL リソースに対する読み取り専用権限を付与します。"}},"roles/storage.admin":{"permissions":["firebase.projects.get","orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","storage.buckets.*","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Storage Admin","roleName":"roles/storage.admin","roleDescription":"Grants full control of objects and buckets.\n\n\nWhen applied to an individual bucket, control applies only to\nthe specified bucket and objects within the bucket."},"ja":{"roleTitle":"ストレージ管理者","roleName":"roles/storage.admin","roleDescription":"オブジェクトとバケットのすべてを管理する権限。\n個々のバケットに適用した場合、指定したバケットとその中のオブジェクトに対してのみ操作が適用されます。"}},"roles/storage.hmacKeyAdmin":{"permissions":["firebase.projects.get","orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","storage.hmacKeys.*"],"en":{"roleTitle":"Storage HMAC Key Admin","roleName":"roles/storage.hmacKeyAdmin","roleDescription":"Full control of Cloud Storage HMAC keys."},"ja":{"roleTitle":"Storage HMAC キー管理者","roleName":"roles/storage.hmacKeyAdmin","roleDescription":"Cloud Storage HMAC キーのすべてを管理できる権限。"}},"roles/storage.objectAdmin":{"permissions":["orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Storage Object Admin","roleName":"roles/storage.objectAdmin","roleDescription":"Grants full control of objects, including listing, creating, viewing,\nand deleting objects."},"ja":{"roleTitle":"ストレージ オブジェクト管理者","roleName":"roles/storage.objectAdmin","roleDescription":"オブジェクトの一覧表示、作成、表示、削除など、オブジェクトのすべてを管理できる権限を付与します。"}},"roles/storage.objectCreator":{"permissions":["orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","storage.multipartUploads.abort","storage.multipartUploads.create","storage.multipartUploads.listParts","storage.objects.create"],"en":{"roleTitle":"Storage Object Creator","roleName":"roles/storage.objectCreator","roleDescription":"Allows users to create objects. Does not give permission to view,\ndelete, or overwrite objects."},"ja":{"roleTitle":"ストレージ オブジェクト作成者","roleName":"roles/storage.objectCreator","roleDescription":"ユーザーによるオブジェクトの作成を許可します。オブジェクトを削除または上書きする権限は付与されません。"}},"roles/storage.objectViewer":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Storage Object Viewer","roleName":"roles/storage.objectViewer","roleDescription":"Grants access to view objects and their metadata, excluding ACLs. Can\nalso list the objects in a bucket."},"ja":{"roleTitle":"ストレージ オブジェクト閲覧者","roleName":"roles/storage.objectViewer","roleDescription":"オブジェクトとそのメタデータ(ACL を除く)を閲覧するためのアクセス権を付与します。バケット内のオブジェクトを一覧表示することもできます。"}},"roles/storagetransfer.admin":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","storagetransfer.*"],"en":{"roleTitle":"Storage Transfer Admin","roleName":"roles/storagetransfer.admin","roleDescription":"Create, update and manage transfer jobs and operations."},"ja":{"roleTitle":"ストレージ転送管理者","roleName":"roles/storagetransfer.admin","roleDescription":"転送のジョブとオペレーションを作成、更新、管理します。"}},"roles/storagetransfer.transferAgent":{"permissions":["pubsub.snapshots.seek","pubsub.subscriptions.consume","pubsub.subscriptions.create","pubsub.subscriptions.delete","pubsub.subscriptions.get","pubsub.topics.attachSubscription","pubsub.topics.create","pubsub.topics.get","pubsub.topics.list","pubsub.topics.publish","storagetransfer.agentpools.report","storagetransfer.operations.assign","storagetransfer.operations.get","storagetransfer.operations.report"],"en":{"roleTitle":"Storage Transfer Agent","roleName":"roles/storagetransfer.transferAgent","roleDescription":"Perform transfers from an agent."},"ja":{"roleTitle":"Storage Transfer エージェント","roleName":"roles/storagetransfer.transferAgent","roleDescription":"エージェントからの転送を実行します。"}},"roles/storagetransfer.user":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","storagetransfer.agentpools.create","storagetransfer.agentpools.get","storagetransfer.agentpools.list","storagetransfer.agentpools.report","storagetransfer.agentpools.update","storagetransfer.jobs.create","storagetransfer.jobs.get","storagetransfer.jobs.list","storagetransfer.jobs.run","storagetransfer.jobs.update","storagetransfer.operations.*","storagetransfer.projects.*"],"en":{"roleTitle":"Storage Transfer User","roleName":"roles/storagetransfer.user","roleDescription":"Create and update storage transfer jobs and operations."},"ja":{"roleTitle":"ストレージ転送ユーザー","roleName":"roles/storagetransfer.user","roleDescription":"ストレージ転送のジョブとオペレーションを作成および更新します。"}},"roles/storagetransfer.viewer":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","storagetransfer.agentpools.get","storagetransfer.agentpools.list","storagetransfer.jobs.get","storagetransfer.jobs.list","storagetransfer.operations.get","storagetransfer.operations.list","storagetransfer.projects.*"],"en":{"roleTitle":"Storage Transfer Viewer","roleName":"roles/storagetransfer.viewer","roleDescription":"Read access to storage transfer jobs and operations."},"ja":{"roleTitle":"ストレージ転送閲覧者","roleName":"roles/storagetransfer.viewer","roleDescription":"ストレージ転送のジョブとオペレーションへの読み取りアクセス。"}},"roles/storage.legacyBucketOwner":{"permissions":["storage.buckets.createTagBinding","storage.buckets.deleteTagBinding","storage.buckets.get","storage.buckets.getIamPolicy","storage.buckets.listTagBindings","storage.buckets.setIamPolicy","storage.buckets.update","storage.multipartUploads.*","storage.objects.create","storage.objects.delete","storage.objects.list"],"en":{"roleTitle":"Storage Legacy Bucket Owner","roleName":"roles/storage.legacyBucketOwner","roleDescription":"Grants permission to create, overwrite, and delete objects; list objects\nin a bucket and read object metadata, excluding IAM\npolicies, when listing; and read and edit bucket metadata, including\nIAM policies.\n\n\nUse of this role is also reflected in the bucket's ACLs. For more\ninformation, see \nIAM relation to ACLs."},"ja":{"roleTitle":"ストレージのレガシー バケット オーナー","roleName":"roles/storage.legacyBucketOwner","roleDescription":"オブジェクトを作成、上書き、削除するための権限、バケット内のオブジェクトを一覧表示する権限、リスト表示時にオブジェクトのメタデータ(IAM ポリシーを除く)を読み取るための権限、IAM ポリシーを含むバケット メタデータの読み取り権限と編集権限を付与します。\n\nこのロールの使用はバケットの ACL にも反映されます。詳細については、IAM と ACL の関係をご覧ください。"}},"roles/storage.legacyBucketReader":{"permissions":["storage.buckets.get","storage.multipartUploads.list","storage.objects.list"],"en":{"roleTitle":"Storage Legacy Bucket Reader","roleName":"roles/storage.legacyBucketReader","roleDescription":"Grants permission to list a bucket's contents and read bucket metadata,\nexcluding IAM policies. Also grants permission to read\nobject metadata, excluding IAM policies, when listing\nobjects.\n\n\nUse of this role is also reflected in the bucket's ACLs. For more\ninformation, see \nIAM relation to ACLs."},"ja":{"roleTitle":"ストレージ レガシー バケット読み取り","roleName":"roles/storage.legacyBucketReader","roleDescription":"バケットのコンテンツを一覧表示し、バケットのメタデータ(IAM ポリシーを除く)を読み取るための権限を付与します。また、オブジェクトを一覧表示するときに、オブジェクトのメタデータ(IAM ポリシーを除く)を読み取るための権限も付与します。\n\nこのロールの使用はバケットの ACL にも反映されます。詳細については、IAM と ACL の関係をご覧ください。"}},"roles/storage.legacyBucketWriter":{"permissions":["storage.buckets.get","storage.multipartUploads.*","storage.objects.create","storage.objects.delete","storage.objects.list"],"en":{"roleTitle":"Storage Legacy Bucket Writer","roleName":"roles/storage.legacyBucketWriter","roleDescription":"Grants permission to create, overwrite, and delete objects; list objects\nin a bucket and read object metadata, excluding IAM\npolicies, when listing; and read bucket metadata, excluding\nIAM policies.\n\n\nUse of this role is also reflected in the bucket's ACLs. For more\ninformation, see \nIAM relation to ACLs."},"ja":{"roleTitle":"ストレージ レガシー バケット書き込み","roleName":"roles/storage.legacyBucketWriter","roleDescription":"オブジェクトを作成、上書き、削除するための権限、バケット内のオブジェクトを一覧表示する権限、リスト表示時にオブジェクト メタデータ(IAM ポリシーを除く)を読み取るための権限、バケット メタデータ(IAM ポリシーを除く)を読み取るための権限を付与します。\n\nこのロールの使用はバケットの ACL にも反映されます。詳細については、IAM と ACL の関係をご覧ください。"}},"roles/storage.legacyObjectOwner":{"permissions":["storage.objects.get","storage.objects.getIamPolicy","storage.objects.setIamPolicy","storage.objects.update"],"en":{"roleTitle":"Storage Legacy Object Owner","roleName":"roles/storage.legacyObjectOwner","roleDescription":"Grants permission to view and edit objects and their metadata, including\nACLs."},"ja":{"roleTitle":"ストレージ レガシー オブジェクト オーナー","roleName":"roles/storage.legacyObjectOwner","roleDescription":"オブジェクトとそのメタデータ(ACL を含む)を閲覧し、編集するための権限を付与します。"}},"roles/storage.legacyObjectReader":{"permissions":["storage.objects.get"],"en":{"roleTitle":"Storage Legacy Object Reader","roleName":"roles/storage.legacyObjectReader","roleDescription":"Grants permission to view objects and their metadata, excluding ACLs."},"ja":{"roleTitle":"ストレージ レガシー オブジェクト読み取り","roleName":"roles/storage.legacyObjectReader","roleDescription":"オブジェクトとそのメタデータ(ACL を除く)を閲覧するための権限を付与します。"}},"roles/cloudjobdiscovery.admin":{"permissions":["cloudjobdiscovery.tools.*","iam.serviceAccounts.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Admin","roleName":"roles/cloudjobdiscovery.admin","roleDescription":"Access to Cloud Talent Solution Self-Service Tools."},"ja":{"roleTitle":"管理者","roleName":"roles/cloudjobdiscovery.admin","roleDescription":"Cloud Talent Solution セルフサービス ツールに対するアクセス権。"}},"roles/cloudjobdiscovery.jobsEditor":{"permissions":["cloudjobdiscovery.companies.*","cloudjobdiscovery.events.*","cloudjobdiscovery.jobs.*","cloudjobdiscovery.tenants.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Job Editor","roleName":"roles/cloudjobdiscovery.jobsEditor","roleDescription":"Write access to all job data in Cloud Talent Solution."},"ja":{"roleTitle":"ジョブ編集者","roleName":"roles/cloudjobdiscovery.jobsEditor","roleDescription":"Cloud Talent Solution のすべてのジョブデータに対する書き込みアクセス権。"}},"roles/cloudjobdiscovery.jobsViewer":{"permissions":["cloudjobdiscovery.companies.get","cloudjobdiscovery.companies.list","cloudjobdiscovery.jobs.get","cloudjobdiscovery.jobs.search","cloudjobdiscovery.tenants.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Job Viewer","roleName":"roles/cloudjobdiscovery.jobsViewer","roleDescription":"Read access to all job data in Cloud Talent Solution."},"ja":{"roleTitle":"ジョブ閲覧者","roleName":"roles/cloudjobdiscovery.jobsViewer","roleDescription":"Cloud Talent Solution のすべてのジョブデータに対する読み取りアクセス権。"}},"roles/cloudjobdiscovery.profilesEditor":{"permissions":["cloudjobdiscovery.events.*","cloudjobdiscovery.profiles.*","cloudjobdiscovery.tenants.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Profile Editor","roleName":"roles/cloudjobdiscovery.profilesEditor","roleDescription":"Write access to all profile data in Cloud Talent Solution."},"ja":{"roleTitle":"プロファイル編集者","roleName":"roles/cloudjobdiscovery.profilesEditor","roleDescription":"Cloud Talent Solution のすべてのプロファイル データに対する書き込み権限。"}},"roles/cloudjobdiscovery.profilesViewer":{"permissions":["cloudjobdiscovery.profiles.get","cloudjobdiscovery.profiles.search","cloudjobdiscovery.tenants.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Profile Viewer","roleName":"roles/cloudjobdiscovery.profilesViewer","roleDescription":"Read access to all profile data in Cloud Talent Solution."},"ja":{"roleTitle":"プロファイル閲覧者","roleName":"roles/cloudjobdiscovery.profilesViewer","roleDescription":"Cloud Talent Solution のすべてのプロファイル データに対する読み取り権限。"}},"roles/cloudtasks.admin":{"permissions":["cloudtasks.*","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Tasks Admin","roleName":"roles/cloudtasks.admin","roleDescription":"Full access to queues and tasks."},"ja":{"roleTitle":"Cloud Tasks 管理者","roleName":"roles/cloudtasks.admin","roleDescription":"キューとタスクに対する完全アクセス権。"}},"roles/cloudtasks.enqueuer":{"permissions":["cloudtasks.tasks.create","cloudtasks.tasks.fullView","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Tasks Enqueuer","roleName":"roles/cloudtasks.enqueuer","roleDescription":"Access to create tasks."},"ja":{"roleTitle":"Cloud Tasks へのデータ追加","roleName":"roles/cloudtasks.enqueuer","roleDescription":"タスクを作成するための権限。"}},"roles/cloudtasks.queueAdmin":{"permissions":["cloudtasks.locations.*","cloudtasks.queues.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Tasks Queue Admin","roleName":"roles/cloudtasks.queueAdmin","roleDescription":"Admin access to queues."},"ja":{"roleTitle":"Cloud Tasks のキュー管理者","roleName":"roles/cloudtasks.queueAdmin","roleDescription":"キューに対する管理者権限。"}},"roles/cloudtasks.taskDeleter":{"permissions":["cloudtasks.tasks.delete","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Tasks Task Deleter","roleName":"roles/cloudtasks.taskDeleter","roleDescription":"Access to delete tasks."},"ja":{"roleTitle":"Cloud Tasks のタスク削除","roleName":"roles/cloudtasks.taskDeleter","roleDescription":"タスクを削除するための権限。"}},"roles/cloudtasks.taskRunner":{"permissions":["cloudtasks.tasks.fullView","cloudtasks.tasks.run","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Tasks Task Runner","roleName":"roles/cloudtasks.taskRunner","roleDescription":"Access to run tasks."},"ja":{"roleTitle":"Cloud Tasks タスク実行者","roleName":"roles/cloudtasks.taskRunner","roleDescription":"タスクを実行するための権限。"}},"roles/cloudtasks.viewer":{"permissions":["cloudtasks.locations.*","cloudtasks.queues.get","cloudtasks.queues.list","cloudtasks.tasks.fullView","cloudtasks.tasks.get","cloudtasks.tasks.list","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Tasks Viewer","roleName":"roles/cloudtasks.viewer","roleDescription":"Get and list access to tasks, queues, and locations."},"ja":{"roleTitle":"Cloud Tasks 閲覧者","roleName":"roles/cloudtasks.viewer","roleDescription":"タスク、キュー、位置の取得と一覧表示のアクセス権。"}},"roles/tpu.admin":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","tpu.*"],"en":{"roleTitle":"TPU Admin","roleName":"roles/tpu.admin","roleDescription":"Full access to TPU nodes and related resources."},"ja":{"roleTitle":"TPU 管理者","roleName":"roles/tpu.admin","roleDescription":"TPU ノードと関連リソースに対する完全アクセス権。"}},"roles/tpu.viewer":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","tpu.acceleratortypes.*","tpu.locations.*","tpu.nodes.get","tpu.nodes.list","tpu.operations.*","tpu.tensorflowversions.*"],"en":{"roleTitle":"TPU Viewer","roleName":"roles/tpu.viewer","roleDescription":"Read-only access to TPU nodes and related resources."},"ja":{"roleTitle":"TPU 閲覧者","roleName":"roles/tpu.viewer","roleDescription":"TPU ノードと関連リソースに対する読み取り専用アクセス権。"}},"roles/tpu.xpnAgent":{"permissions":["compute.addresses.use","compute.firewalls.create","compute.firewalls.delete","compute.firewalls.get","compute.firewalls.update","compute.globalOperations.get","compute.networks.get","compute.networks.list","compute.networks.updatePolicy","compute.networks.use","compute.networks.useExternalIp","compute.routes.list","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.zoneOperations.get"],"en":{"roleTitle":"TPU Shared VPC Agent","roleName":"roles/tpu.xpnAgent","roleDescription":"Can use shared VPC network (XPN) for the TPU VMs."},"ja":{"roleTitle":"TPU 共有 VPC エージェント","roleName":"roles/tpu.xpnAgent","roleDescription":"TPU VM の共有 VPC ネットワーク(XPN)を使用できます。"}},"roles/cloudtrace.admin":{"permissions":["cloudtrace.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Trace Admin","roleName":"roles/cloudtrace.admin","roleDescription":"Provides full access to the Trace console and read-write access to traces."},"ja":{"roleTitle":"Cloud Trace 管理者","roleName":"roles/cloudtrace.admin","roleDescription":"Trace コンソールへの完全アクセス権とトレースへの読み取り / 書き込み権限を付与します。"}},"roles/cloudtrace.agent":{"permissions":["cloudtrace.traces.patch"],"en":{"roleTitle":"Cloud Trace Agent","roleName":"roles/cloudtrace.agent","roleDescription":"For service accounts. Provides ability to write traces by sending the data\nto Stackdriver Trace."},"ja":{"roleTitle":"Cloud Trace エージェント","roleName":"roles/cloudtrace.agent","roleDescription":"サービス アカウント用。Stackdriver Trace にデータを送信してトレースを書き込む権限を付与します。"}},"roles/cloudtrace.user":{"permissions":["cloudtrace.insights.*","cloudtrace.stats.*","cloudtrace.tasks.*","cloudtrace.traces.get","cloudtrace.traces.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Trace User","roleName":"roles/cloudtrace.user","roleDescription":"Provides full access to the Trace console and read access to traces."},"ja":{"roleTitle":"Cloud Trace ユーザー","roleName":"roles/cloudtrace.user","roleDescription":"Trace コンソールへの完全アクセス権とトレースへの読み取り権限を付与します。"}},"roles/cloudtranslate.admin":{"permissions":["automl.models.get","automl.models.predict","cloudtranslate.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Translation API Admin","roleName":"roles/cloudtranslate.admin","roleDescription":"Full access to all Cloud Translation resources"},"ja":{"roleTitle":"Cloud Translation API 管理者","roleName":"roles/cloudtranslate.admin","roleDescription":"すべての Cloud Translation リソースに対する完全アクセス権"}},"roles/cloudtranslate.editor":{"permissions":["automl.models.get","automl.models.predict","cloudtranslate.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Translation API Editor","roleName":"roles/cloudtranslate.editor","roleDescription":"Editor of all Cloud Translation resources"},"ja":{"roleTitle":"Cloud Translation API 編集者","roleName":"roles/cloudtranslate.editor","roleDescription":"すべての Cloud Translation リソースの編集者"}},"roles/cloudtranslate.user":{"permissions":["automl.models.get","automl.models.predict","cloudtranslate.generalModels.*","cloudtranslate.glossaries.batchDocPredict","cloudtranslate.glossaries.batchPredict","cloudtranslate.glossaries.docPredict","cloudtranslate.glossaries.get","cloudtranslate.glossaries.list","cloudtranslate.glossaries.predict","cloudtranslate.languageDetectionModels.*","cloudtranslate.locations.*","cloudtranslate.operations.get","cloudtranslate.operations.list","cloudtranslate.operations.wait","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Translation API User","roleName":"roles/cloudtranslate.user","roleDescription":"User of Cloud Translation and AutoML models"},"ja":{"roleTitle":"Cloud Translation API ユーザー","roleName":"roles/cloudtranslate.user","roleDescription":"Cloud Translation と AutoML モデルのユーザー"}},"roles/cloudtranslate.viewer":{"permissions":["automl.models.get","cloudtranslate.generalModels.get","cloudtranslate.glossaries.get","cloudtranslate.glossaries.list","cloudtranslate.locations.*","cloudtranslate.operations.get","cloudtranslate.operations.list","cloudtranslate.operations.wait","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Translation API Viewer","roleName":"roles/cloudtranslate.viewer","roleDescription":"Viewer of all Translation resources"},"ja":{"roleTitle":"Cloud Translation API 閲覧者","roleName":"roles/cloudtranslate.viewer","roleDescription":"すべての Translation リソースの閲覧者"}},"roles/compute.admin":{"permissions":["compute.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Admin","roleName":"roles/compute.admin","roleDescription":"Full control of all Compute Engine resources.\n\nIf the user will be managing virtual machine instances that are configured\nto run as a service account, you must also grant the\nroles/iam.serviceAccountUser role."},"ja":{"roleTitle":"Compute 管理者","roleName":"roles/compute.admin","roleDescription":"Compute Engine リソースのすべてを管理する権限。\nユーザーがサービス アカウントとして実行するように構成されている仮想マシン インスタンスを管理する場合は、roles/iam.serviceAccountUser ロールも付与する必要があります。"}},"roles/compute.imageUser":{"permissions":["compute.images.get","compute.images.getFromFamily","compute.images.list","compute.images.useReadOnly","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Image User","roleName":"roles/compute.imageUser","roleDescription":"Permission to list and read images without having other permissions on the image. Granting this role\nat the project level gives users the ability to list all images in the project and create resources,\nsuch as instances and persistent disks, based on images in the project."},"ja":{"roleTitle":"Compute イメージ ユーザー","roleName":"roles/compute.imageUser","roleDescription":"イメージを一覧表示し、読み取る権限(イメージに対する他の権限はありません)。このロールをプロジェクト レベルで付与すると、ユーザーはプロジェクト内のすべてのイメージを一覧表示し、プロジェクト内のイメージに基づいてインスタンス、永続ディスクなどのリソースを作成できます。"}},"roles/compute.instanceAdmin":{"permissions":["compute.acceleratorTypes.*","compute.addresses.createInternal","compute.addresses.deleteInternal","compute.addresses.get","compute.addresses.list","compute.addresses.use","compute.addresses.useInternal","compute.autoscalers.*","compute.diskTypes.*","compute.disks.create","compute.disks.createSnapshot","compute.disks.delete","compute.disks.get","compute.disks.list","compute.disks.resize","compute.disks.setLabels","compute.disks.update","compute.disks.use","compute.disks.useReadOnly","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalAddresses.use","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.list","compute.images.get","compute.images.getFromFamily","compute.images.list","compute.images.useReadOnly","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.licenses.get","compute.licenses.list","compute.machineImages.*","compute.machineTypes.*","compute.networkEndpointGroups.*","compute.networks.get","compute.networks.list","compute.networks.use","compute.networks.useExternalIp","compute.projects.get","compute.regionNetworkEndpointGroups.*","compute.regionOperations.get","compute.regionOperations.list","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.targetPools.get","compute.targetPools.list","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Instance Admin (beta)","roleName":"roles/compute.instanceAdmin","roleDescription":"Permissions to create, modify, and delete virtual machine instances.\nThis includes permissions to create, modify, and delete disks, and also to\nconfigure Shielded VM\nsettings.\n\n\nIf the user will be managing virtual machine instances that are configured\nto run as a service account, you must also grant the\nroles/iam.serviceAccountUser role.\n\n\nFor example, if your company has someone who manages groups of virtual\nmachine instances but does not manage network or security settings and\ndoes not manage instances that run as service accounts, you can grant this\nrole on the organization, folder, or project that contains the instances,\nor you can grant it on individual instances."},"ja":{"roleTitle":"Compute インスタンス管理者(ベータ版)","roleName":"roles/compute.instanceAdmin","roleDescription":"仮想マシン インスタンスを作成、変更、削除する権限。ディスクの作成、変更、削除を行う権限が含まれます。Shielded VM の設定を構成する権限も含まれます。\nユーザーがサービス アカウントとして実行するように構成されている仮想マシン インスタンスを管理する場合は、roles/iam.serviceAccountUser ロールも付与する必要があります。\nたとえば、仮想マシン インスタンスのグループは管理しているが、ネットワークやセキュリティの設定の管理や、サービス アカウントとして実行するインスタンスの管理は行っていないというユーザーが社内にいる場合は、このロールをインスタンスが含まれている組織、フォルダ、プロジェクトあるいは個々のインスタンスに付与できます。"}},"roles/compute.instanceAdmin.v1":{"permissions":["compute.acceleratorTypes.*","compute.addresses.createInternal","compute.addresses.deleteInternal","compute.addresses.get","compute.addresses.list","compute.addresses.use","compute.addresses.useInternal","compute.autoscalers.*","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.list","compute.diskTypes.*","compute.disks.*","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalAddresses.use","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.*","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.*","compute.licenses.*","compute.machineImages.*","compute.machineTypes.*","compute.networkEndpointGroups.*","compute.networks.get","compute.networks.list","compute.networks.use","compute.networks.useExternalIp","compute.projects.get","compute.projects.setCommonInstanceMetadata","compute.regionBackendServices.get","compute.regionBackendServices.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.*","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.*","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.*","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Instance Admin (v1)","roleName":"roles/compute.instanceAdmin.v1","roleDescription":"Full control of Compute Engine instances, instance groups, disks, snapshots, and images.\nRead access to all Compute Engine networking resources.\nIf you grant a user this role only at an instance level, then that user cannot create new instances."},"ja":{"roleTitle":"Compute インスタンス管理者(v1)","roleName":"roles/compute.instanceAdmin.v1","roleDescription":"Compute Engine インスタンス、インスタンス グループ、ディスク、スナップショット、イメージのすべてを管理する権限。すべての Compute Engine ネットワーキング リソースへの読み取り専用権権限。\nこのロールをユーザーにインスタンス レベルでのみ付与した場合、そのユーザーは新しいインスタンスを作成できません。"}},"roles/compute.loadBalancerAdmin":{"permissions":["certificatemanager.certmaps.get","certificatemanager.certmaps.list","certificatemanager.certmaps.use","compute.addresses.*","compute.backendBuckets.*","compute.backendServices.*","compute.disks.listTagBindings","compute.forwardingRules.*","compute.globalAddresses.*","compute.globalForwardingRules.*","compute.globalNetworkEndpointGroups.*","compute.healthChecks.*","compute.httpHealthChecks.*","compute.httpsHealthChecks.*","compute.images.listTagBindings","compute.instanceGroups.*","compute.instances.get","compute.instances.list","compute.instances.use","compute.instances.useReadOnly","compute.networkEndpointGroups.*","compute.networks.get","compute.networks.list","compute.networks.use","compute.projects.get","compute.regionBackendServices.*","compute.regionHealthCheckServices.*","compute.regionHealthChecks.*","compute.regionNetworkEndpointGroups.*","compute.regionNotificationEndpoints.*","compute.regionSslCertificates.*","compute.regionTargetHttpProxies.*","compute.regionTargetHttpsProxies.*","compute.regionUrlMaps.*","compute.securityPolicies.get","compute.securityPolicies.list","compute.securityPolicies.use","compute.snapshots.listTagBindings","compute.sslCertificates.*","compute.sslPolicies.*","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.targetGrpcProxies.*","compute.targetHttpProxies.*","compute.targetHttpsProxies.*","compute.targetInstances.*","compute.targetPools.*","compute.targetSslProxies.*","compute.targetTcpProxies.*","compute.urlMaps.*","networksecurity.clientTlsPolicies.get","networksecurity.clientTlsPolicies.list","networksecurity.clientTlsPolicies.use","networksecurity.serverTlsPolicies.get","networksecurity.serverTlsPolicies.list","networksecurity.serverTlsPolicies.use","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Load Balancer Admin","roleName":"roles/compute.loadBalancerAdmin","roleDescription":"Permissions to create, modify, and delete load balancers and associate\nresources.\n\n\nFor example, if your company has a load balancing team that manages load\nbalancers, SSL certificates for load balancers, SSL policies, and other\nload balancing resources, and a separate networking team that manages\nthe rest of the networking resources, then grant this role to the load\nbalancing team's group."},"ja":{"roleTitle":"Compute ロードバランサ管理者","roleName":"roles/compute.loadBalancerAdmin","roleDescription":"ロードバランサを作成、変更、削除し、リソースを関連付ける権限。\nたとえば、会社にロードバランサ、ロードバランサの SSL 証明書、SSL ポリシー、その他のロード バランシング リソースを管理するロード バランシング チームと、残りのネットワーク リソースを管理する別のネットワーク チームが存在する場合は、このロールをロード バランシング チームのグループに付与します。"}},"roles/compute.loadBalancerServiceUser":{"permissions":["compute.backendServices.get","compute.backendServices.list","compute.backendServices.use","compute.projects.get","compute.regionBackendServices.get","compute.regionBackendServices.list","compute.regionBackendServices.use","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Load Balancer Services User","roleName":"roles/compute.loadBalancerServiceUser","roleDescription":"Permissions to use services from a load balancer in other projects."},"ja":{"roleTitle":"Compute ロードバランサ サービスのユーザー","roleName":"roles/compute.loadBalancerServiceUser","roleDescription":"他のプロジェクトのロードバランサのサービスを使用するための権限。"}},"roles/compute.networkAdmin":{"permissions":["compute.acceleratorTypes.*","compute.addresses.*","compute.autoscalers.get","compute.autoscalers.list","compute.backendBuckets.*","compute.backendServices.*","compute.disks.listTagBindings","compute.externalVpnGateways.*","compute.firewallPolicies.get","compute.firewallPolicies.list","compute.firewallPolicies.use","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.*","compute.globalAddresses.*","compute.globalForwardingRules.*","compute.globalNetworkEndpointGroups.get","compute.globalNetworkEndpointGroups.list","compute.globalNetworkEndpointGroups.use","compute.globalOperations.get","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.delete","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.globalPublicDelegatedPrefixes.update","compute.globalPublicDelegatedPrefixes.updatePolicy","compute.healthChecks.*","compute.httpHealthChecks.*","compute.httpsHealthChecks.*","compute.images.listTagBindings","compute.instanceGroupManagers.get","compute.instanceGroupManagers.list","compute.instanceGroupManagers.update","compute.instanceGroupManagers.use","compute.instanceGroups.get","compute.instanceGroups.list","compute.instanceGroups.update","compute.instanceGroups.use","compute.instances.get","compute.instances.getGuestAttributes","compute.instances.getScreenshot","compute.instances.getSerialPortOutput","compute.instances.list","compute.instances.listReferrers","compute.instances.updateSecurity","compute.instances.use","compute.instances.useReadOnly","compute.interconnectAttachments.*","compute.interconnectLocations.*","compute.interconnects.*","compute.machineTypes.*","compute.networkEndpointGroups.get","compute.networkEndpointGroups.list","compute.networkEndpointGroups.use","compute.networks.*","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.publicDelegatedPrefixes.delete","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.publicDelegatedPrefixes.update","compute.publicDelegatedPrefixes.updatePolicy","compute.regionBackendServices.*","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.list","compute.regionFirewallPolicies.use","compute.regionHealthCheckServices.*","compute.regionHealthChecks.*","compute.regionNetworkEndpointGroups.get","compute.regionNetworkEndpointGroups.list","compute.regionNetworkEndpointGroups.use","compute.regionNotificationEndpoints.*","compute.regionOperations.get","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.*","compute.regionTargetHttpsProxies.*","compute.regionUrlMaps.*","compute.regions.*","compute.routers.*","compute.routes.*","compute.securityPolicies.get","compute.securityPolicies.list","compute.securityPolicies.use","compute.serviceAttachments.*","compute.snapshots.listTagBindings","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.*","compute.subnetworks.*","compute.targetGrpcProxies.*","compute.targetHttpProxies.*","compute.targetHttpsProxies.*","compute.targetInstances.*","compute.targetPools.*","compute.targetSslProxies.*","compute.targetTcpProxies.*","compute.targetVpnGateways.*","compute.urlMaps.*","compute.vpnGateways.*","compute.vpnTunnels.*","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","networkconnectivity.locations.*","networkconnectivity.operations.*","networksecurity.*","networkservices.*","resourcemanager.projects.get","resourcemanager.projects.list","servicedirectory.namespaces.create","servicedirectory.namespaces.delete","servicedirectory.services.create","servicedirectory.services.delete","servicenetworking.operations.get","servicenetworking.services.addPeering","servicenetworking.services.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","trafficdirector.*"],"en":{"roleTitle":"Compute Network Admin","roleName":"roles/compute.networkAdmin","roleDescription":"Permissions to create, modify, and delete networking resources,\nexcept for firewall rules and SSL certificates. The network admin role\nallows read-only access to firewall rules, SSL certificates, and instances\n(to view their ephemeral IP addresses). The network admin role does not\nallow a user to create, start, stop, or delete instances.\n\n\nFor example, if your company has a security team that manages firewalls\nand SSL certificates and a networking team that manages the rest of the\nnetworking resources, then grant this role to the networking team's group.\nOr, if you have a combined team that manages both security and networking,\nthen grant this role as well as the \nroles/compute.securityAdmin role to the combined team's group."},"ja":{"roleTitle":"Compute ネットワーク管理者","roleName":"roles/compute.networkAdmin","roleDescription":"ネットワーキング リソース(ファイアウォール ルールと SSL 証明書を除く)を作成、変更、削除する権限。ネットワーク管理者の役割により、ファイアウォール ルール、SSL 証明書、インスタンス(それぞれのエフェメラル IP アドレスの表示用)への読み取り専用アクセスを付与できます。ネットワーク管理者ロールでは、インスタンスの作成、起動、停止、削除はできません。\n\n\nたとえば、会社にファイアウォールと SSL 証明書を管理するセキュリティチームと、残りのネットワーク リソースを管理するネットワーク チームが存在する場合は、このロールをネットワーク チームのグループに付与します。または、セキュリティとネットワークの両方を管理する統合チームが参加している場合は、このロールと roles/compute.securityAdmin ロールを統合チームのグループに付与します。"}},"roles/compute.networkUser":{"permissions":["compute.addresses.createInternal","compute.addresses.deleteInternal","compute.addresses.get","compute.addresses.list","compute.addresses.useInternal","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.externalVpnGateways.use","compute.firewalls.get","compute.firewalls.list","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.interconnects.use","compute.networks.access","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.networks.use","compute.networks.useExternalIp","compute.projects.get","compute.regions.*","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnGateways.use","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zones.*","networkconnectivity.locations.*","networkconnectivity.operations.get","networkconnectivity.operations.list","networksecurity.authorizationPolicies.get","networksecurity.authorizationPolicies.list","networksecurity.authorizationPolicies.use","networksecurity.clientTlsPolicies.get","networksecurity.clientTlsPolicies.list","networksecurity.clientTlsPolicies.use","networksecurity.locations.*","networksecurity.operations.get","networksecurity.operations.list","networksecurity.serverTlsPolicies.get","networksecurity.serverTlsPolicies.list","networksecurity.serverTlsPolicies.use","networkservices.endpointConfigSelectors.get","networkservices.endpointConfigSelectors.list","networkservices.endpointConfigSelectors.use","networkservices.endpointPolicies.get","networkservices.endpointPolicies.list","networkservices.endpointPolicies.use","networkservices.gateways.get","networkservices.gateways.list","networkservices.gateways.use","networkservices.grpcRoutes.get","networkservices.grpcRoutes.list","networkservices.grpcRoutes.use","networkservices.httpFilters.get","networkservices.httpFilters.list","networkservices.httpFilters.use","networkservices.httpRoutes.get","networkservices.httpRoutes.list","networkservices.httpRoutes.use","networkservices.httpfilters.get","networkservices.httpfilters.list","networkservices.httpfilters.use","networkservices.locations.*","networkservices.meshes.get","networkservices.meshes.list","networkservices.meshes.use","networkservices.operations.get","networkservices.operations.list","networkservices.serviceBindings.get","networkservices.serviceBindings.list","networkservices.tcpRoutes.get","networkservices.tcpRoutes.list","networkservices.tcpRoutes.use","resourcemanager.projects.get","resourcemanager.projects.list","servicenetworking.services.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Network User","roleName":"roles/compute.networkUser","roleDescription":"Provides access to a shared VPC network\n\nOnce granted, service owners can use VPC networks and subnets that belong\nto the host project. For example, a network user can create a VM instance\nthat belongs to a host project network but they cannot delete or create\nnew networks in the host project."},"ja":{"roleTitle":"Compute ネットワーク ユーザー","roleName":"roles/compute.networkUser","roleDescription":"共有 VPC ネットワークへのアクセス権を付与します。\n\nアクセス権を付与されたサービス オーナーは、ホスト プロジェクトに属する VPC ネットワークとサブネットを使用できます。たとえば、ネットワーク ユーザーは、ホスト プロジェクト ネットワークに属する VM インスタンスを作成できますが、ホスト プロジェクトでネットワークを削除できません。また、新しいネットワークを作成することもできません。"}},"roles/compute.networkViewer":{"permissions":["compute.acceleratorTypes.*","compute.addresses.get","compute.addresses.list","compute.autoscalers.get","compute.autoscalers.list","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.list","compute.disks.listTagBindings","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.listTagBindings","compute.instanceGroupManagers.get","compute.instanceGroupManagers.list","compute.instanceGroups.get","compute.instanceGroups.list","compute.instances.get","compute.instances.getGuestAttributes","compute.instances.getScreenshot","compute.instances.getSerialPortOutput","compute.instances.list","compute.instances.listReferrers","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.machineTypes.*","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.regionBackendServices.get","compute.regionBackendServices.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regions.*","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.listTagBindings","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.list","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zones.*","networkconnectivity.locations.*","networkconnectivity.operations.get","networkconnectivity.operations.list","networksecurity.authorizationPolicies.get","networksecurity.authorizationPolicies.list","networksecurity.clientTlsPolicies.get","networksecurity.clientTlsPolicies.list","networksecurity.locations.*","networksecurity.operations.get","networksecurity.operations.list","networksecurity.serverTlsPolicies.get","networksecurity.serverTlsPolicies.list","networkservices.endpointConfigSelectors.get","networkservices.endpointConfigSelectors.list","networkservices.endpointPolicies.get","networkservices.endpointPolicies.list","networkservices.gateways.get","networkservices.gateways.list","networkservices.grpcRoutes.get","networkservices.grpcRoutes.list","networkservices.httpFilters.get","networkservices.httpFilters.list","networkservices.httpRoutes.get","networkservices.httpRoutes.list","networkservices.httpfilters.get","networkservices.httpfilters.list","networkservices.locations.*","networkservices.meshes.get","networkservices.meshes.list","networkservices.operations.get","networkservices.operations.list","networkservices.serviceBindings.get","networkservices.serviceBindings.list","networkservices.tcpRoutes.get","networkservices.tcpRoutes.list","resourcemanager.projects.get","resourcemanager.projects.list","servicenetworking.services.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","trafficdirector.*"],"en":{"roleTitle":"Compute Network Viewer","roleName":"roles/compute.networkViewer","roleDescription":"Read-only access to all networking resources\n\nFor example, if you have software that inspects your network\nconfiguration, you could grant this role to that software's\nservice account."},"ja":{"roleTitle":"Compute ネットワーク閲覧者","roleName":"roles/compute.networkViewer","roleDescription":"すべてのネットワーク リソースに対する読み取りアクセス権。\nたとえば、ネットワーク構成を検査するソフトウェアがある場合は、そのソフトウェアのサービス アカウントにこのロールを付与できます。"}},"roles/compute.orgFirewallPolicyAdmin":{"permissions":["compute.firewallPolicies.cloneRules","compute.firewallPolicies.create","compute.firewallPolicies.delete","compute.firewallPolicies.get","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewallPolicies.move","compute.firewallPolicies.setIamPolicy","compute.firewallPolicies.update","compute.firewallPolicies.use","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalOperations.setIamPolicy","compute.projects.get","compute.regionFirewallPolicies.*","compute.regionOperations.get","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionOperations.setIamPolicy","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Organization Firewall Policy Admin","roleName":"roles/compute.orgFirewallPolicyAdmin","roleDescription":"Full control of Compute Engine Organization Firewall Policies."},"ja":{"roleTitle":"Compute 組織ファイアウォール ポリシー管理者","roleName":"roles/compute.orgFirewallPolicyAdmin","roleDescription":"Compute Engine 組織のファイアウォール ポリシーのすべてを管理できる権限。"}},"roles/compute.orgFirewallPolicyUser":{"permissions":["compute.firewallPolicies.get","compute.firewallPolicies.list","compute.firewallPolicies.use","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.projects.get","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.list","compute.regionFirewallPolicies.use","compute.regionOperations.get","compute.regionOperations.getIamPolicy","compute.regionOperations.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Organization Firewall Policy User","roleName":"roles/compute.orgFirewallPolicyUser","roleDescription":"View or use Compute Engine Firewall Policies to associate with the organization or folders."},"ja":{"roleTitle":"Compute 組織ファイアウォール ポリシー ユーザー","roleName":"roles/compute.orgFirewallPolicyUser","roleDescription":"Compute Engine ファイアウォール ポリシーを表示または使用して、組織またはフォルダに関連付けます。"}},"roles/compute.orgSecurityPolicyAdmin":{"permissions":["compute.firewallPolicies.*","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalOperations.setIamPolicy","compute.projects.get","compute.securityPolicies.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Organization Security Policy Admin","roleName":"roles/compute.orgSecurityPolicyAdmin","roleDescription":"Full control of Compute Engine Organization Security Policies."},"ja":{"roleTitle":"コンピューティング組織セキュリティ ポリシー管理者","roleName":"roles/compute.orgSecurityPolicyAdmin","roleDescription":"Compute Engine 組織のセキュリティ ポリシーのすべてを管理できる権限。"}},"roles/compute.orgSecurityPolicyUser":{"permissions":["compute.firewallPolicies.addAssociation","compute.firewallPolicies.get","compute.firewallPolicies.list","compute.firewallPolicies.removeAssociation","compute.firewallPolicies.use","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalOperations.setIamPolicy","compute.projects.get","compute.securityPolicies.addAssociation","compute.securityPolicies.get","compute.securityPolicies.list","compute.securityPolicies.removeAssociation","compute.securityPolicies.use","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Organization Security Policy User","roleName":"roles/compute.orgSecurityPolicyUser","roleDescription":"View or use Compute Engine Security Policies to associate with the organization or folders."},"ja":{"roleTitle":"コンピューティング組織セキュリティ ポリシー ユーザー","roleName":"roles/compute.orgSecurityPolicyUser","roleDescription":"Compute Engine セキュリティ ポリシーを表示または使用して、組織またはフォルダに関連付けます。"}},"roles/compute.orgSecurityResourceAdmin":{"permissions":["compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalOperations.setIamPolicy","compute.organizations.listAssociations","compute.organizations.setFirewallPolicy","compute.organizations.setSecurityPolicy","compute.projects.get","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Organization Resource Admin","roleName":"roles/compute.orgSecurityResourceAdmin","roleDescription":"Full control of Compute Engine Firewall Policy associations to the organization or folders."},"ja":{"roleTitle":"コンピューティング組織リソース管理者","roleName":"roles/compute.orgSecurityResourceAdmin","roleDescription":"組織またはフォルダへの Compute Engine ファイアウォール ポリシーの関連付けのすべてを管理できる権限。"}},"roles/compute.osAdminLogin":{"permissions":["compute.disks.listTagBindings","compute.images.listTagBindings","compute.instances.get","compute.instances.list","compute.instances.osAdminLogin","compute.instances.osLogin","compute.projects.get","compute.snapshots.listTagBindings","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute OS Admin Login","roleName":"roles/compute.osAdminLogin","roleDescription":"Access to log in to a Compute Engine instance as an administrator\nuser."},"ja":{"roleTitle":"Compute OS 管理者ログイン","roleName":"roles/compute.osAdminLogin","roleDescription":"管理者ユーザーとして Compute Engine インスタンスにログインするアクセス権。"}},"roles/compute.osLogin":{"permissions":["compute.disks.listTagBindings","compute.images.listTagBindings","compute.instances.get","compute.instances.list","compute.instances.osLogin","compute.projects.get","compute.snapshots.listTagBindings","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute OS Login","roleName":"roles/compute.osLogin","roleDescription":"Access to log in to a Compute Engine instance as a standard user."},"ja":{"roleTitle":"Compute OS Login","roleName":"roles/compute.osLogin","roleDescription":"標準ユーザーとして Compute Engine インスタンスにログインするアクセス権。"}},"roles/compute.osLoginExternalUser":{"permissions":["compute.oslogin.*"],"en":{"roleTitle":"Compute OS Login External User","roleName":"roles/compute.osLoginExternalUser","roleDescription":"Available only at the organization level.\n\n\nAccess for an external user to set OS Login information associated with\nthis organization. This role does not grant access to instances. External\nusers must be granted one of the required\nOS Login roles \nin order to allow access to instances using SSH."},"ja":{"roleTitle":"Compute OS Login 外部ユーザー","roleName":"roles/compute.osLoginExternalUser","roleDescription":"組織レベルでのみ利用できます。\n\nこの組織に関連付けられた OS Login 情報を外部ユーザーが設定するアクセス権。この役割で、インスタンスへのアクセスは許可されません。外部ユーザーが SSH を使用してインスタンスにアクセスできるようにするには、OS Login ロールのいずれかが付与されている必要があります。"}},"roles/compute.packetMirroringAdmin":{"permissions":["compute.instances.updateSecurity","compute.networks.mirror","compute.projects.get","compute.subnetworks.mirror","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute packet mirroring admin","roleName":"roles/compute.packetMirroringAdmin","roleDescription":"Specify resources to be mirrored."},"ja":{"roleTitle":"Compute Packet Mirroring 管理者","roleName":"roles/compute.packetMirroringAdmin","roleDescription":"ミラーリングするリソースを指定します。"}},"roles/compute.packetMirroringUser":{"permissions":["compute.packetMirrorings.*","compute.projects.get","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute packet mirroring user","roleName":"roles/compute.packetMirroringUser","roleDescription":"Use Compute Engine packet mirrorings."},"ja":{"roleTitle":"Compute Packet Mirroring ユーザー","roleName":"roles/compute.packetMirroringUser","roleDescription":"Compute Engine Packet Mirroring を使用します。"}},"roles/compute.publicIpAdmin":{"permissions":["compute.addresses.*","compute.globalAddresses.*","compute.globalPublicDelegatedPrefixes.*","compute.publicAdvertisedPrefixes.*","compute.publicDelegatedPrefixes.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Compute Public IP Admin","roleName":"roles/compute.publicIpAdmin","roleDescription":"Full control of public IP address management for Compute Engine."},"ja":{"roleTitle":"Compute パブリック IP 管理者","roleName":"roles/compute.publicIpAdmin","roleDescription":"Compute Engine のパブリック IP アドレス管理を完全に制御できる権限。"}},"roles/compute.securityAdmin":{"permissions":["compute.firewallPolicies.*","compute.firewalls.*","compute.globalOperations.get","compute.globalOperations.list","compute.instances.getEffectiveFirewalls","compute.instances.setShieldedInstanceIntegrityPolicy","compute.instances.setShieldedVmIntegrityPolicy","compute.instances.updateSecurity","compute.instances.updateShieldedInstanceConfig","compute.instances.updateShieldedVmConfig","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.updatePolicy","compute.packetMirrorings.*","compute.projects.get","compute.regionFirewallPolicies.*","compute.regionOperations.get","compute.regionOperations.list","compute.regionSslCertificates.*","compute.regions.*","compute.routes.get","compute.routes.list","compute.securityPolicies.*","compute.sslCertificates.*","compute.sslPolicies.*","compute.subnetworks.get","compute.subnetworks.list","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Security Admin","roleName":"roles/compute.securityAdmin","roleDescription":"Permissions to create, modify, and delete firewall rules and SSL\ncertificates, and also to\nconfigure Shielded VM\nsettings.\n\n\nFor example, if your company has a security team that manages firewalls\nand SSL certificates and a networking team that manages the rest of the\nnetworking resources, then grant this role to the security team's group."},"ja":{"roleTitle":"Compute セキュリティ管理者","roleName":"roles/compute.securityAdmin","roleDescription":"ファイアウォール ルールと SSL 証明書を作成、変更、削除するための権限。Shielded VM の設定を構成する権限も含まれます。\nたとえば、会社にファイアウォールと SSL 証明書を管理するセキュリティチームと、残りのネットワーク リソースを管理するネットワーク チームが存在する場合は、このロールをセキュリティ チームのグループに付与します。"}},"roles/compute.soleTenantViewer":{"permissions":["compute.nodeGroups.get","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeTemplates.get","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTypes.*"],"en":{"roleTitle":"Compute Sole Tenant Viewer","roleName":"roles/compute.soleTenantViewer","roleDescription":"Permissions to view sole tenancy node groups"},"ja":{"roleTitle":"コンピューティング単一テナント閲覧者","roleName":"roles/compute.soleTenantViewer","roleDescription":"単一テナントノード グループを表示する権限"}},"roles/compute.storageAdmin":{"permissions":["compute.diskTypes.*","compute.disks.*","compute.globalOperations.get","compute.globalOperations.list","compute.images.*","compute.licenseCodes.*","compute.licenses.*","compute.projects.get","compute.regionOperations.get","compute.regionOperations.list","compute.regions.*","compute.resourcePolicies.*","compute.snapshots.*","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Storage Admin","roleName":"roles/compute.storageAdmin","roleDescription":"Permissions to create, modify, and delete disks, images, and snapshots.\n\n\nFor example, if your company has someone who manages project images and\nyou don't want them to have the editor role on the project, then grant\nthis role to their account on the project."},"ja":{"roleTitle":"Compute ストレージ管理者","roleName":"roles/compute.storageAdmin","roleDescription":"ディスク、イメージ、スナップショットを作成、変更、削除する権限。\n\nたとえば、プロジェクトのイメージを管理するユーザーがいて、そのユーザーにプロジェクト編集者ロールを与えたくない場合には、プロジェクトでそのユーザーのアカウントにこのロールを付与します。"}},"roles/compute.viewer":{"permissions":["compute.acceleratorTypes.*","compute.addresses.get","compute.addresses.list","compute.autoscalers.get","compute.autoscalers.list","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.getIamPolicy","compute.backendServices.list","compute.commitments.get","compute.commitments.list","compute.diskTypes.*","compute.disks.get","compute.disks.getIamPolicy","compute.disks.list","compute.disks.listTagBindings","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewallPolicies.get","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.get","compute.globalNetworkEndpointGroups.list","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.get","compute.images.getFromFamily","compute.images.getIamPolicy","compute.images.list","compute.images.listTagBindings","compute.instanceGroupManagers.get","compute.instanceGroupManagers.list","compute.instanceGroups.get","compute.instanceGroups.list","compute.instanceTemplates.get","compute.instanceTemplates.getIamPolicy","compute.instanceTemplates.list","compute.instances.get","compute.instances.getEffectiveFirewalls","compute.instances.getGuestAttributes","compute.instances.getIamPolicy","compute.instances.getScreenshot","compute.instances.getSerialPortOutput","compute.instances.getShieldedInstanceIdentity","compute.instances.getShieldedVmIdentity","compute.instances.list","compute.instances.listReferrers","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.get","compute.licenseCodes.getIamPolicy","compute.licenseCodes.list","compute.licenses.get","compute.licenses.getIamPolicy","compute.licenses.list","compute.machineImages.get","compute.machineImages.getIamPolicy","compute.machineImages.list","compute.machineTypes.*","compute.maintenancePolicies.get","compute.maintenancePolicies.getIamPolicy","compute.maintenancePolicies.list","compute.networkEndpointGroups.get","compute.networkEndpointGroups.getIamPolicy","compute.networkEndpointGroups.list","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.nodeGroups.get","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeTemplates.get","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTypes.*","compute.organizations.listAssociations","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.publicAdvertisedPrefixes.get","compute.publicAdvertisedPrefixes.list","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.regionBackendServices.get","compute.regionBackendServices.getIamPolicy","compute.regionBackendServices.list","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.getIamPolicy","compute.regionFirewallPolicies.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.get","compute.regionNetworkEndpointGroups.list","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regionUrlMaps.validate","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.get","compute.resourcePolicies.list","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.securityPolicies.get","compute.securityPolicies.getIamPolicy","compute.securityPolicies.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.get","compute.snapshots.getIamPolicy","compute.snapshots.list","compute.snapshots.listTagBindings","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.getIamPolicy","compute.subnetworks.list","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.urlMaps.validate","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.getIamPolicy","compute.zoneOperations.list","compute.zones.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Compute Viewer","roleName":"roles/compute.viewer","roleDescription":"Read-only access to get and list Compute Engine resources, without\nbeing able to read the data stored on them.\n\n\nFor example, an account with this role could inventory all of the disks in\na project, but it could not read any of the data on those disks."},"ja":{"roleTitle":"Compute 閲覧者","roleName":"roles/compute.viewer","roleDescription":"Compute Engine リソースを取得して表示する読み取りアクセス権。そこに格納されたデータを読み取ることはできません。\nたとえば、このロールを持つアカウントはプロジェクトのすべてのディスクの一覧を作成できますが、それらのディスク内のデータを読み取ることはできません。"}},"roles/compute.xpnAdmin":{"permissions":["compute.globalOperations.get","compute.globalOperations.list","compute.organizations.administerXpn","compute.organizations.disableXpnHost","compute.organizations.disableXpnResource","compute.organizations.enableXpnHost","compute.organizations.enableXpnResource","compute.projects.get","compute.subnetworks.getIamPolicy","compute.subnetworks.setIamPolicy","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Compute Shared VPC Admin","roleName":"roles/compute.xpnAdmin","roleDescription":"Permissions to administer shared VPC host projects,\nspecifically enabling the host projects and associating shared VPC service projects to the host\nproject's network.\n\n\nAt the organization level, this role can only be granted by an organization admin.\n\n\nGoogle Cloud recommends that the Shared VPC Admin be the owner of the shared VPC host project. The\nShared VPC Admin is responsible for granting the Compute Network User role\n(roles/compute.networkUser) to service owners, and the shared VPC host project owner\ncontrols the project itself. Managing the project is easier if a single principal (individual or\ngroup) can fulfill both roles."},"ja":{"roleTitle":"Compute Shared VPC 管理者","roleName":"roles/compute.xpnAdmin","roleDescription":"共有 VPC ホスト プロジェクトを管理する権限。特にホスト プロジェクトを有効にし、共有 VPC サービス プロジェクトをホスト プロジェクトのネットワークに関連付ける権限。\n組織レベルでこのロールを付与できるのは組織管理者のみです。\n\n\nGoogle Cloud では、共有 VPC ホスト プロジェクトのオーナーを共有 VPC 管理者にすることを推奨しています。共有 VPC 管理者は Compute ネットワーク ユーザーのロール(roles/compute.networkUser)をサービス オーナーに付与し、共有 VPC ホスト プロジェクトのオーナーはプロジェクト自体を制御します。単一のプリンシパル(個人やグループ)が両方のロールを果たすことができれば、プロジェクトの管理が容易になります。"}},"roles/osconfig.guestPolicyAdmin":{"permissions":["osconfig.guestPolicies.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"GuestPolicy Admin","roleName":"roles/osconfig.guestPolicyAdmin","roleDescription":"Full admin access to GuestPolicies"},"ja":{"roleTitle":"GuestPolicy 管理者","roleName":"roles/osconfig.guestPolicyAdmin","roleDescription":"GuestPolicy に対する完全な管理者アクセス権"}},"roles/osconfig.guestPolicyEditor":{"permissions":["osconfig.guestPolicies.get","osconfig.guestPolicies.list","osconfig.guestPolicies.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"GuestPolicy Editor","roleName":"roles/osconfig.guestPolicyEditor","roleDescription":"Editor of GuestPolicy resources"},"ja":{"roleTitle":"GuestPolicy 編集者","roleName":"roles/osconfig.guestPolicyEditor","roleDescription":"GuestPolicy リソースの編集者"}},"roles/osconfig.guestPolicyViewer":{"permissions":["osconfig.guestPolicies.get","osconfig.guestPolicies.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"GuestPolicy Viewer","roleName":"roles/osconfig.guestPolicyViewer","roleDescription":"Viewer of GuestPolicy resources"},"ja":{"roleTitle":"GuestPolicy 閲覧者","roleName":"roles/osconfig.guestPolicyViewer","roleDescription":"GuestPolicy リソースの閲覧者"}},"roles/osconfig.instanceOSPoliciesComplianceViewer":{"permissions":["osconfig.instanceOSPoliciesCompliances.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"InstanceOSPoliciesCompliance Viewer","roleName":"roles/osconfig.instanceOSPoliciesComplianceViewer","roleDescription":"Viewer of OS Policies Compliance of VM instances"},"ja":{"roleTitle":"InstanceOSPoliciesCompliance 閲覧者","roleName":"roles/osconfig.instanceOSPoliciesComplianceViewer","roleDescription":"VM インスタンスの OS ポリシー コンプライアンスの閲覧者"}},"roles/osconfig.inventoryViewer":{"permissions":["osconfig.inventories.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"OS Inventory Viewer","roleName":"roles/osconfig.inventoryViewer","roleDescription":"Viewer of OS Inventories"},"ja":{"roleTitle":"OS インベントリ閲覧者","roleName":"roles/osconfig.inventoryViewer","roleDescription":"OS インベントリの閲覧者"}},"roles/osconfig.osPolicyAssignmentAdmin":{"permissions":["osconfig.osPolicyAssignments.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"OSPolicyAssignment Admin","roleName":"roles/osconfig.osPolicyAssignmentAdmin","roleDescription":"Full admin access to OS Policy Assignments"},"ja":{"roleTitle":"OSPolicyAssignment 管理者","roleName":"roles/osconfig.osPolicyAssignmentAdmin","roleDescription":"OS ポリシーの割り当てに対する完全な管理者アクセス権"}},"roles/osconfig.osPolicyAssignmentEditor":{"permissions":["osconfig.osPolicyAssignments.get","osconfig.osPolicyAssignments.list","osconfig.osPolicyAssignments.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"OSPolicyAssignment Editor","roleName":"roles/osconfig.osPolicyAssignmentEditor","roleDescription":"Editor of OS Policy Assignments"},"ja":{"roleTitle":"OSPolicyAssignment 編集者","roleName":"roles/osconfig.osPolicyAssignmentEditor","roleDescription":"OS ポリシーの割り当ての編集者"}},"roles/osconfig.osPolicyAssignmentReportViewer":{"permissions":["osconfig.osPolicyAssignmentReports.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"OSPolicyAssignmentReport Viewer","roleName":"roles/osconfig.osPolicyAssignmentReportViewer","roleDescription":"Viewer of OS policy assignment reports for VM instances"},"ja":{"roleTitle":"OSPolicyAssignmentReport 閲覧者","roleName":"roles/osconfig.osPolicyAssignmentReportViewer","roleDescription":"VM インスタンスの OS ポリシー割り当てレポートの閲覧者"}},"roles/osconfig.osPolicyAssignmentViewer":{"permissions":["osconfig.osPolicyAssignments.get","osconfig.osPolicyAssignments.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"OSPolicyAssignment Viewer","roleName":"roles/osconfig.osPolicyAssignmentViewer","roleDescription":"Viewer of OS Policy Assignments"},"ja":{"roleTitle":"OSPolicyAssignment 閲覧者","roleName":"roles/osconfig.osPolicyAssignmentViewer","roleDescription":"OS ポリシーの割り当ての閲覧者"}},"roles/osconfig.patchDeploymentAdmin":{"permissions":["osconfig.patchDeployments.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"PatchDeployment Admin","roleName":"roles/osconfig.patchDeploymentAdmin","roleDescription":"Full admin access to PatchDeployments"},"ja":{"roleTitle":"PatchDeployment 管理者","roleName":"roles/osconfig.patchDeploymentAdmin","roleDescription":"PatchDeployment に対する完全な管理者アクセス権"}},"roles/osconfig.patchDeploymentViewer":{"permissions":["osconfig.patchDeployments.get","osconfig.patchDeployments.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"PatchDeployment Viewer","roleName":"roles/osconfig.patchDeploymentViewer","roleDescription":"Viewer of PatchDeployment resources"},"ja":{"roleTitle":"PatchDeployment 閲覧者","roleName":"roles/osconfig.patchDeploymentViewer","roleDescription":"PatchDeployment リソースの閲覧者"}},"roles/osconfig.patchJobExecutor":{"permissions":["osconfig.patchJobs.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Patch Job Executor","roleName":"roles/osconfig.patchJobExecutor","roleDescription":"Access to execute Patch Jobs."},"ja":{"roleTitle":"パッチジョブ エグゼキュータ","roleName":"roles/osconfig.patchJobExecutor","roleDescription":"パッチジョブを実行するためのアクセス権。"}},"roles/osconfig.patchJobViewer":{"permissions":["osconfig.patchJobs.get","osconfig.patchJobs.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Patch Job Viewer","roleName":"roles/osconfig.patchJobViewer","roleDescription":"Get and list Patch Jobs."},"ja":{"roleTitle":"パッチジョブ閲覧者","roleName":"roles/osconfig.patchJobViewer","roleDescription":"パッチジョブを取得して一覧表示します。"}},"roles/osconfig.vulnerabilityReportViewer":{"permissions":["osconfig.vulnerabilityReports.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"OS VulnerabilityReport Viewer","roleName":"roles/osconfig.vulnerabilityReportViewer","roleDescription":"Viewer of OS VulnerabilityReports"},"ja":{"roleTitle":"OS VulnerabilityReport 閲覧者","roleName":"roles/osconfig.vulnerabilityReportViewer","roleDescription":"OS VulnerabilityReports の閲覧者"}},"roles/containeranalysis.admin":{"permissions":["containeranalysis.notes.attachOccurrence","containeranalysis.notes.create","containeranalysis.notes.delete","containeranalysis.notes.get","containeranalysis.notes.getIamPolicy","containeranalysis.notes.list","containeranalysis.notes.setIamPolicy","containeranalysis.notes.update","containeranalysis.occurrences.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Container Analysis Admin","roleName":"roles/containeranalysis.admin","roleDescription":"Access to all Container Analysis resources."},"ja":{"roleTitle":"Container Analysis 管理者","roleName":"roles/containeranalysis.admin","roleDescription":"すべての Container Analysis リソースへのアクセス権。"}},"roles/containeranalysis.notes.attacher":{"permissions":["containeranalysis.notes.attachOccurrence","containeranalysis.notes.get"],"en":{"roleTitle":"Container Analysis Notes Attacher","roleName":"roles/containeranalysis.notes.attacher","roleDescription":"Can attach Container Analysis Occurrences to Notes."},"ja":{"roleTitle":"Container Analysis メモ添付者","roleName":"roles/containeranalysis.notes.attacher","roleDescription":"Container Analysis のオカレンスをメモに添付できます。"}},"roles/containeranalysis.notes.editor":{"permissions":["containeranalysis.notes.attachOccurrence","containeranalysis.notes.create","containeranalysis.notes.delete","containeranalysis.notes.get","containeranalysis.notes.list","containeranalysis.notes.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Container Analysis Notes Editor","roleName":"roles/containeranalysis.notes.editor","roleDescription":"Can edit Container Analysis Notes."},"ja":{"roleTitle":"Container Analysis メモ編集者","roleName":"roles/containeranalysis.notes.editor","roleDescription":"Container Analysis のメモを編集できる権限。"}},"roles/containeranalysis.notes.occurrences.viewer":{"permissions":["containeranalysis.notes.get","containeranalysis.notes.listOccurrences"],"en":{"roleTitle":"Container Analysis Occurrences for Notes Viewer","roleName":"roles/containeranalysis.notes.occurrences.viewer","roleDescription":"Can view all Container Analysis Occurrences attached to a Note."},"ja":{"roleTitle":"メモに対する Container Analysis のオカレンスの閲覧者","roleName":"roles/containeranalysis.notes.occurrences.viewer","roleDescription":"メモに添付されたすべての Container Analysis のオカレンスを表示できます。"}},"roles/containeranalysis.notes.viewer":{"permissions":["containeranalysis.notes.get","containeranalysis.notes.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Container Analysis Notes Viewer","roleName":"roles/containeranalysis.notes.viewer","roleDescription":"Can view Container Analysis Notes."},"ja":{"roleTitle":"Container Analysis メモ閲覧者","roleName":"roles/containeranalysis.notes.viewer","roleDescription":"Container Analysis のメモを閲覧する権限。"}},"roles/containeranalysis.occurrences.editor":{"permissions":["containeranalysis.occurrences.create","containeranalysis.occurrences.delete","containeranalysis.occurrences.get","containeranalysis.occurrences.list","containeranalysis.occurrences.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Container Analysis Occurrences Editor","roleName":"roles/containeranalysis.occurrences.editor","roleDescription":"Can edit Container Analysis Occurrences."},"ja":{"roleTitle":"Container Analysis のオカレンスの編集者","roleName":"roles/containeranalysis.occurrences.editor","roleDescription":"Container Analysis のオカレンスを編集する権限。"}},"roles/containeranalysis.occurrences.viewer":{"permissions":["containeranalysis.occurrences.get","containeranalysis.occurrences.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Container Analysis Occurrences Viewer","roleName":"roles/containeranalysis.occurrences.viewer","roleDescription":"Can view Container Analysis Occurrences."},"ja":{"roleTitle":"Container Analysis のオカレンスの閲覧者","roleName":"roles/containeranalysis.occurrences.viewer","roleDescription":"Container Analysis のオカレンスを閲覧する権限。"}},"roles/datacatalog.admin":{"permissions":["bigquery.connections.get","bigquery.connections.updateTag","bigquery.datasets.get","bigquery.datasets.updateTag","bigquery.models.getMetadata","bigquery.models.updateTag","bigquery.routines.get","bigquery.routines.updateTag","bigquery.tables.get","bigquery.tables.updateTag","datacatalog.categories.getIamPolicy","datacatalog.categories.setIamPolicy","datacatalog.entries.*","datacatalog.entryGroups.*","datacatalog.tagTemplates.*","datacatalog.taxonomies.*","pubsub.topics.get","pubsub.topics.updateTag","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data Catalog Admin","roleName":"roles/datacatalog.admin","roleDescription":"Full access to all DataCatalog resources"},"ja":{"roleTitle":"Data Catalog 管理者","roleName":"roles/datacatalog.admin","roleDescription":"すべての DataCatalog リソースに対する完全アクセス権。"}},"roles/datacatalog.categoryAdmin":{"permissions":["datacatalog.categories.getIamPolicy","datacatalog.categories.setIamPolicy","datacatalog.taxonomies.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Policy Tag Admin","roleName":"roles/datacatalog.categoryAdmin","roleDescription":"Manage taxonomies"},"ja":{"roleTitle":"ポリシータグ管理者","roleName":"roles/datacatalog.categoryAdmin","roleDescription":"分類を管理します。"}},"roles/datacatalog.categoryFineGrainedReader":{"permissions":["datacatalog.categories.fineGrainedGet"],"en":{"roleTitle":"Fine-Grained Reader","roleName":"roles/datacatalog.categoryFineGrainedReader","roleDescription":"Read access to sub-resources tagged by a policy tag, for example, BigQuery columns"},"ja":{"roleTitle":"きめ細かい読み取り","roleName":"roles/datacatalog.categoryFineGrainedReader","roleDescription":"ポリシーのタグが付けられているサブリソース(BigQuery 列など)に対する読み取りアクセス権。"}},"roles/datacatalog.entryGroupCreator":{"permissions":["datacatalog.entryGroups.create","datacatalog.entryGroups.get","datacatalog.entryGroups.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"DataCatalog EntryGroup Creator","roleName":"roles/datacatalog.entryGroupCreator","roleDescription":"Can create new entryGroups"},"ja":{"roleTitle":"DataCatalog EntryGroup 作成者","roleName":"roles/datacatalog.entryGroupCreator","roleDescription":"新しい entryGroup を作成できます。"}},"roles/datacatalog.entryGroupOwner":{"permissions":["datacatalog.entries.*","datacatalog.entryGroups.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"DataCatalog entryGroup Owner","roleName":"roles/datacatalog.entryGroupOwner","roleDescription":"Full access to entryGroups"},"ja":{"roleTitle":"DataCatalog entryGroup オーナー","roleName":"roles/datacatalog.entryGroupOwner","roleDescription":"entryGroup に対する完全アクセス権。"}},"roles/datacatalog.entryOwner":{"permissions":["datacatalog.entries.*","datacatalog.entryGroups.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"DataCatalog entry Owner","roleName":"roles/datacatalog.entryOwner","roleDescription":"Full access to entries"},"ja":{"roleTitle":"DataCatalog エントリ オーナー","roleName":"roles/datacatalog.entryOwner","roleDescription":"エントリへの完全アクセス権。"}},"roles/datacatalog.entryViewer":{"permissions":["datacatalog.entries.get","datacatalog.entries.list","datacatalog.entryGroups.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"DataCatalog Entry Viewer","roleName":"roles/datacatalog.entryViewer","roleDescription":"Read access to entries"},"ja":{"roleTitle":"DataCatalog エントリ閲覧者","roleName":"roles/datacatalog.entryViewer","roleDescription":"エントリに対する読み取りアクセス権。"}},"roles/datacatalog.tagEditor":{"permissions":["bigquery.connections.updateTag","bigquery.datasets.updateTag","bigquery.models.updateTag","bigquery.routines.updateTag","bigquery.tables.updateTag","datacatalog.entries.updateTag","pubsub.topics.updateTag"],"en":{"roleTitle":"Data Catalog Tag Editor","roleName":"roles/datacatalog.tagEditor","roleDescription":"Provides access to modify tags on Google Cloud assets for BigQuery and\nPub/Sub"},"ja":{"roleTitle":"Data Catalog Tag 編集者","roleName":"roles/datacatalog.tagEditor","roleDescription":"BigQuery と Pub/Sub の Google Cloud アセットのタグを変更するためのアクセス権を付与します。"}},"roles/datacatalog.tagTemplateCreator":{"permissions":["datacatalog.tagTemplates.create","datacatalog.tagTemplates.get"],"en":{"roleTitle":"Data Catalog TagTemplate Creator","roleName":"roles/datacatalog.tagTemplateCreator","roleDescription":"Access to create new tag templates"},"ja":{"roleTitle":"Data Catalog TagTemplate 作成者","roleName":"roles/datacatalog.tagTemplateCreator","roleDescription":"新しいタグ テンプレートを作成するためのアクセス権。"}},"roles/datacatalog.tagTemplateOwner":{"permissions":["datacatalog.tagTemplates.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data Catalog TagTemplate Owner","roleName":"roles/datacatalog.tagTemplateOwner","roleDescription":"Full access to tag templates"},"ja":{"roleTitle":"Data Catalog TagTemplate オーナー","roleName":"roles/datacatalog.tagTemplateOwner","roleDescription":"タグ テンプレートに対する完全アクセス権。"}},"roles/datacatalog.tagTemplateUser":{"permissions":["datacatalog.tagTemplates.get","datacatalog.tagTemplates.getTag","datacatalog.tagTemplates.use","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data Catalog TagTemplate User","roleName":"roles/datacatalog.tagTemplateUser","roleDescription":"Access to use templates to tag resources"},"ja":{"roleTitle":"Data Catalog TagTemplate ユーザー","roleName":"roles/datacatalog.tagTemplateUser","roleDescription":"テンプレートを使用してリソースにタグを付けるためのアクセス権。"}},"roles/datacatalog.tagTemplateViewer":{"permissions":["datacatalog.tagTemplates.get","datacatalog.tagTemplates.getTag","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data Catalog TagTemplate Viewer","roleName":"roles/datacatalog.tagTemplateViewer","roleDescription":"Read access to templates and tags created using the templates"},"ja":{"roleTitle":"Data Catalog TagTemplate 閲覧者","roleName":"roles/datacatalog.tagTemplateViewer","roleDescription":"テンプレートとそのテンプレートを使用して作成されたタグに対する読み取りアクセス権。"}},"roles/datacatalog.viewer":{"permissions":["bigquery.connections.get","bigquery.datasets.get","bigquery.models.getMetadata","bigquery.routines.get","bigquery.tables.get","datacatalog.entries.get","datacatalog.entries.list","datacatalog.entryGroups.get","datacatalog.entryGroups.list","datacatalog.tagTemplates.get","datacatalog.tagTemplates.getTag","datacatalog.taxonomies.get","datacatalog.taxonomies.list","pubsub.topics.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data Catalog Viewer","roleName":"roles/datacatalog.viewer","roleDescription":"Provides metadata read access to catalogued Google Cloud assets for BigQuery\nand Pub/Sub"},"ja":{"roleTitle":"Data Catalog 閲覧者","roleName":"roles/datacatalog.viewer","roleDescription":"BigQuery と Pub/Sub のカタログ化された Google Cloud アセットのメタデータを読み取るためのアクセス権を付与します。"}},"roles/dataconnectors.connectorAdmin":{"permissions":["dataconnectors.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Connector Admin","roleName":"roles/dataconnectors.connectorAdmin","roleDescription":"Full access to Data Connectors."},"ja":{"roleTitle":"Connectors 管理者","roleName":"roles/dataconnectors.connectorAdmin","roleDescription":"Data Connectors に対する完全アクセス権"}},"roles/dataconnectors.connectorUser":{"permissions":["dataconnectors.connectors.get","dataconnectors.connectors.getIamPolicy","dataconnectors.connectors.list","dataconnectors.connectors.use"],"en":{"roleTitle":"Connector User","roleName":"roles/dataconnectors.connectorUser","roleDescription":"Access to use Data Connectors."},"ja":{"roleTitle":"コネクタ ユーザー","roleName":"roles/dataconnectors.connectorUser","roleDescription":"Data Connectors の使用アクセス権"}},"roles/datamigration.admin":{"permissions":["datamigration.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Database Migration Admin","roleName":"roles/datamigration.admin","roleDescription":"Full access to all resources of Database Migration."},"ja":{"roleTitle":"データベース移行管理者","roleName":"roles/datamigration.admin","roleDescription":"データベースの移行のすべてのリソースに対する完全アクセス権。"}},"roles/datapipelines.admin":{"permissions":["datapipelines.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data pipelines Admin","roleName":"roles/datapipelines.admin","roleDescription":"Administrator of Data pipelines resources"},"ja":{"roleTitle":"データ パイプライン管理者","roleName":"roles/datapipelines.admin","roleDescription":"Data Pipelines リソース管理者"}},"roles/datapipelines.invoker":{"permissions":["datapipelines.pipelines.run","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data pipelines Invoker","roleName":"roles/datapipelines.invoker","roleDescription":"Invoker of Data pipelines jobs"},"ja":{"roleTitle":"データ パイプライン起動元","roleName":"roles/datapipelines.invoker","roleDescription":"Data Pipelines ジョブの呼び出し元"}},"roles/datapipelines.viewer":{"permissions":["datapipelines.jobs.*","datapipelines.pipelines.get","datapipelines.pipelines.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Data pipelines Viewer","roleName":"roles/datapipelines.viewer","roleDescription":"Viewer of Data pipelines resources"},"ja":{"roleTitle":"データ パイプライン閲覧者","roleName":"roles/datapipelines.viewer","roleDescription":"Data Pipelines リソースの閲覧者"}},"roles/dataflow.admin":{"permissions":["compute.machineTypes.get","compute.projects.get","compute.regions.list","compute.zones.list","dataflow.jobs.*","dataflow.messages.*","dataflow.metrics.*","dataflow.snapshots.*","recommender.dataflowDiagnosticsInsights.*","resourcemanager.projects.get","resourcemanager.projects.list","storage.buckets.get","storage.objects.create","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Dataflow Admin","roleName":"roles/dataflow.admin","roleDescription":"Minimal role for creating and managing dataflow jobs."},"ja":{"roleTitle":"Dataflow 管理者","roleName":"roles/dataflow.admin","roleDescription":"データフロー ジョブを作成し、管理するための最低限のロール。"}},"roles/dataflow.developer":{"permissions":["compute.projects.get","compute.regions.list","compute.zones.list","dataflow.jobs.*","dataflow.messages.*","dataflow.metrics.*","dataflow.snapshots.*","recommender.dataflowDiagnosticsInsights.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataflow Developer","roleName":"roles/dataflow.developer","roleDescription":"Provides the permissions necessary to execute and manipulate\nDataflow jobs."},"ja":{"roleTitle":"Dataflow デベロッパー","roleName":"roles/dataflow.developer","roleDescription":"Dataflow ジョブを実行、操作するために必要な権限を付与します。"}},"roles/dataflow.viewer":{"permissions":["dataflow.jobs.get","dataflow.jobs.list","dataflow.messages.*","dataflow.metrics.*","dataflow.snapshots.get","dataflow.snapshots.list","recommender.dataflowDiagnosticsInsights.get","recommender.dataflowDiagnosticsInsights.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataflow Viewer","roleName":"roles/dataflow.viewer","roleDescription":"Provides read-only access to all Dataflow-related\nresources."},"ja":{"roleTitle":"Dataflow 閲覧者","roleName":"roles/dataflow.viewer","roleDescription":"すべての Dataflow 関連リソースに対する読み取り専用アクセス権を付与します。"}},"roles/dataflow.worker":{"permissions":["autoscaling.sites.readRecommendations","autoscaling.sites.writeMetrics","autoscaling.sites.writeState","compute.instanceGroupManagers.update","compute.instances.delete","compute.instances.setDiskAutoDelete","dataflow.jobs.get","dataflow.shuffle.*","dataflow.streamingWorkItems.*","dataflow.workItems.*","logging.logEntries.create","storage.buckets.get","storage.objects.create","storage.objects.get"],"en":{"roleTitle":"Dataflow Worker","roleName":"roles/dataflow.worker","roleDescription":"Provides the permissions necessary for a Compute Engine service\naccount to execute work units for a Dataflow pipeline."},"ja":{"roleTitle":"Dataflow ワーカー","roleName":"roles/dataflow.worker","roleDescription":"Compute Engine サービス アカウントが Dataflow パイプラインの作業単位を実行するために必要な権限を付与します。"}},"roles/dataprep.projects.user":{"permissions":["dataprep.*","resourcemanager.projects.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Dataprep User","roleName":"roles/dataprep.projects.user","roleDescription":"Use of Dataprep."},"ja":{"roleTitle":"Dataprep ユーザー","roleName":"roles/dataprep.projects.user","roleDescription":"Dataprep の使用権限。"}},"roles/dataproc.admin":{"permissions":["compute.machineTypes.*","compute.networks.get","compute.networks.list","compute.projects.get","compute.regions.*","compute.zones.*","dataproc.autoscalingPolicies.*","dataproc.batches.*","dataproc.clusters.*","dataproc.jobs.*","dataproc.operations.*","dataproc.workflowTemplates.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataproc Administrator","roleName":"roles/dataproc.admin","roleDescription":"Full control of Dataproc resources."},"ja":{"roleTitle":"Dataproc 管理者","roleName":"roles/dataproc.admin","roleDescription":"Dataproc リソースのすべてを管理できる権限。"}},"roles/dataproc.editor":{"permissions":["compute.machineTypes.*","compute.networks.get","compute.networks.list","compute.projects.get","compute.regions.*","compute.zones.*","dataproc.autoscalingPolicies.create","dataproc.autoscalingPolicies.delete","dataproc.autoscalingPolicies.get","dataproc.autoscalingPolicies.list","dataproc.autoscalingPolicies.update","dataproc.autoscalingPolicies.use","dataproc.batches.*","dataproc.clusters.create","dataproc.clusters.delete","dataproc.clusters.get","dataproc.clusters.list","dataproc.clusters.start","dataproc.clusters.stop","dataproc.clusters.update","dataproc.clusters.use","dataproc.jobs.cancel","dataproc.jobs.create","dataproc.jobs.delete","dataproc.jobs.get","dataproc.jobs.list","dataproc.jobs.update","dataproc.operations.cancel","dataproc.operations.delete","dataproc.operations.get","dataproc.operations.list","dataproc.workflowTemplates.create","dataproc.workflowTemplates.delete","dataproc.workflowTemplates.get","dataproc.workflowTemplates.instantiate","dataproc.workflowTemplates.instantiateInline","dataproc.workflowTemplates.list","dataproc.workflowTemplates.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataproc Editor","roleName":"roles/dataproc.editor","roleDescription":"Provides the permissions necessary for viewing the resources required to\nmanage Dataproc, including machine types, networks, projects,\nand zones."},"ja":{"roleTitle":"Dataproc 編集者","roleName":"roles/dataproc.editor","roleDescription":"マシンタイプ、ネットワーク、プロジェクト、ゾーンなどの Dataproc を管理するために必要となるリソースの表示に必要な権限を付与します。"}},"roles/dataproc.hubAgent":{"permissions":["compute.instances.get","compute.instances.setMetadata","compute.instances.setTags","compute.zoneOperations.get","compute.zones.list","dataproc.autoscalingPolicies.get","dataproc.autoscalingPolicies.list","dataproc.autoscalingPolicies.use","dataproc.clusters.create","dataproc.clusters.delete","dataproc.clusters.get","dataproc.clusters.list","dataproc.clusters.update","dataproc.operations.cancel","dataproc.operations.delete","dataproc.operations.get","dataproc.operations.list","iam.serviceAccounts.actAs","iam.serviceAccounts.get","iam.serviceAccounts.list","logging.buckets.get","logging.buckets.list","logging.exclusions.get","logging.exclusions.list","logging.locations.*","logging.logEntries.create","logging.logEntries.list","logging.logMetrics.get","logging.logMetrics.list","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.operations.get","logging.operations.list","logging.queries.create","logging.queries.delete","logging.queries.get","logging.queries.list","logging.queries.listShared","logging.queries.update","logging.sinks.get","logging.sinks.list","logging.usage.*","logging.views.get","logging.views.list","resourcemanager.projects.get","resourcemanager.projects.list","storage.buckets.get","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Dataproc Hub Agent","roleName":"roles/dataproc.hubAgent","roleDescription":"Allows management of Dataproc resources. Intended for service accounts running Dataproc Hub instances."},"ja":{"roleTitle":"Dataproc ハブ エージェント","roleName":"roles/dataproc.hubAgent","roleDescription":"Dataproc リソースの管理を許可します。Dataproc ハブ インスタンスが実行されているサービス アカウントを対象としています。"}},"roles/dataproc.viewer":{"permissions":["compute.machineTypes.get","compute.regions.*","compute.zones.*","dataproc.autoscalingPolicies.get","dataproc.autoscalingPolicies.list","dataproc.batches.get","dataproc.batches.list","dataproc.clusters.get","dataproc.clusters.list","dataproc.jobs.get","dataproc.jobs.list","dataproc.operations.get","dataproc.operations.list","dataproc.workflowTemplates.get","dataproc.workflowTemplates.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataproc Viewer","roleName":"roles/dataproc.viewer","roleDescription":"Provides read-only access to Dataproc resources."},"ja":{"roleTitle":"Dataproc 閲覧者","roleName":"roles/dataproc.viewer","roleDescription":"Dataproc リソースに対する読み取り専用アクセス権を付与します。"}},"roles/dataproc.worker":{"permissions":["dataproc.agents.*","dataproc.tasks.*","logging.logEntries.create","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create","storage.buckets.get","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Dataproc Worker","roleName":"roles/dataproc.worker","roleDescription":"Provides worker access to Dataproc resources. Intended for service accounts."},"ja":{"roleTitle":"Dataproc ワーカー","roleName":"roles/dataproc.worker","roleDescription":"Dataproc リソースへのワーカー アクセス権を付与します。サービス アカウント向けです。"}},"roles/metastore.admin":{"permissions":["metastore.backups.*","metastore.imports.*","metastore.locations.*","metastore.operations.*","metastore.services.create","metastore.services.delete","metastore.services.export","metastore.services.get","metastore.services.getIamPolicy","metastore.services.list","metastore.services.restore","metastore.services.setIamPolicy","metastore.services.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataproc Metastore Admin","roleName":"roles/metastore.admin","roleDescription":"Full access to all Dataproc Metastore resources."},"ja":{"roleTitle":"Dataproc Metastore 管理者","roleName":"roles/metastore.admin","roleDescription":"すべての Dataproc Metastore リソースに対する完全アクセス権。"}},"roles/metastore.editor":{"permissions":["metastore.backups.*","metastore.imports.*","metastore.locations.*","metastore.operations.*","metastore.services.create","metastore.services.delete","metastore.services.export","metastore.services.get","metastore.services.getIamPolicy","metastore.services.list","metastore.services.restore","metastore.services.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataproc Metastore Editor","roleName":"roles/metastore.editor","roleDescription":"Read and write access to all Dataproc Metastore resources."},"ja":{"roleTitle":"Dataproc Metastore 編集者","roleName":"roles/metastore.editor","roleDescription":"すべての Dataproc Metastore リソースに対する読み取り / 書き込みアクセス権。"}},"roles/metastore.metadataEditor":{"permissions":["metastore.databases.create","metastore.databases.delete","metastore.databases.get","metastore.databases.getIamPolicy","metastore.databases.list","metastore.databases.update","metastore.services.get","metastore.services.use","metastore.tables.create","metastore.tables.delete","metastore.tables.get","metastore.tables.getIamPolicy","metastore.tables.list","metastore.tables.update"],"en":{"roleTitle":"Dataproc Metastore Metadata Editor","roleName":"roles/metastore.metadataEditor","roleDescription":"Access to read and modify the metadata of databases and tables under those databases."},"ja":{"roleTitle":"Dataproc Metastore メタデータ編集者","roleName":"roles/metastore.metadataEditor","roleDescription":"データベースのメタデータとこれらのデータベースのテーブルの読み取りと変更のアクセス権。"}},"roles/metastore.metadataOperator":{"permissions":["metastore.backups.*","metastore.imports.*","metastore.locations.*","metastore.operations.get","metastore.operations.list","metastore.services.export","metastore.services.get","metastore.services.getIamPolicy","metastore.services.list","metastore.services.restore","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataproc Metastore Metadata Operator","roleName":"roles/metastore.metadataOperator","roleDescription":"Read-only access to Dataproc Metastore resources with additional metadata operations permission."},"ja":{"roleTitle":"Dataproc Metastore メタデータ オペレータ","roleName":"roles/metastore.metadataOperator","roleDescription":"Dataproc Metastore リソースに対する読み取り専用アクセス権と追加のメタデータ オペレーション権限。"}},"roles/metastore.metadataOwner":{"permissions":["metastore.databases.*","metastore.services.get","metastore.services.getIamPolicy","metastore.services.list","metastore.services.use","metastore.tables.*"],"en":{"roleTitle":"Dataproc Metastore Data Owner","roleName":"roles/metastore.metadataOwner","roleDescription":"Full access to the metadata of databases and tables under those databases."},"ja":{"roleTitle":"Dataproc Metastore データオーナー","roleName":"roles/metastore.metadataOwner","roleDescription":"データベースのメタデータとそれらのデータベースにあるテーブルへの完全アクセス権。"}},"roles/metastore.metadataUser":{"permissions":["metastore.databases.get","metastore.databases.list","metastore.services.get","metastore.services.use"],"en":{"roleTitle":"Dataproc Metastore Metadata User","roleName":"roles/metastore.metadataUser","roleDescription":"Access to the Dataproc Metastore gRPC endpoint"},"ja":{"roleTitle":"Dataproc Metastore メタデータ ユーザー","roleName":"roles/metastore.metadataUser","roleDescription":"Dataproc Metastore gRPC エンドポイントへのアクセス権"}},"roles/metastore.metadataViewer":{"permissions":["metastore.databases.get","metastore.databases.getIamPolicy","metastore.databases.list","metastore.services.get","metastore.services.use","metastore.tables.get","metastore.tables.getIamPolicy","metastore.tables.list"],"en":{"roleTitle":"Dataproc Metastore Metadata Viewer","roleName":"roles/metastore.metadataViewer","roleDescription":"Access to read the metadata of databases and tables under those databases"},"ja":{"roleTitle":"Dataproc Metastore メタデータ閲覧者","roleName":"roles/metastore.metadataViewer","roleDescription":"データベースのメタデータとこれらのデータベースのテーブルの読み取りのアクセス権"}},"roles/metastore.user":{"permissions":["metastore.backups.get","metastore.backups.list","metastore.imports.get","metastore.imports.list","metastore.locations.*","metastore.operations.get","metastore.operations.list","metastore.services.export","metastore.services.get","metastore.services.getIamPolicy","metastore.services.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataproc Metastore Viewer","roleName":"roles/metastore.user","roleDescription":"Read-only access to all Dataproc Metastore resources."},"ja":{"roleTitle":"Dataproc Metastore 閲覧者","roleName":"roles/metastore.user","roleDescription":"すべての Dataproc Metastore リソースに対する読み取り専用アクセス権。"}},"roles/datastore.importExportAdmin":{"permissions":["appengine.applications.get","datastore.databases.export","datastore.databases.getMetadata","datastore.databases.import","datastore.operations.cancel","datastore.operations.get","datastore.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Datastore Import Export Admin","roleName":"roles/datastore.importExportAdmin","roleDescription":"Provides full access to manage imports and exports."},"ja":{"roleTitle":"Cloud Datastore インポート / エクスポート管理者","roleName":"roles/datastore.importExportAdmin","roleDescription":"インポートとエクスポートを管理できる完全アクセス権を付与します。"}},"roles/datastore.indexAdmin":{"permissions":["appengine.applications.get","datastore.databases.getMetadata","datastore.indexes.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Datastore Index Admin","roleName":"roles/datastore.indexAdmin","roleDescription":"Provides full access to manage index definitions."},"ja":{"roleTitle":"Cloud Datastore インデックス管理者","roleName":"roles/datastore.indexAdmin","roleDescription":"インデックス定義を管理できる完全アクセス権を付与します。"}},"roles/datastore.keyVisualizerViewer":{"permissions":["datastore.databases.getMetadata","datastore.keyVisualizerScans.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Datastore Key Visualizer Viewer","roleName":"roles/datastore.keyVisualizerViewer","roleDescription":"Full access to Key Visualizer scans."},"ja":{"roleTitle":"Cloud Datastore Key Visualizer 閲覧者","roleName":"roles/datastore.keyVisualizerViewer","roleDescription":"Key Visualizer スキャンに対する完全アクセス権。"}},"roles/datastore.owner":{"permissions":["appengine.applications.get","datastore.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Datastore Owner","roleName":"roles/datastore.owner","roleDescription":"Provides full access to Datastore resources."},"ja":{"roleTitle":"Cloud Datastore オーナー","roleName":"roles/datastore.owner","roleDescription":"Datastore のリソースへの完全アクセス権を付与します。"}},"roles/datastore.user":{"permissions":["appengine.applications.get","datastore.databases.get","datastore.databases.getMetadata","datastore.entities.*","datastore.indexes.list","datastore.namespaces.get","datastore.namespaces.list","datastore.statistics.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Datastore User","roleName":"roles/datastore.user","roleDescription":"Provides read/write access to data in a Datastore database."},"ja":{"roleTitle":"Cloud Datastore ユーザー","roleName":"roles/datastore.user","roleDescription":"Datastore データベース内のデータに対する読み取り / 書き込み権限を付与します。"}},"roles/datastore.viewer":{"permissions":["appengine.applications.get","datastore.databases.get","datastore.databases.getMetadata","datastore.databases.list","datastore.entities.get","datastore.entities.list","datastore.indexes.get","datastore.indexes.list","datastore.namespaces.get","datastore.namespaces.list","datastore.statistics.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Datastore Viewer","roleName":"roles/datastore.viewer","roleDescription":"Provides read access to Datastore resources."},"ja":{"roleTitle":"Cloud Datastore 閲覧者","roleName":"roles/datastore.viewer","roleDescription":"Datastore のリソースへの読み取りアクセス権を付与します。"}},"roles/datastream.admin":{"permissions":["datastream.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Datastream Admin","roleName":"roles/datastream.admin","roleDescription":"Full access to all Datastream resources."},"ja":{"roleTitle":"Datastream 管理者","roleName":"roles/datastream.admin","roleDescription":"すべての Datastream リソースへの完全アクセス権。"}},"roles/datastream.viewer":{"permissions":["datastream.connectionProfiles.destinationTypes","datastream.connectionProfiles.discover","datastream.connectionProfiles.get","datastream.connectionProfiles.getIamPolicy","datastream.connectionProfiles.list","datastream.connectionProfiles.listStaticServiceIps","datastream.connectionProfiles.sourceTypes","datastream.locations.*","datastream.objects.get","datastream.objects.list","datastream.operations.get","datastream.operations.list","datastream.privateConnections.get","datastream.privateConnections.getIamPolicy","datastream.privateConnections.list","datastream.routes.get","datastream.routes.getIamPolicy","datastream.routes.list","datastream.streams.fetchErrors","datastream.streams.get","datastream.streams.getIamPolicy","datastream.streams.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Datastream Viewer","roleName":"roles/datastream.viewer","roleDescription":"Read-only access to all Datastream resources."},"ja":{"roleTitle":"Datastream 閲覧者","roleName":"roles/datastream.viewer","roleDescription":"すべての Datastream リソースに対する読み取り専用アクセス権。"}},"roles/deploymentmanager.editor":{"permissions":["deploymentmanager.compositeTypes.*","deploymentmanager.deployments.cancelPreview","deploymentmanager.deployments.create","deploymentmanager.deployments.delete","deploymentmanager.deployments.get","deploymentmanager.deployments.list","deploymentmanager.deployments.stop","deploymentmanager.deployments.update","deploymentmanager.manifests.*","deploymentmanager.operations.*","deploymentmanager.resources.*","deploymentmanager.typeProviders.*","deploymentmanager.types.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Deployment Manager Editor","roleName":"roles/deploymentmanager.editor","roleDescription":"Provides the permissions necessary to create and manage deployments."},"ja":{"roleTitle":"Deployment Manager 編集者","roleName":"roles/deploymentmanager.editor","roleDescription":"デプロイの作成と管理に必要なアクセス権を付与します。"}},"roles/deploymentmanager.typeEditor":{"permissions":["deploymentmanager.compositeTypes.*","deploymentmanager.operations.get","deploymentmanager.typeProviders.*","deploymentmanager.types.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get"],"en":{"roleTitle":"Deployment Manager Type Editor","roleName":"roles/deploymentmanager.typeEditor","roleDescription":"Provides read and write access to all Type Registry resources."},"ja":{"roleTitle":"Deployment Manager タイプ編集者","roleName":"roles/deploymentmanager.typeEditor","roleDescription":"すべてのタイプ レジストリ リソースに対する読み取り / 書き込みアクセス権を付与します。"}},"roles/deploymentmanager.typeViewer":{"permissions":["deploymentmanager.compositeTypes.get","deploymentmanager.compositeTypes.list","deploymentmanager.typeProviders.get","deploymentmanager.typeProviders.getType","deploymentmanager.typeProviders.list","deploymentmanager.typeProviders.listTypes","deploymentmanager.types.get","deploymentmanager.types.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get"],"en":{"roleTitle":"Deployment Manager Type Viewer","roleName":"roles/deploymentmanager.typeViewer","roleDescription":"Provides read-only access to all Type Registry resources."},"ja":{"roleTitle":"Deployment Manager タイプ閲覧者","roleName":"roles/deploymentmanager.typeViewer","roleDescription":"すべてのタイプ レジストリ リソースに対する読み取り専用アクセス権を付与します。"}},"roles/deploymentmanager.viewer":{"permissions":["deploymentmanager.compositeTypes.get","deploymentmanager.compositeTypes.list","deploymentmanager.deployments.get","deploymentmanager.deployments.list","deploymentmanager.manifests.*","deploymentmanager.operations.*","deploymentmanager.resources.*","deploymentmanager.typeProviders.get","deploymentmanager.typeProviders.getType","deploymentmanager.typeProviders.list","deploymentmanager.typeProviders.listTypes","deploymentmanager.types.get","deploymentmanager.types.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Deployment Manager Viewer","roleName":"roles/deploymentmanager.viewer","roleDescription":"Provides read-only access to all Deployment Manager-related\nresources."},"ja":{"roleTitle":"Deployment Manager 閲覧者","roleName":"roles/deploymentmanager.viewer","roleDescription":"すべての Deployment Manager 関連リソースに対する読み取り専用アクセス権を付与します。"}},"roles/dialogflow.aamAdmin":{"permissions":["dialogflow.agents.export","dialogflow.agents.get","dialogflow.agents.list","dialogflow.agents.search","dialogflow.agents.searchResources","dialogflow.answerrecords.get","dialogflow.answerrecords.list","dialogflow.callMatchers.list","dialogflow.changelogs.*","dialogflow.contexts.get","dialogflow.contexts.list","dialogflow.conversationDatasets.get","dialogflow.conversationDatasets.list","dialogflow.conversationModels.get","dialogflow.conversationModels.list","dialogflow.conversationProfiles.get","dialogflow.conversationProfiles.list","dialogflow.conversations.get","dialogflow.conversations.list","dialogflow.documents.get","dialogflow.documents.list","dialogflow.entityTypes.get","dialogflow.entityTypes.list","dialogflow.environments.get","dialogflow.environments.list","dialogflow.flows.get","dialogflow.flows.list","dialogflow.fulfillments.get","dialogflow.integrations.get","dialogflow.integrations.list","dialogflow.intents.get","dialogflow.intents.list","dialogflow.knowledgeBases.get","dialogflow.knowledgeBases.list","dialogflow.messages.*","dialogflow.modelEvaluations.*","dialogflow.operations.*","dialogflow.pages.get","dialogflow.pages.list","dialogflow.participants.get","dialogflow.participants.list","dialogflow.phoneNumberOrders.get","dialogflow.phoneNumberOrders.list","dialogflow.phoneNumbers.list","dialogflow.securitySettings.get","dialogflow.securitySettings.list","dialogflow.sessionEntityTypes.get","dialogflow.sessionEntityTypes.list","dialogflow.smartMessagingEntries.get","dialogflow.smartMessagingEntries.list","dialogflow.transitionRouteGroups.get","dialogflow.transitionRouteGroups.list","dialogflow.versions.get","dialogflow.versions.list","dialogflow.webhooks.get","dialogflow.webhooks.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"AAM Admin","roleName":"roles/dialogflow.aamAdmin","roleDescription":"An admin has access to all resources and can perform all administrative actions in an AAM project."},"ja":{"roleTitle":"AAM 管理者","roleName":"roles/dialogflow.aamAdmin","roleDescription":"管理者は、すべてのリソースへのアクセス権を持ち、AAM プロジェクトのすべての管理アクションを実行できます。"}},"roles/dialogflow.aamConversationalArchitect":{"permissions":["dialogflow.agents.export","dialogflow.agents.get","dialogflow.agents.list","dialogflow.agents.search","dialogflow.agents.searchResources","dialogflow.answerrecords.get","dialogflow.answerrecords.list","dialogflow.callMatchers.list","dialogflow.changelogs.*","dialogflow.contexts.get","dialogflow.contexts.list","dialogflow.conversationDatasets.get","dialogflow.conversationDatasets.list","dialogflow.conversationModels.get","dialogflow.conversationModels.list","dialogflow.conversationProfiles.get","dialogflow.conversationProfiles.list","dialogflow.conversations.get","dialogflow.conversations.list","dialogflow.documents.get","dialogflow.documents.list","dialogflow.entityTypes.get","dialogflow.entityTypes.list","dialogflow.environments.get","dialogflow.environments.list","dialogflow.flows.get","dialogflow.flows.list","dialogflow.fulfillments.get","dialogflow.integrations.get","dialogflow.integrations.list","dialogflow.intents.get","dialogflow.intents.list","dialogflow.knowledgeBases.get","dialogflow.knowledgeBases.list","dialogflow.messages.*","dialogflow.modelEvaluations.*","dialogflow.operations.*","dialogflow.pages.get","dialogflow.pages.list","dialogflow.participants.get","dialogflow.participants.list","dialogflow.phoneNumberOrders.get","dialogflow.phoneNumberOrders.list","dialogflow.phoneNumbers.list","dialogflow.securitySettings.get","dialogflow.securitySettings.list","dialogflow.sessionEntityTypes.get","dialogflow.sessionEntityTypes.list","dialogflow.smartMessagingEntries.get","dialogflow.smartMessagingEntries.list","dialogflow.transitionRouteGroups.get","dialogflow.transitionRouteGroups.list","dialogflow.versions.get","dialogflow.versions.list","dialogflow.webhooks.get","dialogflow.webhooks.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"AAM Conversational Architect","roleName":"roles/dialogflow.aamConversationalArchitect","roleDescription":"A Conversational Architect can label conversational data, approve taxonomy changes and design virtual agents for a customer's use cases."},"ja":{"roleTitle":"AAM 会話アーキテクト","roleName":"roles/dialogflow.aamConversationalArchitect","roleDescription":"会話アーキテクトは、会話データにラベルを付け、分類の変更を承認し、顧客のユースケース用の仮想エージェントを設計できます。"}},"roles/dialogflow.aamDialogDesigner":{"permissions":["dialogflow.agents.export","dialogflow.agents.get","dialogflow.agents.list","dialogflow.agents.search","dialogflow.agents.searchResources","dialogflow.answerrecords.get","dialogflow.answerrecords.list","dialogflow.callMatchers.list","dialogflow.changelogs.*","dialogflow.contexts.get","dialogflow.contexts.list","dialogflow.conversationDatasets.get","dialogflow.conversationDatasets.list","dialogflow.conversationModels.get","dialogflow.conversationModels.list","dialogflow.conversationProfiles.get","dialogflow.conversationProfiles.list","dialogflow.conversations.get","dialogflow.conversations.list","dialogflow.documents.get","dialogflow.documents.list","dialogflow.entityTypes.get","dialogflow.entityTypes.list","dialogflow.environments.get","dialogflow.environments.list","dialogflow.flows.get","dialogflow.flows.list","dialogflow.fulfillments.get","dialogflow.integrations.get","dialogflow.integrations.list","dialogflow.intents.get","dialogflow.intents.list","dialogflow.knowledgeBases.get","dialogflow.knowledgeBases.list","dialogflow.messages.*","dialogflow.modelEvaluations.*","dialogflow.operations.*","dialogflow.pages.get","dialogflow.pages.list","dialogflow.participants.get","dialogflow.participants.list","dialogflow.phoneNumberOrders.get","dialogflow.phoneNumberOrders.list","dialogflow.phoneNumbers.list","dialogflow.securitySettings.get","dialogflow.securitySettings.list","dialogflow.sessionEntityTypes.get","dialogflow.sessionEntityTypes.list","dialogflow.smartMessagingEntries.get","dialogflow.smartMessagingEntries.list","dialogflow.transitionRouteGroups.get","dialogflow.transitionRouteGroups.list","dialogflow.versions.get","dialogflow.versions.list","dialogflow.webhooks.get","dialogflow.webhooks.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"AAM Dialog Designer","roleName":"roles/dialogflow.aamDialogDesigner","roleDescription":"A Dialog Designer can label conversational data and propose taxonomy changes for virtual agent modeling."},"ja":{"roleTitle":"AAM ダイアログ デザイナー","roleName":"roles/dialogflow.aamDialogDesigner","roleDescription":"ダイアログ デザイナーは、会話データにラベルを付け、仮想エージェントのモデリング用に分類の変更を提案できます。"}},"roles/dialogflow.aamLeadDialogDesigner":{"permissions":["dialogflow.agents.export","dialogflow.agents.get","dialogflow.agents.list","dialogflow.agents.search","dialogflow.agents.searchResources","dialogflow.answerrecords.get","dialogflow.answerrecords.list","dialogflow.callMatchers.list","dialogflow.changelogs.*","dialogflow.contexts.get","dialogflow.contexts.list","dialogflow.conversationDatasets.get","dialogflow.conversationDatasets.list","dialogflow.conversationModels.get","dialogflow.conversationModels.list","dialogflow.conversationProfiles.get","dialogflow.conversationProfiles.list","dialogflow.conversations.get","dialogflow.conversations.list","dialogflow.documents.get","dialogflow.documents.list","dialogflow.entityTypes.get","dialogflow.entityTypes.list","dialogflow.environments.get","dialogflow.environments.list","dialogflow.flows.get","dialogflow.flows.list","dialogflow.fulfillments.get","dialogflow.integrations.get","dialogflow.integrations.list","dialogflow.intents.get","dialogflow.intents.list","dialogflow.knowledgeBases.get","dialogflow.knowledgeBases.list","dialogflow.messages.*","dialogflow.modelEvaluations.*","dialogflow.operations.*","dialogflow.pages.get","dialogflow.pages.list","dialogflow.participants.get","dialogflow.participants.list","dialogflow.phoneNumberOrders.get","dialogflow.phoneNumberOrders.list","dialogflow.phoneNumbers.list","dialogflow.securitySettings.get","dialogflow.securitySettings.list","dialogflow.sessionEntityTypes.get","dialogflow.sessionEntityTypes.list","dialogflow.smartMessagingEntries.get","dialogflow.smartMessagingEntries.list","dialogflow.transitionRouteGroups.get","dialogflow.transitionRouteGroups.list","dialogflow.versions.get","dialogflow.versions.list","dialogflow.webhooks.get","dialogflow.webhooks.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"AAM Lead Dialog Designer","roleName":"roles/dialogflow.aamLeadDialogDesigner","roleDescription":"A Dialog Designer Lead can label conversational data and approve taxonomy changes for virtual agent modeling."},"ja":{"roleTitle":"AAM リード ダイアログ デザイナー","roleName":"roles/dialogflow.aamLeadDialogDesigner","roleDescription":"リード ダイアログ デザイナーは、会話データにラベルを付け、仮想エージェントのモデリング用に分類の変更を承認できます。"}},"roles/dialogflow.aamViewer":{"permissions":["dialogflow.agents.export","dialogflow.agents.get","dialogflow.agents.list","dialogflow.agents.search","dialogflow.agents.searchResources","dialogflow.answerrecords.get","dialogflow.answerrecords.list","dialogflow.callMatchers.list","dialogflow.changelogs.*","dialogflow.contexts.get","dialogflow.contexts.list","dialogflow.conversationDatasets.get","dialogflow.conversationDatasets.list","dialogflow.conversationModels.get","dialogflow.conversationModels.list","dialogflow.conversationProfiles.get","dialogflow.conversationProfiles.list","dialogflow.conversations.get","dialogflow.conversations.list","dialogflow.documents.get","dialogflow.documents.list","dialogflow.entityTypes.get","dialogflow.entityTypes.list","dialogflow.environments.get","dialogflow.environments.list","dialogflow.flows.get","dialogflow.flows.list","dialogflow.fulfillments.get","dialogflow.integrations.get","dialogflow.integrations.list","dialogflow.intents.get","dialogflow.intents.list","dialogflow.knowledgeBases.get","dialogflow.knowledgeBases.list","dialogflow.messages.*","dialogflow.modelEvaluations.*","dialogflow.operations.*","dialogflow.pages.get","dialogflow.pages.list","dialogflow.participants.get","dialogflow.participants.list","dialogflow.phoneNumberOrders.get","dialogflow.phoneNumberOrders.list","dialogflow.phoneNumbers.list","dialogflow.securitySettings.get","dialogflow.securitySettings.list","dialogflow.sessionEntityTypes.get","dialogflow.sessionEntityTypes.list","dialogflow.smartMessagingEntries.get","dialogflow.smartMessagingEntries.list","dialogflow.transitionRouteGroups.get","dialogflow.transitionRouteGroups.list","dialogflow.versions.get","dialogflow.versions.list","dialogflow.webhooks.get","dialogflow.webhooks.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"AAM Viewer","roleName":"roles/dialogflow.aamViewer","roleDescription":"A user can view the taxonomy and data reports in an AAM project."},"ja":{"roleTitle":"AAM 閲覧者","roleName":"roles/dialogflow.aamViewer","roleDescription":"ユーザーは、AAM プロジェクト内の分類とデータレポートを閲覧できます。"}},"roles/dialogflow.admin":{"permissions":["dialogflow.*","resourcemanager.projects.get"],"en":{"roleTitle":"Dialogflow API Admin","roleName":"roles/dialogflow.admin","roleDescription":"Grant to Dialogflow API admins\nthat need full access to Dialogflow-specific resources.\nAlso see\nDialogflow access control."},"ja":{"roleTitle":"Dialogflow API 管理者","roleName":"roles/dialogflow.admin","roleDescription":"Dialogflow 固有のリソースへの完全アクセス権が必要な Dialogflow API 管理者に付与します。Dialogflow アクセス制御もご覧ください。"}},"roles/dialogflow.client":{"permissions":["dialogflow.contexts.*","dialogflow.conversations.*","dialogflow.messages.*","dialogflow.participants.*","dialogflow.sessionEntityTypes.*","dialogflow.sessions.*"],"en":{"roleTitle":"Dialogflow API Client","roleName":"roles/dialogflow.client","roleDescription":"Grant to Dialogflow API clients\nthat perform Dialogflow-specific edits and detect intent calls\nusing the API.\nAlso see\nDialogflow access control."},"ja":{"roleTitle":"Dialogflow API クライアント","roleName":"roles/dialogflow.client","roleDescription":"API を使用して Dialogflow 固有の編集を実行し、インテント呼び出しを検出する Dialogflow API クライアントに付与します。Dialogflow アクセス制御もご覧ください。"}},"roles/dialogflow.consoleAgentEditor":{"permissions":["actions.agentVersions.create","dialogflow.*","resourcemanager.projects.get"],"en":{"roleTitle":"Dialogflow Console Agent Editor","roleName":"roles/dialogflow.consoleAgentEditor","roleDescription":"Grant to Dialogflow Console editors\nthat edit existing agents.\nAlso see\nDialogflow access control."},"ja":{"roleTitle":"Dialogflow コンソール エージェント編集者","roleName":"roles/dialogflow.consoleAgentEditor","roleDescription":"既存のエージェントを編集する Dialogflow コンソール編集者に付与します。Dialogflow アクセス制御もご覧ください。"}},"roles/dialogflow.consoleSimulatorUser":{"permissions":["dialogflow.conversationModels.get","dialogflow.conversationModels.list","dialogflow.conversationProfiles.get","dialogflow.conversationProfiles.list","dialogflow.conversations.*","dialogflow.documents.get","dialogflow.documents.list","dialogflow.knowledgeBases.get","dialogflow.knowledgeBases.list","dialogflow.participants.*","dialogflow.sessions.detectIntent","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dialogflow Console Simulator User","roleName":"roles/dialogflow.consoleSimulatorUser","roleDescription":"Can perform query of dialogflow suggestions in the simulator in web console."},"ja":{"roleTitle":"Dialogflow コンソール シミュレータ ユーザー","roleName":"roles/dialogflow.consoleSimulatorUser","roleDescription":"ウェブ コンソールのシミュレータで、Dialogflow の候補のクエリを実行できます。"}},"roles/dialogflow.consoleSmartMessagingAllowlistEditor":{"permissions":["dialogflow.conversationDatasets.get","dialogflow.conversationDatasets.list","dialogflow.conversationModels.get","dialogflow.conversationModels.list","dialogflow.conversationProfiles.list","dialogflow.documents.get","dialogflow.documents.list","dialogflow.operations.*","dialogflow.smartMessagingEntries.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dialogflow Console Smart Messaging Allowlist Editor","roleName":"roles/dialogflow.consoleSmartMessagingAllowlistEditor","roleDescription":"Can edit allowlist for smart messaging associated with conversation model in the agent assist console"},"ja":{"roleTitle":"Dialogflow コンソール スマート メッセージ許可リスト編集者","roleName":"roles/dialogflow.consoleSmartMessagingAllowlistEditor","roleDescription":"Agent Assist コンソールで、会話モデルに関連付けられたスマート メッセージの許可リストを編集できます。"}},"roles/dialogflow.conversationManager":{"permissions":["dialogflow.conversationProfiles.*","dialogflow.conversations.*","dialogflow.participants.*"],"en":{"roleTitle":"Dialogflow Conversation Manager","roleName":"roles/dialogflow.conversationManager","roleDescription":"Can manage all the resources related to Dialogflow Conversations."},"ja":{"roleTitle":"Dialogflow 会話マネージャー","roleName":"roles/dialogflow.conversationManager","roleDescription":"Dialogflow の会話に関するすべてのリソースを管理できます。"}},"roles/dialogflow.entityTypeAdmin":{"permissions":["dialogflow.entityTypes.*"],"en":{"roleTitle":"Dialogflow Entity Type Admin","roleName":"roles/dialogflow.entityTypeAdmin","roleDescription":"Can read & write entity types."},"ja":{"roleTitle":"Dialogflow エンティティ タイプ管理者","roleName":"roles/dialogflow.entityTypeAdmin","roleDescription":"エンティティ タイプの読み取りと書き込みを行うことができます。"}},"roles/dialogflow.environmentEditor":{"permissions":["dialogflow.environments.get","dialogflow.environments.getHistory","dialogflow.environments.list","dialogflow.environments.lookupHistory","dialogflow.environments.update"],"en":{"roleTitle":"Dialogflow Environment editor","roleName":"roles/dialogflow.environmentEditor","roleDescription":"Can read & update environment and its sub-resources."},"ja":{"roleTitle":"Dialogflow 環境編集者","roleName":"roles/dialogflow.environmentEditor","roleDescription":"環境とそのサブリソースの読み取りと更新を行うことができます。"}},"roles/dialogflow.flowEditor":{"permissions":["dialogflow.flows.get","dialogflow.flows.list","dialogflow.flows.train","dialogflow.flows.update","dialogflow.flows.validate","dialogflow.pages.*","dialogflow.transitionRouteGroups.*","dialogflow.versions.*"],"en":{"roleTitle":"Dialogflow Flow editor","roleName":"roles/dialogflow.flowEditor","roleDescription":"Can read & update flow and its sub-resources."},"ja":{"roleTitle":"Dialogflow フロー編集者","roleName":"roles/dialogflow.flowEditor","roleDescription":"フローとそのサブリソースの読み取りと更新を行うことができます。"}},"roles/dialogflow.integrationManager":{"permissions":["dialogflow.integrations.*"],"en":{"roleTitle":"Dialogflow Integration Manager","roleName":"roles/dialogflow.integrationManager","roleDescription":"Can add, remove, enable and disable Dialogflow integrations."},"ja":{"roleTitle":"Dialogflow 統合マネージャー","roleName":"roles/dialogflow.integrationManager","roleDescription":"Dialogflow 統合を追加、削除、有効化、無効化できます。"}},"roles/dialogflow.intentAdmin":{"permissions":["dialogflow.intents.*"],"en":{"roleTitle":"Dialogflow Intent Admin","roleName":"roles/dialogflow.intentAdmin","roleDescription":"Can read & write intents."},"ja":{"roleTitle":"Dialogflow インテント管理者","roleName":"roles/dialogflow.intentAdmin","roleDescription":"インテントの読み取りと書き込みを行うことができます。"}},"roles/dialogflow.reader":{"permissions":["dialogflow.agents.export","dialogflow.agents.get","dialogflow.agents.list","dialogflow.agents.search","dialogflow.agents.searchResources","dialogflow.answerrecords.get","dialogflow.answerrecords.list","dialogflow.callMatchers.list","dialogflow.changelogs.*","dialogflow.contexts.get","dialogflow.contexts.list","dialogflow.conversationDatasets.get","dialogflow.conversationDatasets.list","dialogflow.conversationModels.get","dialogflow.conversationModels.list","dialogflow.conversationProfiles.get","dialogflow.conversationProfiles.list","dialogflow.conversations.get","dialogflow.conversations.list","dialogflow.documents.get","dialogflow.documents.list","dialogflow.entityTypes.get","dialogflow.entityTypes.list","dialogflow.environments.get","dialogflow.environments.list","dialogflow.flows.get","dialogflow.flows.list","dialogflow.fulfillments.get","dialogflow.integrations.get","dialogflow.integrations.list","dialogflow.intents.get","dialogflow.intents.list","dialogflow.knowledgeBases.get","dialogflow.knowledgeBases.list","dialogflow.messages.*","dialogflow.modelEvaluations.*","dialogflow.operations.*","dialogflow.pages.get","dialogflow.pages.list","dialogflow.participants.get","dialogflow.participants.list","dialogflow.phoneNumberOrders.get","dialogflow.phoneNumberOrders.list","dialogflow.phoneNumbers.list","dialogflow.securitySettings.get","dialogflow.securitySettings.list","dialogflow.sessionEntityTypes.get","dialogflow.sessionEntityTypes.list","dialogflow.smartMessagingEntries.get","dialogflow.smartMessagingEntries.list","dialogflow.transitionRouteGroups.get","dialogflow.transitionRouteGroups.list","dialogflow.versions.get","dialogflow.versions.list","dialogflow.webhooks.get","dialogflow.webhooks.list","resourcemanager.projects.get"],"en":{"roleTitle":"Dialogflow API Reader","roleName":"roles/dialogflow.reader","roleDescription":"Grant to Dialogflow API clients\nthat perform Dialogflow-specific read-only calls\nusing the API.\nAlso see\nDialogflow access control."},"ja":{"roleTitle":"Dialogflow API 読み取り","roleName":"roles/dialogflow.reader","roleDescription":"API を使用して Dialogflow 固有の読み取り専用呼び出しを実行する Dialogflow API クライアントに付与します。Dialogflow アクセス制御もご覧ください。"}},"roles/dialogflow.testCaseAdmin":{"permissions":[""],"en":{"roleTitle":"Dialogflow Test Case Admin","roleName":"roles/dialogflow.testCaseAdmin","roleDescription":"Can read & write test cases."},"ja":{"roleTitle":"Dialogflow テストケース管理者","roleName":"roles/dialogflow.testCaseAdmin","roleDescription":"テストケースの読み取りと書き込みを行うことができます。"}},"roles/dialogflow.webhookAdmin":{"permissions":["dialogflow.webhooks.*"],"en":{"roleTitle":"Dialogflow Webhook Admin","roleName":"roles/dialogflow.webhookAdmin","roleDescription":"Can read & write webhooks."},"ja":{"roleTitle":"Dialogflow Webhook 管理者","roleName":"roles/dialogflow.webhookAdmin","roleDescription":"Webhook の読み取りと書き込みを行うことができます。"}},"roles/dns.admin":{"permissions":["compute.networks.get","compute.networks.list","dns.changes.*","dns.dnsKeys.*","dns.managedZoneOperations.*","dns.managedZones.*","dns.networks.*","dns.policies.create","dns.policies.delete","dns.policies.get","dns.policies.list","dns.policies.update","dns.projects.*","dns.resourceRecordSets.*","dns.responsePolicies.*","dns.responsePolicyRules.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"DNS Administrator","roleName":"roles/dns.admin","roleDescription":"Provides read-write access to all Cloud DNS resources."},"ja":{"roleTitle":"DNS 管理者","roleName":"roles/dns.admin","roleDescription":"すべての Cloud DNS リソースへの読み取り / 書き込みアクセス権を付与します。"}},"roles/dns.peer":{"permissions":["dns.networks.targetWithPeeringZone"],"en":{"roleTitle":"DNS Peer","roleName":"roles/dns.peer","roleDescription":"Access to target networks with DNS peering zones"},"ja":{"roleTitle":"DNS ピア","roleName":"roles/dns.peer","roleDescription":"DNS ピアリング ゾーンを持つターゲット ネットワークへのアクセス権。"}},"roles/dns.reader":{"permissions":["compute.networks.get","dns.changes.get","dns.changes.list","dns.dnsKeys.*","dns.managedZoneOperations.*","dns.managedZones.get","dns.managedZones.list","dns.policies.get","dns.policies.list","dns.projects.*","dns.resourceRecordSets.get","dns.resourceRecordSets.list","dns.responsePolicies.get","dns.responsePolicies.list","dns.responsePolicyRules.get","dns.responsePolicyRules.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"DNS Reader","roleName":"roles/dns.reader","roleDescription":"Provides read-only access to all Cloud DNS resources."},"ja":{"roleTitle":"DNS 読み取り","roleName":"roles/dns.reader","roleDescription":"すべての Cloud DNS リソースへの読み取り専用アクセス権を付与します。"}},"roles/documentai.admin":{"permissions":["documentai.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Document AI Administrator.","roleName":"roles/documentai.admin","roleDescription":"Grants full access to all resources in Document AI"},"ja":{"roleTitle":"Document AI 管理者。","roleName":"roles/documentai.admin","roleDescription":"Document AI 内のすべてのリソースに対する完全アクセス権を付与します。"}},"roles/documentai.apiUser":{"permissions":["documentai.humanReviewConfigs.review","documentai.operations.*","documentai.processorVersions.processBatch","documentai.processorVersions.processOnline","documentai.processors.processBatch","documentai.processors.processOnline"],"en":{"roleTitle":"Document AI API User","roleName":"roles/documentai.apiUser","roleDescription":"Grants access to process documents in Document AI"},"ja":{"roleTitle":"Document AI API ユーザー","roleName":"roles/documentai.apiUser","roleDescription":"Document AI 内のドキュメントを処理するためのアクセス権を付与します。"}},"roles/documentai.editor":{"permissions":["documentai.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Document AI Editor","roleName":"roles/documentai.editor","roleDescription":"Grants access to use all resources in Document AI"},"ja":{"roleTitle":"Document AI 編集者","roleName":"roles/documentai.editor","roleDescription":"Document AI 内のすべてのリソースを使用するためのアクセス権を付与します。"}},"roles/documentai.viewer":{"permissions":["documentai.datasetSchemas.get","documentai.datasets.get","documentai.evaluations.get","documentai.evaluations.list","documentai.humanReviewConfigs.get","documentai.humanReviewConfigs.review","documentai.labelerPools.get","documentai.labelerPools.list","documentai.locations.*","documentai.operations.*","documentai.processorTypes.*","documentai.processorVersions.get","documentai.processorVersions.list","documentai.processorVersions.processBatch","documentai.processorVersions.processOnline","documentai.processors.fetchHumanReviewDetails","documentai.processors.get","documentai.processors.list","documentai.processors.processBatch","documentai.processors.processOnline","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Document AI Viewer","roleName":"roles/documentai.viewer","roleDescription":"Grants access to view all resources and process documents in Document AI"},"ja":{"roleTitle":"Document AI 閲覧者","roleName":"roles/documentai.viewer","roleDescription":"Document AI 内のすべてのリソースを表示し、ドキュメントを処理するためのアクセス権を付与します。"}},"roles/earthengine.admin":{"permissions":["earthengine.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Earth Engine Resource Admin","roleName":"roles/earthengine.admin","roleDescription":"Full access to all Earth Engine resource features"},"ja":{"roleTitle":"Earth Engine リソース管理者","roleName":"roles/earthengine.admin","roleDescription":"すべての Earth Engine リソース機能に対する完全アクセス権"}},"roles/earthengine.appsPublisher":{"permissions":["iam.serviceAccounts.create","iam.serviceAccounts.disable","iam.serviceAccounts.enable","iam.serviceAccounts.get","iam.serviceAccounts.getIamPolicy","iam.serviceAccounts.setIamPolicy","resourcemanager.projects.get","serviceusage.services.get"],"en":{"roleTitle":"Earth Engine Apps Publisher","roleName":"roles/earthengine.appsPublisher","roleDescription":"Publisher of Earth Engine Apps"},"ja":{"roleTitle":"Earth Engine アプリ パブリッシャー","roleName":"roles/earthengine.appsPublisher","roleDescription":"Earth Engine アプリのパブリッシャー"}},"roles/earthengine.viewer":{"permissions":["earthengine.assets.get","earthengine.assets.getIamPolicy","earthengine.assets.list","earthengine.computations.*","earthengine.filmstripthumbnails.get","earthengine.maps.get","earthengine.operations.get","earthengine.operations.list","earthengine.tables.get","earthengine.thumbnails.get","earthengine.videothumbnails.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Earth Engine Resource Viewer","roleName":"roles/earthengine.viewer","roleDescription":"Viewer of all Earth Engine resources"},"ja":{"roleTitle":"Earth Engine リソース閲覧者","roleName":"roles/earthengine.viewer","roleDescription":"すべての Earth Engine リソースの閲覧者"}},"roles/earthengine.writer":{"permissions":["earthengine.assets.create","earthengine.assets.delete","earthengine.assets.get","earthengine.assets.getIamPolicy","earthengine.assets.list","earthengine.assets.update","earthengine.computations.*","earthengine.exports.*","earthengine.filmstripthumbnails.*","earthengine.imports.*","earthengine.maps.*","earthengine.operations.*","earthengine.tables.*","earthengine.thumbnails.*","earthengine.videothumbnails.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Earth Engine Resource Writer","roleName":"roles/earthengine.writer","roleDescription":"Writer of all Earth Engine resources"},"ja":{"roleTitle":"Earth Engine リソース書き込み","roleName":"roles/earthengine.writer","roleDescription":"すべての Earth Engine リソースの書き込み"}},"roles/edgecontainer.admin":{"permissions":["edgecontainer.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Edge Container Admin","roleName":"roles/edgecontainer.admin","roleDescription":"Full access to Edge Container all resources."},"ja":{"roleTitle":"Edge コンテナ管理者","roleName":"roles/edgecontainer.admin","roleDescription":"Edge コンテナのすべてのリソースに対する完全アクセス権。"}},"roles/edgecontainer.machineUser":{"permissions":["edgecontainer.machines.get","edgecontainer.machines.getIamPolicy","edgecontainer.machines.list","edgecontainer.machines.use","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Edge Container Machine User","roleName":"roles/edgecontainer.machineUser","roleDescription":"Access to use Edge Container Machine resources."},"ja":{"roleTitle":"Edge コンテナマシン ユーザー","roleName":"roles/edgecontainer.machineUser","roleDescription":"Edge コンテナマシンのリソースを使用するためのアクセス権。"}},"roles/edgecontainer.viewer":{"permissions":["edgecontainer.clusters.generateAccessToken","edgecontainer.clusters.get","edgecontainer.clusters.getIamPolicy","edgecontainer.clusters.list","edgecontainer.locations.*","edgecontainer.machines.get","edgecontainer.machines.getIamPolicy","edgecontainer.machines.list","edgecontainer.nodePools.get","edgecontainer.nodePools.getIamPolicy","edgecontainer.nodePools.list","edgecontainer.operations.get","edgecontainer.operations.list","edgecontainer.vpnConnections.get","edgecontainer.vpnConnections.getIamPolicy","edgecontainer.vpnConnections.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Edge Container Viewer","roleName":"roles/edgecontainer.viewer","roleDescription":"Read-only access to Edge Container all resources."},"ja":{"roleTitle":"Edge コンテナ閲覧者","roleName":"roles/edgecontainer.viewer","roleDescription":"Edge コンテナのすべてのリソースに対する読み取り専用アクセス権。"}},"roles/endpoints.portalAdmin":{"permissions":["endpoints.*","resourcemanager.projects.get","resourcemanager.projects.list","servicemanagement.services.get"],"en":{"roleTitle":"Endpoints Portal Admin","roleName":"roles/endpoints.portalAdmin","roleDescription":"Provides all permissions needed to add, view, and delete custom domains\non the Endpoints > Developer Portal page in the Cloud Console. On\na portal created for an API, provides the permission to change settings on\nthe Site Wide tab on the Settings page."},"ja":{"roleTitle":"Endpoints Portal 管理者","roleName":"roles/endpoints.portalAdmin","roleDescription":"Cloud Console の [エンドポイント] > [デベロッパー ポータル] ページでカスタム ドメインを追加、表示、削除するのに必要なすべての権限を付与します。API 用に作成されたポータルで、[設定] ページの [サイト全体] タブで設定を変更するための権限を付与します。"}},"roles/errorreporting.admin":{"permissions":["cloudnotifications.*","errorreporting.*","logging.notificationRules.*","resourcemanager.projects.get","resourcemanager.projects.list","stackdriver.projects.get"],"en":{"roleTitle":"Error Reporting Admin","roleName":"roles/errorreporting.admin","roleDescription":"Provides full access to Error Reporting data."},"ja":{"roleTitle":"Error Reporting 管理者","roleName":"roles/errorreporting.admin","roleDescription":"Error Reporting データへの完全アクセス権を付与します。"}},"roles/errorreporting.user":{"permissions":["cloudnotifications.*","errorreporting.applications.*","errorreporting.errorEvents.delete","errorreporting.errorEvents.list","errorreporting.groupMetadata.*","errorreporting.groups.*","logging.notificationRules.*","resourcemanager.projects.get","resourcemanager.projects.list","stackdriver.projects.get"],"en":{"roleTitle":"Error Reporting User","roleName":"roles/errorreporting.user","roleDescription":"Provides the permissions to read and write Error Reporting data, except\nfor sending new error events."},"ja":{"roleTitle":"Error Reporting ユーザー","roleName":"roles/errorreporting.user","roleDescription":"Error Reporting データを読み書きする権限(新しいエラーイベントの送信を除く)を付与します。"}},"roles/errorreporting.viewer":{"permissions":["cloudnotifications.*","errorreporting.applications.*","errorreporting.errorEvents.list","errorreporting.groupMetadata.get","errorreporting.groups.*","logging.notificationRules.get","logging.notificationRules.list","resourcemanager.projects.get","resourcemanager.projects.list","stackdriver.projects.get"],"en":{"roleTitle":"Error Reporting Viewer","roleName":"roles/errorreporting.viewer","roleDescription":"Provides read-only access to Error Reporting data."},"ja":{"roleTitle":"Error Reporting 閲覧者","roleName":"roles/errorreporting.viewer","roleDescription":"Error Reporting データに対する読み取り専用権限を付与します。"}},"roles/errorreporting.writer":{"permissions":["errorreporting.errorEvents.create"],"en":{"roleTitle":"Error Reporting Writer","roleName":"roles/errorreporting.writer","roleDescription":"Provides the permissions to send error events to Error Reporting."},"ja":{"roleTitle":"Error Reporting 書き込み","roleName":"roles/errorreporting.writer","roleDescription":"Reporting にエラーイベントを送信する権限を付与します。"}},"roles/eventarc.admin":{"permissions":["eventarc.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Eventarc Admin","roleName":"roles/eventarc.admin","roleDescription":"Full control over all Eventarc resources."},"ja":{"roleTitle":"Eventarc 管理者","roleName":"roles/eventarc.admin","roleDescription":"すべての Eventarc リソースに対する完全アクセス権。"}},"roles/eventarc.developer":{"permissions":["eventarc.locations.*","eventarc.operations.*","eventarc.triggers.create","eventarc.triggers.delete","eventarc.triggers.get","eventarc.triggers.getIamPolicy","eventarc.triggers.list","eventarc.triggers.undelete","eventarc.triggers.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Eventarc Developer","roleName":"roles/eventarc.developer","roleDescription":"Access to read and write Eventarc resources."},"ja":{"roleTitle":"Eventarc デベロッパー","roleName":"roles/eventarc.developer","roleDescription":"Eventarc リソースの読み取りと書き込みを行うためのアクセス権。"}},"roles/eventarc.eventReceiver":{"permissions":["eventarc.events.*"],"en":{"roleTitle":"Eventarc Event Receiver","roleName":"roles/eventarc.eventReceiver","roleDescription":"Can receive events from all event providers."},"ja":{"roleTitle":"Eventarc イベント受信者","roleName":"roles/eventarc.eventReceiver","roleDescription":"すべてのイベント プロバイダからイベントを受信できます。"}},"roles/eventarc.viewer":{"permissions":["eventarc.locations.*","eventarc.operations.get","eventarc.operations.list","eventarc.providers.*","eventarc.triggers.get","eventarc.triggers.getIamPolicy","eventarc.triggers.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Eventarc Viewer","roleName":"roles/eventarc.viewer","roleDescription":"Can view the state of all Eventarc resources, including IAM policies."},"ja":{"roleTitle":"Eventarc 閲覧者","roleName":"roles/eventarc.viewer","roleDescription":"IAM ポリシーを含む、すべての Eventarc リソースの状態を表示できます。"}},"roles/firebase.admin":{"permissions":["apikeys.keys.get","apikeys.keys.list","apikeys.keys.lookup","appengine.applications.get","automl.*","clientauthconfig.brands.get","clientauthconfig.brands.list","clientauthconfig.brands.update","clientauthconfig.clients.create","clientauthconfig.clients.delete","clientauthconfig.clients.get","clientauthconfig.clients.list","clientauthconfig.clients.update","cloudbuild.builds.get","cloudbuild.builds.list","cloudconfig.*","cloudfunctions.*","cloudmessaging.*","cloudnotifications.*","cloudtestservice.*","cloudtoolresults.*","datastore.*","errorreporting.groups.*","eventarc.*","fcmdata.*","firebase.*","firebaseabt.*","firebaseanalytics.*","firebaseappcheck.*","firebaseappdistro.*","firebaseauth.*","firebasecrash.*","firebasecrashlytics.*","firebasedatabase.*","firebasedynamiclinks.*","firebaseextensions.*","firebasehosting.*","firebaseinappmessaging.*","firebaseml.*","firebasenotifications.*","firebaseperformance.*","firebasepredictions.*","firebaserules.*","firebasestorage.*","logging.logEntries.list","monitoring.timeSeries.list","orgpolicy.policy.get","recommender.locations.*","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","run.*","runtimeconfig.configs.create","runtimeconfig.configs.delete","runtimeconfig.configs.get","runtimeconfig.configs.list","runtimeconfig.configs.update","runtimeconfig.operations.*","runtimeconfig.variables.create","runtimeconfig.variables.delete","runtimeconfig.variables.get","runtimeconfig.variables.list","runtimeconfig.variables.update","runtimeconfig.variables.watch","runtimeconfig.waiters.create","runtimeconfig.waiters.delete","runtimeconfig.waiters.get","runtimeconfig.waiters.list","runtimeconfig.waiters.update","serviceusage.operations.get","serviceusage.operations.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.buckets.*","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Firebase Admin","roleName":"roles/firebase.admin","roleDescription":"Full access to Firebase products."},"ja":{"roleTitle":"Firebase 管理者","roleName":"roles/firebase.admin","roleDescription":"Firebase プロダクトに対する完全アクセス権。"}},"roles/firebase.analyticsAdmin":{"permissions":["cloudnotifications.*","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.links.list","firebase.playLinks.get","firebase.playLinks.list","firebase.projects.get","firebaseanalytics.*","firebaseextensions.configs.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Analytics Admin","roleName":"roles/firebase.analyticsAdmin","roleDescription":"Full access to Google Analytics for Firebase."},"ja":{"roleTitle":"Firebase 向け Google アナリティクス管理者","roleName":"roles/firebase.analyticsAdmin","roleDescription":"Firebase 向け Google アナリティクスに対する完全アクセス権。"}},"roles/firebase.analyticsViewer":{"permissions":["cloudnotifications.*","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.links.list","firebase.playLinks.get","firebase.playLinks.list","firebase.projects.get","firebaseanalytics.resources.googleAnalyticsReadAndAnalyze","firebaseextensions.configs.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Analytics Viewer","roleName":"roles/firebase.analyticsViewer","roleDescription":"Read access to Google Analytics for Firebase."},"ja":{"roleTitle":"Firebase 向け Google アナリティクス閲覧者","roleName":"roles/firebase.analyticsViewer","roleDescription":"Firebase 向け Google アナリティクスに対する読み取りアクセス権。"}},"roles/firebase.developAdmin":{"permissions":["apikeys.keys.get","apikeys.keys.list","apikeys.keys.lookup","appengine.applications.get","automl.*","clientauthconfig.brands.get","clientauthconfig.brands.list","clientauthconfig.brands.update","clientauthconfig.clients.get","clientauthconfig.clients.list","cloudbuild.builds.get","cloudbuild.builds.list","cloudfunctions.*","cloudnotifications.*","datastore.*","errorreporting.groups.*","eventarc.*","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.links.list","firebase.playLinks.get","firebase.playLinks.list","firebase.projects.get","firebaseanalytics.*","firebaseappcheck.*","firebaseauth.*","firebasedatabase.*","firebaseextensions.configs.list","firebasehosting.*","firebaseml.*","firebaserules.*","firebasestorage.*","logging.logEntries.list","monitoring.timeSeries.list","orgpolicy.policy.get","recommender.locations.*","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","run.*","runtimeconfig.configs.create","runtimeconfig.configs.delete","runtimeconfig.configs.get","runtimeconfig.configs.list","runtimeconfig.configs.update","runtimeconfig.operations.*","runtimeconfig.variables.create","runtimeconfig.variables.delete","runtimeconfig.variables.get","runtimeconfig.variables.list","runtimeconfig.variables.update","runtimeconfig.variables.watch","runtimeconfig.waiters.create","runtimeconfig.waiters.delete","runtimeconfig.waiters.get","runtimeconfig.waiters.list","runtimeconfig.waiters.update","serviceusage.operations.get","serviceusage.operations.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.buckets.*","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Firebase Develop Admin","roleName":"roles/firebase.developAdmin","roleDescription":"Full access to Firebase Develop products and Analytics."},"ja":{"roleTitle":"Firebase Develop 管理者","roleName":"roles/firebase.developAdmin","roleDescription":"Firebase Develop プロダクトとアナリティクスに対する完全アクセス権。"}},"roles/firebase.developViewer":{"permissions":["automl.annotationSpecs.get","automl.annotationSpecs.list","automl.annotations.list","automl.columnSpecs.get","automl.columnSpecs.list","automl.datasets.get","automl.datasets.list","automl.examples.get","automl.examples.list","automl.humanAnnotationTasks.get","automl.humanAnnotationTasks.list","automl.locations.get","automl.locations.list","automl.modelEvaluations.get","automl.modelEvaluations.list","automl.models.get","automl.models.list","automl.operations.get","automl.operations.list","automl.tableSpecs.get","automl.tableSpecs.list","clientauthconfig.brands.get","clientauthconfig.brands.list","cloudbuild.builds.get","cloudbuild.builds.list","cloudfunctions.functions.get","cloudfunctions.functions.list","cloudfunctions.locations.*","cloudfunctions.operations.*","cloudfunctions.runtimes.*","cloudnotifications.*","datastore.databases.get","datastore.databases.getIamPolicy","datastore.databases.getMetadata","datastore.databases.list","datastore.entities.get","datastore.entities.list","datastore.indexes.get","datastore.indexes.list","datastore.namespaces.get","datastore.namespaces.getIamPolicy","datastore.namespaces.list","datastore.statistics.*","errorreporting.groups.*","eventarc.locations.*","eventarc.operations.get","eventarc.operations.list","eventarc.providers.*","eventarc.triggers.get","eventarc.triggers.getIamPolicy","eventarc.triggers.list","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.links.list","firebase.playLinks.get","firebase.playLinks.list","firebase.projects.get","firebaseanalytics.resources.googleAnalyticsReadAndAnalyze","firebaseappcheck.appAttestConfig.get","firebaseappcheck.debugTokens.get","firebaseappcheck.deviceCheckConfig.get","firebaseappcheck.recaptchaConfig.get","firebaseappcheck.recaptchaEnterpriseConfig.get","firebaseappcheck.safetyNetConfig.get","firebaseappcheck.services.get","firebaseauth.configs.get","firebaseauth.users.get","firebasedatabase.instances.get","firebasedatabase.instances.list","firebaseextensions.configs.list","firebasehosting.sites.get","firebasehosting.sites.list","firebaseml.compressionjobs.get","firebaseml.compressionjobs.list","firebaseml.models.get","firebaseml.models.list","firebaseml.modelversions.get","firebaseml.modelversions.list","firebaserules.releases.get","firebaserules.releases.list","firebaserules.rulesets.get","firebaserules.rulesets.list","firebasestorage.buckets.get","firebasestorage.buckets.list","logging.logEntries.list","monitoring.timeSeries.list","recommender.locations.*","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","run.configurations.*","run.locations.*","run.operations.get","run.operations.list","run.revisions.get","run.revisions.list","run.routes.get","run.routes.list","run.services.get","run.services.getIamPolicy","run.services.list","run.services.listEffectiveTags","run.services.listTagBindings","serviceusage.operations.get","serviceusage.operations.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.buckets.get","storage.buckets.getIamPolicy","storage.buckets.list","storage.objects.get","storage.objects.getIamPolicy","storage.objects.list"],"en":{"roleTitle":"Firebase Develop Viewer","roleName":"roles/firebase.developViewer","roleDescription":"Read access to Firebase Develop products and Analytics."},"ja":{"roleTitle":"Firebase Develop 閲覧者","roleName":"roles/firebase.developViewer","roleDescription":"Firebase Develop プロダクトとアナリティクスに対する読み取りアクセス権。"}},"roles/firebase.growthAdmin":{"permissions":["clientauthconfig.clients.get","clientauthconfig.clients.list","cloudconfig.*","cloudmessaging.*","cloudnotifications.*","fcmdata.*","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.links.list","firebase.playLinks.get","firebase.playLinks.list","firebase.projects.get","firebaseabt.*","firebaseanalytics.*","firebasedynamiclinks.*","firebaseextensions.configs.list","firebaseinappmessaging.*","firebasenotifications.*","firebasepredictions.*","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","serviceusage.operations.get","serviceusage.operations.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Firebase Grow Admin","roleName":"roles/firebase.growthAdmin","roleDescription":"Full access to Firebase Grow products and Analytics."},"ja":{"roleTitle":"Firebase Grow 管理者","roleName":"roles/firebase.growthAdmin","roleDescription":"Firebase Grow プロダクトとアナリティクスに対する完全アクセス権。"}},"roles/firebase.growthViewer":{"permissions":["cloudconfig.configs.get","cloudnotifications.*","fcmdata.*","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.links.list","firebase.playLinks.get","firebase.playLinks.list","firebase.projects.get","firebaseabt.experimentresults.*","firebaseabt.experiments.get","firebaseabt.experiments.list","firebaseabt.projectmetadata.*","firebaseanalytics.resources.googleAnalyticsReadAndAnalyze","firebasedynamiclinks.destinations.list","firebasedynamiclinks.domains.get","firebasedynamiclinks.domains.list","firebasedynamiclinks.links.get","firebasedynamiclinks.links.list","firebasedynamiclinks.stats.*","firebaseextensions.configs.list","firebaseinappmessaging.campaigns.get","firebaseinappmessaging.campaigns.list","firebasenotifications.messages.get","firebasenotifications.messages.list","firebasepredictions.predictions.list","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","serviceusage.operations.get","serviceusage.operations.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Firebase Grow Viewer","roleName":"roles/firebase.growthViewer","roleDescription":"Read access to Firebase Grow products and Analytics."},"ja":{"roleTitle":"Firebase Grow 閲覧者","roleName":"roles/firebase.growthViewer","roleDescription":"Firebase Grow プロダクトとアナリティクスに対する読み取りアクセス権。"}},"roles/firebase.qualityAdmin":{"permissions":["cloudnotifications.*","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.links.list","firebase.playLinks.get","firebase.playLinks.list","firebase.projects.get","firebaseanalytics.*","firebaseappdistro.*","firebasecrash.*","firebasecrashlytics.*","firebaseextensions.configs.list","firebaseperformance.*","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","serviceusage.operations.get","serviceusage.operations.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Firebase Quality Admin","roleName":"roles/firebase.qualityAdmin","roleDescription":"Full access to Firebase Quality products and Analytics."},"ja":{"roleTitle":"Firebase Quality 管理者","roleName":"roles/firebase.qualityAdmin","roleDescription":"Firebase Quality プロダクトとアナリティクスに対する完全アクセス権。"}},"roles/firebase.qualityViewer":{"permissions":["cloudnotifications.*","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.links.list","firebase.playLinks.get","firebase.playLinks.list","firebase.projects.get","firebaseanalytics.resources.googleAnalyticsReadAndAnalyze","firebaseappdistro.groups.list","firebaseappdistro.releases.list","firebaseappdistro.testers.list","firebasecrash.reports.*","firebasecrashlytics.config.get","firebasecrashlytics.data.*","firebasecrashlytics.issues.get","firebasecrashlytics.issues.list","firebasecrashlytics.sessions.*","firebaseextensions.configs.list","firebaseperformance.data.*","monitoring.timeSeries.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","serviceusage.operations.get","serviceusage.operations.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Firebase Quality Viewer","roleName":"roles/firebase.qualityViewer","roleDescription":"Read access to Firebase Quality products and Analytics."},"ja":{"roleTitle":"Firebase Quality 閲覧者","roleName":"roles/firebase.qualityViewer","roleDescription":"Firebase Quality プロダクトとアナリティクスに対する読み取りアクセス権。"}},"roles/firebase.viewer":{"permissions":["automl.annotationSpecs.get","automl.annotationSpecs.list","automl.annotations.list","automl.columnSpecs.get","automl.columnSpecs.list","automl.datasets.get","automl.datasets.list","automl.examples.get","automl.examples.list","automl.humanAnnotationTasks.get","automl.humanAnnotationTasks.list","automl.locations.get","automl.locations.list","automl.modelEvaluations.get","automl.modelEvaluations.list","automl.models.get","automl.models.list","automl.operations.get","automl.operations.list","automl.tableSpecs.get","automl.tableSpecs.list","clientauthconfig.brands.get","clientauthconfig.brands.list","cloudbuild.builds.get","cloudbuild.builds.list","cloudconfig.configs.get","cloudfunctions.functions.get","cloudfunctions.functions.list","cloudfunctions.locations.*","cloudfunctions.operations.*","cloudfunctions.runtimes.*","cloudnotifications.*","cloudtestservice.environmentcatalog.*","cloudtestservice.matrices.get","cloudtoolresults.executions.get","cloudtoolresults.executions.list","cloudtoolresults.histories.get","cloudtoolresults.histories.list","cloudtoolresults.settings.get","cloudtoolresults.steps.get","cloudtoolresults.steps.list","datastore.databases.get","datastore.databases.getIamPolicy","datastore.databases.getMetadata","datastore.databases.list","datastore.entities.get","datastore.entities.list","datastore.indexes.get","datastore.indexes.list","datastore.namespaces.get","datastore.namespaces.getIamPolicy","datastore.namespaces.list","datastore.statistics.*","errorreporting.groups.*","eventarc.locations.*","eventarc.operations.get","eventarc.operations.list","eventarc.providers.*","eventarc.triggers.get","eventarc.triggers.getIamPolicy","eventarc.triggers.list","fcmdata.*","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.links.list","firebase.playLinks.get","firebase.playLinks.list","firebase.projects.get","firebaseabt.experimentresults.*","firebaseabt.experiments.get","firebaseabt.experiments.list","firebaseabt.projectmetadata.*","firebaseanalytics.resources.googleAnalyticsReadAndAnalyze","firebaseappcheck.appAttestConfig.get","firebaseappcheck.debugTokens.get","firebaseappcheck.deviceCheckConfig.get","firebaseappcheck.recaptchaConfig.get","firebaseappcheck.recaptchaEnterpriseConfig.get","firebaseappcheck.safetyNetConfig.get","firebaseappcheck.services.get","firebaseappdistro.groups.list","firebaseappdistro.releases.list","firebaseappdistro.testers.list","firebaseauth.configs.get","firebaseauth.users.get","firebasecrash.reports.*","firebasecrashlytics.config.get","firebasecrashlytics.data.*","firebasecrashlytics.issues.get","firebasecrashlytics.issues.list","firebasecrashlytics.sessions.*","firebasedatabase.instances.get","firebasedatabase.instances.list","firebasedynamiclinks.destinations.list","firebasedynamiclinks.domains.get","firebasedynamiclinks.domains.list","firebasedynamiclinks.links.get","firebasedynamiclinks.links.list","firebasedynamiclinks.stats.*","firebaseextensions.configs.list","firebasehosting.sites.get","firebasehosting.sites.list","firebaseinappmessaging.campaigns.get","firebaseinappmessaging.campaigns.list","firebaseml.compressionjobs.get","firebaseml.compressionjobs.list","firebaseml.models.get","firebaseml.models.list","firebaseml.modelversions.get","firebaseml.modelversions.list","firebasenotifications.messages.get","firebasenotifications.messages.list","firebaseperformance.data.*","firebasepredictions.predictions.list","firebaserules.releases.get","firebaserules.releases.list","firebaserules.rulesets.get","firebaserules.rulesets.list","firebasestorage.buckets.get","firebasestorage.buckets.list","logging.logEntries.list","monitoring.timeSeries.list","recommender.locations.*","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","run.configurations.*","run.locations.*","run.operations.get","run.operations.list","run.revisions.get","run.revisions.list","run.routes.get","run.routes.list","run.services.get","run.services.getIamPolicy","run.services.list","run.services.listEffectiveTags","run.services.listTagBindings","serviceusage.operations.get","serviceusage.operations.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.buckets.get","storage.buckets.getIamPolicy","storage.buckets.list","storage.objects.get","storage.objects.getIamPolicy","storage.objects.list"],"en":{"roleTitle":"Firebase Viewer","roleName":"roles/firebase.viewer","roleDescription":"Read-only access to Firebase products."},"ja":{"roleTitle":"Firebase 閲覧者","roleName":"roles/firebase.viewer","roleDescription":"Firebase プロダクトへの読み取り専用権限。"}},"roles/cloudconfig.admin":{"permissions":["cloudconfig.*","firebase.clients.get","firebase.clients.list","firebase.projects.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Remote Config Admin","roleName":"roles/cloudconfig.admin","roleDescription":"Full access to Firebase Remote Config resources."},"ja":{"roleTitle":"Firebase Remote Config 管理者","roleName":"roles/cloudconfig.admin","roleDescription":"Firebase Remote Config リソースに対する完全アクセス権。"}},"roles/cloudconfig.viewer":{"permissions":["cloudconfig.configs.get","firebase.clients.get","firebase.clients.list","firebase.projects.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Remote Config Viewer","roleName":"roles/cloudconfig.viewer","roleDescription":"Read access to Firebase Remote Config resources."},"ja":{"roleTitle":"Firebase Remote Config 閲覧者","roleName":"roles/cloudconfig.viewer","roleDescription":"Firebase Remote Config リソースに対する読み取りアクセス権。"}},"roles/cloudtestservice.testAdmin":{"permissions":["cloudtestservice.*","cloudtoolresults.*","firebase.billingPlans.get","firebase.clients.get","firebase.clients.list","firebase.projects.get","resourcemanager.projects.get","resourcemanager.projects.list","storage.buckets.create","storage.buckets.get","storage.buckets.update","storage.objects.create","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Firebase Test Lab Admin","roleName":"roles/cloudtestservice.testAdmin","roleDescription":"Full access to all Test Lab features"},"ja":{"roleTitle":"Firebase Test Lab 管理者","roleName":"roles/cloudtestservice.testAdmin","roleDescription":"すべての Test Lab 機能に対する完全アクセス権。"}},"roles/cloudtestservice.testViewer":{"permissions":["cloudtestservice.environmentcatalog.*","cloudtestservice.matrices.get","cloudtoolresults.executions.get","cloudtoolresults.executions.list","cloudtoolresults.histories.get","cloudtoolresults.histories.list","cloudtoolresults.settings.get","cloudtoolresults.steps.get","cloudtoolresults.steps.list","firebase.clients.get","firebase.clients.list","firebase.projects.get","resourcemanager.projects.get","resourcemanager.projects.list","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Firebase Test Lab Viewer","roleName":"roles/cloudtestservice.testViewer","roleDescription":"Read access to Test Lab features"},"ja":{"roleTitle":"Firebase Test Lab 閲覧者","roleName":"roles/cloudtestservice.testViewer","roleDescription":"Test Lab 機能への読み取りアクセス権。"}},"roles/firebaseabt.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseabt.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase A/B Testing Admin","roleName":"roles/firebaseabt.admin","roleDescription":"Full read/write access to Firebase A/B Testing resources."},"ja":{"roleTitle":"Firebase A/B Testing 管理者","roleName":"roles/firebaseabt.admin","roleDescription":"Firebase A/B Testing リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebaseabt.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseabt.experimentresults.*","firebaseabt.experiments.get","firebaseabt.experiments.list","firebaseabt.projectmetadata.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase A/B Testing Viewer","roleName":"roles/firebaseabt.viewer","roleDescription":"Read-only access to Firebase A/B Testing resources."},"ja":{"roleTitle":"Firebase A/B Testing 閲覧者","roleName":"roles/firebaseabt.viewer","roleDescription":"Firebase A/B Testing リソースに対する読み取り専用アクセス権。"}},"roles/firebaseappcheck.admin":{"permissions":["firebaseappcheck.*"],"en":{"roleTitle":"Firebase App Check Admin","roleName":"roles/firebaseappcheck.admin","roleDescription":"Full management of Firebase App Check."},"ja":{"roleTitle":"Firebase App Check 管理者","roleName":"roles/firebaseappcheck.admin","roleDescription":"Firebase App Check の完全な管理。"}},"roles/firebaseappcheck.viewer":{"permissions":["firebaseappcheck.appAttestConfig.get","firebaseappcheck.debugTokens.get","firebaseappcheck.deviceCheckConfig.get","firebaseappcheck.recaptchaConfig.get","firebaseappcheck.recaptchaEnterpriseConfig.get","firebaseappcheck.safetyNetConfig.get","firebaseappcheck.services.get"],"en":{"roleTitle":"Firebase App Check Viewer","roleName":"roles/firebaseappcheck.viewer","roleDescription":"Read-only access for Firebase App Check."},"ja":{"roleTitle":"Firebase App Check 閲覧者","roleName":"roles/firebaseappcheck.viewer","roleDescription":"Firebase App Check の読み取り専用アクセス権。"}},"roles/firebaseappdistro.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseappdistro.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase App Distribution Admin","roleName":"roles/firebaseappdistro.admin","roleDescription":"Full read/write access to Firebase App Distribution resources."},"ja":{"roleTitle":"Firebase App Distribution 管理者","roleName":"roles/firebaseappdistro.admin","roleDescription":"Firebase App Distribution リソースへの完全な読み取り / 書き込みアクセス権。"}},"roles/firebaseappdistro.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseappdistro.groups.list","firebaseappdistro.releases.list","firebaseappdistro.testers.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase App Distribution Viewer","roleName":"roles/firebaseappdistro.viewer","roleDescription":"Read-only access to Firebase App Distribution resources."},"ja":{"roleTitle":"Firebase App Distribution 閲覧者","roleName":"roles/firebaseappdistro.viewer","roleDescription":"Firebase App Distribution リソースに対する読み取り専用アクセス権。"}},"roles/firebaseauth.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseauth.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Authentication Admin","roleName":"roles/firebaseauth.admin","roleDescription":"Full read/write access to Firebase Authentication resources."},"ja":{"roleTitle":"Firebase Authentication 管理者","roleName":"roles/firebaseauth.admin","roleDescription":"Firebase Authentication リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebaseauth.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseauth.configs.get","firebaseauth.users.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Authentication Viewer","roleName":"roles/firebaseauth.viewer","roleDescription":"Read-only access to Firebase Authentication resources."},"ja":{"roleTitle":"Firebase Authentication 閲覧者","roleName":"roles/firebaseauth.viewer","roleDescription":"Firebase Authentication リソースに対する読み取り専用アクセス権。"}},"roles/firebasecrashlytics.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasecrashlytics.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Crashlytics Admin","roleName":"roles/firebasecrashlytics.admin","roleDescription":"Full read/write access to Firebase Crashlytics resources."},"ja":{"roleTitle":"Firebase Crashlytics 管理者","roleName":"roles/firebasecrashlytics.admin","roleDescription":"Firebase Crashlytics リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebasecrashlytics.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasecrashlytics.config.get","firebasecrashlytics.data.*","firebasecrashlytics.issues.get","firebasecrashlytics.issues.list","firebasecrashlytics.sessions.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Crashlytics Viewer","roleName":"roles/firebasecrashlytics.viewer","roleDescription":"Read-only access to Firebase Crashlytics resources."},"ja":{"roleTitle":"Firebase Crashlytics 閲覧者","roleName":"roles/firebasecrashlytics.viewer","roleDescription":"Firebase Crashlytics リソースに対する読み取り専用アクセス権。"}},"roles/firebasedatabase.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasedatabase.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Realtime Database Admin","roleName":"roles/firebasedatabase.admin","roleDescription":"Full read/write access to Firebase Realtime Database resources."},"ja":{"roleTitle":"Firebase Realtime Database 管理者","roleName":"roles/firebasedatabase.admin","roleDescription":"Firebase Realtime Database リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebasedatabase.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasedatabase.instances.get","firebasedatabase.instances.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Realtime Database Viewer","roleName":"roles/firebasedatabase.viewer","roleDescription":"Read-only access to Firebase Realtime Database resources."},"ja":{"roleTitle":"Firebase Realtime Database 閲覧者","roleName":"roles/firebasedatabase.viewer","roleDescription":"Firebase Realtime Database リソースに対する読み取り専用アクセス権。"}},"roles/firebasedynamiclinks.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasedynamiclinks.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Dynamic Links Admin","roleName":"roles/firebasedynamiclinks.admin","roleDescription":"Full read/write access to Firebase Dynamic Links resources."},"ja":{"roleTitle":"Firebase Dynamic Links 管理者","roleName":"roles/firebasedynamiclinks.admin","roleDescription":"Firebase Dynamic Links リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebasedynamiclinks.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasedynamiclinks.destinations.list","firebasedynamiclinks.domains.get","firebasedynamiclinks.domains.list","firebasedynamiclinks.links.get","firebasedynamiclinks.links.list","firebasedynamiclinks.stats.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Dynamic Links Viewer","roleName":"roles/firebasedynamiclinks.viewer","roleDescription":"Read-only access to Firebase Dynamic Links resources."},"ja":{"roleTitle":"Firebase Dynamic Links 閲覧者","roleName":"roles/firebasedynamiclinks.viewer","roleDescription":"Firebase Dynamic Links リソースに対する読み取り専用アクセス権。"}},"roles/firebasehosting.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasehosting.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Hosting Admin","roleName":"roles/firebasehosting.admin","roleDescription":"Full read/write access to Firebase Hosting resources."},"ja":{"roleTitle":"Firebase Hosting 管理者","roleName":"roles/firebasehosting.admin","roleDescription":"Firebase Hosting リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebasehosting.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasehosting.sites.get","firebasehosting.sites.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Hosting Viewer","roleName":"roles/firebasehosting.viewer","roleDescription":"Read-only access to Firebase Hosting resources."},"ja":{"roleTitle":"Firebase Hosting 閲覧者","roleName":"roles/firebasehosting.viewer","roleDescription":"Firebase Hosting リソースに対する読み取り専用アクセス権。"}},"roles/firebaseinappmessaging.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseinappmessaging.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase In-App Messaging Admin","roleName":"roles/firebaseinappmessaging.admin","roleDescription":"Full read/write access to Firebase In-App Messaging resources."},"ja":{"roleTitle":"Firebase アプリ内メッセージング管理者","roleName":"roles/firebaseinappmessaging.admin","roleDescription":"Firebase アプリ内メッセージングのリソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebaseinappmessaging.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseinappmessaging.campaigns.get","firebaseinappmessaging.campaigns.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase In-App Messaging Viewer","roleName":"roles/firebaseinappmessaging.viewer","roleDescription":"Read-only access to Firebase In-App Messaging resources."},"ja":{"roleTitle":"Firebase アプリ内メッセージング閲覧者","roleName":"roles/firebaseinappmessaging.viewer","roleDescription":"Firebase アプリ内メッセージングのリソースに対する読み取り専用アクセス権。"}},"roles/firebaseml.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseml.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase ML Kit Admin","roleName":"roles/firebaseml.admin","roleDescription":"Full read/write access to Firebase ML Kit resources."},"ja":{"roleTitle":"Firebase ML Kit 管理者","roleName":"roles/firebaseml.admin","roleDescription":"Firebase ML Kit リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebaseml.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseml.compressionjobs.get","firebaseml.compressionjobs.list","firebaseml.models.get","firebaseml.models.list","firebaseml.modelversions.get","firebaseml.modelversions.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase ML Kit Viewer","roleName":"roles/firebaseml.viewer","roleDescription":"Read-only access to Firebase ML Kit resources."},"ja":{"roleTitle":"Firebase ML Kit 閲覧者","roleName":"roles/firebaseml.viewer","roleDescription":"Firebase ML Kit リソースに対する読み取り専用アクセス権。"}},"roles/firebasenotifications.admin":{"permissions":["fcmdata.*","firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasenotifications.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Cloud Messaging Admin","roleName":"roles/firebasenotifications.admin","roleDescription":"Full read/write access to Firebase Cloud Messaging resources."},"ja":{"roleTitle":"Firebase Cloud Messaging 管理者","roleName":"roles/firebasenotifications.admin","roleDescription":"Firebase Cloud Messaging リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebasenotifications.viewer":{"permissions":["fcmdata.*","firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasenotifications.messages.get","firebasenotifications.messages.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Cloud Messaging Viewer","roleName":"roles/firebasenotifications.viewer","roleDescription":"Read-only access to Firebase Cloud Messaging resources."},"ja":{"roleTitle":"Firebase Cloud Messaging 閲覧者","roleName":"roles/firebasenotifications.viewer","roleDescription":"Firebase Cloud Messaging リソースに対する読み取り専用アクセス権。"}},"roles/firebaseperformance.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseperformance.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Performance Reporting Admin","roleName":"roles/firebaseperformance.admin","roleDescription":"Full access to firebaseperformance resources."},"ja":{"roleTitle":"Firebase Performance Reporting 管理者","roleName":"roles/firebaseperformance.admin","roleDescription":"firebaseperformance リソースに対する完全アクセス権。"}},"roles/firebaseperformance.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebaseperformance.data.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Performance Reporting Viewer","roleName":"roles/firebaseperformance.viewer","roleDescription":"Read-only access to firebaseperformance resources."},"ja":{"roleTitle":"Firebase Performance Reporting 閲覧者","roleName":"roles/firebaseperformance.viewer","roleDescription":"firebaseperformance リソースに対する読み取り専用権限。"}},"roles/firebasepredictions.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasepredictions.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Predictions Admin","roleName":"roles/firebasepredictions.admin","roleDescription":"Full read/write access to Firebase Predictions resources."},"ja":{"roleTitle":"Firebase Predictions 管理者","roleName":"roles/firebasepredictions.admin","roleDescription":"Firebase Predictions リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebasepredictions.viewer":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasepredictions.predictions.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Predictions Viewer","roleName":"roles/firebasepredictions.viewer","roleDescription":"Read-only access to Firebase Predictions resources."},"ja":{"roleTitle":"Firebase Predictions 閲覧者","roleName":"roles/firebasepredictions.viewer","roleDescription":"Firebase Predictions リソースに対する読み取り専用アクセス権。"}},"roles/firebaserules.admin":{"permissions":["firebaserules.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Rules Admin","roleName":"roles/firebaserules.admin","roleDescription":"Full management of Firebase Rules."},"ja":{"roleTitle":"Firebase ルール管理者","roleName":"roles/firebaserules.admin","roleDescription":"Firebase ルールをすべて管理できます。"}},"roles/firebaserules.viewer":{"permissions":["firebaserules.releases.get","firebaserules.releases.list","firebaserules.rulesets.get","firebaserules.rulesets.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Rules Viewer","roleName":"roles/firebaserules.viewer","roleDescription":"Read-only access on all resources with the ability to test Rulesets."},"ja":{"roleTitle":"Firebase Rules 閲覧者","roleName":"roles/firebaserules.viewer","roleDescription":"ルールセットをテストできる、すべてのリソースに対する読み取り専用アクセス権。"}},"roles/firebasestorage.admin":{"permissions":["firebase.clients.get","firebase.clients.list","firebase.projects.get","firebasestorage.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Storage for Firebase Admin","roleName":"roles/firebasestorage.admin","roleDescription":"Full management of Cloud Storage for Firebase."},"ja":{"roleTitle":"Cloud Storage for Firebase 管理者","roleName":"roles/firebasestorage.admin","roleDescription":"Cloud Storage for Firebase をすべて管理できます。"}},"roles/firebasestorage.viewer":{"permissions":["firebasestorage.buckets.get","firebasestorage.buckets.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Storage for Firebase Viewer","roleName":"roles/firebasestorage.viewer","roleDescription":"Read-only access for Cloud Storage for Firebase."},"ja":{"roleTitle":"Cloud Storage for Firebase 閲覧者","roleName":"roles/firebasestorage.viewer","roleDescription":"Cloud Storage for Firebase への読み取り専用アクセス権。"}},"roles/fleetengine.consumerSdkUser":{"permissions":["fleetengine.trips.get","fleetengine.vehicles.get","fleetengine.vehicles.search","fleetengine.vehicles.searchFuzzed"],"en":{"roleTitle":"Fleet Engine Consumer SDK User","roleName":"roles/fleetengine.consumerSdkUser","roleDescription":"Limited read access to Fleet Engine resources"},"ja":{"roleTitle":"Fleet Engine Consumer SDK ユーザー","roleName":"roles/fleetengine.consumerSdkUser","roleDescription":"Fleet Engine リソースに対する制限付きの読み取りアクセス権"}},"roles/fleetengine.deliveryConsumer":{"permissions":["fleetengine.tasks.searchWithTrackingId"],"en":{"roleTitle":"Fleet Engine Delivery Consumer User","roleName":"roles/fleetengine.deliveryConsumer","roleDescription":"Limited read access to Fleet Engine Delivery resources"},"ja":{"roleTitle":"Fleet Engine Delivery の一般ユーザー","roleName":"roles/fleetengine.deliveryConsumer","roleDescription":"Fleet Engine Delivery リソースへの制限付き読み取りアクセス権"}},"roles/fleetengine.deliveryFleetReader":{"permissions":["fleetengine.deliveryvehicles.get","fleetengine.deliveryvehicles.list","fleetengine.tasks.get","fleetengine.tasks.list","fleetengine.tasks.searchWithTrackingId"],"en":{"roleTitle":"Fleet Engine Delivery Fleet Reader User","roleName":"roles/fleetengine.deliveryFleetReader","roleDescription":"Grants read access to all Fleet Engine Delivery resources"},"ja":{"roleTitle":"Fleet Engine Delivery フリート リーダー ユーザー","roleName":"roles/fleetengine.deliveryFleetReader","roleDescription":"すべての Fleet Engine Delivery リソースに対する読み取りアクセス権を付与します。"}},"roles/fleetengine.deliverySuperUser":{"permissions":["fleetengine.deliveryvehicles.*","fleetengine.tasks.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Fleet Engine Delivery Super User","roleName":"roles/fleetengine.deliverySuperUser","roleDescription":"Full access to Fleet Engine DeliveryVehicles and Tasks resources."},"ja":{"roleTitle":"Fleet Engine Delivery のスーパー ユーザー","roleName":"roles/fleetengine.deliverySuperUser","roleDescription":"Fleet Engine DeliveryVehicles と Tasks のリソースに対する完全アクセス権。"}},"roles/fleetengine.deliveryTrustedDriver":{"permissions":["fleetengine.deliveryvehicles.create","fleetengine.deliveryvehicles.get","fleetengine.deliveryvehicles.update","fleetengine.deliveryvehicles.updateLocation","fleetengine.deliveryvehicles.updateVehicleStops","fleetengine.tasks.create","fleetengine.tasks.update"],"en":{"roleTitle":"Fleet Engine Delivery Trusted Driver User","roleName":"roles/fleetengine.deliveryTrustedDriver","roleDescription":"Read and write access to Fleet Engine Delivery resources"},"ja":{"roleTitle":"Fleet Engine Delivery の信頼されているドライバ ユーザー","roleName":"roles/fleetengine.deliveryTrustedDriver","roleDescription":"Fleet Engine Delivery リソースへの読み取り / 書き込みアクセス権"}},"roles/fleetengine.deliveryUntrustedDriver":{"permissions":["fleetengine.deliveryvehicles.get","fleetengine.deliveryvehicles.updateLocation"],"en":{"roleTitle":"Fleet Engine Delivery Untrusted Driver User","roleName":"roles/fleetengine.deliveryUntrustedDriver","roleDescription":"Limited write access to Fleet Engine Delivery Vehicle resources"},"ja":{"roleTitle":"Fleet Engine Delivery の信頼されていないドライバ ユーザー","roleName":"roles/fleetengine.deliveryUntrustedDriver","roleDescription":"Fleet Engine Delivery Vehicle リソースへの限定的な書き込みアクセス権"}},"roles/fleetengine.driverSdkUser":{"permissions":["fleetengine.trips.get","fleetengine.trips.search","fleetengine.trips.update","fleetengine.vehicles.get","fleetengine.vehicles.updateLocation"],"en":{"roleTitle":"Fleet Engine Driver SDK User","roleName":"roles/fleetengine.driverSdkUser","roleDescription":"Read and limited update access to Fleet Engine resources"},"ja":{"roleTitle":"Fleet Engine Driver SDK ユーザー","roleName":"roles/fleetengine.driverSdkUser","roleDescription":"Fleet Engine リソースに対する読み取りアクセス権と制限付きの更新アクセス権"}},"roles/fleetengine.serviceSuperUser":{"permissions":["fleetengine.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Fleet Engine Service Super User","roleName":"roles/fleetengine.serviceSuperUser","roleDescription":"Full access to all Fleet Engine resources."},"ja":{"roleTitle":"Fleet Engine サービス スーパー ユーザー","roleName":"roles/fleetengine.serviceSuperUser","roleDescription":"すべての Fleet Engine リソースに対する完全アクセス権"}},"roles/genomics.admin":{"permissions":["genomics.*"],"en":{"roleTitle":"Genomics Admin","roleName":"roles/genomics.admin","roleDescription":"Full access to genomics datasets and operations."},"ja":{"roleTitle":"Genomics 管理者","roleName":"roles/genomics.admin","roleDescription":"Genomics のデータセットとオペレーションに対する完全アクセス権。"}},"roles/genomics.editor":{"permissions":["genomics.datasets.create","genomics.datasets.delete","genomics.datasets.get","genomics.datasets.list","genomics.datasets.update","genomics.operations.*"],"en":{"roleTitle":"Genomics Editor","roleName":"roles/genomics.editor","roleDescription":"Access to read and edit genomics datasets and operations."},"ja":{"roleTitle":"Genomics 編集者","roleName":"roles/genomics.editor","roleDescription":"Genomics のデータセットとオペレーションへの読み取り / 編集アクセス権。"}},"roles/genomics.pipelinesRunner":{"permissions":["genomics.operations.*"],"en":{"roleTitle":"Genomics Pipelines Runner","roleName":"roles/genomics.pipelinesRunner","roleDescription":"Full access to operate on genomics pipelines."},"ja":{"roleTitle":"Genomics Pipelines 実行者","roleName":"roles/genomics.pipelinesRunner","roleDescription":"genomics パイプラインに関する操作への完全アクセス権。"}},"roles/genomics.viewer":{"permissions":["genomics.datasets.get","genomics.datasets.list","genomics.operations.get","genomics.operations.list"],"en":{"roleTitle":"Genomics Viewer","roleName":"roles/genomics.viewer","roleDescription":"Access to view genomics datasets and operations."},"ja":{"roleTitle":"Genomics 閲覧者","roleName":"roles/genomics.viewer","roleDescription":"Genomics のデータセットとオペレーションを表示するためのアクセス権。"}},"roles/gkehub.admin":{"permissions":["gkehub.features.*","gkehub.fleet.*","gkehub.locations.*","gkehub.memberships.*","gkehub.operations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"GKE Hub Admin","roleName":"roles/gkehub.admin","roleDescription":"Full access to GKE Hub resources."},"ja":{"roleTitle":"GKE Hub 管理者","roleName":"roles/gkehub.admin","roleDescription":"GKE Hub リソースに対する完全アクセス権。"}},"roles/gkehub.connect":{"permissions":["gkehub.endpoints.*"],"en":{"roleTitle":"GKE Connect Agent","roleName":"roles/gkehub.connect","roleDescription":"Ability to set up GKE Connect between external clusters and Google."},"ja":{"roleTitle":"GKE Connect エージェント","roleName":"roles/gkehub.connect","roleDescription":"外部クラスタと Google の間の GKE 接続を設定できます。"}},"roles/gkehub.editor":{"permissions":["gkehub.features.create","gkehub.features.delete","gkehub.features.get","gkehub.features.getIamPolicy","gkehub.features.list","gkehub.features.update","gkehub.fleet.*","gkehub.locations.*","gkehub.memberships.create","gkehub.memberships.delete","gkehub.memberships.generateConnectManifest","gkehub.memberships.get","gkehub.memberships.getIamPolicy","gkehub.memberships.list","gkehub.memberships.update","gkehub.operations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"GKE Hub Editor","roleName":"roles/gkehub.editor","roleDescription":"Edit access to GKE Hub resources."},"ja":{"roleTitle":"GKE Hub 編集者","roleName":"roles/gkehub.editor","roleDescription":"GKE Hub リソースに対する編集アクセス権。"}},"roles/gkehub.gatewayAdmin":{"permissions":["gkehub.gateway.*","serviceusage.services.get"],"en":{"roleTitle":"Connect Gateway Admin","roleName":"roles/gkehub.gatewayAdmin","roleDescription":"Full access to Connect Gateway."},"ja":{"roleTitle":"Connect Gateway 管理者","roleName":"roles/gkehub.gatewayAdmin","roleDescription":"Connect Gateway に対する完全アクセス権。"}},"roles/gkehub.gatewayReader":{"permissions":["gkehub.gateway.get","serviceusage.services.get"],"en":{"roleTitle":"Connect Gateway Reader","roleName":"roles/gkehub.gatewayReader","roleDescription":"Read-only access to Connect Gateway."},"ja":{"roleTitle":"Connect Gateway 読み取り","roleName":"roles/gkehub.gatewayReader","roleDescription":"Connect Gateway に対する読み取り専用アクセス権。"}},"roles/gkehub.viewer":{"permissions":["gkehub.features.get","gkehub.features.getIamPolicy","gkehub.features.list","gkehub.fleet.get","gkehub.locations.*","gkehub.memberships.generateConnectManifest","gkehub.memberships.get","gkehub.memberships.getIamPolicy","gkehub.memberships.list","gkehub.operations.get","gkehub.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"GKE Hub Viewer","roleName":"roles/gkehub.viewer","roleDescription":"Read-only access to GKE Hubs and related resources."},"ja":{"roleTitle":"GKE Hub 閲覧者","roleName":"roles/gkehub.viewer","roleDescription":"GKE Hub と関連リソースへの読み取り専用アクセス権。"}},"roles/gkeonprem.admin":{"permissions":["gkeonprem.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"GKE on-prem Admin","roleName":"roles/gkeonprem.admin","roleDescription":"Full access to GKE on-prem all resources."},"ja":{"roleTitle":"GKE On-Prem 管理者","roleName":"roles/gkeonprem.admin","roleDescription":"GKE On-Prem のすべてのリソースに対する完全アクセス権。"}},"roles/gkeonprem.viewer":{"permissions":["gkeonprem.locations.*","gkeonprem.operations.get","gkeonprem.operations.list","gkeonprem.vmwareClusters.get","gkeonprem.vmwareClusters.getIamPolicy","gkeonprem.vmwareClusters.list","gkeonprem.vmwareNodePools.get","gkeonprem.vmwareNodePools.getIamPolicy","gkeonprem.vmwareNodePools.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"GKE on-prem Viewer","roleName":"roles/gkeonprem.viewer","roleDescription":"Read-only access to GKE on-prem all resources."},"ja":{"roleTitle":"GKE On-Prem 閲覧者","roleName":"roles/gkeonprem.viewer","roleDescription":"GKE On-Prem のすべてのリソースに対する読み取り専用アクセス権。"}},"roles/gsuiteaddons.developer":{"permissions":["gsuiteaddons.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Workspace Add-ons Developer","roleName":"roles/gsuiteaddons.developer","roleDescription":"Full access to Google Workspace Add-ons resources"},"ja":{"roleTitle":"Google Workspace アドオン デベロッパー","roleName":"roles/gsuiteaddons.developer","roleDescription":"Google Workspace アドオン リソースに対する完全アクセス権"}},"roles/gsuiteaddons.reader":{"permissions":["gsuiteaddons.authorizations.*","gsuiteaddons.deployments.get","gsuiteaddons.deployments.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Workspace Add-ons Reader","roleName":"roles/gsuiteaddons.reader","roleDescription":"Read-only access to Google Workspace Add-ons resources"},"ja":{"roleTitle":"Google Workspace アドオン読み取り","roleName":"roles/gsuiteaddons.reader","roleDescription":"Google Workspace アドオンのリソースに対する読み取り専用アクセス権"}},"roles/gsuiteaddons.tester":{"permissions":["gsuiteaddons.deployments.execute","gsuiteaddons.deployments.install","gsuiteaddons.deployments.installStatus","gsuiteaddons.deployments.uninstall","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Google Workspace Add-ons Tester","roleName":"roles/gsuiteaddons.tester","roleDescription":"Testing execution access to Google Workspace Add-ons resources"},"ja":{"roleTitle":"Google Workspace アドオン テスター","roleName":"roles/gsuiteaddons.tester","roleDescription":"Google Workspace アドオンのリソースに対するテスト実行アクセス権"}},"roles/chat.owner":{"permissions":["chat.*"],"en":{"roleTitle":"Chat Bots Owner","roleName":"roles/chat.owner","roleDescription":"Can view and modify bot configurations"},"ja":{"roleTitle":"chat bot オーナー","roleName":"roles/chat.owner","roleDescription":"bot 構成を表示および変更できます。"}},"roles/chat.reader":{"permissions":["chat.bots.get"],"en":{"roleTitle":"Chat Bots Viewer","roleName":"roles/chat.reader","roleDescription":"Can view bot configurations"},"ja":{"roleTitle":"chat bot 閲覧者","roleName":"roles/chat.reader","roleDescription":"bot 構成を表示できます。"}},"roles/iam.denyAdmin":{"permissions":["iam.denypolicies.*"],"en":{"roleTitle":"Deny Admin","roleName":"roles/iam.denyAdmin","roleDescription":"Deny admin role, with permissions to read and modify deny policies"},"ja":{"roleTitle":"拒否管理者","roleName":"roles/iam.denyAdmin","roleDescription":"拒否ポリシーの読み取りと変更を行う権限を持つ、拒否管理者ロール"}},"roles/iam.denyReviewer":{"permissions":["iam.denypolicies.get","iam.denypolicies.list"],"en":{"roleTitle":"Deny Reviewer","roleName":"roles/iam.denyReviewer","roleDescription":"Deny Reviewer role, with permissions to read deny policies"},"ja":{"roleTitle":"拒否審査担当者","roleName":"roles/iam.denyReviewer","roleDescription":"拒否ポリシーの読み取り権限を持つ、審査担当者ロール"}},"roles/iam.securityAdmin":{"permissions":["accessapproval.requests.list","accesscontextmanager.accessLevels.list","accesscontextmanager.accessPolicies.getIamPolicy","accesscontextmanager.accessPolicies.list","accesscontextmanager.accessPolicies.setIamPolicy","accesscontextmanager.accessZones.list","accesscontextmanager.gcpUserAccessBindings.list","accesscontextmanager.policies.getIamPolicy","accesscontextmanager.policies.list","accesscontextmanager.policies.setIamPolicy","accesscontextmanager.servicePerimeters.list","actions.agentVersions.list","advisorynotifications.notifications.list","aiplatform.annotationSpecs.list","aiplatform.annotations.list","aiplatform.artifacts.list","aiplatform.batchPredictionJobs.list","aiplatform.contexts.list","aiplatform.customJobs.list","aiplatform.dataItems.list","aiplatform.dataLabelingJobs.list","aiplatform.datasets.list","aiplatform.deploymentResourcePools.list","aiplatform.edgeDeploymentJobs.list","aiplatform.edgeDevices.list","aiplatform.endpoints.list","aiplatform.entityTypes.list","aiplatform.executions.list","aiplatform.features.list","aiplatform.featurestores.list","aiplatform.humanInTheLoops.list","aiplatform.hyperparameterTuningJobs.list","aiplatform.indexEndpoints.list","aiplatform.indexes.list","aiplatform.locations.list","aiplatform.metadataSchemas.list","aiplatform.metadataStores.list","aiplatform.modelDeploymentMonitoringJobs.list","aiplatform.modelEvaluationSlices.list","aiplatform.modelEvaluations.list","aiplatform.models.list","aiplatform.nasJobs.list","aiplatform.operations.*","aiplatform.pipelineJobs.list","aiplatform.specialistPools.list","aiplatform.studies.list","aiplatform.tensorboardExperiments.list","aiplatform.tensorboardRuns.list","aiplatform.tensorboardTimeSeries.list","aiplatform.tensorboards.list","aiplatform.trainingPipelines.list","aiplatform.trials.list","analyticshub.dataExchanges.getIamPolicy","analyticshub.dataExchanges.list","analyticshub.dataExchanges.setIamPolicy","analyticshub.listings.getIamPolicy","analyticshub.listings.list","analyticshub.listings.setIamPolicy","apigateway.apiconfigs.getIamPolicy","apigateway.apiconfigs.list","apigateway.apiconfigs.setIamPolicy","apigateway.apis.getIamPolicy","apigateway.apis.list","apigateway.apis.setIamPolicy","apigateway.gateways.getIamPolicy","apigateway.gateways.list","apigateway.gateways.setIamPolicy","apigateway.locations.list","apigateway.operations.list","apigee.apiproductattributes.list","apigee.apiproducts.list","apigee.apps.list","apigee.archivedeployments.list","apigee.caches.list","apigee.datacollectors.list","apigee.datastores.list","apigee.deployments.list","apigee.developerappattributes.list","apigee.developerapps.list","apigee.developerattributes.list","apigee.developers.list","apigee.developersubscriptions.list","apigee.envgroupattachments.list","apigee.envgroups.list","apigee.environments.getIamPolicy","apigee.environments.list","apigee.environments.setIamPolicy","apigee.exports.list","apigee.flowhooks.list","apigee.hostqueries.list","apigee.hostsecurityreports.list","apigee.instanceattachments.list","apigee.instances.list","apigee.keystorealiases.list","apigee.keystores.list","apigee.keyvaluemapentries.*","apigee.keyvaluemaps.list","apigee.operations.list","apigee.organizations.list","apigee.portals.list","apigee.proxies.list","apigee.proxyrevisions.list","apigee.queries.list","apigee.rateplans.list","apigee.references.list","apigee.reports.list","apigee.resourcefiles.list","apigee.securityreports.list","apigee.sharedflowrevisions.list","apigee.sharedflows.list","apigee.targetservers.list","apigee.tracesessions.list","apigeeconnect.connections.*","apigeeregistry.apis.getIamPolicy","apigeeregistry.apis.list","apigeeregistry.apis.setIamPolicy","apigeeregistry.artifacts.getIamPolicy","apigeeregistry.artifacts.list","apigeeregistry.artifacts.setIamPolicy","apigeeregistry.deployments.list","apigeeregistry.locations.list","apigeeregistry.operations.list","apigeeregistry.specs.getIamPolicy","apigeeregistry.specs.list","apigeeregistry.specs.setIamPolicy","apigeeregistry.versions.getIamPolicy","apigeeregistry.versions.list","apigeeregistry.versions.setIamPolicy","apikeys.keys.list","appengine.instances.list","appengine.memcache.list","appengine.operations.list","appengine.services.list","appengine.versions.list","artifactregistry.dockerimages.list","artifactregistry.files.list","artifactregistry.packages.list","artifactregistry.repositories.getIamPolicy","artifactregistry.repositories.list","artifactregistry.repositories.setIamPolicy","artifactregistry.tags.list","artifactregistry.versions.list","assuredworkloads.operations.list","assuredworkloads.violations.list","assuredworkloads.workload.list","automl.annotationSpecs.list","automl.annotations.list","automl.columnSpecs.list","automl.datasets.getIamPolicy","automl.datasets.list","automl.datasets.setIamPolicy","automl.examples.list","automl.humanAnnotationTasks.list","automl.locations.getIamPolicy","automl.locations.list","automl.locations.setIamPolicy","automl.modelEvaluations.list","automl.models.getIamPolicy","automl.models.list","automl.models.setIamPolicy","automl.operations.list","automl.tableSpecs.list","automlrecommendations.apiKeys.list","automlrecommendations.catalogItems.list","automlrecommendations.catalogs.list","automlrecommendations.events.list","automlrecommendations.placements.list","automlrecommendations.recommendations.list","autoscaling.sites.getIamPolicy","autoscaling.sites.setIamPolicy","baremetalsolution.instances.list","baremetalsolution.luns.list","baremetalsolution.networks.list","baremetalsolution.nfsshares.list","baremetalsolution.snapshotschedulepolicies.list","baremetalsolution.volumes.list","baremetalsolution.volumesnapshots.list","bigquery.capacityCommitments.list","bigquery.connections.getIamPolicy","bigquery.connections.list","bigquery.connections.setIamPolicy","bigquery.dataPolicies.getIamPolicy","bigquery.dataPolicies.list","bigquery.dataPolicies.setIamPolicy","bigquery.datasets.getIamPolicy","bigquery.datasets.setIamPolicy","bigquery.jobs.list","bigquery.models.list","bigquery.reservationAssignments.list","bigquery.reservations.list","bigquery.routines.list","bigquery.rowAccessPolicies.getIamPolicy","bigquery.rowAccessPolicies.list","bigquery.rowAccessPolicies.setIamPolicy","bigquery.savedqueries.list","bigquery.tables.getIamPolicy","bigquery.tables.list","bigquery.tables.setIamPolicy","bigquerymigration.locations.list","bigquerymigration.subtasks.list","bigquerymigration.workflows.list","bigtable.appProfiles.list","bigtable.backups.getIamPolicy","bigtable.backups.list","bigtable.backups.setIamPolicy","bigtable.clusters.list","bigtable.instances.getIamPolicy","bigtable.instances.list","bigtable.instances.setIamPolicy","bigtable.keyvisualizer.list","bigtable.locations.*","bigtable.tables.getIamPolicy","bigtable.tables.list","bigtable.tables.setIamPolicy","billing.accounts.getIamPolicy","billing.accounts.list","billing.accounts.setIamPolicy","billing.budgets.list","billing.credits.*","billing.resourceAssociations.list","billing.subscriptions.list","binaryauthorization.attestors.getIamPolicy","binaryauthorization.attestors.list","binaryauthorization.attestors.setIamPolicy","binaryauthorization.continuousValidationConfig.getIamPolicy","binaryauthorization.continuousValidationConfig.setIamPolicy","binaryauthorization.platformPolicies.list","binaryauthorization.policy.getIamPolicy","binaryauthorization.policy.setIamPolicy","certificatemanager.certmapentries.getIamPolicy","certificatemanager.certmapentries.list","certificatemanager.certmapentries.setIamPolicy","certificatemanager.certmaps.getIamPolicy","certificatemanager.certmaps.list","certificatemanager.certmaps.setIamPolicy","certificatemanager.certs.getIamPolicy","certificatemanager.certs.list","certificatemanager.certs.setIamPolicy","certificatemanager.dnsauthorizations.getIamPolicy","certificatemanager.dnsauthorizations.list","certificatemanager.dnsauthorizations.setIamPolicy","certificatemanager.locations.list","certificatemanager.operations.list","clientauthconfig.brands.list","clientauthconfig.clients.list","cloudasset.assets.searchAllResources","cloudasset.feeds.list","cloudasset.savedqueries.list","cloudbuild.builds.list","cloudbuild.integrations.list","cloudbuild.workerpools.list","clouddebugger.breakpoints.list","clouddebugger.debuggees.list","clouddeploy.deliveryPipelines.getIamPolicy","clouddeploy.deliveryPipelines.list","clouddeploy.deliveryPipelines.setIamPolicy","clouddeploy.locations.list","clouddeploy.operations.list","clouddeploy.releases.list","clouddeploy.rollouts.list","clouddeploy.targets.getIamPolicy","clouddeploy.targets.list","clouddeploy.targets.setIamPolicy","cloudfunctions.functions.getIamPolicy","cloudfunctions.functions.list","cloudfunctions.functions.setIamPolicy","cloudfunctions.locations.list","cloudfunctions.operations.list","cloudfunctions.runtimes.*","cloudiot.devices.list","cloudiot.registries.getIamPolicy","cloudiot.registries.list","cloudiot.registries.setIamPolicy","cloudjobdiscovery.companies.list","cloudkms.cryptoKeyVersions.list","cloudkms.cryptoKeys.getIamPolicy","cloudkms.cryptoKeys.list","cloudkms.cryptoKeys.setIamPolicy","cloudkms.ekmConnections.getIamPolicy","cloudkms.ekmConnections.list","cloudkms.ekmConnections.setIamPolicy","cloudkms.importJobs.getIamPolicy","cloudkms.importJobs.list","cloudkms.importJobs.setIamPolicy","cloudkms.keyRings.getIamPolicy","cloudkms.keyRings.list","cloudkms.keyRings.setIamPolicy","cloudkms.locations.list","cloudnotifications.*","cloudonefs.isiloncloud.com/clusters.list","cloudonefs.isiloncloud.com/fileshares.list","cloudprivatecatalogproducer.associations.list","cloudprivatecatalogproducer.catalogAssociations.list","cloudprivatecatalogproducer.catalogs.getIamPolicy","cloudprivatecatalogproducer.catalogs.list","cloudprivatecatalogproducer.catalogs.setIamPolicy","cloudprivatecatalogproducer.producerCatalogs.getIamPolicy","cloudprivatecatalogproducer.producerCatalogs.list","cloudprivatecatalogproducer.producerCatalogs.setIamPolicy","cloudprivatecatalogproducer.products.getIamPolicy","cloudprivatecatalogproducer.products.list","cloudprivatecatalogproducer.products.setIamPolicy","cloudprofiler.profiles.list","cloudscheduler.jobs.list","cloudscheduler.locations.list","cloudsecurityscanner.crawledurls.*","cloudsecurityscanner.results.list","cloudsecurityscanner.scanruns.list","cloudsecurityscanner.scans.list","cloudsql.backupRuns.list","cloudsql.databases.list","cloudsql.instances.list","cloudsql.sslCerts.list","cloudsql.users.list","cloudsupport.accounts.getIamPolicy","cloudsupport.accounts.list","cloudsupport.accounts.setIamPolicy","cloudsupport.techCases.list","cloudtasks.locations.list","cloudtasks.queues.getIamPolicy","cloudtasks.queues.list","cloudtasks.queues.setIamPolicy","cloudtasks.tasks.list","cloudtoolresults.executions.list","cloudtoolresults.histories.list","cloudtoolresults.steps.list","cloudtrace.insights.list","cloudtrace.tasks.list","cloudtrace.traces.list","cloudtranslate.glossaries.list","cloudtranslate.locations.list","cloudtranslate.operations.list","cloudvolumesgcp-api.netapp.com/activeDirectories.list","cloudvolumesgcp-api.netapp.com/ipRanges.*","cloudvolumesgcp-api.netapp.com/jobs.list","cloudvolumesgcp-api.netapp.com/regions.*","cloudvolumesgcp-api.netapp.com/serviceLevels.*","cloudvolumesgcp-api.netapp.com/snapshots.list","cloudvolumesgcp-api.netapp.com/volumes.list","commerceprice.privateoffers.list","composer.dags.list","composer.environments.list","composer.imageversions.*","composer.operations.list","compute.acceleratorTypes.list","compute.addresses.list","compute.autoscalers.list","compute.backendBuckets.list","compute.backendServices.getIamPolicy","compute.backendServices.list","compute.backendServices.setIamPolicy","compute.commitments.list","compute.diskTypes.list","compute.disks.getIamPolicy","compute.disks.list","compute.disks.setIamPolicy","compute.externalVpnGateways.list","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewallPolicies.setIamPolicy","compute.firewalls.list","compute.forwardingRules.list","compute.globalAddresses.list","compute.globalForwardingRules.list","compute.globalNetworkEndpointGroups.list","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalOperations.setIamPolicy","compute.globalPublicDelegatedPrefixes.list","compute.healthChecks.list","compute.httpHealthChecks.list","compute.httpsHealthChecks.list","compute.images.getIamPolicy","compute.images.list","compute.images.setIamPolicy","compute.instanceGroupManagers.list","compute.instanceGroups.list","compute.instanceTemplates.getIamPolicy","compute.instanceTemplates.list","compute.instanceTemplates.setIamPolicy","compute.instances.getIamPolicy","compute.instances.list","compute.instances.setIamPolicy","compute.interconnectAttachments.list","compute.interconnectLocations.list","compute.interconnects.list","compute.licenseCodes.getIamPolicy","compute.licenseCodes.list","compute.licenseCodes.setIamPolicy","compute.licenses.getIamPolicy","compute.licenses.list","compute.licenses.setIamPolicy","compute.machineImages.getIamPolicy","compute.machineImages.list","compute.machineImages.setIamPolicy","compute.machineTypes.list","compute.maintenancePolicies.getIamPolicy","compute.maintenancePolicies.list","compute.maintenancePolicies.setIamPolicy","compute.networkEndpointGroups.getIamPolicy","compute.networkEndpointGroups.list","compute.networkEndpointGroups.setIamPolicy","compute.networks.list","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeGroups.setIamPolicy","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTemplates.setIamPolicy","compute.nodeTypes.list","compute.packetMirrorings.list","compute.publicAdvertisedPrefixes.list","compute.publicDelegatedPrefixes.list","compute.regionBackendServices.getIamPolicy","compute.regionBackendServices.list","compute.regionBackendServices.setIamPolicy","compute.regionFirewallPolicies.getIamPolicy","compute.regionFirewallPolicies.list","compute.regionFirewallPolicies.setIamPolicy","compute.regionHealthCheckServices.list","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.list","compute.regionNotificationEndpoints.list","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionOperations.setIamPolicy","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.list","compute.regions.list","compute.reservations.list","compute.resourcePolicies.list","compute.routers.list","compute.routes.list","compute.securityPolicies.getIamPolicy","compute.securityPolicies.list","compute.securityPolicies.setIamPolicy","compute.serviceAttachments.list","compute.snapshots.getIamPolicy","compute.snapshots.list","compute.snapshots.setIamPolicy","compute.sslCertificates.list","compute.sslPolicies.list","compute.subnetworks.getIamPolicy","compute.subnetworks.list","compute.subnetworks.setIamPolicy","compute.targetGrpcProxies.list","compute.targetHttpProxies.list","compute.targetHttpsProxies.list","compute.targetInstances.list","compute.targetPools.list","compute.targetSslProxies.list","compute.targetTcpProxies.list","compute.targetVpnGateways.list","compute.urlMaps.list","compute.vpnGateways.list","compute.vpnTunnels.list","compute.zoneOperations.getIamPolicy","compute.zoneOperations.list","compute.zoneOperations.setIamPolicy","compute.zones.list","connectors.connections.getIamPolicy","connectors.connections.list","connectors.connections.setIamPolicy","connectors.connectors.list","connectors.locations.list","connectors.operations.list","connectors.providers.list","connectors.versions.list","consumerprocurement.accounts.list","consumerprocurement.entitlements.list","consumerprocurement.freeTrials.list","consumerprocurement.orderAttributions.list","consumerprocurement.orders.list","contactcenterinsights.analyses.list","contactcenterinsights.conversations.list","contactcenterinsights.issueModels.list","contactcenterinsights.issues.list","contactcenterinsights.operations.list","contactcenterinsights.phraseMatchers.list","container.apiServices.list","container.auditSinks.list","container.backendConfigs.list","container.bindings.list","container.certificateSigningRequests.list","container.clusterRoleBindings.list","container.clusterRoles.list","container.clusters.list","container.componentStatuses.list","container.configMaps.list","container.controllerRevisions.list","container.cronJobs.list","container.csiDrivers.list","container.csiNodeInfos.list","container.csiNodes.list","container.customResourceDefinitions.list","container.daemonSets.list","container.deployments.list","container.endpointSlices.list","container.endpoints.list","container.events.list","container.frontendConfigs.list","container.horizontalPodAutoscalers.list","container.ingresses.list","container.initializerConfigurations.list","container.jobs.list","container.leases.list","container.limitRanges.list","container.localSubjectAccessReviews.list","container.managedCertificates.list","container.mutatingWebhookConfigurations.list","container.namespaces.list","container.networkPolicies.list","container.nodes.list","container.operations.list","container.persistentVolumeClaims.list","container.persistentVolumes.list","container.petSets.list","container.podDisruptionBudgets.list","container.podPresets.list","container.podSecurityPolicies.list","container.podTemplates.list","container.pods.list","container.priorityClasses.list","container.replicaSets.list","container.replicationControllers.list","container.resourceQuotas.list","container.roleBindings.list","container.roles.list","container.runtimeClasses.list","container.scheduledJobs.list","container.selfSubjectAccessReviews.list","container.serviceAccounts.list","container.services.list","container.statefulSets.list","container.storageClasses.list","container.storageStates.list","container.storageVersionMigrations.list","container.subjectAccessReviews.list","container.thirdPartyObjects.list","container.thirdPartyResources.list","container.updateInfos.list","container.validatingWebhookConfigurations.list","container.volumeAttachments.list","container.volumeSnapshotClasses.list","container.volumeSnapshotContents.list","container.volumeSnapshots.list","containeranalysis.notes.getIamPolicy","containeranalysis.notes.list","containeranalysis.notes.setIamPolicy","containeranalysis.occurrences.getIamPolicy","containeranalysis.occurrences.list","containeranalysis.occurrences.setIamPolicy","contentwarehouse.documentSchemas.list","contentwarehouse.documents.getIamPolicy","contentwarehouse.documents.setIamPolicy","contentwarehouse.ruleSets.list","contentwarehouse.synonymSets.list","datacatalog.categories.getIamPolicy","datacatalog.categories.setIamPolicy","datacatalog.entries.getIamPolicy","datacatalog.entries.list","datacatalog.entries.setIamPolicy","datacatalog.entryGroups.getIamPolicy","datacatalog.entryGroups.list","datacatalog.entryGroups.setIamPolicy","datacatalog.tagTemplates.getIamPolicy","datacatalog.tagTemplates.setIamPolicy","datacatalog.taxonomies.getIamPolicy","datacatalog.taxonomies.list","datacatalog.taxonomies.setIamPolicy","dataconnectors.connectors.getIamPolicy","dataconnectors.connectors.list","dataconnectors.connectors.setIamPolicy","dataconnectors.locations.list","dataconnectors.operations.list","dataflow.jobs.list","dataflow.messages.*","dataflow.snapshots.list","datafusion.instances.getIamPolicy","datafusion.instances.list","datafusion.instances.setIamPolicy","datafusion.locations.list","datafusion.operations.list","datalabeling.annotateddatasets.list","datalabeling.annotationspecsets.list","datalabeling.dataitems.list","datalabeling.datasets.list","datalabeling.examples.list","datalabeling.instructions.list","datalabeling.operations.list","datamigration.connectionprofiles.getIamPolicy","datamigration.connectionprofiles.list","datamigration.connectionprofiles.setIamPolicy","datamigration.locations.list","datamigration.migrationjobs.getIamPolicy","datamigration.migrationjobs.list","datamigration.migrationjobs.setIamPolicy","datamigration.operations.list","datapipelines.jobs.*","datapipelines.pipelines.list","dataplex.assetActions.*","dataplex.assets.getIamPolicy","dataplex.assets.list","dataplex.assets.setIamPolicy","dataplex.content.getIamPolicy","dataplex.content.list","dataplex.content.setIamPolicy","dataplex.entities.list","dataplex.environments.getIamPolicy","dataplex.environments.list","dataplex.environments.setIamPolicy","dataplex.lakeActions.*","dataplex.lakes.getIamPolicy","dataplex.lakes.list","dataplex.lakes.setIamPolicy","dataplex.locations.list","dataplex.operations.list","dataplex.partitions.list","dataplex.tasks.getIamPolicy","dataplex.tasks.list","dataplex.tasks.setIamPolicy","dataplex.zoneActions.*","dataplex.zones.getIamPolicy","dataplex.zones.list","dataplex.zones.setIamPolicy","dataproc.agents.list","dataproc.autoscalingPolicies.getIamPolicy","dataproc.autoscalingPolicies.list","dataproc.autoscalingPolicies.setIamPolicy","dataproc.batches.list","dataproc.clusters.getIamPolicy","dataproc.clusters.list","dataproc.clusters.setIamPolicy","dataproc.jobs.getIamPolicy","dataproc.jobs.list","dataproc.jobs.setIamPolicy","dataproc.operations.getIamPolicy","dataproc.operations.list","dataproc.operations.setIamPolicy","dataproc.workflowTemplates.getIamPolicy","dataproc.workflowTemplates.list","dataproc.workflowTemplates.setIamPolicy","dataprocessing.datasources.list","dataprocessing.featurecontrols.list","dataprocessing.groupcontrols.list","datastore.databases.getIamPolicy","datastore.databases.list","datastore.databases.setIamPolicy","datastore.entities.list","datastore.indexes.list","datastore.keyVisualizerScans.list","datastore.locations.list","datastore.namespaces.getIamPolicy","datastore.namespaces.list","datastore.namespaces.setIamPolicy","datastore.operations.list","datastore.statistics.list","datastream.connectionProfiles.getIamPolicy","datastream.connectionProfiles.list","datastream.connectionProfiles.setIamPolicy","datastream.locations.list","datastream.objects.list","datastream.operations.list","datastream.privateConnections.getIamPolicy","datastream.privateConnections.list","datastream.privateConnections.setIamPolicy","datastream.routes.getIamPolicy","datastream.routes.list","datastream.routes.setIamPolicy","datastream.streams.getIamPolicy","datastream.streams.list","datastream.streams.setIamPolicy","deploymentmanager.compositeTypes.list","deploymentmanager.deployments.getIamPolicy","deploymentmanager.deployments.list","deploymentmanager.deployments.setIamPolicy","deploymentmanager.manifests.list","deploymentmanager.operations.list","deploymentmanager.resources.list","deploymentmanager.typeProviders.list","deploymentmanager.types.list","dialogflow.agents.list","dialogflow.answerrecords.list","dialogflow.callMatchers.list","dialogflow.changelogs.list","dialogflow.contexts.list","dialogflow.conversationDatasets.list","dialogflow.conversationModels.list","dialogflow.conversationProfiles.list","dialogflow.conversations.list","dialogflow.documents.list","dialogflow.entityTypes.list","dialogflow.environments.list","dialogflow.flows.list","dialogflow.integrations.list","dialogflow.intents.list","dialogflow.knowledgeBases.list","dialogflow.messages.*","dialogflow.modelEvaluations.list","dialogflow.pages.list","dialogflow.participants.list","dialogflow.phoneNumberOrders.list","dialogflow.phoneNumbers.list","dialogflow.securitySettings.list","dialogflow.sessionEntityTypes.list","dialogflow.smartMessagingEntries.list","dialogflow.transitionRouteGroups.list","dialogflow.versions.list","dialogflow.webhooks.list","dlp.analyzeRiskTemplates.list","dlp.columnDataProfiles.list","dlp.deidentifyTemplates.list","dlp.estimates.list","dlp.inspectFindings.*","dlp.inspectTemplates.list","dlp.jobTriggers.list","dlp.jobs.list","dlp.locations.list","dlp.projectDataProfiles.list","dlp.storedInfoTypes.list","dlp.tableDataProfiles.list","dns.changes.list","dns.dnsKeys.list","dns.managedZoneOperations.list","dns.managedZones.list","dns.policies.getIamPolicy","dns.policies.list","dns.policies.setIamPolicy","dns.resourceRecordSets.list","dns.responsePolicies.list","dns.responsePolicyRules.list","documentai.evaluations.list","documentai.labelerPools.list","documentai.locations.list","documentai.processorTypes.list","documentai.processorVersions.list","documentai.processors.list","domains.locations.list","domains.operations.list","domains.registrations.getIamPolicy","domains.registrations.list","domains.registrations.setIamPolicy","earlyaccesscenter.campaigns.list","earlyaccesscenter.customerAllowlists.list","earthengine.assets.getIamPolicy","earthengine.assets.list","earthengine.assets.setIamPolicy","earthengine.operations.list","edgecontainer.clusters.getIamPolicy","edgecontainer.clusters.list","edgecontainer.clusters.setIamPolicy","edgecontainer.locations.list","edgecontainer.machines.getIamPolicy","edgecontainer.machines.list","edgecontainer.machines.setIamPolicy","edgecontainer.nodePools.getIamPolicy","edgecontainer.nodePools.list","edgecontainer.nodePools.setIamPolicy","edgecontainer.operations.list","edgecontainer.vpnConnections.getIamPolicy","edgecontainer.vpnConnections.list","edgecontainer.vpnConnections.setIamPolicy","errorreporting.applications.*","errorreporting.errorEvents.list","errorreporting.groups.*","essentialcontacts.contacts.list","eventarc.locations.list","eventarc.operations.list","eventarc.providers.list","eventarc.triggers.getIamPolicy","eventarc.triggers.list","eventarc.triggers.setIamPolicy","fcmdata.*","file.backups.list","file.instances.list","file.locations.list","file.operations.list","firebase.clients.list","firebase.links.list","firebase.playLinks.list","firebaseabt.experiments.list","firebaseappdistro.groups.list","firebaseappdistro.releases.list","firebaseappdistro.testers.list","firebasecrashlytics.issues.list","firebasedatabase.instances.list","firebasedynamiclinks.destinations.list","firebasedynamiclinks.domains.list","firebasedynamiclinks.links.list","firebaseextensions.configs.list","firebasehosting.sites.list","firebaseinappmessaging.campaigns.list","firebaseml.compressionjobs.list","firebaseml.models.list","firebaseml.modelversions.list","firebasenotifications.messages.list","firebasepredictions.predictions.list","firebaserules.releases.list","firebaserules.rulesets.list","firebasestorage.buckets.list","fleetengine.deliveryvehicles.list","fleetengine.tasks.list","fleetengine.vehicles.list","gameservices.gameServerClusters.list","gameservices.gameServerConfigs.list","gameservices.gameServerDeployments.list","gameservices.locations.list","gameservices.operations.list","gameservices.realms.list","gcp.redisenterprise.com/databases.list","gcp.redisenterprise.com/subscriptions.list","genomics.datasets.getIamPolicy","genomics.datasets.list","genomics.datasets.setIamPolicy","genomics.operations.list","gkebackup.backupPlans.getIamPolicy","gkebackup.backupPlans.list","gkebackup.backupPlans.setIamPolicy","gkebackup.backups.list","gkebackup.locations.list","gkebackup.operations.list","gkebackup.restorePlans.getIamPolicy","gkebackup.restorePlans.list","gkebackup.restorePlans.setIamPolicy","gkebackup.restores.list","gkebackup.volumeBackups.list","gkebackup.volumeRestores.list","gkehub.features.getIamPolicy","gkehub.features.list","gkehub.features.setIamPolicy","gkehub.gateway.getIamPolicy","gkehub.gateway.setIamPolicy","gkehub.locations.list","gkehub.memberships.getIamPolicy","gkehub.memberships.list","gkehub.memberships.setIamPolicy","gkehub.operations.list","gkemulticloud.awsClusters.list","gkemulticloud.awsNodePools.list","gkemulticloud.azureClients.list","gkemulticloud.azureClusters.list","gkemulticloud.azureNodePools.list","gkemulticloud.operations.list","gkeonprem.locations.list","gkeonprem.operations.list","gkeonprem.vmwareClusters.getIamPolicy","gkeonprem.vmwareClusters.list","gkeonprem.vmwareClusters.setIamPolicy","gkeonprem.vmwareNodePools.getIamPolicy","gkeonprem.vmwareNodePools.list","gkeonprem.vmwareNodePools.setIamPolicy","gsuiteaddons.deployments.list","healthcare.annotationStores.getIamPolicy","healthcare.annotationStores.list","healthcare.annotationStores.setIamPolicy","healthcare.annotations.list","healthcare.attributeDefinitions.list","healthcare.consentArtifacts.list","healthcare.consentStores.getIamPolicy","healthcare.consentStores.list","healthcare.consentStores.setIamPolicy","healthcare.consents.list","healthcare.datasets.getIamPolicy","healthcare.datasets.list","healthcare.datasets.setIamPolicy","healthcare.dicomStores.getIamPolicy","healthcare.dicomStores.list","healthcare.dicomStores.setIamPolicy","healthcare.fhirStores.getIamPolicy","healthcare.fhirStores.list","healthcare.fhirStores.setIamPolicy","healthcare.hl7V2Messages.list","healthcare.hl7V2Stores.getIamPolicy","healthcare.hl7V2Stores.list","healthcare.hl7V2Stores.setIamPolicy","healthcare.locations.list","healthcare.operations.list","healthcare.userDataMappings.list","iam.denypolicies.list","iam.googleapis.com/workloadIdentityPoolProviders.list","iam.googleapis.com/workloadIdentityPools.list","iam.roles.get","iam.roles.list","iam.serviceAccountKeys.list","iam.serviceAccounts.get","iam.serviceAccounts.getIamPolicy","iam.serviceAccounts.list","iam.serviceAccounts.setIamPolicy","iap.tunnel.*","iap.tunnelInstances.getIamPolicy","iap.tunnelInstances.setIamPolicy","iap.tunnelZones.*","iap.web.getIamPolicy","iap.web.setIamPolicy","iap.webServiceVersions.getIamPolicy","iap.webServiceVersions.setIamPolicy","iap.webServices.getIamPolicy","iap.webServices.setIamPolicy","iap.webTypes.getIamPolicy","iap.webTypes.setIamPolicy","ids.endpoints.getIamPolicy","ids.endpoints.list","ids.endpoints.setIamPolicy","ids.locations.list","ids.operations.list","integrations.apigeeAuthConfigs.list","integrations.apigeeCertificates.list","integrations.apigeeExecutions.*","integrations.apigeeIntegrationVers.list","integrations.apigeeIntegrations.list","integrations.apigeeSfdcChannels.list","integrations.apigeeSfdcInstances.list","integrations.apigeeSuspensions.list","integrations.securityAuthConfigs.list","integrations.securityExecutions.list","integrations.securityIntegTempVers.list","integrations.securityIntegrationVers.list","integrations.securityIntegrations.list","krmapihosting.krmApiHosts.getIamPolicy","krmapihosting.krmApiHosts.list","krmapihosting.krmApiHosts.setIamPolicy","krmapihosting.locations.list","krmapihosting.operations.list","lifesciences.operations.list","livestream.channels.list","livestream.events.list","livestream.inputs.list","livestream.locations.list","livestream.operations.list","logging.buckets.list","logging.exclusions.list","logging.locations.list","logging.logEntries.list","logging.logMetrics.list","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.notificationRules.list","logging.operations.list","logging.privateLogEntries.*","logging.queries.list","logging.sinks.list","logging.views.list","managedidentities.backups.getIamPolicy","managedidentities.backups.list","managedidentities.backups.setIamPolicy","managedidentities.domains.getIamPolicy","managedidentities.domains.list","managedidentities.domains.setIamPolicy","managedidentities.locations.list","managedidentities.operations.list","managedidentities.peerings.getIamPolicy","managedidentities.peerings.list","managedidentities.peerings.setIamPolicy","managedidentities.sqlintegrations.list","memcache.instances.list","memcache.locations.list","memcache.operations.list","metastore.backups.list","metastore.databases.getIamPolicy","metastore.databases.list","metastore.databases.setIamPolicy","metastore.imports.list","metastore.locations.list","metastore.operations.list","metastore.services.getIamPolicy","metastore.services.list","metastore.services.setIamPolicy","metastore.tables.getIamPolicy","metastore.tables.list","metastore.tables.setIamPolicy","ml.jobs.getIamPolicy","ml.jobs.list","ml.jobs.setIamPolicy","ml.locations.list","ml.models.getIamPolicy","ml.models.list","ml.models.setIamPolicy","ml.operations.list","ml.studies.getIamPolicy","ml.studies.list","ml.studies.setIamPolicy","ml.trials.list","ml.versions.list","monitoring.alertPolicies.list","monitoring.dashboards.list","monitoring.groups.list","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.list","monitoring.notificationChannelDescriptors.list","monitoring.notificationChannels.list","monitoring.publicWidgets.list","monitoring.services.list","monitoring.slos.list","monitoring.timeSeries.list","monitoring.uptimeCheckConfigs.list","networkconnectivity.hubs.getIamPolicy","networkconnectivity.hubs.list","networkconnectivity.hubs.setIamPolicy","networkconnectivity.locations.list","networkconnectivity.operations.list","networkconnectivity.spokes.getIamPolicy","networkconnectivity.spokes.list","networkconnectivity.spokes.setIamPolicy","networkmanagement.connectivitytests.getIamPolicy","networkmanagement.connectivitytests.list","networkmanagement.connectivitytests.setIamPolicy","networkmanagement.locations.list","networkmanagement.operations.list","networksecurity.authorizationPolicies.getIamPolicy","networksecurity.authorizationPolicies.list","networksecurity.authorizationPolicies.setIamPolicy","networksecurity.clientTlsPolicies.getIamPolicy","networksecurity.clientTlsPolicies.list","networksecurity.clientTlsPolicies.setIamPolicy","networksecurity.locations.list","networksecurity.operations.list","networksecurity.serverTlsPolicies.getIamPolicy","networksecurity.serverTlsPolicies.list","networksecurity.serverTlsPolicies.setIamPolicy","networkservices.endpointConfigSelectors.getIamPolicy","networkservices.endpointConfigSelectors.list","networkservices.endpointConfigSelectors.setIamPolicy","networkservices.endpointPolicies.getIamPolicy","networkservices.endpointPolicies.list","networkservices.endpointPolicies.setIamPolicy","networkservices.gateways.list","networkservices.grpcRoutes.getIamPolicy","networkservices.grpcRoutes.list","networkservices.grpcRoutes.setIamPolicy","networkservices.httpFilters.getIamPolicy","networkservices.httpFilters.list","networkservices.httpFilters.setIamPolicy","networkservices.httpRoutes.getIamPolicy","networkservices.httpRoutes.list","networkservices.httpRoutes.setIamPolicy","networkservices.httpfilters.getIamPolicy","networkservices.httpfilters.list","networkservices.httpfilters.setIamPolicy","networkservices.locations.list","networkservices.meshes.getIamPolicy","networkservices.meshes.list","networkservices.meshes.setIamPolicy","networkservices.operations.list","networkservices.serviceBindings.list","networkservices.tcpRoutes.getIamPolicy","networkservices.tcpRoutes.list","networkservices.tcpRoutes.setIamPolicy","notebooks.environments.getIamPolicy","notebooks.environments.list","notebooks.environments.setIamPolicy","notebooks.executions.getIamPolicy","notebooks.executions.list","notebooks.executions.setIamPolicy","notebooks.instances.getIamPolicy","notebooks.instances.list","notebooks.instances.setIamPolicy","notebooks.locations.list","notebooks.operations.list","notebooks.runtimes.getIamPolicy","notebooks.runtimes.list","notebooks.runtimes.setIamPolicy","notebooks.schedules.getIamPolicy","notebooks.schedules.list","notebooks.schedules.setIamPolicy","ondemandscanning.operations.list","opsconfigmonitoring.resourceMetadata.list","orgpolicy.constraints.*","orgpolicy.policies.list","osconfig.guestPolicies.list","osconfig.instanceOSPoliciesCompliances.list","osconfig.inventories.list","osconfig.osPolicyAssignmentReports.list","osconfig.osPolicyAssignments.list","osconfig.patchDeployments.list","osconfig.patchJobs.list","osconfig.vulnerabilityReports.list","paymentsresellersubscription.products.*","paymentsresellersubscription.promotions.*","policysimulator.*","privateca.caPools.getIamPolicy","privateca.caPools.list","privateca.caPools.setIamPolicy","privateca.certificateAuthorities.getIamPolicy","privateca.certificateAuthorities.list","privateca.certificateAuthorities.setIamPolicy","privateca.certificateRevocationLists.getIamPolicy","privateca.certificateRevocationLists.list","privateca.certificateRevocationLists.setIamPolicy","privateca.certificateTemplates.getIamPolicy","privateca.certificateTemplates.list","privateca.certificateTemplates.setIamPolicy","privateca.certificates.getIamPolicy","privateca.certificates.list","privateca.certificates.setIamPolicy","privateca.locations.list","privateca.operations.list","privateca.reusableConfigs.getIamPolicy","privateca.reusableConfigs.list","privateca.reusableConfigs.setIamPolicy","proximitybeacon.attachments.list","proximitybeacon.beacons.getIamPolicy","proximitybeacon.beacons.list","proximitybeacon.beacons.setIamPolicy","proximitybeacon.namespaces.getIamPolicy","proximitybeacon.namespaces.list","proximitybeacon.namespaces.setIamPolicy","pubsub.schemas.getIamPolicy","pubsub.schemas.list","pubsub.schemas.setIamPolicy","pubsub.snapshots.getIamPolicy","pubsub.snapshots.list","pubsub.snapshots.setIamPolicy","pubsub.subscriptions.getIamPolicy","pubsub.subscriptions.list","pubsub.subscriptions.setIamPolicy","pubsub.topics.getIamPolicy","pubsub.topics.list","pubsub.topics.setIamPolicy","pubsublite.operations.list","pubsublite.reservations.list","pubsublite.subscriptions.list","pubsublite.topics.list","recaptchaenterprise.keys.list","recaptchaenterprise.relatedaccountgroupmemberships.*","recaptchaenterprise.relatedaccountgroups.*","recommender.bigqueryCapacityCommitmentsInsights.list","recommender.bigqueryCapacityCommitmentsRecommendations.list","recommender.cloudAssetInsights.list","recommender.cloudsqlIdleInstanceRecommendations.list","recommender.cloudsqlInstanceActivityInsights.list","recommender.cloudsqlInstanceCpuUsageInsights.list","recommender.cloudsqlInstanceDiskUsageTrendInsights.list","recommender.cloudsqlInstanceMemoryUsageInsights.list","recommender.cloudsqlInstanceOutOfDiskRecommendations.list","recommender.cloudsqlOverprovisionedInstanceRecommendations.list","recommender.commitmentUtilizationInsights.list","recommender.computeAddressIdleResourceInsights.list","recommender.computeAddressIdleResourceRecommendations.list","recommender.computeDiskIdleResourceInsights.list","recommender.computeDiskIdleResourceRecommendations.list","recommender.computeFirewallInsights.list","recommender.computeImageIdleResourceInsights.list","recommender.computeImageIdleResourceRecommendations.list","recommender.computeInstanceGroupManagerMachineTypeRecommendations.list","recommender.computeInstanceIdleResourceRecommendations.list","recommender.computeInstanceMachineTypeRecommendations.list","recommender.dataflowDiagnosticsInsights.list","recommender.errorReportingInsights.list","recommender.errorReportingRecommendations.list","recommender.iamPolicyInsights.list","recommender.iamPolicyLateralMovementInsights.list","recommender.iamPolicyRecommendations.list","recommender.iamServiceAccountInsights.list","recommender.locations.list","recommender.loggingProductSuggestionContainerInsights.list","recommender.loggingProductSuggestionContainerRecommendations.list","recommender.monitoringProductSuggestionComputeInsights.list","recommender.monitoringProductSuggestionComputeRecommendations.list","recommender.resourcemanagerProjectUtilizationInsights.list","recommender.resourcemanagerProjectUtilizationRecommendations.list","recommender.usageCommitmentRecommendations.list","redis.instances.list","redis.locations.list","redis.operations.list","remotebuildexecution.instances.list","remotebuildexecution.workerpools.list","resourcemanager.folders.getIamPolicy","resourcemanager.folders.list","resourcemanager.folders.setIamPolicy","resourcemanager.hierarchyNodes.listTagBindings","resourcemanager.organizations.getIamPolicy","resourcemanager.organizations.setIamPolicy","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","resourcemanager.projects.setIamPolicy","resourcemanager.tagHolds.list","resourcemanager.tagKeys.getIamPolicy","resourcemanager.tagKeys.list","resourcemanager.tagKeys.setIamPolicy","resourcemanager.tagValues.getIamPolicy","resourcemanager.tagValues.list","resourcemanager.tagValues.setIamPolicy","resourcesettings.settings.list","retail.catalogs.list","retail.controls.list","retail.models.list","retail.operations.list","retail.products.list","retail.servingConfigs.list","riskmanager.operations.list","riskmanager.policies.list","riskmanager.reports.list","run.configurations.list","run.locations.*","run.operations.list","run.revisions.list","run.routes.list","run.services.getIamPolicy","run.services.list","run.services.setIamPolicy","runtimeconfig.configs.getIamPolicy","runtimeconfig.configs.list","runtimeconfig.configs.setIamPolicy","runtimeconfig.operations.list","runtimeconfig.variables.getIamPolicy","runtimeconfig.variables.list","runtimeconfig.variables.setIamPolicy","runtimeconfig.waiters.getIamPolicy","runtimeconfig.waiters.list","runtimeconfig.waiters.setIamPolicy","secretmanager.locations.list","secretmanager.secrets.getIamPolicy","secretmanager.secrets.list","secretmanager.secrets.setIamPolicy","secretmanager.versions.list","securitycenter.assets.list","securitycenter.bigQueryExports.list","securitycenter.findings.list","securitycenter.muteconfigs.list","securitycenter.notificationconfig.list","securitycenter.sources.getIamPolicy","securitycenter.sources.list","securitycenter.sources.setIamPolicy","servicebroker.bindingoperations.list","servicebroker.bindings.getIamPolicy","servicebroker.bindings.list","servicebroker.bindings.setIamPolicy","servicebroker.catalogs.getIamPolicy","servicebroker.catalogs.list","servicebroker.catalogs.setIamPolicy","servicebroker.instanceoperations.list","servicebroker.instances.getIamPolicy","servicebroker.instances.list","servicebroker.instances.setIamPolicy","serviceconsumermanagement.tenancyu.list","servicedirectory.endpoints.getIamPolicy","servicedirectory.endpoints.list","servicedirectory.endpoints.setIamPolicy","servicedirectory.locations.list","servicedirectory.namespaces.getIamPolicy","servicedirectory.namespaces.list","servicedirectory.namespaces.setIamPolicy","servicedirectory.services.getIamPolicy","servicedirectory.services.list","servicedirectory.services.setIamPolicy","servicemanagement.services.getIamPolicy","servicemanagement.services.list","servicemanagement.services.setIamPolicy","servicenetworking.operations.list","serviceusage.operations.list","serviceusage.services.list","source.repos.getIamPolicy","source.repos.list","source.repos.setIamPolicy","spanner.backupOperations.list","spanner.backups.getIamPolicy","spanner.backups.list","spanner.backups.setIamPolicy","spanner.databaseOperations.list","spanner.databases.getIamPolicy","spanner.databases.list","spanner.databases.setIamPolicy","spanner.instanceConfigs.list","spanner.instanceOperations.list","spanner.instances.getIamPolicy","spanner.instances.list","spanner.instances.setIamPolicy","spanner.sessions.list","speech.customClasses.list","speech.phraseSets.list","storage.buckets.getIamPolicy","storage.buckets.list","storage.buckets.setIamPolicy","storage.hmacKeys.list","storage.multipartUploads.list","storage.objects.getIamPolicy","storage.objects.list","storage.objects.setIamPolicy","storagetransfer.agentpools.list","storagetransfer.jobs.list","storagetransfer.operations.list","tpu.acceleratortypes.list","tpu.locations.list","tpu.nodes.list","tpu.operations.list","tpu.tensorflowversions.list","transcoder.jobTemplates.list","transcoder.jobs.list","translationhub.portals.list","videostitcher.cdnKeys.list","videostitcher.liveAdTagDetails.list","videostitcher.slates.list","videostitcher.vodAdTagDetails.list","videostitcher.vodStitchDetails.list","visualinspection.annotationSets.list","visualinspection.annotationSpecs.list","visualinspection.annotations.list","visualinspection.datasets.list","visualinspection.images.list","visualinspection.locations.list","visualinspection.modelEvaluations.list","visualinspection.models.list","visualinspection.modules.list","visualinspection.operations.list","visualinspection.solutionArtifacts.list","visualinspection.solutions.list","vmmigration.cloneJobs.list","vmmigration.cutoverJobs.list","vmmigration.datacenterConnectors.list","vmmigration.deployments.list","vmmigration.groups.list","vmmigration.locations.list","vmmigration.migratingVms.list","vmmigration.operations.list","vmmigration.sources.list","vmmigration.targets.list","vmmigration.utilizationReports.list","vpcaccess.connectors.list","vpcaccess.locations.*","vpcaccess.operations.list","workflows.executions.list","workflows.locations.list","workflows.operations.list","workflows.workflows.list"],"en":{"roleTitle":"Security Admin","roleName":"roles/iam.securityAdmin","roleDescription":"Security admin role, with permissions to get and set any IAM policy."},"ja":{"roleTitle":"セキュリティ管理者","roleName":"roles/iam.securityAdmin","roleDescription":"任意の IAM ポリシーを取得して設定する権限を持つ、セキュリティ管理者ロール。"}},"roles/iam.securityReviewer":{"permissions":["accessapproval.requests.list","accesscontextmanager.accessLevels.list","accesscontextmanager.accessPolicies.getIamPolicy","accesscontextmanager.accessPolicies.list","accesscontextmanager.accessZones.list","accesscontextmanager.gcpUserAccessBindings.list","accesscontextmanager.policies.getIamPolicy","accesscontextmanager.policies.list","accesscontextmanager.servicePerimeters.list","actions.agentVersions.list","advisorynotifications.notifications.list","aiplatform.annotationSpecs.list","aiplatform.annotations.list","aiplatform.artifacts.list","aiplatform.batchPredictionJobs.list","aiplatform.contexts.list","aiplatform.customJobs.list","aiplatform.dataItems.list","aiplatform.dataLabelingJobs.list","aiplatform.datasets.list","aiplatform.deploymentResourcePools.list","aiplatform.edgeDeploymentJobs.list","aiplatform.edgeDevices.list","aiplatform.endpoints.list","aiplatform.entityTypes.list","aiplatform.executions.list","aiplatform.features.list","aiplatform.featurestores.list","aiplatform.humanInTheLoops.list","aiplatform.hyperparameterTuningJobs.list","aiplatform.indexEndpoints.list","aiplatform.indexes.list","aiplatform.locations.list","aiplatform.metadataSchemas.list","aiplatform.metadataStores.list","aiplatform.modelDeploymentMonitoringJobs.list","aiplatform.modelEvaluationSlices.list","aiplatform.modelEvaluations.list","aiplatform.models.list","aiplatform.nasJobs.list","aiplatform.operations.*","aiplatform.pipelineJobs.list","aiplatform.specialistPools.list","aiplatform.studies.list","aiplatform.tensorboardExperiments.list","aiplatform.tensorboardRuns.list","aiplatform.tensorboardTimeSeries.list","aiplatform.tensorboards.list","aiplatform.trainingPipelines.list","aiplatform.trials.list","analyticshub.dataExchanges.getIamPolicy","analyticshub.dataExchanges.list","analyticshub.listings.getIamPolicy","analyticshub.listings.list","apigateway.apiconfigs.getIamPolicy","apigateway.apiconfigs.list","apigateway.apis.getIamPolicy","apigateway.apis.list","apigateway.gateways.getIamPolicy","apigateway.gateways.list","apigateway.locations.list","apigateway.operations.list","apigee.apiproductattributes.list","apigee.apiproducts.list","apigee.apps.list","apigee.archivedeployments.list","apigee.caches.list","apigee.datacollectors.list","apigee.datastores.list","apigee.deployments.list","apigee.developerappattributes.list","apigee.developerapps.list","apigee.developerattributes.list","apigee.developers.list","apigee.developersubscriptions.list","apigee.envgroupattachments.list","apigee.envgroups.list","apigee.environments.getIamPolicy","apigee.environments.list","apigee.exports.list","apigee.flowhooks.list","apigee.hostqueries.list","apigee.hostsecurityreports.list","apigee.instanceattachments.list","apigee.instances.list","apigee.keystorealiases.list","apigee.keystores.list","apigee.keyvaluemapentries.*","apigee.keyvaluemaps.list","apigee.operations.list","apigee.organizations.list","apigee.portals.list","apigee.proxies.list","apigee.proxyrevisions.list","apigee.queries.list","apigee.rateplans.list","apigee.references.list","apigee.reports.list","apigee.resourcefiles.list","apigee.securityreports.list","apigee.sharedflowrevisions.list","apigee.sharedflows.list","apigee.targetservers.list","apigee.tracesessions.list","apigeeconnect.connections.*","apigeeregistry.apis.getIamPolicy","apigeeregistry.apis.list","apigeeregistry.artifacts.getIamPolicy","apigeeregistry.artifacts.list","apigeeregistry.deployments.list","apigeeregistry.locations.list","apigeeregistry.operations.list","apigeeregistry.specs.getIamPolicy","apigeeregistry.specs.list","apigeeregistry.versions.getIamPolicy","apigeeregistry.versions.list","apikeys.keys.list","appengine.instances.list","appengine.memcache.list","appengine.operations.list","appengine.services.list","appengine.versions.list","artifactregistry.dockerimages.list","artifactregistry.files.list","artifactregistry.packages.list","artifactregistry.repositories.getIamPolicy","artifactregistry.repositories.list","artifactregistry.tags.list","artifactregistry.versions.list","assuredworkloads.operations.list","assuredworkloads.violations.list","assuredworkloads.workload.list","automl.annotationSpecs.list","automl.annotations.list","automl.columnSpecs.list","automl.datasets.getIamPolicy","automl.datasets.list","automl.examples.list","automl.humanAnnotationTasks.list","automl.locations.getIamPolicy","automl.locations.list","automl.modelEvaluations.list","automl.models.getIamPolicy","automl.models.list","automl.operations.list","automl.tableSpecs.list","automlrecommendations.apiKeys.list","automlrecommendations.catalogItems.list","automlrecommendations.catalogs.list","automlrecommendations.events.list","automlrecommendations.placements.list","automlrecommendations.recommendations.list","autoscaling.sites.getIamPolicy","baremetalsolution.instances.list","baremetalsolution.luns.list","baremetalsolution.networks.list","baremetalsolution.nfsshares.list","baremetalsolution.snapshotschedulepolicies.list","baremetalsolution.volumes.list","baremetalsolution.volumesnapshots.list","bigquery.capacityCommitments.list","bigquery.connections.getIamPolicy","bigquery.connections.list","bigquery.dataPolicies.getIamPolicy","bigquery.dataPolicies.list","bigquery.datasets.getIamPolicy","bigquery.jobs.list","bigquery.models.list","bigquery.reservationAssignments.list","bigquery.reservations.list","bigquery.routines.list","bigquery.rowAccessPolicies.getIamPolicy","bigquery.rowAccessPolicies.list","bigquery.savedqueries.list","bigquery.tables.getIamPolicy","bigquery.tables.list","bigquerymigration.locations.list","bigquerymigration.subtasks.list","bigquerymigration.workflows.list","bigtable.appProfiles.list","bigtable.backups.getIamPolicy","bigtable.backups.list","bigtable.clusters.list","bigtable.instances.getIamPolicy","bigtable.instances.list","bigtable.keyvisualizer.list","bigtable.locations.*","bigtable.tables.getIamPolicy","bigtable.tables.list","billing.accounts.getIamPolicy","billing.accounts.list","billing.budgets.list","billing.credits.*","billing.resourceAssociations.list","billing.subscriptions.list","binaryauthorization.attestors.getIamPolicy","binaryauthorization.attestors.list","binaryauthorization.continuousValidationConfig.getIamPolicy","binaryauthorization.platformPolicies.list","binaryauthorization.policy.getIamPolicy","certificatemanager.certmapentries.getIamPolicy","certificatemanager.certmapentries.list","certificatemanager.certmaps.getIamPolicy","certificatemanager.certmaps.list","certificatemanager.certs.getIamPolicy","certificatemanager.certs.list","certificatemanager.dnsauthorizations.getIamPolicy","certificatemanager.dnsauthorizations.list","certificatemanager.locations.list","certificatemanager.operations.list","clientauthconfig.brands.list","clientauthconfig.clients.list","cloudasset.feeds.list","cloudasset.savedqueries.list","cloudbuild.builds.list","cloudbuild.integrations.list","cloudbuild.workerpools.list","clouddebugger.breakpoints.list","clouddebugger.debuggees.list","clouddeploy.deliveryPipelines.getIamPolicy","clouddeploy.deliveryPipelines.list","clouddeploy.locations.list","clouddeploy.operations.list","clouddeploy.releases.list","clouddeploy.rollouts.list","clouddeploy.targets.getIamPolicy","clouddeploy.targets.list","cloudfunctions.functions.getIamPolicy","cloudfunctions.functions.list","cloudfunctions.locations.list","cloudfunctions.operations.list","cloudfunctions.runtimes.*","cloudiot.devices.list","cloudiot.registries.getIamPolicy","cloudiot.registries.list","cloudjobdiscovery.companies.list","cloudkms.cryptoKeyVersions.list","cloudkms.cryptoKeys.getIamPolicy","cloudkms.cryptoKeys.list","cloudkms.ekmConnections.getIamPolicy","cloudkms.ekmConnections.list","cloudkms.importJobs.getIamPolicy","cloudkms.importJobs.list","cloudkms.keyRings.getIamPolicy","cloudkms.keyRings.list","cloudkms.locations.list","cloudnotifications.*","cloudonefs.isiloncloud.com/clusters.list","cloudonefs.isiloncloud.com/fileshares.list","cloudprivatecatalogproducer.associations.list","cloudprivatecatalogproducer.catalogAssociations.list","cloudprivatecatalogproducer.catalogs.getIamPolicy","cloudprivatecatalogproducer.catalogs.list","cloudprivatecatalogproducer.producerCatalogs.getIamPolicy","cloudprivatecatalogproducer.producerCatalogs.list","cloudprivatecatalogproducer.products.getIamPolicy","cloudprivatecatalogproducer.products.list","cloudprofiler.profiles.list","cloudscheduler.jobs.list","cloudscheduler.locations.list","cloudsecurityscanner.crawledurls.*","cloudsecurityscanner.results.list","cloudsecurityscanner.scanruns.list","cloudsecurityscanner.scans.list","cloudsql.backupRuns.list","cloudsql.databases.list","cloudsql.instances.list","cloudsql.sslCerts.list","cloudsql.users.list","cloudsupport.accounts.getIamPolicy","cloudsupport.accounts.list","cloudsupport.techCases.list","cloudtasks.locations.list","cloudtasks.queues.getIamPolicy","cloudtasks.queues.list","cloudtasks.tasks.list","cloudtoolresults.executions.list","cloudtoolresults.histories.list","cloudtoolresults.steps.list","cloudtrace.insights.list","cloudtrace.tasks.list","cloudtrace.traces.list","cloudtranslate.glossaries.list","cloudtranslate.locations.list","cloudtranslate.operations.list","cloudvolumesgcp-api.netapp.com/activeDirectories.list","cloudvolumesgcp-api.netapp.com/ipRanges.*","cloudvolumesgcp-api.netapp.com/jobs.list","cloudvolumesgcp-api.netapp.com/regions.*","cloudvolumesgcp-api.netapp.com/serviceLevels.*","cloudvolumesgcp-api.netapp.com/snapshots.list","cloudvolumesgcp-api.netapp.com/volumes.list","commerceprice.privateoffers.list","composer.dags.list","composer.environments.list","composer.imageversions.*","composer.operations.list","compute.acceleratorTypes.list","compute.addresses.list","compute.autoscalers.list","compute.backendBuckets.list","compute.backendServices.getIamPolicy","compute.backendServices.list","compute.commitments.list","compute.diskTypes.list","compute.disks.getIamPolicy","compute.disks.list","compute.externalVpnGateways.list","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewalls.list","compute.forwardingRules.list","compute.globalAddresses.list","compute.globalForwardingRules.list","compute.globalNetworkEndpointGroups.list","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.list","compute.healthChecks.list","compute.httpHealthChecks.list","compute.httpsHealthChecks.list","compute.images.getIamPolicy","compute.images.list","compute.instanceGroupManagers.list","compute.instanceGroups.list","compute.instanceTemplates.getIamPolicy","compute.instanceTemplates.list","compute.instances.getIamPolicy","compute.instances.list","compute.interconnectAttachments.list","compute.interconnectLocations.list","compute.interconnects.list","compute.licenseCodes.getIamPolicy","compute.licenseCodes.list","compute.licenses.getIamPolicy","compute.licenses.list","compute.machineImages.getIamPolicy","compute.machineImages.list","compute.machineTypes.list","compute.maintenancePolicies.getIamPolicy","compute.maintenancePolicies.list","compute.networkEndpointGroups.getIamPolicy","compute.networkEndpointGroups.list","compute.networks.list","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTypes.list","compute.packetMirrorings.list","compute.publicAdvertisedPrefixes.list","compute.publicDelegatedPrefixes.list","compute.regionBackendServices.getIamPolicy","compute.regionBackendServices.list","compute.regionFirewallPolicies.getIamPolicy","compute.regionFirewallPolicies.list","compute.regionHealthCheckServices.list","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.list","compute.regionNotificationEndpoints.list","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.list","compute.regions.list","compute.reservations.list","compute.resourcePolicies.list","compute.routers.list","compute.routes.list","compute.securityPolicies.getIamPolicy","compute.securityPolicies.list","compute.serviceAttachments.list","compute.snapshots.getIamPolicy","compute.snapshots.list","compute.sslCertificates.list","compute.sslPolicies.list","compute.subnetworks.getIamPolicy","compute.subnetworks.list","compute.targetGrpcProxies.list","compute.targetHttpProxies.list","compute.targetHttpsProxies.list","compute.targetInstances.list","compute.targetPools.list","compute.targetSslProxies.list","compute.targetTcpProxies.list","compute.targetVpnGateways.list","compute.urlMaps.list","compute.vpnGateways.list","compute.vpnTunnels.list","compute.zoneOperations.getIamPolicy","compute.zoneOperations.list","compute.zones.list","connectors.connections.getIamPolicy","connectors.connections.list","connectors.connectors.list","connectors.locations.list","connectors.operations.list","connectors.providers.list","connectors.versions.list","consumerprocurement.accounts.list","consumerprocurement.entitlements.list","consumerprocurement.freeTrials.list","consumerprocurement.orderAttributions.list","consumerprocurement.orders.list","contactcenterinsights.analyses.list","contactcenterinsights.conversations.list","contactcenterinsights.issueModels.list","contactcenterinsights.issues.list","contactcenterinsights.operations.list","contactcenterinsights.phraseMatchers.list","container.apiServices.list","container.auditSinks.list","container.backendConfigs.list","container.bindings.list","container.certificateSigningRequests.list","container.clusterRoleBindings.list","container.clusterRoles.list","container.clusters.list","container.componentStatuses.list","container.configMaps.list","container.controllerRevisions.list","container.cronJobs.list","container.csiDrivers.list","container.csiNodeInfos.list","container.csiNodes.list","container.customResourceDefinitions.list","container.daemonSets.list","container.deployments.list","container.endpointSlices.list","container.endpoints.list","container.events.list","container.frontendConfigs.list","container.horizontalPodAutoscalers.list","container.ingresses.list","container.initializerConfigurations.list","container.jobs.list","container.leases.list","container.limitRanges.list","container.localSubjectAccessReviews.list","container.managedCertificates.list","container.mutatingWebhookConfigurations.list","container.namespaces.list","container.networkPolicies.list","container.nodes.list","container.operations.list","container.persistentVolumeClaims.list","container.persistentVolumes.list","container.petSets.list","container.podDisruptionBudgets.list","container.podPresets.list","container.podSecurityPolicies.list","container.podTemplates.list","container.pods.list","container.priorityClasses.list","container.replicaSets.list","container.replicationControllers.list","container.resourceQuotas.list","container.roleBindings.list","container.roles.list","container.runtimeClasses.list","container.scheduledJobs.list","container.selfSubjectAccessReviews.list","container.serviceAccounts.list","container.services.list","container.statefulSets.list","container.storageClasses.list","container.storageStates.list","container.storageVersionMigrations.list","container.subjectAccessReviews.list","container.thirdPartyObjects.list","container.thirdPartyResources.list","container.updateInfos.list","container.validatingWebhookConfigurations.list","container.volumeAttachments.list","container.volumeSnapshotClasses.list","container.volumeSnapshotContents.list","container.volumeSnapshots.list","containeranalysis.notes.getIamPolicy","containeranalysis.notes.list","containeranalysis.occurrences.getIamPolicy","containeranalysis.occurrences.list","contentwarehouse.documentSchemas.list","contentwarehouse.documents.getIamPolicy","contentwarehouse.ruleSets.list","contentwarehouse.synonymSets.list","datacatalog.categories.getIamPolicy","datacatalog.entries.getIamPolicy","datacatalog.entries.list","datacatalog.entryGroups.getIamPolicy","datacatalog.entryGroups.list","datacatalog.tagTemplates.getIamPolicy","datacatalog.taxonomies.getIamPolicy","datacatalog.taxonomies.list","dataconnectors.connectors.getIamPolicy","dataconnectors.connectors.list","dataconnectors.locations.list","dataconnectors.operations.list","dataflow.jobs.list","dataflow.messages.*","dataflow.snapshots.list","datafusion.instances.getIamPolicy","datafusion.instances.list","datafusion.locations.list","datafusion.operations.list","datalabeling.annotateddatasets.list","datalabeling.annotationspecsets.list","datalabeling.dataitems.list","datalabeling.datasets.list","datalabeling.examples.list","datalabeling.instructions.list","datalabeling.operations.list","datamigration.connectionprofiles.getIamPolicy","datamigration.connectionprofiles.list","datamigration.locations.list","datamigration.migrationjobs.getIamPolicy","datamigration.migrationjobs.list","datamigration.operations.list","datapipelines.jobs.*","datapipelines.pipelines.list","dataplex.assetActions.*","dataplex.assets.getIamPolicy","dataplex.assets.list","dataplex.content.getIamPolicy","dataplex.content.list","dataplex.entities.list","dataplex.environments.getIamPolicy","dataplex.environments.list","dataplex.lakeActions.*","dataplex.lakes.getIamPolicy","dataplex.lakes.list","dataplex.locations.list","dataplex.operations.list","dataplex.partitions.list","dataplex.tasks.getIamPolicy","dataplex.tasks.list","dataplex.zoneActions.*","dataplex.zones.getIamPolicy","dataplex.zones.list","dataproc.agents.list","dataproc.autoscalingPolicies.getIamPolicy","dataproc.autoscalingPolicies.list","dataproc.batches.list","dataproc.clusters.getIamPolicy","dataproc.clusters.list","dataproc.jobs.getIamPolicy","dataproc.jobs.list","dataproc.operations.getIamPolicy","dataproc.operations.list","dataproc.workflowTemplates.getIamPolicy","dataproc.workflowTemplates.list","dataprocessing.datasources.list","dataprocessing.featurecontrols.list","dataprocessing.groupcontrols.list","datastore.databases.getIamPolicy","datastore.databases.list","datastore.entities.list","datastore.indexes.list","datastore.keyVisualizerScans.list","datastore.locations.list","datastore.namespaces.getIamPolicy","datastore.namespaces.list","datastore.operations.list","datastore.statistics.list","datastream.connectionProfiles.getIamPolicy","datastream.connectionProfiles.list","datastream.locations.list","datastream.objects.list","datastream.operations.list","datastream.privateConnections.getIamPolicy","datastream.privateConnections.list","datastream.routes.getIamPolicy","datastream.routes.list","datastream.streams.getIamPolicy","datastream.streams.list","deploymentmanager.compositeTypes.list","deploymentmanager.deployments.getIamPolicy","deploymentmanager.deployments.list","deploymentmanager.manifests.list","deploymentmanager.operations.list","deploymentmanager.resources.list","deploymentmanager.typeProviders.list","deploymentmanager.types.list","dialogflow.agents.list","dialogflow.answerrecords.list","dialogflow.callMatchers.list","dialogflow.changelogs.list","dialogflow.contexts.list","dialogflow.conversationDatasets.list","dialogflow.conversationModels.list","dialogflow.conversationProfiles.list","dialogflow.conversations.list","dialogflow.documents.list","dialogflow.entityTypes.list","dialogflow.environments.list","dialogflow.flows.list","dialogflow.integrations.list","dialogflow.intents.list","dialogflow.knowledgeBases.list","dialogflow.messages.*","dialogflow.modelEvaluations.list","dialogflow.pages.list","dialogflow.participants.list","dialogflow.phoneNumberOrders.list","dialogflow.phoneNumbers.list","dialogflow.securitySettings.list","dialogflow.sessionEntityTypes.list","dialogflow.smartMessagingEntries.list","dialogflow.transitionRouteGroups.list","dialogflow.versions.list","dialogflow.webhooks.list","dlp.analyzeRiskTemplates.list","dlp.columnDataProfiles.list","dlp.deidentifyTemplates.list","dlp.estimates.list","dlp.inspectFindings.*","dlp.inspectTemplates.list","dlp.jobTriggers.list","dlp.jobs.list","dlp.locations.list","dlp.projectDataProfiles.list","dlp.storedInfoTypes.list","dlp.tableDataProfiles.list","dns.changes.list","dns.dnsKeys.list","dns.managedZoneOperations.list","dns.managedZones.list","dns.policies.getIamPolicy","dns.policies.list","dns.resourceRecordSets.list","dns.responsePolicies.list","dns.responsePolicyRules.list","documentai.evaluations.list","documentai.labelerPools.list","documentai.locations.list","documentai.processorTypes.list","documentai.processorVersions.list","documentai.processors.list","domains.locations.list","domains.operations.list","domains.registrations.getIamPolicy","domains.registrations.list","earlyaccesscenter.campaigns.list","earlyaccesscenter.customerAllowlists.list","earthengine.assets.getIamPolicy","earthengine.assets.list","earthengine.operations.list","edgecontainer.clusters.getIamPolicy","edgecontainer.clusters.list","edgecontainer.locations.list","edgecontainer.machines.getIamPolicy","edgecontainer.machines.list","edgecontainer.nodePools.getIamPolicy","edgecontainer.nodePools.list","edgecontainer.operations.list","edgecontainer.vpnConnections.getIamPolicy","edgecontainer.vpnConnections.list","errorreporting.applications.*","errorreporting.errorEvents.list","errorreporting.groups.*","essentialcontacts.contacts.list","eventarc.locations.list","eventarc.operations.list","eventarc.providers.list","eventarc.triggers.getIamPolicy","eventarc.triggers.list","fcmdata.*","file.backups.list","file.instances.list","file.locations.list","file.operations.list","firebase.clients.list","firebase.links.list","firebase.playLinks.list","firebaseabt.experiments.list","firebaseappdistro.groups.list","firebaseappdistro.releases.list","firebaseappdistro.testers.list","firebasecrashlytics.issues.list","firebasedatabase.instances.list","firebasedynamiclinks.destinations.list","firebasedynamiclinks.domains.list","firebasedynamiclinks.links.list","firebaseextensions.configs.list","firebasehosting.sites.list","firebaseinappmessaging.campaigns.list","firebaseml.compressionjobs.list","firebaseml.models.list","firebaseml.modelversions.list","firebasenotifications.messages.list","firebasepredictions.predictions.list","firebaserules.releases.list","firebaserules.rulesets.list","firebasestorage.buckets.list","fleetengine.deliveryvehicles.list","fleetengine.tasks.list","fleetengine.vehicles.list","gameservices.gameServerClusters.list","gameservices.gameServerConfigs.list","gameservices.gameServerDeployments.list","gameservices.locations.list","gameservices.operations.list","gameservices.realms.list","gcp.redisenterprise.com/databases.list","gcp.redisenterprise.com/subscriptions.list","genomics.datasets.getIamPolicy","genomics.datasets.list","genomics.operations.list","gkebackup.backupPlans.getIamPolicy","gkebackup.backupPlans.list","gkebackup.backups.list","gkebackup.locations.list","gkebackup.operations.list","gkebackup.restorePlans.getIamPolicy","gkebackup.restorePlans.list","gkebackup.restores.list","gkebackup.volumeBackups.list","gkebackup.volumeRestores.list","gkehub.features.getIamPolicy","gkehub.features.list","gkehub.gateway.getIamPolicy","gkehub.locations.list","gkehub.memberships.getIamPolicy","gkehub.memberships.list","gkehub.operations.list","gkemulticloud.awsClusters.list","gkemulticloud.awsNodePools.list","gkemulticloud.azureClients.list","gkemulticloud.azureClusters.list","gkemulticloud.azureNodePools.list","gkemulticloud.operations.list","gkeonprem.locations.list","gkeonprem.operations.list","gkeonprem.vmwareClusters.getIamPolicy","gkeonprem.vmwareClusters.list","gkeonprem.vmwareNodePools.getIamPolicy","gkeonprem.vmwareNodePools.list","gsuiteaddons.deployments.list","healthcare.annotationStores.getIamPolicy","healthcare.annotationStores.list","healthcare.annotations.list","healthcare.attributeDefinitions.list","healthcare.consentArtifacts.list","healthcare.consentStores.getIamPolicy","healthcare.consentStores.list","healthcare.consents.list","healthcare.datasets.getIamPolicy","healthcare.datasets.list","healthcare.dicomStores.getIamPolicy","healthcare.dicomStores.list","healthcare.fhirStores.getIamPolicy","healthcare.fhirStores.list","healthcare.hl7V2Messages.list","healthcare.hl7V2Stores.getIamPolicy","healthcare.hl7V2Stores.list","healthcare.locations.list","healthcare.operations.list","healthcare.userDataMappings.list","iam.denypolicies.list","iam.googleapis.com/workloadIdentityPoolProviders.list","iam.googleapis.com/workloadIdentityPools.list","iam.roles.get","iam.roles.list","iam.serviceAccountKeys.list","iam.serviceAccounts.get","iam.serviceAccounts.getIamPolicy","iam.serviceAccounts.list","iap.tunnel.getIamPolicy","iap.tunnelInstances.getIamPolicy","iap.tunnelZones.getIamPolicy","iap.web.getIamPolicy","iap.webServiceVersions.getIamPolicy","iap.webServices.getIamPolicy","iap.webTypes.getIamPolicy","ids.endpoints.getIamPolicy","ids.endpoints.list","ids.locations.list","ids.operations.list","integrations.apigeeAuthConfigs.list","integrations.apigeeCertificates.list","integrations.apigeeExecutions.*","integrations.apigeeIntegrationVers.list","integrations.apigeeIntegrations.list","integrations.apigeeSfdcChannels.list","integrations.apigeeSfdcInstances.list","integrations.apigeeSuspensions.list","integrations.securityAuthConfigs.list","integrations.securityExecutions.list","integrations.securityIntegTempVers.list","integrations.securityIntegrationVers.list","integrations.securityIntegrations.list","krmapihosting.krmApiHosts.getIamPolicy","krmapihosting.krmApiHosts.list","krmapihosting.locations.list","krmapihosting.operations.list","lifesciences.operations.list","livestream.channels.list","livestream.events.list","livestream.inputs.list","livestream.locations.list","livestream.operations.list","logging.buckets.list","logging.exclusions.list","logging.locations.list","logging.logEntries.list","logging.logMetrics.list","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.notificationRules.list","logging.operations.list","logging.privateLogEntries.*","logging.queries.list","logging.sinks.list","logging.views.list","managedidentities.backups.getIamPolicy","managedidentities.backups.list","managedidentities.domains.getIamPolicy","managedidentities.domains.list","managedidentities.locations.list","managedidentities.operations.list","managedidentities.peerings.getIamPolicy","managedidentities.peerings.list","managedidentities.sqlintegrations.list","memcache.instances.list","memcache.locations.list","memcache.operations.list","metastore.backups.list","metastore.databases.getIamPolicy","metastore.databases.list","metastore.imports.list","metastore.locations.list","metastore.operations.list","metastore.services.getIamPolicy","metastore.services.list","metastore.tables.getIamPolicy","metastore.tables.list","ml.jobs.getIamPolicy","ml.jobs.list","ml.locations.list","ml.models.getIamPolicy","ml.models.list","ml.operations.list","ml.studies.getIamPolicy","ml.studies.list","ml.trials.list","ml.versions.list","monitoring.alertPolicies.list","monitoring.dashboards.list","monitoring.groups.list","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.list","monitoring.notificationChannelDescriptors.list","monitoring.notificationChannels.list","monitoring.publicWidgets.list","monitoring.services.list","monitoring.slos.list","monitoring.timeSeries.list","monitoring.uptimeCheckConfigs.list","networkconnectivity.hubs.getIamPolicy","networkconnectivity.hubs.list","networkconnectivity.locations.list","networkconnectivity.operations.list","networkconnectivity.spokes.getIamPolicy","networkconnectivity.spokes.list","networkmanagement.connectivitytests.getIamPolicy","networkmanagement.connectivitytests.list","networkmanagement.locations.list","networkmanagement.operations.list","networksecurity.authorizationPolicies.getIamPolicy","networksecurity.authorizationPolicies.list","networksecurity.clientTlsPolicies.getIamPolicy","networksecurity.clientTlsPolicies.list","networksecurity.locations.list","networksecurity.operations.list","networksecurity.serverTlsPolicies.getIamPolicy","networksecurity.serverTlsPolicies.list","networkservices.endpointConfigSelectors.getIamPolicy","networkservices.endpointConfigSelectors.list","networkservices.endpointPolicies.getIamPolicy","networkservices.endpointPolicies.list","networkservices.gateways.list","networkservices.grpcRoutes.getIamPolicy","networkservices.grpcRoutes.list","networkservices.httpFilters.getIamPolicy","networkservices.httpFilters.list","networkservices.httpRoutes.getIamPolicy","networkservices.httpRoutes.list","networkservices.httpfilters.getIamPolicy","networkservices.httpfilters.list","networkservices.locations.list","networkservices.meshes.getIamPolicy","networkservices.meshes.list","networkservices.operations.list","networkservices.serviceBindings.list","networkservices.tcpRoutes.getIamPolicy","networkservices.tcpRoutes.list","notebooks.environments.getIamPolicy","notebooks.environments.list","notebooks.executions.getIamPolicy","notebooks.executions.list","notebooks.instances.getIamPolicy","notebooks.instances.list","notebooks.locations.list","notebooks.operations.list","notebooks.runtimes.getIamPolicy","notebooks.runtimes.list","notebooks.schedules.getIamPolicy","notebooks.schedules.list","ondemandscanning.operations.list","opsconfigmonitoring.resourceMetadata.list","orgpolicy.constraints.*","orgpolicy.policies.list","osconfig.guestPolicies.list","osconfig.instanceOSPoliciesCompliances.list","osconfig.inventories.list","osconfig.osPolicyAssignmentReports.list","osconfig.osPolicyAssignments.list","osconfig.patchDeployments.list","osconfig.patchJobs.list","osconfig.vulnerabilityReports.list","paymentsresellersubscription.products.*","paymentsresellersubscription.promotions.*","policysimulator.replayResults.*","policysimulator.replays.list","privateca.caPools.getIamPolicy","privateca.caPools.list","privateca.certificateAuthorities.getIamPolicy","privateca.certificateAuthorities.list","privateca.certificateRevocationLists.getIamPolicy","privateca.certificateRevocationLists.list","privateca.certificateTemplates.getIamPolicy","privateca.certificateTemplates.list","privateca.certificates.getIamPolicy","privateca.certificates.list","privateca.locations.list","privateca.operations.list","privateca.reusableConfigs.getIamPolicy","privateca.reusableConfigs.list","proximitybeacon.attachments.list","proximitybeacon.beacons.getIamPolicy","proximitybeacon.beacons.list","proximitybeacon.namespaces.getIamPolicy","proximitybeacon.namespaces.list","pubsub.schemas.getIamPolicy","pubsub.schemas.list","pubsub.snapshots.getIamPolicy","pubsub.snapshots.list","pubsub.subscriptions.getIamPolicy","pubsub.subscriptions.list","pubsub.topics.getIamPolicy","pubsub.topics.list","pubsublite.operations.list","pubsublite.reservations.list","pubsublite.subscriptions.list","pubsublite.topics.list","recaptchaenterprise.keys.list","recaptchaenterprise.relatedaccountgroupmemberships.*","recaptchaenterprise.relatedaccountgroups.*","recommender.bigqueryCapacityCommitmentsInsights.list","recommender.bigqueryCapacityCommitmentsRecommendations.list","recommender.cloudAssetInsights.list","recommender.cloudsqlIdleInstanceRecommendations.list","recommender.cloudsqlInstanceActivityInsights.list","recommender.cloudsqlInstanceCpuUsageInsights.list","recommender.cloudsqlInstanceDiskUsageTrendInsights.list","recommender.cloudsqlInstanceMemoryUsageInsights.list","recommender.cloudsqlInstanceOutOfDiskRecommendations.list","recommender.cloudsqlOverprovisionedInstanceRecommendations.list","recommender.commitmentUtilizationInsights.list","recommender.computeAddressIdleResourceInsights.list","recommender.computeAddressIdleResourceRecommendations.list","recommender.computeDiskIdleResourceInsights.list","recommender.computeDiskIdleResourceRecommendations.list","recommender.computeFirewallInsights.list","recommender.computeImageIdleResourceInsights.list","recommender.computeImageIdleResourceRecommendations.list","recommender.computeInstanceGroupManagerMachineTypeRecommendations.list","recommender.computeInstanceIdleResourceRecommendations.list","recommender.computeInstanceMachineTypeRecommendations.list","recommender.dataflowDiagnosticsInsights.list","recommender.errorReportingInsights.list","recommender.errorReportingRecommendations.list","recommender.iamPolicyInsights.list","recommender.iamPolicyLateralMovementInsights.list","recommender.iamPolicyRecommendations.list","recommender.iamServiceAccountInsights.list","recommender.locations.list","recommender.loggingProductSuggestionContainerInsights.list","recommender.loggingProductSuggestionContainerRecommendations.list","recommender.monitoringProductSuggestionComputeInsights.list","recommender.monitoringProductSuggestionComputeRecommendations.list","recommender.resourcemanagerProjectUtilizationInsights.list","recommender.resourcemanagerProjectUtilizationRecommendations.list","recommender.usageCommitmentRecommendations.list","redis.instances.list","redis.locations.list","redis.operations.list","remotebuildexecution.instances.list","remotebuildexecution.workerpools.list","resourcemanager.folders.getIamPolicy","resourcemanager.folders.list","resourcemanager.hierarchyNodes.listTagBindings","resourcemanager.organizations.getIamPolicy","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","resourcemanager.tagHolds.list","resourcemanager.tagKeys.getIamPolicy","resourcemanager.tagKeys.list","resourcemanager.tagValues.getIamPolicy","resourcemanager.tagValues.list","resourcesettings.settings.list","retail.catalogs.list","retail.controls.list","retail.models.list","retail.operations.list","retail.products.list","retail.servingConfigs.list","riskmanager.operations.list","riskmanager.policies.list","riskmanager.reports.list","run.configurations.list","run.locations.*","run.operations.list","run.revisions.list","run.routes.list","run.services.getIamPolicy","run.services.list","runtimeconfig.configs.getIamPolicy","runtimeconfig.configs.list","runtimeconfig.operations.list","runtimeconfig.variables.getIamPolicy","runtimeconfig.variables.list","runtimeconfig.waiters.getIamPolicy","runtimeconfig.waiters.list","secretmanager.locations.list","secretmanager.secrets.getIamPolicy","secretmanager.secrets.list","secretmanager.versions.list","securitycenter.assets.list","securitycenter.bigQueryExports.list","securitycenter.findings.list","securitycenter.muteconfigs.list","securitycenter.notificationconfig.list","securitycenter.sources.getIamPolicy","securitycenter.sources.list","servicebroker.bindingoperations.list","servicebroker.bindings.getIamPolicy","servicebroker.bindings.list","servicebroker.catalogs.getIamPolicy","servicebroker.catalogs.list","servicebroker.instanceoperations.list","servicebroker.instances.getIamPolicy","servicebroker.instances.list","serviceconsumermanagement.tenancyu.list","servicedirectory.endpoints.getIamPolicy","servicedirectory.endpoints.list","servicedirectory.locations.list","servicedirectory.namespaces.getIamPolicy","servicedirectory.namespaces.list","servicedirectory.services.getIamPolicy","servicedirectory.services.list","servicemanagement.services.getIamPolicy","servicemanagement.services.list","servicenetworking.operations.list","serviceusage.operations.list","serviceusage.services.list","source.repos.getIamPolicy","source.repos.list","spanner.backupOperations.list","spanner.backups.getIamPolicy","spanner.backups.list","spanner.databaseOperations.list","spanner.databases.getIamPolicy","spanner.databases.list","spanner.instanceConfigs.list","spanner.instanceOperations.list","spanner.instances.getIamPolicy","spanner.instances.list","spanner.sessions.list","speech.customClasses.list","speech.phraseSets.list","storage.buckets.getIamPolicy","storage.buckets.list","storage.hmacKeys.list","storage.multipartUploads.list","storage.objects.getIamPolicy","storage.objects.list","storagetransfer.agentpools.list","storagetransfer.jobs.list","storagetransfer.operations.list","tpu.acceleratortypes.list","tpu.locations.list","tpu.nodes.list","tpu.operations.list","tpu.tensorflowversions.list","transcoder.jobTemplates.list","transcoder.jobs.list","translationhub.portals.list","videostitcher.cdnKeys.list","videostitcher.liveAdTagDetails.list","videostitcher.slates.list","videostitcher.vodAdTagDetails.list","videostitcher.vodStitchDetails.list","visualinspection.annotationSets.list","visualinspection.annotationSpecs.list","visualinspection.annotations.list","visualinspection.datasets.list","visualinspection.images.list","visualinspection.locations.list","visualinspection.modelEvaluations.list","visualinspection.models.list","visualinspection.modules.list","visualinspection.operations.list","visualinspection.solutionArtifacts.list","visualinspection.solutions.list","vmmigration.cloneJobs.list","vmmigration.cutoverJobs.list","vmmigration.datacenterConnectors.list","vmmigration.deployments.list","vmmigration.groups.list","vmmigration.locations.list","vmmigration.migratingVms.list","vmmigration.operations.list","vmmigration.sources.list","vmmigration.targets.list","vmmigration.utilizationReports.list","vpcaccess.connectors.list","vpcaccess.locations.*","vpcaccess.operations.list","workflows.executions.list","workflows.locations.list","workflows.operations.list","workflows.workflows.list"],"en":{"roleTitle":"Security Reviewer","roleName":"roles/iam.securityReviewer","roleDescription":"Provides permissions to list all resources and IAM policies\non them."},"ja":{"roleTitle":"セキュリティ審査担当者","roleName":"roles/iam.securityReviewer","roleDescription":"すべてのリソースとその IAM ポリシーを一覧表示する権限を付与します。"}},"roles/krmapihosting.admin":{"permissions":["krmapihosting.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Config Controller Admin","roleName":"roles/krmapihosting.admin","roleDescription":"Full access to all Config Controller resources."},"ja":{"roleTitle":"Config Controller 管理者","roleName":"roles/krmapihosting.admin","roleDescription":"すべての Config Controller リソースに対する完全アクセス権。"}},"roles/krmapihosting.viewer":{"permissions":["krmapihosting.krmApiHosts.get","krmapihosting.krmApiHosts.getIamPolicy","krmapihosting.krmApiHosts.list","krmapihosting.locations.*","krmapihosting.operations.get","krmapihosting.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Config Controller Viewer","roleName":"roles/krmapihosting.viewer","roleDescription":"Read-only access to all Config Controller resources."},"ja":{"roleTitle":"Config Controller 閲覧者","roleName":"roles/krmapihosting.viewer","roleDescription":"すべての Config Controller リソースに対する読み取り専用アクセス権。"}},"roles/container.admin":{"permissions":["container.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Kubernetes Engine Admin","roleName":"roles/container.admin","roleDescription":"Provides access to full management of clusters and their\nKubernetes API objects.\n\nTo set a service account on nodes, you must also have the Service Account User role\n(roles/iam.serviceAccountUser) on the\nuser-managed\nservice account that your nodes will use."},"ja":{"roleTitle":"Kubernetes Engine 管理者","roleName":"roles/container.admin","roleDescription":"クラスタとその Kubernetes API オブジェクトを完全に管理するためのアクセス権を付与します。\n\nノードにサービス アカウントを設定するには、ノードが使用するユーザー管理サービス アカウントに対するサービス アカウント ユーザーのロール(roles/iam.serviceAccountUser)も必要です。"}},"roles/container.clusterAdmin":{"permissions":["container.clusters.create","container.clusters.delete","container.clusters.get","container.clusters.list","container.clusters.update","container.operations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Kubernetes Engine Cluster Admin","roleName":"roles/container.clusterAdmin","roleDescription":"Provides access to management of clusters.\n\nTo set a service account on nodes, you must also have the Service Account User role\n(roles/iam.serviceAccountUser) on the\nuser-managed\nservice account that your nodes will use."},"ja":{"roleTitle":"Kubernetes Engine クラスタ管理者","roleName":"roles/container.clusterAdmin","roleDescription":"クラスタを管理するための権限を付与します。\n\nノードにサービス アカウントを設定するには、ノードが使用するユーザー管理サービス アカウントに対するサービス アカウント ユーザーのロール(roles/iam.serviceAccountUser)も必要です。"}},"roles/container.clusterViewer":{"permissions":["container.clusters.get","container.clusters.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Kubernetes Engine Cluster Viewer","roleName":"roles/container.clusterViewer","roleDescription":"Provides access to get and list GKE clusters."},"ja":{"roleTitle":"Kubernetes Engine クラスタ閲覧者","roleName":"roles/container.clusterViewer","roleDescription":"GKE クラスタを取得して一覧表示するためのアクセス権を付与します。"}},"roles/container.developer":{"permissions":["container.apiServices.*","container.auditSinks.*","container.backendConfigs.*","container.bindings.*","container.certificateSigningRequests.create","container.certificateSigningRequests.delete","container.certificateSigningRequests.get","container.certificateSigningRequests.list","container.certificateSigningRequests.update","container.certificateSigningRequests.updateStatus","container.clusterRoleBindings.get","container.clusterRoleBindings.list","container.clusterRoles.get","container.clusterRoles.list","container.clusters.get","container.clusters.list","container.componentStatuses.*","container.configMaps.*","container.controllerRevisions.get","container.controllerRevisions.list","container.cronJobs.*","container.csiDrivers.*","container.csiNodeInfos.*","container.csiNodes.*","container.customResourceDefinitions.*","container.daemonSets.*","container.deployments.*","container.endpointSlices.*","container.endpoints.*","container.events.*","container.frontendConfigs.*","container.horizontalPodAutoscalers.*","container.ingresses.*","container.initializerConfigurations.*","container.jobs.*","container.leases.*","container.limitRanges.*","container.localSubjectAccessReviews.*","container.managedCertificates.*","container.mutatingWebhookConfigurations.get","container.mutatingWebhookConfigurations.list","container.namespaces.*","container.networkPolicies.*","container.nodes.*","container.persistentVolumeClaims.*","container.persistentVolumes.*","container.petSets.*","container.podDisruptionBudgets.*","container.podPresets.*","container.podSecurityPolicies.get","container.podSecurityPolicies.list","container.podTemplates.*","container.pods.*","container.priorityClasses.*","container.replicaSets.*","container.replicationControllers.*","container.resourceQuotas.*","container.roleBindings.get","container.roleBindings.list","container.roles.get","container.roles.list","container.runtimeClasses.*","container.scheduledJobs.*","container.secrets.*","container.selfSubjectAccessReviews.*","container.selfSubjectRulesReviews.*","container.serviceAccounts.*","container.services.*","container.statefulSets.*","container.storageClasses.*","container.storageStates.*","container.storageVersionMigrations.*","container.subjectAccessReviews.*","container.thirdPartyObjects.*","container.thirdPartyResources.*","container.tokenReviews.*","container.updateInfos.*","container.validatingWebhookConfigurations.get","container.validatingWebhookConfigurations.list","container.volumeAttachments.*","container.volumeSnapshotClasses.*","container.volumeSnapshotContents.*","container.volumeSnapshots.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Kubernetes Engine Developer","roleName":"roles/container.developer","roleDescription":"Provides access to Kubernetes API objects inside clusters."},"ja":{"roleTitle":"Kubernetes Engine 開発者","roleName":"roles/container.developer","roleDescription":"クラスタ内の Kubernetes API オブジェクトへのアクセス権を付与します。"}},"roles/container.hostServiceAgentUser":{"permissions":["compute.firewalls.get","container.hostServiceAgent.*","dns.networks.bindDNSResponsePolicy","dns.networks.bindPrivateDNSPolicy","dns.networks.bindPrivateDNSZone","dns.responsePolicies.*","dns.responsePolicyRules.*"],"en":{"roleTitle":"Kubernetes Engine Host Service Agent User","roleName":"roles/container.hostServiceAgentUser","roleDescription":"Allows the Kubernetes Engine service account in the host project to configure shared network\nresources for cluster management. Also gives access to inspect the firewall rules in the host\nproject."},"ja":{"roleTitle":"Kubernetes Engine Host サービス エージェント ユーザー","roleName":"roles/container.hostServiceAgentUser","roleDescription":"クラスタ管理用に共有ネットワーク リソースを構成することを、ホスト プロジェクトの Kubernetes Engine サービス アカウントに許可します。また、ホスト プロジェクトのファイアウォール ルールを調べるためのアクセス権も付与します。"}},"roles/container.viewer":{"permissions":["container.apiServices.get","container.apiServices.getStatus","container.apiServices.list","container.auditSinks.get","container.auditSinks.list","container.backendConfigs.get","container.backendConfigs.list","container.bindings.get","container.bindings.list","container.certificateSigningRequests.get","container.certificateSigningRequests.getStatus","container.certificateSigningRequests.list","container.clusterRoleBindings.get","container.clusterRoleBindings.list","container.clusterRoles.get","container.clusterRoles.list","container.clusters.get","container.clusters.list","container.componentStatuses.*","container.configMaps.get","container.configMaps.list","container.controllerRevisions.get","container.controllerRevisions.list","container.cronJobs.get","container.cronJobs.getStatus","container.cronJobs.list","container.csiDrivers.get","container.csiDrivers.list","container.csiNodeInfos.get","container.csiNodeInfos.list","container.csiNodes.get","container.csiNodes.list","container.customResourceDefinitions.get","container.customResourceDefinitions.getStatus","container.customResourceDefinitions.list","container.daemonSets.get","container.daemonSets.getStatus","container.daemonSets.list","container.deployments.get","container.deployments.getScale","container.deployments.getStatus","container.deployments.list","container.endpointSlices.get","container.endpointSlices.list","container.endpoints.get","container.endpoints.list","container.events.get","container.events.list","container.frontendConfigs.get","container.frontendConfigs.list","container.horizontalPodAutoscalers.get","container.horizontalPodAutoscalers.getStatus","container.horizontalPodAutoscalers.list","container.ingresses.get","container.ingresses.getStatus","container.ingresses.list","container.initializerConfigurations.get","container.initializerConfigurations.list","container.jobs.get","container.jobs.getStatus","container.jobs.list","container.leases.get","container.leases.list","container.limitRanges.get","container.limitRanges.list","container.managedCertificates.get","container.managedCertificates.list","container.mutatingWebhookConfigurations.get","container.mutatingWebhookConfigurations.list","container.namespaces.get","container.namespaces.getStatus","container.namespaces.list","container.networkPolicies.get","container.networkPolicies.list","container.nodes.get","container.nodes.getStatus","container.nodes.list","container.operations.*","container.persistentVolumeClaims.get","container.persistentVolumeClaims.getStatus","container.persistentVolumeClaims.list","container.persistentVolumes.get","container.persistentVolumes.getStatus","container.persistentVolumes.list","container.petSets.get","container.petSets.list","container.podDisruptionBudgets.get","container.podDisruptionBudgets.getStatus","container.podDisruptionBudgets.list","container.podPresets.get","container.podPresets.list","container.podSecurityPolicies.get","container.podSecurityPolicies.list","container.podTemplates.get","container.podTemplates.list","container.pods.get","container.pods.getStatus","container.pods.list","container.priorityClasses.get","container.priorityClasses.list","container.replicaSets.get","container.replicaSets.getScale","container.replicaSets.getStatus","container.replicaSets.list","container.replicationControllers.get","container.replicationControllers.getScale","container.replicationControllers.getStatus","container.replicationControllers.list","container.resourceQuotas.get","container.resourceQuotas.getStatus","container.resourceQuotas.list","container.roleBindings.get","container.roleBindings.list","container.roles.get","container.roles.list","container.runtimeClasses.get","container.runtimeClasses.list","container.scheduledJobs.get","container.scheduledJobs.list","container.serviceAccounts.get","container.serviceAccounts.list","container.services.get","container.services.getStatus","container.services.list","container.statefulSets.get","container.statefulSets.getScale","container.statefulSets.getStatus","container.statefulSets.list","container.storageClasses.get","container.storageClasses.list","container.storageStates.get","container.storageStates.getStatus","container.storageStates.list","container.storageVersionMigrations.get","container.storageVersionMigrations.getStatus","container.storageVersionMigrations.list","container.thirdPartyObjects.get","container.thirdPartyObjects.list","container.thirdPartyResources.get","container.thirdPartyResources.list","container.tokenReviews.*","container.updateInfos.get","container.updateInfos.list","container.validatingWebhookConfigurations.get","container.validatingWebhookConfigurations.list","container.volumeAttachments.get","container.volumeAttachments.getStatus","container.volumeAttachments.list","container.volumeSnapshotClasses.get","container.volumeSnapshotClasses.list","container.volumeSnapshotContents.get","container.volumeSnapshotContents.getStatus","container.volumeSnapshotContents.list","container.volumeSnapshots.get","container.volumeSnapshots.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Kubernetes Engine Viewer","roleName":"roles/container.viewer","roleDescription":"Provides read-only access to resources within GKE clusters, such as nodes, pods, and GKE API objects."},"ja":{"roleTitle":"Kubernetes Engine 閲覧者","roleName":"roles/container.viewer","roleDescription":"ノード、Pod、GKE API オブジェクトなどの GKE クラスタ内のリソースへの読み取り専用アクセス権を付与します。"}},"roles/livestream.editor":{"permissions":["livestream.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Live Stream Editor","roleName":"roles/livestream.editor","roleDescription":"Full access to Live Stream resources."},"ja":{"roleTitle":"ライブ ストリーム編集者","roleName":"roles/livestream.editor","roleDescription":"ライブ ストリーム リソースに対する完全アクセス権。"}},"roles/livestream.viewer":{"permissions":["livestream.channels.get","livestream.channels.list","livestream.events.get","livestream.events.list","livestream.inputs.get","livestream.inputs.list","livestream.locations.*","livestream.operations.get","livestream.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Live Stream Viewer","roleName":"roles/livestream.viewer","roleDescription":"Read access to Live Stream resources."},"ja":{"roleTitle":"ライブ ストリーム閲覧者","roleName":"roles/livestream.viewer","roleDescription":"ライブ ストリーム リソースに対する読み取りアクセス権。"}},"roles/logging.admin":{"permissions":["logging.buckets.copyLogEntries","logging.buckets.create","logging.buckets.delete","logging.buckets.get","logging.buckets.list","logging.buckets.undelete","logging.buckets.update","logging.cmekSettings.*","logging.exclusions.*","logging.fields.*","logging.locations.*","logging.logEntries.*","logging.logMetrics.*","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.*","logging.notificationRules.*","logging.operations.*","logging.privateLogEntries.*","logging.queries.*","logging.sinks.*","logging.usage.*","logging.views.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Logging Admin","roleName":"roles/logging.admin","roleDescription":"Provides all permissions necessary to use all features of Cloud Logging."},"ja":{"roleTitle":"Logging 管理者","roleName":"roles/logging.admin","roleDescription":"Cloud Logging のすべての機能を使用するのに必要なすべての権限を付与します。"}},"roles/logging.bucketWriter":{"permissions":["logging.buckets.write"],"en":{"roleTitle":"Logs Bucket Writer","roleName":"roles/logging.bucketWriter","roleDescription":"Ability to write logs to a log bucket."},"ja":{"roleTitle":"ログバケット書き込み","roleName":"roles/logging.bucketWriter","roleDescription":"ログバケットにログを書き込むことができます。"}},"roles/logging.configWriter":{"permissions":["logging.buckets.create","logging.buckets.delete","logging.buckets.get","logging.buckets.list","logging.buckets.undelete","logging.buckets.update","logging.cmekSettings.*","logging.exclusions.*","logging.locations.*","logging.logMetrics.*","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.notificationRules.*","logging.operations.*","logging.sinks.*","logging.views.create","logging.views.delete","logging.views.get","logging.views.list","logging.views.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Logs Configuration Writer","roleName":"roles/logging.configWriter","roleDescription":"Provides permissions to read and write the configurations of logs-based\nmetrics and sinks for exporting logs."},"ja":{"roleTitle":"ログ構成書き込み","roleName":"roles/logging.configWriter","roleDescription":"ログをエクスポートするためのログベースの指標とシンクの構成に対する読み取りおよび書き込み権限を付与します。"}},"roles/logging.fieldAccessor":{"permissions":["logging.fields.*"],"en":{"roleTitle":"Log Field Accessor","roleName":"roles/logging.fieldAccessor","roleDescription":"Ability to read restricted fields in a log bucket."},"ja":{"roleTitle":"ログ フィールド アクセサー","roleName":"roles/logging.fieldAccessor","roleDescription":"ログバケット内の制限付きフィールドを読み取ることができます。"}},"roles/logging.logWriter":{"permissions":["logging.logEntries.create"],"en":{"roleTitle":"Logs Writer","roleName":"roles/logging.logWriter","roleDescription":"Provides the permissions to write log entries."},"ja":{"roleTitle":"ログ書き込み","roleName":"roles/logging.logWriter","roleDescription":"ログエントリを書き込むための権限を付与します。"}},"roles/logging.privateLogViewer":{"permissions":["logging.buckets.get","logging.buckets.list","logging.exclusions.get","logging.exclusions.list","logging.locations.*","logging.logEntries.list","logging.logMetrics.get","logging.logMetrics.list","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.privateLogEntries.*","logging.queries.create","logging.queries.delete","logging.queries.get","logging.queries.list","logging.queries.listShared","logging.queries.update","logging.sinks.get","logging.sinks.list","logging.usage.*","logging.views.access","logging.views.get","logging.views.list","resourcemanager.projects.get"],"en":{"roleTitle":"Private Logs Viewer","roleName":"roles/logging.privateLogViewer","roleDescription":"Provides permissions of the Logs Viewer role and in addition, provides\nread-only access to log entries in private logs."},"ja":{"roleTitle":"プライベート ログ閲覧者","roleName":"roles/logging.privateLogViewer","roleDescription":"ログ閲覧者のロールの権限、およびプライベート ログ内のエントリに対する読み取り専用アクセス権を付与します。"}},"roles/logging.viewAccessor":{"permissions":["logging.logEntries.download","logging.views.access","logging.views.listLogs","logging.views.listResourceKeys","logging.views.listResourceValues"],"en":{"roleTitle":"Logs View Accessor","roleName":"roles/logging.viewAccessor","roleDescription":"Ability to read logs in a view."},"ja":{"roleTitle":"ログ表示アクセサー","roleName":"roles/logging.viewAccessor","roleDescription":"ビュー内のログを読み取ることができます。"}},"roles/logging.viewer":{"permissions":["logging.buckets.get","logging.buckets.list","logging.exclusions.get","logging.exclusions.list","logging.locations.*","logging.logEntries.list","logging.logMetrics.get","logging.logMetrics.list","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.operations.get","logging.operations.list","logging.queries.create","logging.queries.delete","logging.queries.get","logging.queries.list","logging.queries.listShared","logging.queries.update","logging.sinks.get","logging.sinks.list","logging.usage.*","logging.views.get","logging.views.list","resourcemanager.projects.get"],"en":{"roleTitle":"Logs Viewer","roleName":"roles/logging.viewer","roleDescription":"Provides access to view logs."},"ja":{"roleTitle":"ログビューア","roleName":"roles/logging.viewer","roleDescription":"ログの閲覧権限を付与します。"}},"roles/memcache.admin":{"permissions":["compute.networks.list","memcache.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Memorystore Memcached Admin","roleName":"roles/memcache.admin","roleDescription":"Full access to Memcached instances and related resources."},"ja":{"roleTitle":"Cloud Memorystore Memcached 管理者","roleName":"roles/memcache.admin","roleDescription":"Memcached のインスタンスと関連リソースに対する完全アクセス権。"}},"roles/memcache.editor":{"permissions":["memcache.instances.applyParameters","memcache.instances.get","memcache.instances.list","memcache.instances.update","memcache.instances.updateParameters","memcache.locations.*","memcache.operations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Memorystore Memcached Editor","roleName":"roles/memcache.editor","roleDescription":"Read-Write access to Memcached instances and related resources."},"ja":{"roleTitle":"Cloud Memorystore Memcached 編集者","roleName":"roles/memcache.editor","roleDescription":"Memcached インスタンスと関連リソースへの読み取り / 書き込みアクセス権。"}},"roles/memcache.viewer":{"permissions":["memcache.instances.get","memcache.instances.list","memcache.locations.*","memcache.operations.get","memcache.operations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Memorystore Memcached Viewer","roleName":"roles/memcache.viewer","roleDescription":"Read-only access to Memcached instances and related resources."},"ja":{"roleTitle":"Cloud Memorystore Memcached 閲覧者","roleName":"roles/memcache.viewer","roleDescription":"Memcached インスタンスと関連リソースに対する読み取り専用アクセス権。"}},"roles/redis.admin":{"permissions":["compute.networks.list","redis.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use"],"en":{"roleTitle":"Cloud Memorystore Redis Admin","roleName":"roles/redis.admin","roleDescription":"Full control for all Memorystore for Redis resources."},"ja":{"roleTitle":"Cloud Memorystore Redis 管理者","roleName":"roles/redis.admin","roleDescription":"すべての Memorystore for Redis リソースに対する完全な制御"}},"roles/redis.editor":{"permissions":["compute.networks.list","redis.instances.failover","redis.instances.get","redis.instances.list","redis.instances.update","redis.locations.*","redis.operations.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use"],"en":{"roleTitle":"Cloud Memorystore Redis Editor","roleName":"roles/redis.editor","roleDescription":"Manage Memorystore for Redis instances. Can't create or delete instances."},"ja":{"roleTitle":"Cloud Memorystore Redis 編集者","roleName":"roles/redis.editor","roleDescription":"Memorystore for Redis インスタンスの管理。インスタンスの作成や削除はできません。"}},"roles/redis.viewer":{"permissions":["redis.instances.get","redis.instances.list","redis.locations.*","redis.operations.get","redis.operations.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use"],"en":{"roleTitle":"Cloud Memorystore Redis Viewer","roleName":"roles/redis.viewer","roleDescription":"Read-only access to all Memorystore for Redis resources."},"ja":{"roleTitle":"Cloud Memorystore Redis 閲覧者","roleName":"roles/redis.viewer","roleDescription":"すべての Memorystore for Redis リソースへの読み取り専用アクセス権。"}},"roles/meshconfig.admin":{"permissions":["meshconfig.*"],"en":{"roleTitle":"Mesh Config Admin","roleName":"roles/meshconfig.admin","roleDescription":"Full access to all mesh configuration resources"},"ja":{"roleTitle":"メッシュ構成管理者","roleName":"roles/meshconfig.admin","roleDescription":"すべてのメッシュ構成リソースに対する完全アクセス権"}},"roles/meshconfig.viewer":{"permissions":["meshconfig.projects.get"],"en":{"roleTitle":"Mesh Config Viewer","roleName":"roles/meshconfig.viewer","roleDescription":"Read access to mesh configuration"},"ja":{"roleTitle":"メッシュ構成の閲覧者","roleName":"roles/meshconfig.viewer","roleDescription":"メッシュ構成に対する読み取りアクセス権"}},"roles/monitoring.admin":{"permissions":["cloudnotifications.*","monitoring.*","opsconfigmonitoring.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.enable","stackdriver.*"],"en":{"roleTitle":"Monitoring Admin","roleName":"roles/monitoring.admin","roleDescription":"Provides the same access as the Monitoring Editor role (roles/monitoring.editor)."},"ja":{"roleTitle":"モニタリング管理者","roleName":"roles/monitoring.admin","roleDescription":"モニタリング編集者のロール(roles/monitoring.editor)と同じアクセス権を付与します。"}},"roles/monitoring.alertPolicyEditor":{"permissions":["monitoring.alertPolicies.*"],"en":{"roleTitle":"Monitoring AlertPolicy Editor","roleName":"roles/monitoring.alertPolicyEditor","roleDescription":"Read/write access to alerting policies."},"ja":{"roleTitle":"Monitoring AlertPolicy 編集者","roleName":"roles/monitoring.alertPolicyEditor","roleDescription":"アラート ポリシーへの読み取り / 書き込みアクセス権。"}},"roles/monitoring.alertPolicyViewer":{"permissions":["monitoring.alertPolicies.get","monitoring.alertPolicies.list"],"en":{"roleTitle":"Monitoring AlertPolicy Viewer","roleName":"roles/monitoring.alertPolicyViewer","roleDescription":"Read-only access to alerting policies."},"ja":{"roleTitle":"Monitoring AlertPolicy 閲覧者","roleName":"roles/monitoring.alertPolicyViewer","roleDescription":"アラート ポリシーへの読み取り専用権限。"}},"roles/monitoring.dashboardEditor":{"permissions":["monitoring.dashboards.*"],"en":{"roleTitle":"Monitoring Dashboard Configuration Editor","roleName":"roles/monitoring.dashboardEditor","roleDescription":"Read/write access to dashboard configurations."},"ja":{"roleTitle":"モニタリング ダッシュボード構成の編集者","roleName":"roles/monitoring.dashboardEditor","roleDescription":"ダッシュボード構成に対する読み取り / 書き込みアクセス権。"}},"roles/monitoring.dashboardViewer":{"permissions":["monitoring.dashboards.get","monitoring.dashboards.list"],"en":{"roleTitle":"Monitoring Dashboard Configuration Viewer","roleName":"roles/monitoring.dashboardViewer","roleDescription":"Read-only access to dashboard configurations."},"ja":{"roleTitle":"モニタリング ダッシュボード構成の閲覧者","roleName":"roles/monitoring.dashboardViewer","roleDescription":"ダッシュボード構成への読み取り専用権限。"}},"roles/monitoring.editor":{"permissions":["cloudnotifications.*","monitoring.alertPolicies.*","monitoring.dashboards.*","monitoring.groups.*","monitoring.metricDescriptors.*","monitoring.monitoredResourceDescriptors.*","monitoring.notificationChannelDescriptors.*","monitoring.notificationChannels.create","monitoring.notificationChannels.delete","monitoring.notificationChannels.get","monitoring.notificationChannels.list","monitoring.notificationChannels.sendVerificationCode","monitoring.notificationChannels.update","monitoring.notificationChannels.verify","monitoring.publicWidgets.*","monitoring.services.*","monitoring.slos.*","monitoring.timeSeries.*","monitoring.uptimeCheckConfigs.*","opsconfigmonitoring.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.enable","stackdriver.*"],"en":{"roleTitle":"Monitoring Editor","roleName":"roles/monitoring.editor","roleDescription":"Provides full access to information about all monitoring data and\nconfigurations."},"ja":{"roleTitle":"モニタリング編集者","roleName":"roles/monitoring.editor","roleDescription":"モニタリング データと構成に関する情報に対する完全アクセス権を付与します。"}},"roles/monitoring.metricWriter":{"permissions":["monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create"],"en":{"roleTitle":"Monitoring Metric Writer","roleName":"roles/monitoring.metricWriter","roleDescription":"Provides write-only access to metrics. This provides exactly the permissions\nneeded by the Cloud Monitoring agent and other systems that send metrics."},"ja":{"roleTitle":"モニタリング指標の書き込み","roleName":"roles/monitoring.metricWriter","roleDescription":"指標に対する書き込み専用アクセス権を付与します。これにより、Cloud Monitoring エージェントや、指標を送信する他のシステムに必要な権限が付与されます。"}},"roles/monitoring.metricsScopesAdmin":{"permissions":["monitoring.metricsScopes.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Monitoring Metrics Scopes Admin","roleName":"roles/monitoring.metricsScopesAdmin","roleDescription":"Access to add and remove monitored projects from metrics scopes."},"ja":{"roleTitle":"モニタリング指標スコープ管理者","roleName":"roles/monitoring.metricsScopesAdmin","roleDescription":"モニタリング対象プロジェクトを指標スコープに追加 / 指標スコープから削除するためのアクセス権。"}},"roles/monitoring.metricsScopesViewer":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Monitoring Metrics Scopes Viewer","roleName":"roles/monitoring.metricsScopesViewer","roleDescription":"Read-only access to metrics scopes and their monitored projects."},"ja":{"roleTitle":"モニタリング指標スコープ閲覧者","roleName":"roles/monitoring.metricsScopesViewer","roleDescription":"指標スコープとモニタリング対象プロジェクトに対する読み取り専用アクセス権。"}},"roles/monitoring.notificationChannelEditor":{"permissions":["monitoring.notificationChannelDescriptors.*","monitoring.notificationChannels.create","monitoring.notificationChannels.delete","monitoring.notificationChannels.get","monitoring.notificationChannels.list","monitoring.notificationChannels.sendVerificationCode","monitoring.notificationChannels.update","monitoring.notificationChannels.verify"],"en":{"roleTitle":"Monitoring NotificationChannel Editor","roleName":"roles/monitoring.notificationChannelEditor","roleDescription":"Read/write access to notification channels."},"ja":{"roleTitle":"Monitoring NotificationChannel 編集者","roleName":"roles/monitoring.notificationChannelEditor","roleDescription":"通知チャネルへの読み取り / 書き込みアクセス権。"}},"roles/monitoring.notificationChannelViewer":{"permissions":["monitoring.notificationChannelDescriptors.*","monitoring.notificationChannels.get","monitoring.notificationChannels.list"],"en":{"roleTitle":"Monitoring NotificationChannel Viewer","roleName":"roles/monitoring.notificationChannelViewer","roleDescription":"Read-only access to notification channels."},"ja":{"roleTitle":"Monitoring NotificationChannel 閲覧者","roleName":"roles/monitoring.notificationChannelViewer","roleDescription":"通知チャネルへの読み取り専用権限。"}},"roles/monitoring.servicesEditor":{"permissions":["monitoring.services.*","monitoring.slos.*"],"en":{"roleTitle":"Monitoring Services Editor","roleName":"roles/monitoring.servicesEditor","roleDescription":"Read/write access to services."},"ja":{"roleTitle":"モニタリング サービス編集者","roleName":"roles/monitoring.servicesEditor","roleDescription":"サービスに対する読み取り / 書き込みアクセス権。"}},"roles/monitoring.servicesViewer":{"permissions":["monitoring.services.get","monitoring.services.list","monitoring.slos.get","monitoring.slos.list"],"en":{"roleTitle":"Monitoring Services Viewer","roleName":"roles/monitoring.servicesViewer","roleDescription":"Read-only access to services."},"ja":{"roleTitle":"モニタリング サービス閲覧者","roleName":"roles/monitoring.servicesViewer","roleDescription":"サービスに対する読み取り専用アクセス権。"}},"roles/monitoring.uptimeCheckConfigEditor":{"permissions":["monitoring.uptimeCheckConfigs.*"],"en":{"roleTitle":"Monitoring Uptime Check Configuration Editor","roleName":"roles/monitoring.uptimeCheckConfigEditor","roleDescription":"Read/write access to uptime check configurations."},"ja":{"roleTitle":"Monitoring 稼働時間チェック構成の編集者","roleName":"roles/monitoring.uptimeCheckConfigEditor","roleDescription":"稼働時間チェック構成への読み取り / 書き込みアクセス権。"}},"roles/monitoring.uptimeCheckConfigViewer":{"permissions":["monitoring.uptimeCheckConfigs.get","monitoring.uptimeCheckConfigs.list"],"en":{"roleTitle":"Monitoring Uptime Check Configuration Viewer","roleName":"roles/monitoring.uptimeCheckConfigViewer","roleDescription":"Read-only access to uptime check configurations."},"ja":{"roleTitle":"Monitoring 稼働時間チェック構成の閲覧者","roleName":"roles/monitoring.uptimeCheckConfigViewer","roleDescription":"稼働時間チェック構成への読み取り専用アクセス権。"}},"roles/monitoring.viewer":{"permissions":["cloudnotifications.*","monitoring.alertPolicies.get","monitoring.alertPolicies.list","monitoring.dashboards.get","monitoring.dashboards.list","monitoring.groups.get","monitoring.groups.list","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.notificationChannelDescriptors.*","monitoring.notificationChannels.get","monitoring.notificationChannels.list","monitoring.publicWidgets.get","monitoring.publicWidgets.list","monitoring.services.get","monitoring.services.list","monitoring.slos.get","monitoring.slos.list","monitoring.timeSeries.list","monitoring.uptimeCheckConfigs.get","monitoring.uptimeCheckConfigs.list","opsconfigmonitoring.resourceMetadata.list","resourcemanager.projects.get","resourcemanager.projects.list","stackdriver.projects.get"],"en":{"roleTitle":"Monitoring Viewer","roleName":"roles/monitoring.viewer","roleDescription":"Provides read-only access to get and list information about all monitoring\ndata and configurations."},"ja":{"roleTitle":"モニタリング閲覧者","roleName":"roles/monitoring.viewer","roleDescription":"すべてのモニタリング データや構成に関する情報を取得して一覧表示するための読み取り専用アクセス権を付与します。"}},"roles/networkconnectivity.hubAdmin":{"permissions":["networkconnectivity.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Hub & Spoke Admin","roleName":"roles/networkconnectivity.hubAdmin","roleDescription":"Enables full access to hub and spoke resources."},"ja":{"roleTitle":"ハブ アンド スコープ管理者","roleName":"roles/networkconnectivity.hubAdmin","roleDescription":"ハブ アンド スポーク リソースに対する完全アクセス権を付与します。"}},"roles/networkconnectivity.hubViewer":{"permissions":["networkconnectivity.hubs.get","networkconnectivity.hubs.getIamPolicy","networkconnectivity.hubs.list","networkconnectivity.locations.*","networkconnectivity.spokes.get","networkconnectivity.spokes.getIamPolicy","networkconnectivity.spokes.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Hub & Spoke Viewer","roleName":"roles/networkconnectivity.hubViewer","roleDescription":"Enables read-only access to hub and spoke resources."},"ja":{"roleTitle":"ハブ アンド スポーク閲覧者","roleName":"roles/networkconnectivity.hubViewer","roleDescription":"ハブ アンド スポーク リソースに対する読み取り専用アクセス権を付与します。"}},"roles/networkconnectivity.spokeAdmin":{"permissions":["networkconnectivity.hubs.get","networkconnectivity.hubs.getIamPolicy","networkconnectivity.hubs.list","networkconnectivity.locations.*","networkconnectivity.operations.get","networkconnectivity.operations.list","networkconnectivity.spokes.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Spoke Admin","roleName":"roles/networkconnectivity.spokeAdmin","roleDescription":"Enables full access to spoke resources and read-only access to hub resources."},"ja":{"roleTitle":"スポーク管理者","roleName":"roles/networkconnectivity.spokeAdmin","roleDescription":"スポーク リソースに対する完全アクセス権と、ハブリソースへの読み取り専用アクセス権を付与します。"}},"roles/networkmanagement.admin":{"permissions":["networkmanagement.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Network Management Admin","roleName":"roles/networkmanagement.admin","roleDescription":"Full access to Network Management resources."},"ja":{"roleTitle":"ネットワーク管理者","roleName":"roles/networkmanagement.admin","roleDescription":"ネットワーク管理リソースに対する完全アクセス権。"}},"roles/networkmanagement.viewer":{"permissions":["networkmanagement.connectivitytests.get","networkmanagement.connectivitytests.getIamPolicy","networkmanagement.connectivitytests.list","networkmanagement.locations.*","networkmanagement.operations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Network Management Viewer","roleName":"roles/networkmanagement.viewer","roleDescription":"Read-only access to Network Management resources."},"ja":{"roleTitle":"ネットワーク管理閲覧者","roleName":"roles/networkmanagement.viewer","roleDescription":"ネットワーク管理リソースに対する読み取り専用アクセス権。"}},"roles/ondemandscanning.admin":{"permissions":["ondemandscanning.*"],"en":{"roleTitle":"On-Demand Scanning Admin","roleName":"roles/ondemandscanning.admin","roleDescription":"All permissions for On-Demand Scanning"},"ja":{"roleTitle":"オンデマンド スキャン管理者","roleName":"roles/ondemandscanning.admin","roleDescription":"オンデマンド スキャンに対するすべての権限"}},"roles/opsconfigmonitoring.resourceMetadata.viewer":{"permissions":["opsconfigmonitoring.resourceMetadata.list"],"en":{"roleTitle":"Ops Config Monitoring Resource Metadata Viewer","roleName":"roles/opsconfigmonitoring.resourceMetadata.viewer","roleDescription":"Read-only access to resource metadata."},"ja":{"roleTitle":"Ops 構成のモニタリング対象リソース メタデータ閲覧者","roleName":"roles/opsconfigmonitoring.resourceMetadata.viewer","roleDescription":"リソース メタデータに対する読み取り専用アクセス権。"}},"roles/opsconfigmonitoring.resourceMetadata.writer":{"permissions":["opsconfigmonitoring.resourceMetadata.write"],"en":{"roleTitle":"Ops Config Monitoring Resource Metadata Writer","roleName":"roles/opsconfigmonitoring.resourceMetadata.writer","roleDescription":"Write-only access to resource metadata. This provides exactly the permissions needed by the Ops Config Monitoring metadata agent and other systems that send metadata."},"ja":{"roleTitle":"Ops 構成のモニタリング対象リソース メタデータ ライター","roleName":"roles/opsconfigmonitoring.resourceMetadata.writer","roleDescription":"リソース メタデータへの書き込み専用権限。Ops 構成のモニタリング メタデータ エージェントやメタデータを送信するその他のシステムが必要とする権限を厳密に付与します。"}},"roles/axt.admin":{"permissions":["axt.*","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Access Transparency Admin","roleName":"roles/axt.admin","roleDescription":"Enable Access Transparency for Organization"},"ja":{"roleTitle":"アクセスの透明性管理者","roleName":"roles/axt.admin","roleDescription":"組織に対してアクセスの透明性を有効にします。"}},"roles/orgpolicy.policyAdmin":{"permissions":["orgpolicy.*"],"en":{"roleTitle":"Organization Policy Administrator","roleName":"roles/orgpolicy.policyAdmin","roleDescription":"Provides access to define what restrictions an organization wants to place\non the configuration of cloud resources by setting Organization Policies."},"ja":{"roleTitle":"組織のポリシー管理者","roleName":"roles/orgpolicy.policyAdmin","roleDescription":"組織のポリシーによるクラウド リソースの構成制限を定義する権限を付与します。"}},"roles/orgpolicy.policyViewer":{"permissions":["orgpolicy.constraints.*","orgpolicy.policies.list","orgpolicy.policy.get"],"en":{"roleTitle":"Organization Policy Viewer","roleName":"roles/orgpolicy.policyViewer","roleDescription":"Provides access to view Organization Policies on resources."},"ja":{"roleTitle":"組織のポリシー閲覧者","roleName":"roles/orgpolicy.policyViewer","roleDescription":"リソースの組織のポリシーを表示するためのアクセス権。"}},"roles/advisorynotifications.viewer":{"permissions":["advisorynotifications.*","resourcemanager.organizations.get"],"en":{"roleTitle":"Advisory Notifications Viewer","roleName":"roles/advisorynotifications.viewer","roleDescription":"Grants view access in Advisory Notifications"},"ja":{"roleTitle":"Advisory Notifications 閲覧者","roleName":"roles/advisorynotifications.viewer","roleDescription":"Advisory Notifications での閲覧権限を付与します"}},"roles/anthospolicycontroller.serviceAgent":{"permissions":["gkehub.features.get","gkehub.locations.*","gkehub.memberships.get","gkehub.memberships.list"],"en":{"roleTitle":"Anthos Policy Controller Service Agent","roleName":"roles/anthospolicycontroller.serviceAgent","roleDescription":"Gives the Anthos Policy Controller service agent access toCloud Platform resources."}},"roles/autoscaling.metricsWriter":{"permissions":["autoscaling.sites.writeMetrics"],"en":{"roleTitle":"Autoscaling Metrics Writer","roleName":"roles/autoscaling.metricsWriter","roleDescription":"Access to write metrics for autoscaling site"},"ja":{"roleTitle":"自動スケーリングの指標書き込み","roleName":"roles/autoscaling.metricsWriter","roleDescription":"自動スケーリング サイトの指標の書き込みアクセス権"}},"roles/autoscaling.recommendationsReader":{"permissions":["autoscaling.sites.readRecommendations"],"en":{"roleTitle":"Autoscaling Recommendations Reader","roleName":"roles/autoscaling.recommendationsReader","roleDescription":"Access to read recommendations from autoscaling site"},"ja":{"roleTitle":"自動スケーリングの推奨事項読み取り","roleName":"roles/autoscaling.recommendationsReader","roleDescription":"自動スケーリング サイトから推奨事項を読み取るためのアクセス権"}},"roles/autoscaling.sitesAdmin":{"permissions":["autoscaling.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Autoscaling Site Admin","roleName":"roles/autoscaling.sitesAdmin","roleDescription":"Full access to all autoscaling site features"},"ja":{"roleTitle":"自動スケーリング サイト管理者","roleName":"roles/autoscaling.sitesAdmin","roleDescription":"すべての自動スケーリング サイトの機能に対する完全アクセス権"}},"roles/autoscaling.stateWriter":{"permissions":["autoscaling.sites.writeState"],"en":{"roleTitle":"Autoscaling State Writer","roleName":"roles/autoscaling.stateWriter","roleDescription":"Access to write state for autoscaling site"},"ja":{"roleTitle":"自動スケーリングの状態書き込み","roleName":"roles/autoscaling.stateWriter","roleDescription":"自動スケーリング サイトの状態の書き込みアクセス権"}},"roles/baremetalsolution.admin":{"permissions":["baremetalsolution.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Bare Metal Solution Admin","roleName":"roles/baremetalsolution.admin","roleDescription":"Administrator of Bare Metal Solution resources"},"ja":{"roleTitle":"Bare Metal Solution 管理者","roleName":"roles/baremetalsolution.admin","roleDescription":"Bare Metal Solution リソースの管理者"}},"roles/baremetalsolution.editor":{"permissions":["baremetalsolution.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Bare Metal Solution Editor","roleName":"roles/baremetalsolution.editor","roleDescription":"Editor of Bare Metal Solution resources"},"ja":{"roleTitle":"Bare Metal Solution 編集者","roleName":"roles/baremetalsolution.editor","roleDescription":"Bare Metal Solution リソースの編集者"}},"roles/baremetalsolution.instancesadmin":{"permissions":["baremetalsolution.instances.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Bare Metal Solution Instances Admin","roleName":"roles/baremetalsolution.instancesadmin","roleDescription":"Admin of Bare Metal Solution Instance resources"},"ja":{"roleTitle":"Bare Metal Solution インスタンス管理者","roleName":"roles/baremetalsolution.instancesadmin","roleDescription":"Bare Metal Solution インスタンス リソースの管理者"}},"roles/baremetalsolution.instancesviewer":{"permissions":["baremetalsolution.instances.get","baremetalsolution.instances.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Bare Metal Solution Instances Viewer","roleName":"roles/baremetalsolution.instancesviewer","roleDescription":"Viewer of Bare Metal Solution Instance resources"},"ja":{"roleTitle":"Bare Metal Solution インスタンス閲覧者","roleName":"roles/baremetalsolution.instancesviewer","roleDescription":"Bare Metal Solution インスタンス リソースの閲覧者"}},"roles/baremetalsolution.lunsadmin":{"permissions":["baremetalsolution.luns.*"],"en":{"roleTitle":"Luns Admin","roleName":"roles/baremetalsolution.lunsadmin","roleDescription":"Administrator of Bare Metal Solution Lun resources"},"ja":{"roleTitle":"Lun 管理者","roleName":"roles/baremetalsolution.lunsadmin","roleDescription":"Bare Metal Solution Lun リソースの管理者"}},"roles/baremetalsolution.lunsviewer":{"permissions":["baremetalsolution.luns.*"],"en":{"roleTitle":"Luns Viewer","roleName":"roles/baremetalsolution.lunsviewer","roleDescription":"Viewer of Bare Metal Solution Lun resources"},"ja":{"roleTitle":"Lun 閲覧者","roleName":"roles/baremetalsolution.lunsviewer","roleDescription":"Bare Metal Solution Lun リソースの閲覧者"}},"roles/baremetalsolution.networksadmin":{"permissions":["baremetalsolution.networks.*"],"en":{"roleTitle":"Networks Admin","roleName":"roles/baremetalsolution.networksadmin","roleDescription":"Admin of Bare Metal Solution networks resources"},"ja":{"roleTitle":"ネットワーク管理者","roleName":"roles/baremetalsolution.networksadmin","roleDescription":"Bare Metal Solution ネットワーク リソースの管理者"}},"roles/baremetalsolution.nfssharesadmin":{"permissions":["baremetalsolution.nfsshares.*"],"en":{"roleTitle":"NFS Shares Admin","roleName":"roles/baremetalsolution.nfssharesadmin","roleDescription":"Administrator of Bare Metal Solution NFS Share resources"},"ja":{"roleTitle":"NFS 共有の管理者","roleName":"roles/baremetalsolution.nfssharesadmin","roleDescription":"Bare Metal Solution の NFS 共有リソースの管理者"}},"roles/baremetalsolution.nfsshareseditor":{"permissions":["baremetalsolution.nfsshares.*"],"en":{"roleTitle":"NFS Shares Editor","roleName":"roles/baremetalsolution.nfsshareseditor","roleDescription":"Editor of Bare Metal Solution NFS Share resources"},"ja":{"roleTitle":"NFS 共有の編集者","roleName":"roles/baremetalsolution.nfsshareseditor","roleDescription":"Bare Metal Solution の NFS 共有リソースの編集者"}},"roles/baremetalsolution.nfssharesviewer":{"permissions":["baremetalsolution.nfsshares.get","baremetalsolution.nfsshares.list"],"en":{"roleTitle":"NFS Shares Viewer","roleName":"roles/baremetalsolution.nfssharesviewer","roleDescription":"Viewer of Bare Metal Solution NFS Share resources"},"ja":{"roleTitle":"NFS 共有の閲覧者","roleName":"roles/baremetalsolution.nfssharesviewer","roleDescription":"Bare Metal Solution の NFS 共有リソースの閲覧者"}},"roles/baremetalsolution.storageadmin":{"permissions":["baremetalsolution.luns.*","baremetalsolution.nfsshares.*","baremetalsolution.snapshotschedulepolicies.*","baremetalsolution.volumes.*","baremetalsolution.volumesnapshots.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Bare Metal Solution Storage Admin","roleName":"roles/baremetalsolution.storageadmin","roleDescription":"Administrator of Bare Metal Solution storage resources"},"ja":{"roleTitle":"Bare Metal Solution ストレージ管理者","roleName":"roles/baremetalsolution.storageadmin","roleDescription":"Bare Metal Solution ストレージ リソースの管理者"}},"roles/baremetalsolution.viewer":{"permissions":["baremetalsolution.instances.get","baremetalsolution.instances.list","baremetalsolution.luns.*","baremetalsolution.networks.get","baremetalsolution.networks.list","baremetalsolution.nfsshares.get","baremetalsolution.nfsshares.list","baremetalsolution.snapshotschedulepolicies.get","baremetalsolution.snapshotschedulepolicies.list","baremetalsolution.volumes.get","baremetalsolution.volumes.list","baremetalsolution.volumesnapshots.get","baremetalsolution.volumesnapshots.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Bare Metal Solution Viewer","roleName":"roles/baremetalsolution.viewer","roleDescription":"Viewer of Bare Metal Solution resources"},"ja":{"roleTitle":"Bare Metal Solution 閲覧者","roleName":"roles/baremetalsolution.viewer","roleDescription":"Bare Metal Solution リソースの閲覧者"}},"roles/baremetalsolution.volumesadmin":{"permissions":["baremetalsolution.volumes.*"],"en":{"roleTitle":"Volume Admin","roleName":"roles/baremetalsolution.volumesadmin","roleDescription":"Administrator of Bare Metal Solution volume resources"},"ja":{"roleTitle":"ボリューム管理者","roleName":"roles/baremetalsolution.volumesadmin","roleDescription":"Bare Metal Solution ボリューム リソースの管理者"}},"roles/baremetalsolution.volumeseditor":{"permissions":["baremetalsolution.volumes.*"],"en":{"roleTitle":"Volumes Editor","roleName":"roles/baremetalsolution.volumeseditor","roleDescription":"Editor of Bare Metal Solution volumes resources"},"ja":{"roleTitle":"ボリューム編集者","roleName":"roles/baremetalsolution.volumeseditor","roleDescription":"Bare Metal Solution ボリューム リソースの編集者"}},"roles/baremetalsolution.volumessviewer":{"permissions":["baremetalsolution.volumes.get","baremetalsolution.volumes.list"],"en":{"roleTitle":"Volumes Viewer","roleName":"roles/baremetalsolution.volumessviewer","roleDescription":"Viewer of Bare Metal Solution volumes resources"},"ja":{"roleTitle":"ボリューム閲覧者","roleName":"roles/baremetalsolution.volumessviewer","roleDescription":"Bare Metal Solution ボリューム リソースの閲覧者"}},"roles/bigquerymigration.editor":{"permissions":["bigquerymigration.locations.*","bigquerymigration.subtasks.get","bigquerymigration.subtasks.list","bigquerymigration.workflows.create","bigquerymigration.workflows.delete","bigquerymigration.workflows.get","bigquerymigration.workflows.list","bigquerymigration.workflows.update"],"en":{"roleTitle":"MigrationWorkflow Editor","roleName":"roles/bigquerymigration.editor","roleDescription":"Editor of EDW migration workflows."}},"roles/bigquerymigration.orchestrator":{"permissions":["bigquerymigration.subtasks.create","bigquerymigration.taskTypes.*","bigquerymigration.workflows.orchestrateTask","bigquerymigration.workflows.writeLogs","storage.objects.list"],"en":{"roleTitle":"Task Orchestrator","roleName":"roles/bigquerymigration.orchestrator","roleDescription":"Orchestrator of EDW migration tasks."}},"roles/bigquerymigration.translationUser":{"permissions":["bigquerymigration.translation.*"],"en":{"roleTitle":"Migration Translation User","roleName":"roles/bigquerymigration.translationUser","roleDescription":"User of EDW migration SQL translation service."}},"roles/bigquerymigration.viewer":{"permissions":["bigquerymigration.locations.*","bigquerymigration.subtasks.get","bigquerymigration.subtasks.list","bigquerymigration.workflows.get","bigquerymigration.workflows.list"],"en":{"roleTitle":"MigrationWorkflow Viewer","roleName":"roles/bigquerymigration.viewer","roleDescription":"Viewer of EDW migration MigrationWorkflow."}},"roles/bigquerymigration.worker":{"permissions":["bigquerymigration.subtaskTypes.*","bigquerymigration.subtasks.executeTask","bigquerymigration.workflows.writeLogs","storage.objects.create","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Task Worker","roleName":"roles/bigquerymigration.worker","roleDescription":"Worker that executes EDW migration subtasks."}},"roles/chroniclesm.admin":{"permissions":["chroniclesm.*"],"en":{"roleTitle":"Chronicle Service Admin","roleName":"roles/chroniclesm.admin","roleDescription":"Admins can view and modify Chronicle service details."},"ja":{"roleTitle":"Chronicle サービス管理者","roleName":"roles/chroniclesm.admin","roleDescription":"管理者は Chronicle サービスの詳細を表示して変更できます。"}},"roles/chroniclesm.viewer":{"permissions":["chroniclesm.gcpAssociations.get","chroniclesm.gcpSettings.get"],"en":{"roleTitle":"Chronicle Service Viewer","roleName":"roles/chroniclesm.viewer","roleDescription":"Viewers can see Chronicle service details but not change them."},"ja":{"roleTitle":"Chronicle サービス閲覧者","roleName":"roles/chroniclesm.viewer","roleDescription":"閲覧者は Chronicle サービスの詳細を確認できますが、変更はできません。"}},"roles/contactcenterinsights.editor":{"permissions":["contactcenterinsights.*"],"en":{"roleTitle":"Contact Center AI Insights editor","roleName":"roles/contactcenterinsights.editor","roleDescription":"Grants read and write access to all Contact Center AI Insights resources."},"ja":{"roleTitle":"Contact Center AI Insights 編集者","roleName":"roles/contactcenterinsights.editor","roleDescription":"すべての Contact Center AI Insights リソースへの読み取り / 書き込みアクセス権を付与します。"}},"roles/contactcenterinsights.viewer":{"permissions":["contactcenterinsights.analyses.get","contactcenterinsights.analyses.list","contactcenterinsights.conversations.get","contactcenterinsights.conversations.list","contactcenterinsights.issueModels.get","contactcenterinsights.issueModels.list","contactcenterinsights.issues.get","contactcenterinsights.issues.list","contactcenterinsights.operations.*","contactcenterinsights.phraseMatchers.get","contactcenterinsights.phraseMatchers.list","contactcenterinsights.settings.get"],"en":{"roleTitle":"Contact Center AI Insights viewer","roleName":"roles/contactcenterinsights.viewer","roleDescription":"Grants read access to all Contact Center AI Insights resources."},"ja":{"roleTitle":"Contact Center AI Insights 閲覧者","roleName":"roles/contactcenterinsights.viewer","roleDescription":"すべての Contact Center AI Insights リソースに対する読み取りアクセス権を付与します。"}},"roles/contentwarehouse.admin":{"permissions":["contentwarehouse.documentSchemas.*","contentwarehouse.documents.create","contentwarehouse.documents.delete","contentwarehouse.documents.get","contentwarehouse.documents.getIamPolicy","contentwarehouse.documents.setIamPolicy","contentwarehouse.documents.update","contentwarehouse.locations.*","contentwarehouse.rawDocuments.*","contentwarehouse.ruleSets.*","contentwarehouse.synonymSets.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Content Warehouse Admin","roleName":"roles/contentwarehouse.admin","roleDescription":"Grants full access to all the resources in Content Warehouse"},"ja":{"roleTitle":"Content Warehouse 管理者","roleName":"roles/contentwarehouse.admin","roleDescription":"Content Warehouse 内のすべてのリソースへの完全アクセス権を付与します。"}},"roles/contentwarehouse.documentCreator":{"permissions":["contentwarehouse.documentSchemas.get","contentwarehouse.documentSchemas.list","contentwarehouse.documents.create","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Content Warehouse document creator","roleName":"roles/contentwarehouse.documentCreator","roleDescription":"Grants access to create document in Content Warehouse"},"ja":{"roleTitle":"Content Warehouse ドキュメント作成者","roleName":"roles/contentwarehouse.documentCreator","roleDescription":"Content Warehouse でドキュメントを作成するためのアクセス権を付与します。"}},"roles/contentwarehouse.documentEditor":{"permissions":["contentwarehouse.documentSchemas.get","contentwarehouse.documents.create","contentwarehouse.documents.delete","contentwarehouse.documents.get","contentwarehouse.documents.getIamPolicy","contentwarehouse.documents.setIamPolicy","contentwarehouse.documents.update","contentwarehouse.rawDocuments.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Content Warehouse Document Editor","roleName":"roles/contentwarehouse.documentEditor","roleDescription":"Grants edit access to document resource in Content Warehouse"},"ja":{"roleTitle":"Content Warehouse ドキュメント編集者","roleName":"roles/contentwarehouse.documentEditor","roleDescription":"Content Warehouse 内のドキュメント リソースに対する編集権限を付与します。"}},"roles/contentwarehouse.documentOwner":{"permissions":["contentwarehouse.documents.enableOwnership","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Content Warehouse document owner","roleName":"roles/contentwarehouse.documentOwner","roleDescription":"Grants editor access to all owned documents in Content Warehouse"},"ja":{"roleTitle":"Content Warehouse ドキュメントのオーナー","roleName":"roles/contentwarehouse.documentOwner","roleDescription":"Content Warehouse 内のすべての所有ドキュメントに対するアクセス権を編集者に付与します。"}},"roles/contentwarehouse.documentSchemaViewer":{"permissions":["contentwarehouse.documentSchemas.get","contentwarehouse.documentSchemas.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Content Warehouse document schema viewer","roleName":"roles/contentwarehouse.documentSchemaViewer","roleDescription":"Grants access to view the document schemas in Content Warehouse"},"ja":{"roleTitle":"Content Warehouse のドキュメント スキーマ閲覧者","roleName":"roles/contentwarehouse.documentSchemaViewer","roleDescription":"Content Warehouse でドキュメント スキーマを表示するためのアクセス権を付与します。"}},"roles/contentwarehouse.documentViewer":{"permissions":["contentwarehouse.documentSchemas.get","contentwarehouse.documents.get","contentwarehouse.documents.getIamPolicy","contentwarehouse.rawDocuments.download","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Content Warehouse Viewer","roleName":"roles/contentwarehouse.documentViewer","roleDescription":"Grants access to view all the resources in Content Warehouse"},"ja":{"roleTitle":"Content Warehouse 閲覧者","roleName":"roles/contentwarehouse.documentViewer","roleDescription":"Content Warehouse 内のすべてのリソースを閲覧するためのアクセス権を付与します。"}},"roles/dataprocessing.admin":{"permissions":["billing.accounts.get","billing.accounts.list","dataprocessing.*"],"en":{"roleTitle":"Data Processing Controls Resource Admin","roleName":"roles/dataprocessing.admin","roleDescription":"Data processing controls admin who can fully manage data processing controls settings and view all datasource data."},"ja":{"roleTitle":"データ処理制御リソース管理者","roleName":"roles/dataprocessing.admin","roleDescription":"データ処理制御の管理者。データ処理制御の設定をすべて管理でき、すべてのデータソースのデータを表示できます。"}},"roles/dataprocessing.dataSourceManager":{"permissions":["dataprocessing.datasources.list","dataprocessing.datasources.update"],"en":{"roleTitle":"Data Processing Controls Data Source Manager","roleName":"roles/dataprocessing.dataSourceManager","roleDescription":"Data processing controls data source manager who can get, list, and update the underlying data."},"ja":{"roleTitle":"データ処理制御のデータソース管理者","roleName":"roles/dataprocessing.dataSourceManager","roleDescription":"データ処理制御のデータソース管理者。基になるデータを取得、一覧表示、更新できます。"}},"roles/earlyaccesscenter.admin":{"permissions":["earlyaccesscenter.*"],"en":{"roleTitle":"Early Access Center Administrator","roleName":"roles/earlyaccesscenter.admin","roleDescription":"Grants full access to the Early Access Center, including access to all DATA_READ and DATA_WRITE permissions. Including the ability to enroll into Early Access Campaigns."},"ja":{"roleTitle":"早期アクセス センター管理者","roleName":"roles/earlyaccesscenter.admin","roleDescription":"早期アクセス センターへの完全アクセス権(すべての DATA_READ 権限と DATA_WRITE 権限に対するアクセス権を含む)を付与します。早期アクセス キャンペーンに登録する権限も含まれます。"}},"roles/earlyaccesscenter.viewer":{"permissions":["earlyaccesscenter.campaigns.get","earlyaccesscenter.campaigns.list","earlyaccesscenter.customerAllowlists.*"],"en":{"roleTitle":"Early Access Center Viewer","roleName":"roles/earlyaccesscenter.viewer","roleDescription":"Grants view access to the Early Access Center, including access to all DATA_READ but no DATA_WRITE permissions."},"ja":{"roleTitle":"早期アクセス センター閲覧者","roleName":"roles/earlyaccesscenter.viewer","roleDescription":"早期アクセス センターの表示アクセス権(すべての DATA_READ 権限に対するアクセス権を含むが、DATA_WRITE 権限に対するアクセス権を除く)を付与します。"}},"roles/essentialcontacts.admin":{"permissions":["essentialcontacts.*"],"en":{"roleTitle":"Essential Contacts Admin","roleName":"roles/essentialcontacts.admin","roleDescription":"Full access to all essential contacts"},"ja":{"roleTitle":"重要な連絡先の管理者","roleName":"roles/essentialcontacts.admin","roleDescription":"すべての重要な連絡先に対する完全アクセス権"}},"roles/essentialcontacts.viewer":{"permissions":["essentialcontacts.contacts.get","essentialcontacts.contacts.list"],"en":{"roleTitle":"Essential Contacts Viewer","roleName":"roles/essentialcontacts.viewer","roleDescription":"Viewer for all essential contacts"},"ja":{"roleTitle":"重要な連絡先の閲覧者","roleName":"roles/essentialcontacts.viewer","roleDescription":"すべての重要な連絡先の閲覧者"}},"roles/firebasecloudmessaging.admin":{"permissions":["cloudmessaging.*","fcmdata.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firebase Cloud Messaging API Admin","roleName":"roles/firebasecloudmessaging.admin","roleDescription":"Full read/write access to Firebase Cloud Messaging API resources."},"ja":{"roleTitle":"Firebase Cloud Messaging API 管理者","roleName":"roles/firebasecloudmessaging.admin","roleDescription":"Firebase Cloud Messaging API リソースに対する完全な読み取り / 書き込みアクセス権。"}},"roles/firebasecrash.symbolMappingsAdmin":{"permissions":["firebase.clients.get","firebase.clients.list","resourcemanager.projects.get"],"en":{"roleTitle":"Firebase Crash Symbol Uploader","roleName":"roles/firebasecrash.symbolMappingsAdmin","roleDescription":"Full read/write access to symbol mapping file resources for Firebase Crash Reporting."},"ja":{"roleTitle":"Firebase Crash Symbol アップローダー","roleName":"roles/firebasecrash.symbolMappingsAdmin","roleDescription":"Firebase Crash Reporting のシンボル マッピング ファイル リソースへの完全な読み取り / 書き込みアクセス権。"}},"roles/identityplatform.admin":{"permissions":["firebaseauth.*"],"en":{"roleTitle":"Identity Platform Admin","roleName":"roles/identityplatform.admin","roleDescription":"Full access to Identity Platform resources."},"ja":{"roleTitle":"Identity Platform 管理者","roleName":"roles/identityplatform.admin","roleDescription":"Identity Platform リソースに対する完全アクセス権。"}},"roles/identityplatform.viewer":{"permissions":["firebaseauth.configs.get","firebaseauth.users.get"],"en":{"roleTitle":"Identity Platform Viewer","roleName":"roles/identityplatform.viewer","roleDescription":"Read access to Identity Platform resources."},"ja":{"roleTitle":"Identity Platform 閲覧者","roleName":"roles/identityplatform.viewer","roleDescription":"Identity Platform リソースに対する読み取りアクセス権。"}},"roles/identitytoolkit.admin":{"permissions":["firebaseauth.*"],"en":{"roleTitle":"Identity Toolkit Admin","roleName":"roles/identitytoolkit.admin","roleDescription":"Full access to Identity Toolkit resources."},"ja":{"roleTitle":"Identity Toolkit 管理者","roleName":"roles/identitytoolkit.admin","roleDescription":"ツールキットのリソースを特定するための完全アクセス権。"}},"roles/identitytoolkit.viewer":{"permissions":["firebaseauth.configs.get","firebaseauth.users.get"],"en":{"roleTitle":"Identity Toolkit Viewer","roleName":"roles/identitytoolkit.viewer","roleDescription":"Read access to Identity Toolkit resources."},"ja":{"roleTitle":"Identity Toolkit 閲覧者","roleName":"roles/identitytoolkit.viewer","roleDescription":"ツールキットのリソースを特定するための読み取りアクセス権です。"}},"roles/integrations.apigeeIntegrationAdminRole":{"permissions":["integrations.apigeeAuthConfigs.*","integrations.apigeeCertificates.*","integrations.apigeeExecutions.*","integrations.apigeeIntegrationVers.*","integrations.apigeeIntegrations.*","integrations.apigeeSfdcChannels.*","integrations.apigeeSfdcInstances.*","integrations.apigeeSuspensions.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Integration Admin","roleName":"roles/integrations.apigeeIntegrationAdminRole","roleDescription":"A user that has full access to all Apigee integrations."},"ja":{"roleTitle":"Apigee 統合管理者","roleName":"roles/integrations.apigeeIntegrationAdminRole","roleDescription":"すべての Apigee 統合への完全アクセス権を持つユーザー。"}},"roles/integrations.apigeeIntegrationDeployerRole":{"permissions":["integrations.apigeeIntegrationVers.deploy","integrations.apigeeIntegrationVers.get","integrations.apigeeIntegrationVers.list","integrations.apigeeIntegrations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Integration Deployer","roleName":"roles/integrations.apigeeIntegrationDeployerRole","roleDescription":"A developer that can deploy/undeploy Apigee integrations to the integration runtime."},"ja":{"roleTitle":"Apigee 統合デプロイ担当者","roleName":"roles/integrations.apigeeIntegrationDeployerRole","roleDescription":"統合ランタイムへの Apigee 統合をデプロイ / デプロイ解除できるデベロッパー。"}},"roles/integrations.apigeeIntegrationEditorRole":{"permissions":["integrations.apigeeAuthConfigs.create","integrations.apigeeAuthConfigs.get","integrations.apigeeAuthConfigs.list","integrations.apigeeAuthConfigs.update","integrations.apigeeCertificates.create","integrations.apigeeCertificates.get","integrations.apigeeCertificates.list","integrations.apigeeCertificates.update","integrations.apigeeExecutions.*","integrations.apigeeIntegrationVers.*","integrations.apigeeIntegrations.*","integrations.apigeeSfdcChannels.create","integrations.apigeeSfdcChannels.get","integrations.apigeeSfdcChannels.list","integrations.apigeeSfdcChannels.update","integrations.apigeeSfdcInstances.create","integrations.apigeeSfdcInstances.get","integrations.apigeeSfdcInstances.list","integrations.apigeeSfdcInstances.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Integration Editor","roleName":"roles/integrations.apigeeIntegrationEditorRole","roleDescription":"A developer that can list, create and update Apigee integrations."},"ja":{"roleTitle":"Apigee 統合編集者","roleName":"roles/integrations.apigeeIntegrationEditorRole","roleDescription":"Apigee 統合の一覧表示、作成、更新ができるデベロッパー。"}},"roles/integrations.apigeeIntegrationInvokerRole":{"permissions":["integrations.apigeeExecutions.*","integrations.apigeeIntegrationVers.get","integrations.apigeeIntegrationVers.list","integrations.apigeeIntegrations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Integration Invoker","roleName":"roles/integrations.apigeeIntegrationInvokerRole","roleDescription":"A role that can invoke Apigee integrations."},"ja":{"roleTitle":"Apigee 統合起動元","roleName":"roles/integrations.apigeeIntegrationInvokerRole","roleDescription":"Apigee 統合を起動できるロール。"}},"roles/integrations.apigeeIntegrationsViewer":{"permissions":["integrations.apigeeAuthConfigs.list","integrations.apigeeCertificates.list","integrations.apigeeIntegrationVers.get","integrations.apigeeIntegrationVers.list","integrations.apigeeIntegrations.list","integrations.apigeeSfdcChannels.list","integrations.apigeeSfdcInstances.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Integration Viewer","roleName":"roles/integrations.apigeeIntegrationsViewer","roleDescription":"A developer that can list and view Apigee integrations."},"ja":{"roleTitle":"Apigee 統合閲覧者","roleName":"roles/integrations.apigeeIntegrationsViewer","roleDescription":"Apigee 統合の一覧表示と閲覧ができるデベロッパー。"}},"roles/integrations.apigeeSuspensionResolver":{"permissions":["integrations.apigeeSuspensions.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Apigee Integration Approver","roleName":"roles/integrations.apigeeSuspensionResolver","roleDescription":"A role that can approve / reject Apigee integrations that contain a suspension/wait task."},"ja":{"roleTitle":"Apigee 統合承認者","roleName":"roles/integrations.apigeeSuspensionResolver","roleDescription":"停止 / 待機タスクを含む Apigee 統合を承認 / 拒否できるロール。"}},"roles/integrations.securityIntegrationAdmin":{"permissions":["integrations.securityAuthConfigs.*","integrations.securityExecutions.*","integrations.securityIntegTempVers.*","integrations.securityIntegrationVers.*","integrations.securityIntegrations.*"],"en":{"roleTitle":"Security Integration Admin","roleName":"roles/integrations.securityIntegrationAdmin","roleDescription":"A user that has full access to all Security integrations."},"ja":{"roleTitle":"セキュリティ統合管理者","roleName":"roles/integrations.securityIntegrationAdmin","roleDescription":"すべてのセキュリティ統合への完全アクセス権を持つユーザー。"}},"roles/oauthconfig.editor":{"permissions":["clientauthconfig.*","oauthconfig.*"],"en":{"roleTitle":"OAuth Config Editor","roleName":"roles/oauthconfig.editor","roleDescription":"Read/write access to OAuth config resources"},"ja":{"roleTitle":"OAuth Config 編集者","roleName":"roles/oauthconfig.editor","roleDescription":"OAuth Config リソースに対する読み取り / 書き込みアクセス権"}},"roles/oauthconfig.viewer":{"permissions":["clientauthconfig.brands.get","clientauthconfig.brands.list","clientauthconfig.clients.get","clientauthconfig.clients.list","oauthconfig.clientpolicy.*","oauthconfig.testusers.get","oauthconfig.verification.get"],"en":{"roleTitle":"OAuth Config Viewer","roleName":"roles/oauthconfig.viewer","roleDescription":"Read-only access to OAuth config resources"},"ja":{"roleTitle":"OAuth Config 閲覧者","roleName":"roles/oauthconfig.viewer","roleDescription":"OAuth Config リソースに対する読み取り専用アクセス権"}},"roles/paymentsresellersubscription.partnerAdmin":{"permissions":["paymentsresellersubscription.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Payments Reseller Admin","roleName":"roles/paymentsresellersubscription.partnerAdmin","roleDescription":"Full access to all Payments Reseller resources, including subscriptions, products and promotions"},"ja":{"roleTitle":"Payments Reseller 管理者","roleName":"roles/paymentsresellersubscription.partnerAdmin","roleDescription":"Payments Reseller リソース(サブスクリプション、プロダクト、プロモーションなど)に対する完全アクセス権"}},"roles/paymentsresellersubscription.partnerViewer":{"permissions":["paymentsresellersubscription.products.*","paymentsresellersubscription.promotions.*","paymentsresellersubscription.subscriptions.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Payments Reseller Viewer","roleName":"roles/paymentsresellersubscription.partnerViewer","roleDescription":"Read access to all Payments Reseller resources, including subscriptions, products and promotions"},"ja":{"roleTitle":"Payments Reseller 閲覧者","roleName":"roles/paymentsresellersubscription.partnerViewer","roleDescription":"Payments Reseller リソース(サブスクリプション、プロダクト、プロモーションなど)に対する読み取りアクセス権"}},"roles/paymentsresellersubscription.productViewer":{"permissions":["paymentsresellersubscription.products.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Payments Reseller Products Viewer","roleName":"roles/paymentsresellersubscription.productViewer","roleDescription":"Read access to Payments Reseller Product resource"},"ja":{"roleTitle":"Payments Reseller Products 閲覧者","roleName":"roles/paymentsresellersubscription.productViewer","roleDescription":"Payments Reseller Product のリソースへの読み取りアクセス権"}},"roles/paymentsresellersubscription.promotionViewer":{"permissions":["paymentsresellersubscription.promotions.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Payments Reseller Promotions Viewer","roleName":"roles/paymentsresellersubscription.promotionViewer","roleDescription":"Read access to Payments Reseller Promotion resource"},"ja":{"roleTitle":"Payments Reseller Promotions 閲覧者","roleName":"roles/paymentsresellersubscription.promotionViewer","roleDescription":"Payments Reseller Promotion のリソースへの読み取りアクセス権"}},"roles/paymentsresellersubscription.subscriptionEditor":{"permissions":["paymentsresellersubscription.subscriptions.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Payments Reseller Subscriptions Editor","roleName":"roles/paymentsresellersubscription.subscriptionEditor","roleDescription":"Write access to Payments Reseller Subscription resource"},"ja":{"roleTitle":"Payments Reseller Subscriptions 編集者","roleName":"roles/paymentsresellersubscription.subscriptionEditor","roleDescription":"Payments Reseller Subscription のリソースへの書き込みアクセス権"}},"roles/paymentsresellersubscription.subscriptionViewer":{"permissions":["paymentsresellersubscription.subscriptions.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Payments Reseller Subscriptions Viewer","roleName":"roles/paymentsresellersubscription.subscriptionViewer","roleDescription":"Read access to Payments Reseller Subscription resource"},"ja":{"roleTitle":"Payments Reseller Subscriptions 閲覧者","roleName":"roles/paymentsresellersubscription.subscriptionViewer","roleDescription":"Payments Reseller Subscription のリソースへの読み取りアクセス権"}},"roles/policyanalyzer.activityAnalysisViewer":{"permissions":["policyanalyzer.*"],"en":{"roleTitle":"Activity Analysis Viewer","roleName":"roles/policyanalyzer.activityAnalysisViewer","roleDescription":"Viewer user that can read all activity analysis."},"ja":{"roleTitle":"アクティビティ分析閲覧者","roleName":"roles/policyanalyzer.activityAnalysisViewer","roleDescription":"すべてのアクティビティ分析を読み取ることができる閲覧者ユーザー。"}},"roles/policysimulator.admin":{"permissions":["policysimulator.*"],"en":{"roleTitle":"Simulator Admin","roleName":"roles/policysimulator.admin","roleDescription":"Admin user that can run and access replays."},"ja":{"roleTitle":"シミュレータ管理者","roleName":"roles/policysimulator.admin","roleDescription":"リプレイの実行とアクセスが可能な管理ユーザー。"}},"roles/recommender.exporter":{"permissions":["recommender.resources.*"],"en":{"roleTitle":"Recommendations Exporter","roleName":"roles/recommender.exporter","roleDescription":"Exporter of Recommendations"},"ja":{"roleTitle":"推奨事項エクスポータ","roleName":"roles/recommender.exporter","roleDescription":"推奨事項のエクスポータ"}},"roles/remotebuildexecution.actionCacheWriter":{"permissions":["remotebuildexecution.actions.set","remotebuildexecution.blobs.create"],"en":{"roleTitle":"Remote Build Execution Action Cache Writer","roleName":"roles/remotebuildexecution.actionCacheWriter","roleDescription":"Remote Build Execution Action Cache Writer"},"ja":{"roleTitle":"Remote Build Execution アクション キャッシュ書き込み","roleName":"roles/remotebuildexecution.actionCacheWriter","roleDescription":"Remote Build Execution アクション キャッシュ書き込み"}},"roles/remotebuildexecution.artifactAdmin":{"permissions":["remotebuildexecution.actions.create","remotebuildexecution.actions.delete","remotebuildexecution.actions.get","remotebuildexecution.blobs.*","remotebuildexecution.logstreams.*"],"en":{"roleTitle":"Remote Build Execution Artifact Admin","roleName":"roles/remotebuildexecution.artifactAdmin","roleDescription":"Remote Build Execution Artifact Admin"},"ja":{"roleTitle":"Remote Build Execution アーティファクト管理者","roleName":"roles/remotebuildexecution.artifactAdmin","roleDescription":"Remote Build Execution アーティファクト管理者"}},"roles/remotebuildexecution.artifactCreator":{"permissions":["remotebuildexecution.actions.create","remotebuildexecution.actions.get","remotebuildexecution.blobs.*","remotebuildexecution.logstreams.*"],"en":{"roleTitle":"Remote Build Execution Artifact Creator","roleName":"roles/remotebuildexecution.artifactCreator","roleDescription":"Remote Build Execution Artifact Creator"},"ja":{"roleTitle":"Remote Build Execution アーティファクト作成者","roleName":"roles/remotebuildexecution.artifactCreator","roleDescription":"Remote Build Execution アーティファクト作成者"}},"roles/remotebuildexecution.artifactViewer":{"permissions":["remotebuildexecution.actions.get","remotebuildexecution.blobs.get","remotebuildexecution.logstreams.get"],"en":{"roleTitle":"Remote Build Execution Artifact Viewer","roleName":"roles/remotebuildexecution.artifactViewer","roleDescription":"Remote Build Execution Artifact Viewer"},"ja":{"roleTitle":"Remote Build Execution アーティファクト閲覧者","roleName":"roles/remotebuildexecution.artifactViewer","roleDescription":"Remote Build Execution アーティファクト閲覧者"}},"roles/remotebuildexecution.configurationAdmin":{"permissions":["remotebuildexecution.instances.*","remotebuildexecution.workerpools.*"],"en":{"roleTitle":"Remote Build Execution Configuration Admin","roleName":"roles/remotebuildexecution.configurationAdmin","roleDescription":"Remote Build Execution Configuration Admin"},"ja":{"roleTitle":"Remote Build Execution 構成管理者","roleName":"roles/remotebuildexecution.configurationAdmin","roleDescription":"Remote Build Execution 管理者"}},"roles/remotebuildexecution.configurationViewer":{"permissions":["remotebuildexecution.instances.get","remotebuildexecution.instances.list","remotebuildexecution.workerpools.get","remotebuildexecution.workerpools.list"],"en":{"roleTitle":"Remote Build Execution Configuration Viewer","roleName":"roles/remotebuildexecution.configurationViewer","roleDescription":"Remote Build Execution Configuration Viewer"},"ja":{"roleTitle":"Remote Build Execution 構成閲覧者","roleName":"roles/remotebuildexecution.configurationViewer","roleDescription":"Remote Build Execution 構成閲覧者"}},"roles/remotebuildexecution.logstreamWriter":{"permissions":["remotebuildexecution.logstreams.create","remotebuildexecution.logstreams.update"],"en":{"roleTitle":"Remote Build Execution Logstream Writer","roleName":"roles/remotebuildexecution.logstreamWriter","roleDescription":"Remote Build Execution Logstream Writer"},"ja":{"roleTitle":"Remote Build Execution ログストリーム書き込み","roleName":"roles/remotebuildexecution.logstreamWriter","roleDescription":"Remote Build Execution ログストリーム書き込み"}},"roles/remotebuildexecution.reservationAdmin":{"permissions":["remotebuildexecution.actions.create","remotebuildexecution.actions.delete","remotebuildexecution.actions.get"],"en":{"roleTitle":"Remote Build Execution Reservation Admin","roleName":"roles/remotebuildexecution.reservationAdmin","roleDescription":"Remote Build Execution Reservation Admin"},"ja":{"roleTitle":"Remote Build Execution 予約管理者","roleName":"roles/remotebuildexecution.reservationAdmin","roleDescription":"Remote Build Execution 予約管理者"}},"roles/remotebuildexecution.worker":{"permissions":["remotebuildexecution.actions.update","remotebuildexecution.blobs.*","remotebuildexecution.botsessions.*","remotebuildexecution.logstreams.create","remotebuildexecution.logstreams.update"],"en":{"roleTitle":"Remote Build Execution Worker","roleName":"roles/remotebuildexecution.worker","roleDescription":"Remote Build Execution Worker"},"ja":{"roleTitle":"Remote Build Execution ワーカー","roleName":"roles/remotebuildexecution.worker","roleDescription":"Remote Build Execution ワーカー"}},"roles/retail.admin":{"permissions":["automlrecommendations.apiKeys.create","automlrecommendations.apiKeys.delete","automlrecommendations.catalogItems.*","automlrecommendations.catalogs.*","automlrecommendations.eventStores.*","automlrecommendations.events.*","automlrecommendations.placements.*","automlrecommendations.recommendations.*","retail.*"],"en":{"roleTitle":"Retail Admin","roleName":"roles/retail.admin","roleDescription":"Full access to Retail api resources."},"ja":{"roleTitle":"Retail 管理者","roleName":"roles/retail.admin","roleDescription":"Retail API リソースに対する完全アクセス権。"}},"roles/retail.editor":{"permissions":["automlrecommendations.apiKeys.create","automlrecommendations.apiKeys.delete","automlrecommendations.catalogItems.*","automlrecommendations.catalogs.*","automlrecommendations.eventStores.*","automlrecommendations.events.create","automlrecommendations.events.list","automlrecommendations.placements.*","automlrecommendations.recommendations.*","retail.attributesConfigs.addCatalogAttribute","retail.attributesConfigs.exportCatalogAttributes","retail.attributesConfigs.get","retail.attributesConfigs.importCatalogAttributes","retail.attributesConfigs.replaceCatalogAttribute","retail.attributesConfigs.update","retail.catalogs.*","retail.controls.*","retail.models.*","retail.operations.*","retail.placements.*","retail.products.create","retail.products.delete","retail.products.export","retail.products.get","retail.products.import","retail.products.list","retail.products.update","retail.retailProjects.*","retail.servingConfigs.*","retail.userEvents.create","retail.userEvents.import"],"en":{"roleTitle":"Retail Editor","roleName":"roles/retail.editor","roleDescription":"Full access to Retail api resources except purge, rejoin, and setSponsorship."},"ja":{"roleTitle":"Retail 編集者","roleName":"roles/retail.editor","roleDescription":"Retail API リソースに対する完全アクセス権(パージ、再参加、setSponsorship を除く)。"}},"roles/retail.viewer":{"permissions":["automlrecommendations.catalogItems.get","automlrecommendations.catalogItems.list","automlrecommendations.catalogs.getStats","automlrecommendations.catalogs.list","automlrecommendations.eventStores.*","automlrecommendations.events.list","automlrecommendations.placements.getStats","automlrecommendations.placements.list","automlrecommendations.recommendations.list","retail.attributesConfigs.exportCatalogAttributes","retail.attributesConfigs.get","retail.catalogs.completeQuery","retail.catalogs.list","retail.controls.export","retail.controls.get","retail.controls.list","retail.models.list","retail.operations.*","retail.placements.*","retail.products.export","retail.products.get","retail.products.list","retail.retailProjects.*","retail.servingConfigs.get","retail.servingConfigs.list"],"en":{"roleTitle":"Retail Viewer","roleName":"roles/retail.viewer","roleDescription":"Grants access to read all resources in Retail."},"ja":{"roleTitle":"Retail 閲覧者","roleName":"roles/retail.viewer","roleDescription":"Retail 内のすべてのリソースを読み取るためのアクセス権を付与します。"}},"roles/runtimeconfig.admin":{"permissions":["runtimeconfig.*"],"en":{"roleTitle":"Cloud RuntimeConfig Admin","roleName":"roles/runtimeconfig.admin","roleDescription":"Full access to RuntimeConfig resources."},"ja":{"roleTitle":"Cloud RuntimeConfig 管理者","roleName":"roles/runtimeconfig.admin","roleDescription":"RuntimeConfig リソースへの完全アクセス権。"}},"roles/speech.admin":{"permissions":["speech.*"],"en":{"roleTitle":"Cloud Speech Administrator","roleName":"roles/speech.admin","roleDescription":"Grants full access to all resources in Speech-to-text"},"ja":{"roleTitle":"Cloud Speech 管理者","roleName":"roles/speech.admin","roleDescription":"Speech-to-Text 内のすべてのリソースに対する完全アクセス権を付与します。"}},"roles/speech.client":{"permissions":["speech.adaptations.*"],"en":{"roleTitle":"Cloud Speech Client","roleName":"roles/speech.client","roleDescription":"Grants access to the recognition APIs."},"ja":{"roleTitle":"Cloud Speech クライアント","roleName":"roles/speech.client","roleDescription":"認識 API へのアクセス権を付与します。"}},"roles/speech.editor":{"permissions":["speech.*"],"en":{"roleTitle":"Cloud Speech Editor","roleName":"roles/speech.editor","roleDescription":"Grants access to edit resources in Speech-to-text"},"ja":{"roleTitle":"Cloud Speech 編集者","roleName":"roles/speech.editor","roleDescription":"Speech-to-Text のリソースを編集するためのアクセス権を付与します。"}},"roles/subscribewithgoogledeveloper.developer":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","subscribewithgoogledeveloper.*"],"en":{"roleTitle":"Subscribe with Google Developer","roleName":"roles/subscribewithgoogledeveloper.developer","roleDescription":"Access DevTools for Subscribe with Google"},"ja":{"roleTitle":"「Google で購読」デベロッパー","roleName":"roles/subscribewithgoogledeveloper.developer","roleDescription":"「Google で購読」用の DevTools へのアクセス権"}},"roles/trafficdirector.client":{"permissions":["trafficdirector.*"],"en":{"roleTitle":"Traffic Director Client","roleName":"roles/trafficdirector.client","roleDescription":"Fetch service configurations and report metrics."},"ja":{"roleTitle":"Traffic Director クライアント","roleName":"roles/trafficdirector.client","roleDescription":"サービス構成を取得してレポート指標を取得します。"}},"roles/translationhub.admin":{"permissions":["automl.models.get","automl.models.list","automl.models.predict","cloudtranslate.glossaries.create","cloudtranslate.glossaries.delete","cloudtranslate.glossaries.get","cloudtranslate.glossaries.list","cloudtranslate.glossaries.predict","resourcemanager.projects.get","resourcemanager.projects.list","translationhub.*"],"en":{"roleTitle":"Translation Hub Admin","roleName":"roles/translationhub.admin","roleDescription":"Admin of Translation Hub"},"ja":{"roleTitle":"Translation Hub 管理者","roleName":"roles/translationhub.admin","roleDescription":"Translation Hub の管理者"}},"roles/translationhub.portalUser":{"permissions":["automl.models.get","automl.models.list","automl.models.predict","cloudtranslate.glossaries.get","cloudtranslate.glossaries.list","cloudtranslate.glossaries.predict","resourcemanager.projects.get","resourcemanager.projects.list","translationhub.portals.get","translationhub.portals.list"],"en":{"roleTitle":"Translation Hub Portal User","roleName":"roles/translationhub.portalUser","roleDescription":"Portal user of Translation Hub"},"ja":{"roleTitle":"Translation Hub ポータル ユーザー","roleName":"roles/translationhub.portalUser","roleDescription":"Translation Hub のポータル ユーザー"}},"roles/visualinspection.editor":{"permissions":["visualinspection.annotationSets.*","visualinspection.annotationSpecs.*","visualinspection.annotations.*","visualinspection.datasets.*","visualinspection.images.*","visualinspection.locations.get","visualinspection.locations.list","visualinspection.modelEvaluations.*","visualinspection.models.*","visualinspection.modules.*","visualinspection.operations.*","visualinspection.solutionArtifacts.*","visualinspection.solutions.*"],"en":{"roleTitle":"Visual Inspection AI Solution Editor","roleName":"roles/visualinspection.editor","roleDescription":"Read and write access to all Visual Inspection AI resources except visualinspection.locations.reportUsageMetrics"},"ja":{"roleTitle":"Visual Inspection AI ソリューション編集者","roleName":"roles/visualinspection.editor","roleDescription":"すべての Visual Inspection AI リソース(visualinspection.locations.reportUsageMetrics を除く)に対する読み取り / 書き込みアクセス権"}},"roles/visualinspection.usageMetricsReporter":{"permissions":["visualinspection.locations.reportUsageMetrics"],"en":{"roleTitle":"Visual Inspection AI Usage Metrics Reporter","roleName":"roles/visualinspection.usageMetricsReporter","roleDescription":"ReportUsageMetric access to Visual Inspection AI Service"},"ja":{"roleTitle":"Visual Inspection AI 使用状況の指標の報告者","roleName":"roles/visualinspection.usageMetricsReporter","roleDescription":"Visual Inspection AI サービスへの ReportUsageMetric アクセス権"}},"roles/visualinspection.viewer":{"permissions":["visualinspection.annotationSets.get","visualinspection.annotationSets.list","visualinspection.annotationSpecs.get","visualinspection.annotationSpecs.list","visualinspection.annotations.get","visualinspection.annotations.list","visualinspection.datasets.export","visualinspection.datasets.get","visualinspection.datasets.list","visualinspection.images.get","visualinspection.images.list","visualinspection.locations.get","visualinspection.locations.list","visualinspection.modelEvaluations.*","visualinspection.models.get","visualinspection.models.list","visualinspection.modules.get","visualinspection.modules.list","visualinspection.operations.*","visualinspection.solutionArtifacts.get","visualinspection.solutionArtifacts.list","visualinspection.solutionArtifacts.predict","visualinspection.solutions.get","visualinspection.solutions.list"],"en":{"roleTitle":"Visual Inspection AI Viewer","roleName":"roles/visualinspection.viewer","roleDescription":"Read access to Visual Inspection AI resources"},"ja":{"roleTitle":"Visual Inspection AI 閲覧者","roleName":"roles/visualinspection.viewer","roleDescription":"Visual Inspection AI リソースへの読み取りアクセス権"}},"roles/browser":{"permissions":["resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Browser","roleName":"roles/browser","roleDescription":"Read access to browse the hierarchy for a project, including the folder,\norganization, and IAM policy. This role doesn't include\npermission to view resources in the project."},"ja":{"roleTitle":"ブラウザ","roleName":"roles/browser","roleDescription":"フォルダ、組織、IAM ポリシーなど、プロジェクトの階層を参照するための読み取りアクセス権。このロールには、プロジェクトのリソースを表示する権限は含まれていません。"}},"roles/proximitybeacon.attachmentEditor":{"permissions":["proximitybeacon.attachments.*","proximitybeacon.beacons.get","proximitybeacon.beacons.list","proximitybeacon.namespaces.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Beacon Attachment Editor","roleName":"roles/proximitybeacon.attachmentEditor","roleDescription":"Can create and delete attachments; can list and get a project's beacons; can list a project's namespaces."},"ja":{"roleTitle":"ビーコン添付ファイル編集者","roleName":"roles/proximitybeacon.attachmentEditor","roleDescription":"添付ファイルの作成と削除、プロジェクトのビーコンの一覧表示と取得、プロジェクトの名前空間の一覧表示が可能です。"}},"roles/proximitybeacon.attachmentPublisher":{"permissions":["proximitybeacon.beacons.attach","proximitybeacon.beacons.get","proximitybeacon.beacons.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Beacon Attachment Publisher","roleName":"roles/proximitybeacon.attachmentPublisher","roleDescription":"Grants necessary permissions to use beacons to create attachments in namespaces not owned by this project."},"ja":{"roleTitle":"ビーコン添付ファイル パブリッシャー","roleName":"roles/proximitybeacon.attachmentPublisher","roleDescription":"ビーコンを使用する権限に加え、このプロジェクトが所有しない名前空間に添付ファイルを作成するために必要な権限を付与します。"}},"roles/proximitybeacon.attachmentViewer":{"permissions":["proximitybeacon.attachments.get","proximitybeacon.attachments.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Beacon Attachment Viewer","roleName":"roles/proximitybeacon.attachmentViewer","roleDescription":"Can view all attachments under a namespace; no beacon or namespace permissions."},"ja":{"roleTitle":"ビーコン添付ファイル閲覧者","roleName":"roles/proximitybeacon.attachmentViewer","roleDescription":"名前空間内のすべての添付ファイルを表示できます(ビーコンや名前空間に対する権限はありません)。"}},"roles/proximitybeacon.beaconEditor":{"permissions":["proximitybeacon.beacons.create","proximitybeacon.beacons.get","proximitybeacon.beacons.list","proximitybeacon.beacons.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Beacon Editor","roleName":"roles/proximitybeacon.beaconEditor","roleDescription":"Necessary access to register, modify, and view beacons; no attachment or namespace permissions."},"ja":{"roleTitle":"ビーコン編集者","roleName":"roles/proximitybeacon.beaconEditor","roleDescription":"ビーコンの登録、変更、表示に必要なアクセス権(添付ファイルや名前空間に対する権限はありません)"}},"roles/pubsub.admin":{"permissions":["pubsub.*","resourcemanager.projects.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Pub/Sub Admin","roleName":"roles/pubsub.admin","roleDescription":"Provides full access to topics and subscriptions."},"ja":{"roleTitle":"Pub/Sub 管理者","roleName":"roles/pubsub.admin","roleDescription":"トピックとサブスクリプションに対する完全アクセス権を付与します。"}},"roles/pubsub.editor":{"permissions":["pubsub.schemas.attach","pubsub.schemas.create","pubsub.schemas.delete","pubsub.schemas.get","pubsub.schemas.list","pubsub.schemas.validate","pubsub.snapshots.create","pubsub.snapshots.delete","pubsub.snapshots.get","pubsub.snapshots.list","pubsub.snapshots.seek","pubsub.snapshots.update","pubsub.subscriptions.consume","pubsub.subscriptions.create","pubsub.subscriptions.delete","pubsub.subscriptions.get","pubsub.subscriptions.list","pubsub.subscriptions.update","pubsub.topics.attachSubscription","pubsub.topics.create","pubsub.topics.delete","pubsub.topics.detachSubscription","pubsub.topics.get","pubsub.topics.list","pubsub.topics.publish","pubsub.topics.update","pubsub.topics.updateTag","resourcemanager.projects.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Pub/Sub Editor","roleName":"roles/pubsub.editor","roleDescription":"Provides access to modify topics and subscriptions, and access to publish\nand consume messages."},"ja":{"roleTitle":"Pub/Sub 編集者","roleName":"roles/pubsub.editor","roleDescription":"トピックとサブスクリプションを変更するためのアクセスと、メッセージを送信および受信するためのアクセスを付与します。"}},"roles/pubsub.publisher":{"permissions":["pubsub.topics.publish"],"en":{"roleTitle":"Pub/Sub Publisher","roleName":"roles/pubsub.publisher","roleDescription":"Provides access to publish messages to a topic."},"ja":{"roleTitle":"Pub/Sub パブリッシャー","roleName":"roles/pubsub.publisher","roleDescription":"メッセージをトピックに送信するためのアクセスを付与します。"}},"roles/pubsub.subscriber":{"permissions":["pubsub.snapshots.seek","pubsub.subscriptions.consume","pubsub.topics.attachSubscription"],"en":{"roleTitle":"Pub/Sub Subscriber","roleName":"roles/pubsub.subscriber","roleDescription":"Provides access to consume messages from a subscription and to attach\nsubscriptions to a topic."},"ja":{"roleTitle":"Pub/Sub サブスクライバー","roleName":"roles/pubsub.subscriber","roleDescription":"サブスクリプションからメッセージを受信し、サブスクリプションをトピックに接続するためのアクセスを付与します。"}},"roles/pubsub.viewer":{"permissions":["pubsub.schemas.get","pubsub.schemas.list","pubsub.schemas.validate","pubsub.snapshots.get","pubsub.snapshots.list","pubsub.subscriptions.get","pubsub.subscriptions.list","pubsub.topics.get","pubsub.topics.list","resourcemanager.projects.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Pub/Sub Viewer","roleName":"roles/pubsub.viewer","roleDescription":"Provides access to view topics and subscriptions."},"ja":{"roleTitle":"Pub/Sub 閲覧者","roleName":"roles/pubsub.viewer","roleDescription":"トピックおよびサブスクリプションを閲覧するためのアクセスを付与します。"}},"roles/pubsublite.admin":{"permissions":["pubsublite.*"],"en":{"roleTitle":"Pub/Sub Lite Admin","roleName":"roles/pubsublite.admin","roleDescription":"Full access to topics, subscriptions and reservations."},"ja":{"roleTitle":"Pub/Sub Lite 管理者","roleName":"roles/pubsublite.admin","roleDescription":"トピック、サブスクリプション、予約に対する完全アクセス権。"}},"roles/pubsublite.editor":{"permissions":["pubsublite.*"],"en":{"roleTitle":"Pub/Sub Lite Editor","roleName":"roles/pubsublite.editor","roleDescription":"Modify topics, subscriptions and reservations, publish and consume messages."},"ja":{"roleTitle":"Pub/Sub Lite 編集者","roleName":"roles/pubsublite.editor","roleDescription":"トピック、サブスクリプション、予約の変更、メッセージのパブリッシュと使用を行います。"}},"roles/pubsublite.publisher":{"permissions":["pubsublite.topics.getPartitions","pubsublite.topics.publish"],"en":{"roleTitle":"Pub/Sub Lite Publisher","roleName":"roles/pubsublite.publisher","roleDescription":"Publish messages to a topic."},"ja":{"roleTitle":"Pub/Sub Lite パブリッシャー","roleName":"roles/pubsublite.publisher","roleDescription":"トピックにメッセージをパブリッシュします。"}},"roles/pubsublite.subscriber":{"permissions":["pubsublite.operations.get","pubsublite.subscriptions.getCursor","pubsublite.subscriptions.seek","pubsublite.subscriptions.setCursor","pubsublite.subscriptions.subscribe","pubsublite.topics.computeHeadCursor","pubsublite.topics.computeMessageStats","pubsublite.topics.computeTimeCursor","pubsublite.topics.getPartitions","pubsublite.topics.subscribe"],"en":{"roleTitle":"Pub/Sub Lite Subscriber","roleName":"roles/pubsublite.subscriber","roleDescription":"Subscribe to and read messages from a topic."},"ja":{"roleTitle":"Pub/Sub Lite サブスクライバー","roleName":"roles/pubsublite.subscriber","roleDescription":"トピックからのメッセージの登録と読み取りを行います。"}},"roles/pubsublite.viewer":{"permissions":["pubsublite.operations.*","pubsublite.reservations.get","pubsublite.reservations.list","pubsublite.reservations.listTopics","pubsublite.subscriptions.get","pubsublite.subscriptions.getCursor","pubsublite.subscriptions.list","pubsublite.topics.get","pubsublite.topics.getPartitions","pubsublite.topics.list","pubsublite.topics.listSubscriptions"],"en":{"roleTitle":"Pub/Sub Lite Viewer","roleName":"roles/pubsublite.viewer","roleDescription":"View topics, subscriptions and reservations."},"ja":{"roleTitle":"Pub/Sub Lite 閲覧者","roleName":"roles/pubsublite.viewer","roleDescription":"トピック、サブスクリプション、予約を表示します。"}},"roles/recaptchaenterprise.admin":{"permissions":["monitoring.timeSeries.list","recaptchaenterprise.keys.*","recaptchaenterprise.metrics.*","recaptchaenterprise.projectmetadata.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"reCAPTCHA Enterprise Admin","roleName":"roles/recaptchaenterprise.admin","roleDescription":"Access to view and modify reCAPTCHA Enterprise keys"},"ja":{"roleTitle":"reCAPTCHA Enterprise 管理者","roleName":"roles/recaptchaenterprise.admin","roleDescription":"reCAPTCHA Enterprise キーを表示および変更するためのアクセス権"}},"roles/recaptchaenterprise.agent":{"permissions":["recaptchaenterprise.assessments.*","recaptchaenterprise.relatedaccountgroupmemberships.*","recaptchaenterprise.relatedaccountgroups.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"reCAPTCHA Enterprise Agent","roleName":"roles/recaptchaenterprise.agent","roleDescription":"Access to create and annotate reCAPTCHA Enterprise assessments"},"ja":{"roleTitle":"reCAPTCHA Enterprise エージェント","roleName":"roles/recaptchaenterprise.agent","roleDescription":"reCAPTCHA Enterprise の評価の作成やアノテーション付けに対するアクセス権"}},"roles/recaptchaenterprise.viewer":{"permissions":["monitoring.timeSeries.list","recaptchaenterprise.keys.get","recaptchaenterprise.keys.list","recaptchaenterprise.metrics.*","recaptchaenterprise.projectmetadata.get","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"reCAPTCHA Enterprise Viewer","roleName":"roles/recaptchaenterprise.viewer","roleDescription":"Access to view reCAPTCHA Enterprise keys and metrics"},"ja":{"roleTitle":"reCAPTCHA Enterprise 閲覧者","roleName":"roles/recaptchaenterprise.viewer","roleDescription":"reCAPTCHA Enterprise のキーと指標を表示するためのアクセス権"}},"roles/automlrecommendations.admin":{"permissions":["automlrecommendations.*","resourcemanager.projects.get","resourcemanager.projects.list","retail.catalogs.list","retail.catalogs.update","retail.operations.*","retail.placements.*","retail.products.create","retail.products.delete","retail.products.export","retail.products.get","retail.products.import","retail.products.list","retail.products.update","retail.retailProjects.*","retail.userEvents.*","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Recommendations AI Admin","roleName":"roles/automlrecommendations.admin","roleDescription":"Full access to all Recommendations AI resources."},"ja":{"roleTitle":"Recommendations AI 管理者","roleName":"roles/automlrecommendations.admin","roleDescription":"すべての Recommendations AI リソースに対する完全アクセス権。"}},"roles/automlrecommendations.adminViewer":{"permissions":["automlrecommendations.apiKeys.list","automlrecommendations.catalogItems.get","automlrecommendations.catalogItems.list","automlrecommendations.catalogs.getStats","automlrecommendations.catalogs.list","automlrecommendations.eventStores.*","automlrecommendations.events.list","automlrecommendations.placements.getStats","automlrecommendations.placements.list","automlrecommendations.recommendations.list","resourcemanager.projects.get","resourcemanager.projects.list","retail.catalogs.list","retail.operations.*","retail.placements.*","retail.products.export","retail.products.get","retail.products.list","retail.retailProjects.*","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Recommendations AI Admin Viewer","roleName":"roles/automlrecommendations.adminViewer","roleDescription":"Viewer of all Recommendations AI resources."},"ja":{"roleTitle":"Recommendations AI 管理者閲覧者","roleName":"roles/automlrecommendations.adminViewer","roleDescription":"すべての Recommendations AI リソースの閲覧者。"}},"roles/automlrecommendations.editor":{"permissions":["automlrecommendations.apiKeys.create","automlrecommendations.apiKeys.list","automlrecommendations.catalogItems.*","automlrecommendations.catalogs.getStats","automlrecommendations.catalogs.list","automlrecommendations.eventStores.*","automlrecommendations.events.create","automlrecommendations.events.list","automlrecommendations.placements.create","automlrecommendations.placements.getStats","automlrecommendations.placements.list","automlrecommendations.recommendations.create","automlrecommendations.recommendations.list","automlrecommendations.recommendations.pause","automlrecommendations.recommendations.resume","automlrecommendations.recommendations.update","resourcemanager.projects.get","resourcemanager.projects.list","retail.catalogs.list","retail.catalogs.update","retail.operations.*","retail.placements.*","retail.products.create","retail.products.delete","retail.products.export","retail.products.get","retail.products.import","retail.products.list","retail.products.update","retail.retailProjects.*","retail.userEvents.create","retail.userEvents.import","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Recommendations AI Editor","roleName":"roles/automlrecommendations.editor","roleDescription":"Editor of all Recommendations AI resources."},"ja":{"roleTitle":"Recommendations AI 編集者","roleName":"roles/automlrecommendations.editor","roleDescription":"すべての Recommendations AI リソースの編集者。"}},"roles/automlrecommendations.viewer":{"permissions":["automlrecommendations.catalogItems.get","automlrecommendations.catalogItems.list","automlrecommendations.catalogs.getStats","automlrecommendations.catalogs.list","automlrecommendations.eventStores.*","automlrecommendations.events.list","automlrecommendations.placements.getStats","automlrecommendations.placements.list","automlrecommendations.recommendations.list","resourcemanager.projects.get","resourcemanager.projects.list","retail.catalogs.list","retail.operations.*","retail.placements.*","retail.products.export","retail.products.get","retail.products.list","retail.retailProjects.*","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Recommendations AI Viewer","roleName":"roles/automlrecommendations.viewer","roleDescription":"Viewer of all Recommendations AI resources except apiKeys. To view all resources,\nincluding apiKeys, grant the Recommendations AI Admin Viewer role\n(roles/automlrecommendations.adminViewer)."},"ja":{"roleTitle":"Recommendations AI 閲覧者","roleName":"roles/automlrecommendations.viewer","roleDescription":"apiKeys を除くすべての Recommendations AI リソースの閲覧者。apiKeys を含むすべてのリソースを表示するには、Recommendations AI 管理閲覧者のロール(roles/automlrecommendations.adminViewer)を付与します。"}},"roles/recommender.bigQueryCapacityCommitmentsAdmin":{"permissions":["recommender.bigqueryCapacityCommitmentsInsights.*","recommender.bigqueryCapacityCommitmentsRecommendations.*","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Slot Recommender Admin","roleName":"roles/recommender.bigQueryCapacityCommitmentsAdmin","roleDescription":"Admin of BigQuery Capacity Commitments insights and recommendations."},"ja":{"roleTitle":"BigQuery スロット Recommender 管理者","roleName":"roles/recommender.bigQueryCapacityCommitmentsAdmin","roleDescription":"BigQuery 容量コミットメントの分析情報と推奨事項の管理者。"}},"roles/recommender.bigQueryCapacityCommitmentsBillingAccountAdmin":{"permissions":["billing.accounts.get","billing.accounts.list","recommender.bigqueryCapacityCommitmentsInsights.*","recommender.bigqueryCapacityCommitmentsRecommendations.*"],"en":{"roleTitle":"BigQuery Recommender Billing Account Admin","roleName":"roles/recommender.bigQueryCapacityCommitmentsBillingAccountAdmin","roleDescription":"Billing Account Admin of BigQuery Capacity Commitments insights and recommendations."},"ja":{"roleTitle":"BigQuery Recommender 請求先アカウント管理者","roleName":"roles/recommender.bigQueryCapacityCommitmentsBillingAccountAdmin","roleDescription":"BigQuery 容量コミットメントの分析情報と推奨事項の請求先アカウント管理者。"}},"roles/recommender.bigQueryCapacityCommitmentsBillingAccountViewer":{"permissions":["billing.accounts.get","billing.accounts.list","recommender.bigqueryCapacityCommitmentsInsights.get","recommender.bigqueryCapacityCommitmentsInsights.list","recommender.bigqueryCapacityCommitmentsRecommendations.get","recommender.bigqueryCapacityCommitmentsRecommendations.list"],"en":{"roleTitle":"BigQuery Recommender Billing Account Viewer","roleName":"roles/recommender.bigQueryCapacityCommitmentsBillingAccountViewer","roleDescription":"Billing Account Viewer of BigQuery Capacity Commitments insights and recommendations."},"ja":{"roleTitle":"BigQuery Recommender 請求先アカウント閲覧者","roleName":"roles/recommender.bigQueryCapacityCommitmentsBillingAccountViewer","roleDescription":"BigQuery 容量コミットメントの分析情報と推奨事項の請求先アカウント閲覧者。"}},"roles/recommender.bigQueryCapacityCommitmentsProjectAdmin":{"permissions":["recommender.bigqueryCapacityCommitmentsInsights.*","recommender.bigqueryCapacityCommitmentsRecommendations.*","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Recommender Project Admin","roleName":"roles/recommender.bigQueryCapacityCommitmentsProjectAdmin","roleDescription":"Project Admin of BigQuery Capacity Commitments insights and recommendations."},"ja":{"roleTitle":"BigQuery Recommender プロジェクト管理者","roleName":"roles/recommender.bigQueryCapacityCommitmentsProjectAdmin","roleDescription":"BigQuery 容量コミットメントの分析情報と推奨事項のプロジェクト管理者。"}},"roles/recommender.bigQueryCapacityCommitmentsProjectViewer":{"permissions":["recommender.bigqueryCapacityCommitmentsInsights.get","recommender.bigqueryCapacityCommitmentsInsights.list","recommender.bigqueryCapacityCommitmentsRecommendations.get","recommender.bigqueryCapacityCommitmentsRecommendations.list","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Recommender Project Viewer","roleName":"roles/recommender.bigQueryCapacityCommitmentsProjectViewer","roleDescription":"Project Viewer of BigQuery Capacity Commitments insights and recommendations."},"ja":{"roleTitle":"BigQuery Recommender プロジェクト閲覧者","roleName":"roles/recommender.bigQueryCapacityCommitmentsProjectViewer","roleDescription":"BigQuery 容量コミットメントの分析情報と推奨事項のプロジェクト閲覧者。"}},"roles/recommender.bigQueryCapacityCommitmentsViewer":{"permissions":["recommender.bigqueryCapacityCommitmentsInsights.get","recommender.bigqueryCapacityCommitmentsInsights.list","recommender.bigqueryCapacityCommitmentsRecommendations.get","recommender.bigqueryCapacityCommitmentsRecommendations.list","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Slot Recommender Viewer","roleName":"roles/recommender.bigQueryCapacityCommitmentsViewer","roleDescription":"Viewer of BigQuery Capacity Commitments insights and recommendations."},"ja":{"roleTitle":"BigQuery スロット Recommender 閲覧者","roleName":"roles/recommender.bigQueryCapacityCommitmentsViewer","roleDescription":"BigQuery 容量コミットメントの分析情報と推奨事項の閲覧者。"}},"roles/recommender.billingAccountCudAdmin":{"permissions":["billing.accounts.get","billing.accounts.list","recommender.commitmentUtilizationInsights.*","recommender.usageCommitmentRecommendations.*"],"en":{"roleTitle":"Billing Account Usage Commitment Recommender Admin","roleName":"roles/recommender.billingAccountCudAdmin","roleDescription":"Admin of Billing Account Usage Commitment Recommender."},"ja":{"roleTitle":"Billing Account Usage Commitment Recommender 管理者","roleName":"roles/recommender.billingAccountCudAdmin","roleDescription":"Billing Account Usage Commitment Recommender の管理者。"}},"roles/recommender.billingAccountCudViewer":{"permissions":["billing.accounts.get","billing.accounts.list","recommender.commitmentUtilizationInsights.get","recommender.commitmentUtilizationInsights.list","recommender.usageCommitmentRecommendations.get","recommender.usageCommitmentRecommendations.list"],"en":{"roleTitle":"Billing Account Usage Commitment Recommender Viewer","roleName":"roles/recommender.billingAccountCudViewer","roleDescription":"Viewer of Billing Account Usage Commitment Recommender."},"ja":{"roleTitle":"Billing Account Usage Commitment Recommender 閲覧者","roleName":"roles/recommender.billingAccountCudViewer","roleDescription":"Billing Account Usage Commitment Recommender の閲覧者。"}},"roles/recommender.cloudAssetInsightsAdmin":{"permissions":["recommender.cloudAssetInsights.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Asset Insights Admin","roleName":"roles/recommender.cloudAssetInsightsAdmin","roleDescription":"Admin of all Cloud Asset insights."},"ja":{"roleTitle":"Cloud Asset の分析情報の管理者","roleName":"roles/recommender.cloudAssetInsightsAdmin","roleDescription":"Cloud Asset のすべての分析情報の管理者。"}},"roles/recommender.cloudAssetInsightsViewer":{"permissions":["recommender.cloudAssetInsights.get","recommender.cloudAssetInsights.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Asset Insights Viewer","roleName":"roles/recommender.cloudAssetInsightsViewer","roleDescription":"Viewer of all Cloud Asset insights."},"ja":{"roleTitle":"Cloud Asset の分析情報の閲覧者","roleName":"roles/recommender.cloudAssetInsightsViewer","roleDescription":"Cloud Asset のすべての分析情報の閲覧者。"}},"roles/recommender.cloudsqlAdmin":{"permissions":["recommender.cloudsqlIdleInstanceRecommendations.*","recommender.cloudsqlInstanceActivityInsights.*","recommender.cloudsqlInstanceCpuUsageInsights.*","recommender.cloudsqlInstanceDiskUsageTrendInsights.*","recommender.cloudsqlInstanceMemoryUsageInsights.*","recommender.cloudsqlInstanceOutOfDiskRecommendations.*","recommender.cloudsqlOverprovisionedInstanceRecommendations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud SQL Recommender Admin","roleName":"roles/recommender.cloudsqlAdmin","roleDescription":"Admin of Cloud SQL insights and recommendations."},"ja":{"roleTitle":"Cloud SQL Recommender 管理者","roleName":"roles/recommender.cloudsqlAdmin","roleDescription":"Cloud SQL の分析情報と推奨事項の管理者。"}},"roles/recommender.cloudsqlViewer":{"permissions":["recommender.cloudsqlIdleInstanceRecommendations.get","recommender.cloudsqlIdleInstanceRecommendations.list","recommender.cloudsqlInstanceActivityInsights.get","recommender.cloudsqlInstanceActivityInsights.list","recommender.cloudsqlInstanceCpuUsageInsights.get","recommender.cloudsqlInstanceCpuUsageInsights.list","recommender.cloudsqlInstanceDiskUsageTrendInsights.get","recommender.cloudsqlInstanceDiskUsageTrendInsights.list","recommender.cloudsqlInstanceMemoryUsageInsights.get","recommender.cloudsqlInstanceMemoryUsageInsights.list","recommender.cloudsqlInstanceOutOfDiskRecommendations.get","recommender.cloudsqlInstanceOutOfDiskRecommendations.list","recommender.cloudsqlOverprovisionedInstanceRecommendations.get","recommender.cloudsqlOverprovisionedInstanceRecommendations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud SQL Recommender Viewer","roleName":"roles/recommender.cloudsqlViewer","roleDescription":"Viewer of Cloud SQL insights and recommendations."},"ja":{"roleTitle":"Cloud SQL Recommender 閲覧者","roleName":"roles/recommender.cloudsqlViewer","roleDescription":"Cloud SQL の分析情報と推奨事項の閲覧者。"}},"roles/recommender.computeAdmin":{"permissions":["recommender.computeAddressIdleResourceInsights.*","recommender.computeAddressIdleResourceRecommendations.*","recommender.computeDiskIdleResourceInsights.*","recommender.computeDiskIdleResourceRecommendations.*","recommender.computeImageIdleResourceInsights.*","recommender.computeImageIdleResourceRecommendations.*","recommender.computeInstanceGroupManagerMachineTypeRecommendations.*","recommender.computeInstanceIdleResourceRecommendations.*","recommender.computeInstanceMachineTypeRecommendations.*","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Compute Recommender Admin","roleName":"roles/recommender.computeAdmin","roleDescription":"Admin of compute recommendations."},"ja":{"roleTitle":"Compute Recommender 管理者","roleName":"roles/recommender.computeAdmin","roleDescription":"コンピューティング推奨事項の管理者。"}},"roles/recommender.computeViewer":{"permissions":["recommender.computeAddressIdleResourceInsights.get","recommender.computeAddressIdleResourceInsights.list","recommender.computeAddressIdleResourceRecommendations.get","recommender.computeAddressIdleResourceRecommendations.list","recommender.computeDiskIdleResourceInsights.get","recommender.computeDiskIdleResourceInsights.list","recommender.computeDiskIdleResourceRecommendations.get","recommender.computeDiskIdleResourceRecommendations.list","recommender.computeImageIdleResourceInsights.get","recommender.computeImageIdleResourceInsights.list","recommender.computeImageIdleResourceRecommendations.get","recommender.computeImageIdleResourceRecommendations.list","recommender.computeInstanceGroupManagerMachineTypeRecommendations.get","recommender.computeInstanceGroupManagerMachineTypeRecommendations.list","recommender.computeInstanceIdleResourceRecommendations.get","recommender.computeInstanceIdleResourceRecommendations.list","recommender.computeInstanceMachineTypeRecommendations.get","recommender.computeInstanceMachineTypeRecommendations.list","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Compute Recommender Viewer","roleName":"roles/recommender.computeViewer","roleDescription":"Viewer of compute recommendations."},"ja":{"roleTitle":"Compute Recommender 閲覧者","roleName":"roles/recommender.computeViewer","roleDescription":"コンピューティング推奨事項の閲覧者。"}},"roles/recommender.dataflowDiagnosticsAdmin":{"permissions":["recommender.dataflowDiagnosticsInsights.*","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataflow Diagnostics Admin","roleName":"roles/recommender.dataflowDiagnosticsAdmin","roleDescription":"Admin of Diagnostics recommendations."},"ja":{"roleTitle":"Dataflow 診断の管理者","roleName":"roles/recommender.dataflowDiagnosticsAdmin","roleDescription":"診断の推奨事項の管理者。"}},"roles/recommender.dataflowDiagnosticsViewer":{"permissions":["recommender.dataflowDiagnosticsInsights.get","recommender.dataflowDiagnosticsInsights.list","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataflow Diagnostics Viewer","roleName":"roles/recommender.dataflowDiagnosticsViewer","roleDescription":"Viewer of Diagnostics recommendations."},"ja":{"roleTitle":"Dataflow 診断閲覧者","roleName":"roles/recommender.dataflowDiagnosticsViewer","roleDescription":"診断の推奨事項の閲覧者。"}},"roles/recommender.errorReportingAdmin":{"permissions":["recommender.errorReportingInsights.*","recommender.errorReportingRecommendations.*","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Error Reporting Recommender Admin","roleName":"roles/recommender.errorReportingAdmin","roleDescription":"Admin of Error Reporting Insights and Recommendations."},"ja":{"roleTitle":"Error Reporting Recommender 管理者","roleName":"roles/recommender.errorReportingAdmin","roleDescription":"Error Reporting の分析情報と推奨事項の管理者。"}},"roles/recommender.errorReportingViewer":{"permissions":["recommender.errorReportingInsights.get","recommender.errorReportingInsights.list","recommender.errorReportingRecommendations.get","recommender.errorReportingRecommendations.list","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Error Reporting Recommender Viewer","roleName":"roles/recommender.errorReportingViewer","roleDescription":"Viewer of Error Reporting Insights and Recommendations."},"ja":{"roleTitle":"Error Reporting Recommender 閲覧者","roleName":"roles/recommender.errorReportingViewer","roleDescription":"Error Reporting の分析情報と推奨事項の閲覧者。"}},"roles/recommender.firewallAdmin":{"permissions":["monitoring.timeSeries.list","recommender.computeFirewallInsights.*","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firewall Recommender Admin","roleName":"roles/recommender.firewallAdmin","roleDescription":"Admin of Firewall insights and recommendations."},"ja":{"roleTitle":"Firewall Recommender 管理者","roleName":"roles/recommender.firewallAdmin","roleDescription":"ファイアウォール インサイトと推奨事項の管理者。"}},"roles/recommender.firewallViewer":{"permissions":["monitoring.timeSeries.list","recommender.computeFirewallInsights.get","recommender.computeFirewallInsights.list","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Firewall Recommender Viewer","roleName":"roles/recommender.firewallViewer","roleDescription":"Viewer of Firewall insights and recommendations."},"ja":{"roleTitle":"Firewall Recommender 閲覧者","roleName":"roles/recommender.firewallViewer","roleDescription":"ファイアウォール インサイトと推奨事項の閲覧者。"}},"roles/recommender.iamAdmin":{"permissions":["recommender.iamPolicyInsights.*","recommender.iamPolicyLateralMovementInsights.*","recommender.iamPolicyRecommendations.*","recommender.iamServiceAccountInsights.*","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"IAM Recommender Admin","roleName":"roles/recommender.iamAdmin","roleDescription":"Admin of IAM recommendations."},"ja":{"roleTitle":"IAM Recommender 管理者","roleName":"roles/recommender.iamAdmin","roleDescription":"IAM 推奨事項の管理者。"}},"roles/recommender.iamViewer":{"permissions":["recommender.iamPolicyInsights.get","recommender.iamPolicyInsights.list","recommender.iamPolicyLateralMovementInsights.get","recommender.iamPolicyLateralMovementInsights.list","recommender.iamPolicyRecommendations.get","recommender.iamPolicyRecommendations.list","recommender.iamServiceAccountInsights.get","recommender.iamServiceAccountInsights.list","recommender.locations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"IAM Recommender Viewer","roleName":"roles/recommender.iamViewer","roleDescription":"Viewer of IAM recommendations."},"ja":{"roleTitle":"IAM Recommender 閲覧者","roleName":"roles/recommender.iamViewer","roleDescription":"IAM 推奨事項の閲覧者。"}},"roles/recommender.productSuggestionAdmin":{"permissions":["recommender.locations.*","recommender.loggingProductSuggestionContainerInsights.*","recommender.loggingProductSuggestionContainerRecommendations.*","recommender.monitoringProductSuggestionComputeInsights.*","recommender.monitoringProductSuggestionComputeRecommendations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Product Suggestion Recommenders Admin","roleName":"roles/recommender.productSuggestionAdmin","roleDescription":"Admin of all Product Suggestion insights and recommendations."},"ja":{"roleTitle":"Product Suggestion Recommenders 管理者","roleName":"roles/recommender.productSuggestionAdmin","roleDescription":"Product Suggestion のすべての分析情報と推奨事項の管理者。"}},"roles/recommender.productSuggestionViewer":{"permissions":["recommender.locations.*","recommender.loggingProductSuggestionContainerInsights.get","recommender.loggingProductSuggestionContainerInsights.list","recommender.loggingProductSuggestionContainerRecommendations.get","recommender.loggingProductSuggestionContainerRecommendations.list","recommender.monitoringProductSuggestionComputeInsights.get","recommender.monitoringProductSuggestionComputeInsights.list","recommender.monitoringProductSuggestionComputeRecommendations.get","recommender.monitoringProductSuggestionComputeRecommendations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Product Suggestion Recommenders Viewer","roleName":"roles/recommender.productSuggestionViewer","roleDescription":"Viewer of all Product Suggestion insights and recommendations."},"ja":{"roleTitle":"Product Suggestion Recommender 閲覧者","roleName":"roles/recommender.productSuggestionViewer","roleDescription":"Product Suggestion のすべての分析情報と推奨事項の閲覧者。"}},"roles/recommender.projectCudAdmin":{"permissions":["recommender.commitmentUtilizationInsights.*","recommender.locations.*","recommender.usageCommitmentRecommendations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Project Usage Commitment Recommender Admin","roleName":"roles/recommender.projectCudAdmin","roleDescription":"Admin of Project Usage Commitment Recommender."},"ja":{"roleTitle":"Project Usage Commitment Recommender 管理者","roleName":"roles/recommender.projectCudAdmin","roleDescription":"Project Usage Commitment Recommender の管理者。"}},"roles/recommender.projectCudViewer":{"permissions":["recommender.commitmentUtilizationInsights.get","recommender.commitmentUtilizationInsights.list","recommender.locations.*","recommender.usageCommitmentRecommendations.get","recommender.usageCommitmentRecommendations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Project Usage Commitment Recommender Viewer","roleName":"roles/recommender.projectCudViewer","roleDescription":"Viewer of Project Usage Commitment Recommender."},"ja":{"roleTitle":"Project Usage Commitment Recommender 閲覧者","roleName":"roles/recommender.projectCudViewer","roleDescription":"Project Usage Commitment Recommender の閲覧者。"}},"roles/recommender.projectUtilAdmin":{"permissions":["recommender.resourcemanagerProjectUtilizationInsights.*","recommender.resourcemanagerProjectUtilizationRecommendations.*","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Project Utilization Recommender Admin","roleName":"roles/recommender.projectUtilAdmin","roleDescription":"Admin of Project Utilization insights and recommendations."},"ja":{"roleTitle":"Project Utilization Recommender 管理者","roleName":"roles/recommender.projectUtilAdmin","roleDescription":"Project Utilization の分析情報と推奨事項の管理者。"}},"roles/recommender.projectUtilViewer":{"permissions":["recommender.resourcemanagerProjectUtilizationInsights.get","recommender.resourcemanagerProjectUtilizationInsights.list","recommender.resourcemanagerProjectUtilizationRecommendations.get","recommender.resourcemanagerProjectUtilizationRecommendations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Project Utilization Recommender Viewer","roleName":"roles/recommender.projectUtilViewer","roleDescription":"Viewer of Project Utilization insights and recommendations."},"ja":{"roleTitle":"Project Utilization Recommender 閲覧者","roleName":"roles/recommender.projectUtilViewer","roleDescription":"Project Utilization の分析情報と推奨事項の閲覧者。"}},"roles/resourcemanager.folderAdmin":{"permissions":["orgpolicy.constraints.*","orgpolicy.policies.list","orgpolicy.policy.get","resourcemanager.folders.*","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","resourcemanager.projects.move","resourcemanager.projects.setIamPolicy"],"en":{"roleTitle":"Folder Admin","roleName":"roles/resourcemanager.folderAdmin","roleDescription":"Provides all available permissions for working with folders."},"ja":{"roleTitle":"フォルダ管理者","roleName":"roles/resourcemanager.folderAdmin","roleDescription":"フォルダの操作に関するすべての権限を付与します。"}},"roles/resourcemanager.folderCreator":{"permissions":["orgpolicy.constraints.*","orgpolicy.policies.list","orgpolicy.policy.get","resourcemanager.folders.create","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Folder Creator","roleName":"roles/resourcemanager.folderCreator","roleDescription":"Provides permissions needed to browse the hierarchy and create folders."},"ja":{"roleTitle":"フォルダ作成者","roleName":"roles/resourcemanager.folderCreator","roleDescription":"階層の参照とフォルダの作成に必要な権限を付与します。"}},"roles/resourcemanager.folderEditor":{"permissions":["orgpolicy.constraints.*","orgpolicy.policies.list","orgpolicy.policy.get","resourcemanager.folders.delete","resourcemanager.folders.get","resourcemanager.folders.getIamPolicy","resourcemanager.folders.list","resourcemanager.folders.undelete","resourcemanager.folders.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Folder Editor","roleName":"roles/resourcemanager.folderEditor","roleDescription":"Provides permission to modify folders as well as to view a folder's\nIAM\npolicy."},"ja":{"roleTitle":"フォルダ編集者","roleName":"roles/resourcemanager.folderEditor","roleDescription":"フォルダの変更と、フォルダの IAM ポリシーの表示ができる権限を付与します。"}},"roles/resourcemanager.folderIamAdmin":{"permissions":["resourcemanager.folders.get","resourcemanager.folders.getIamPolicy","resourcemanager.folders.setIamPolicy"],"en":{"roleTitle":"Folder IAM Admin","roleName":"roles/resourcemanager.folderIamAdmin","roleDescription":"Provides permissions to administer IAM policies on folders."},"ja":{"roleTitle":"フォルダ IAM 管理者","roleName":"roles/resourcemanager.folderIamAdmin","roleDescription":"フォルダの IAM ポリシーを管理する権限を付与します。"}},"roles/resourcemanager.folderMover":{"permissions":["resourcemanager.folders.move","resourcemanager.projects.move"],"en":{"roleTitle":"Folder Mover","roleName":"roles/resourcemanager.folderMover","roleDescription":"Provides permission to move projects and folders into and out of a parent\norganization or folder."},"ja":{"roleTitle":"フォルダ移動","roleName":"roles/resourcemanager.folderMover","roleDescription":"親の組織またはフォルダとの間でフォルダを移動する権限を付与します。"}},"roles/resourcemanager.folderViewer":{"permissions":["orgpolicy.constraints.*","orgpolicy.policies.list","orgpolicy.policy.get","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Folder Viewer","roleName":"roles/resourcemanager.folderViewer","roleDescription":"Provides permission to get a folder and list the folders and projects below\na resource."},"ja":{"roleTitle":"フォルダ閲覧者","roleName":"roles/resourcemanager.folderViewer","roleDescription":"フォルダの取得、リソース内のフォルダとプロジェクトの一覧表示ができる権限を付与します。"}},"roles/resourcemanager.lienModifier":{"permissions":["resourcemanager.projects.updateLiens"],"en":{"roleTitle":"Project Lien Modifier","roleName":"roles/resourcemanager.lienModifier","roleDescription":"Provides access to modify Liens on projects."},"ja":{"roleTitle":"プロジェクト リーエンの変更","roleName":"roles/resourcemanager.lienModifier","roleDescription":"プロジェクト リーエンの変更権限を付与します。"}},"roles/resourcemanager.organizationAdmin":{"permissions":["orgpolicy.constraints.*","orgpolicy.policies.list","orgpolicy.policy.get","resourcemanager.folders.get","resourcemanager.folders.getIamPolicy","resourcemanager.folders.list","resourcemanager.folders.setIamPolicy","resourcemanager.organizations.*","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","resourcemanager.projects.setIamPolicy"],"en":{"roleTitle":"Organization Administrator","roleName":"roles/resourcemanager.organizationAdmin","roleDescription":"Access to manage IAM policies and view organization policies for organizations, folders, and projects."},"ja":{"roleTitle":"組織管理者","roleName":"roles/resourcemanager.organizationAdmin","roleDescription":"IAM ポリシーを管理し、組織、フォルダ、プロジェクトの組織のポリシーを表示するためのアクセス権。"}},"roles/resourcemanager.organizationViewer":{"permissions":["resourcemanager.organizations.get"],"en":{"roleTitle":"Organization Viewer","roleName":"roles/resourcemanager.organizationViewer","roleDescription":"Provides access to view an organization."},"ja":{"roleTitle":"組織閲覧者","roleName":"roles/resourcemanager.organizationViewer","roleDescription":"組織を閲覧するための権限を付与します。"}},"roles/resourcemanager.projectCreator":{"permissions":["resourcemanager.organizations.get","resourcemanager.projects.create"],"en":{"roleTitle":"Project Creator","roleName":"roles/resourcemanager.projectCreator","roleDescription":"Provides access to create new projects. Once a user creates a project,\nthey're automatically granted the owner role for that project."},"ja":{"roleTitle":"プロジェクト作成者","roleName":"roles/resourcemanager.projectCreator","roleDescription":"新しいプロジェクトを作成するためのアクセス権を付与します。プロジェクトを作成したユーザーには、そのプロジェクトのオーナーロールが自動的に付与されます。"}},"roles/resourcemanager.projectDeleter":{"permissions":["resourcemanager.projects.delete"],"en":{"roleTitle":"Project Deleter","roleName":"roles/resourcemanager.projectDeleter","roleDescription":"Provides access to delete Google Cloud projects."},"ja":{"roleTitle":"プロジェクト削除","roleName":"roles/resourcemanager.projectDeleter","roleDescription":"Google Cloud プロジェクトを削除するためのアクセス権を付与します。"}},"roles/resourcemanager.projectIamAdmin":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.setIamPolicy"],"en":{"roleTitle":"Project IAM Admin","roleName":"roles/resourcemanager.projectIamAdmin","roleDescription":"Provides permissions to administer IAM policies on projects."},"ja":{"roleTitle":"プロジェクト IAM 管理者","roleName":"roles/resourcemanager.projectIamAdmin","roleDescription":"プロジェクトの IAM ポリシーを管理する権限を付与します。"}},"roles/resourcemanager.projectMover":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.move","resourcemanager.projects.update"],"en":{"roleTitle":"Project Mover","roleName":"roles/resourcemanager.projectMover","roleDescription":"Provides access to update and move projects."},"ja":{"roleTitle":"プロジェクト移動","roleName":"roles/resourcemanager.projectMover","roleDescription":"プロジェクトの更新と移動に必要な権限を付与します。"}},"roles/resourcemanager.tagAdmin":{"permissions":["resourcemanager.tagHolds.*","resourcemanager.tagKeys.*","resourcemanager.tagValues.*"],"en":{"roleTitle":"Tag Administrator","roleName":"roles/resourcemanager.tagAdmin","roleDescription":"Access to create, delete, update, and manage access to Tags"},"ja":{"roleTitle":"タグ管理者","roleName":"roles/resourcemanager.tagAdmin","roleDescription":"タグの作成、削除、更新、管理を行うためのアクセス権"}},"roles/resourcemanager.tagHoldAdmin":{"permissions":["resourcemanager.tagHolds.*"],"en":{"roleTitle":"Tag Hold Administrator","roleName":"roles/resourcemanager.tagHoldAdmin","roleDescription":"Access to create, delete and list TagHolds under a TagValue"},"ja":{"roleTitle":"タグ保持管理者","roleName":"roles/resourcemanager.tagHoldAdmin","roleDescription":"TagValue で TagHold を作成、削除、一覧表示するためのアクセス権"}},"roles/resourcemanager.tagUser":{"permissions":["artifactregistry.repositories.createTagBinding","artifactregistry.repositories.deleteTagBinding","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","cloudkms.keyRings.createTagBinding","cloudkms.keyRings.deleteTagBinding","cloudkms.keyRings.listTagBindings","cloudsql.instances.createTagBinding","cloudsql.instances.deleteTagBinding","cloudsql.instances.listTagBindings","compute.disks.createTagBinding","compute.disks.deleteTagBinding","compute.disks.listTagBindings","compute.images.createTagBinding","compute.images.deleteTagBinding","compute.images.listTagBindings","compute.snapshots.createTagBinding","compute.snapshots.deleteTagBinding","compute.snapshots.listTagBindings","domains.registrations.createTagBinding","domains.registrations.deleteTagBinding","domains.registrations.listTagBindings","file.backups.createTagBinding","file.backups.deleteTagBinding","file.backups.listTagBindings","file.instances.createTagBinding","file.instances.deleteTagBinding","file.instances.listTagBindings","file.snapshots.createTagBinding","file.snapshots.deleteTagBinding","file.snapshots.listTagBindings","managedidentities.domains.createTagBinding","managedidentities.domains.deleteTagBinding","managedidentities.domains.listTagBindings","resourcemanager.hierarchyNodes.*","resourcemanager.projects.get","resourcemanager.tagKeys.get","resourcemanager.tagKeys.list","resourcemanager.tagValueBindings.*","resourcemanager.tagValues.get","resourcemanager.tagValues.list","run.services.createTagBinding","run.services.deleteTagBinding","run.services.listEffectiveTags","run.services.listTagBindings","storage.buckets.createTagBinding","storage.buckets.deleteTagBinding","storage.buckets.listTagBindings"],"en":{"roleTitle":"Tag User","roleName":"roles/resourcemanager.tagUser","roleDescription":"Access to list Tags and manage their associations with resources"},"ja":{"roleTitle":"タグユーザー","roleName":"roles/resourcemanager.tagUser","roleDescription":"タグの一覧を取得し、リソースとの関連付けを管理するためのアクセス権"}},"roles/resourcemanager.tagViewer":{"permissions":["artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","cloudkms.keyRings.listTagBindings","cloudsql.instances.listTagBindings","compute.disks.listTagBindings","compute.images.listTagBindings","compute.snapshots.listTagBindings","domains.registrations.listTagBindings","file.backups.listTagBindings","file.instances.listTagBindings","file.snapshots.listTagBindings","managedidentities.domains.listTagBindings","resourcemanager.hierarchyNodes.listTagBindings","resourcemanager.tagHolds.list","resourcemanager.tagKeys.get","resourcemanager.tagKeys.list","resourcemanager.tagValues.get","resourcemanager.tagValues.list","run.services.listEffectiveTags","run.services.listTagBindings","storage.buckets.listTagBindings"],"en":{"roleTitle":"Tag Viewer","roleName":"roles/resourcemanager.tagViewer","roleDescription":"Access to list Tags and their associations with resources"},"ja":{"roleTitle":"タグ閲覧者","roleName":"roles/resourcemanager.tagViewer","roleDescription":"タグとそのリソースとの関連付けの一覧を取得するためのアクセス権"}},"roles/resourcesettings.admin":{"permissions":["resourcesettings.*"],"en":{"roleTitle":"Resource Settings Administrator","roleName":"roles/resourcesettings.admin","roleDescription":"Provides admin capabilities to set Resource Setting Values on resources."},"ja":{"roleTitle":"リソース設定管理者","roleName":"roles/resourcesettings.admin","roleDescription":"リソースに関するリソース設定値を設定する管理者機能を提供します。"}},"roles/resourcesettings.viewer":{"permissions":["resourcesettings.settings.get","resourcesettings.settings.list"],"en":{"roleTitle":"Resource Settings Viewer","roleName":"roles/resourcesettings.viewer","roleDescription":"Provides capabilities to view Resource Settings and Resource Setting Values on resources."},"ja":{"roleTitle":"リソース設定閲覧者","roleName":"roles/resourcesettings.viewer","roleDescription":"リソースに関するリソース設定およびリソース設定値を閲覧する機能を提供します。"}},"roles/riskmanager.admin":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","riskmanager.*"],"en":{"roleTitle":"Risk Manager Admin","roleName":"roles/riskmanager.admin","roleDescription":"Grants all Risk Manager permissions"},"ja":{"roleTitle":"Risk Manager 管理者","roleName":"roles/riskmanager.admin","roleDescription":"すべての Risk Manager 権限を付与します"}},"roles/riskmanager.editor":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","riskmanager.operations.*","riskmanager.policies.*","riskmanager.reports.create","riskmanager.reports.delete","riskmanager.reports.get","riskmanager.reports.list","riskmanager.serviceAccount.*","riskmanager.settings.*"],"en":{"roleTitle":"Risk Manager Editor","roleName":"roles/riskmanager.editor","roleDescription":"Access to edit Risk Manager resources"},"ja":{"roleTitle":"Risk Manager 編集者","roleName":"roles/riskmanager.editor","roleDescription":"Risk Manager リソースを編集するためのアクセス権"}},"roles/riskmanager.reviewer":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","riskmanager.operations.get","riskmanager.operations.list","riskmanager.reports.get","riskmanager.reports.list","riskmanager.reports.review"],"en":{"roleTitle":"Risk Manager Report Reviewer","roleName":"roles/riskmanager.reviewer","roleDescription":"Access to review Risk Manager reports"},"ja":{"roleTitle":"Risk Manager レポート審査担当者","roleName":"roles/riskmanager.reviewer","roleDescription":"Risk Manager レポートを審査するためのアクセス権"}},"roles/riskmanager.viewer":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","riskmanager.operations.get","riskmanager.operations.list","riskmanager.policies.*","riskmanager.reports.get","riskmanager.reports.list","riskmanager.settings.get"],"en":{"roleTitle":"Risk Manager Viewer","roleName":"roles/riskmanager.viewer","roleDescription":"Access to view Risk Manager resources"},"ja":{"roleTitle":"Risk Manager 閲覧者","roleName":"roles/riskmanager.viewer","roleDescription":"Risk Manager リソースを表示するためのアクセス権"}},"roles/iam.organizationRoleAdmin":{"permissions":["iam.roles.*","resourcemanager.organizations.get","resourcemanager.organizations.getIamPolicy","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Organization Role Administrator","roleName":"roles/iam.organizationRoleAdmin","roleDescription":"Provides access to administer all custom roles in the organization and the\nprojects below it."},"ja":{"roleTitle":"組織のロールの管理者","roleName":"roles/iam.organizationRoleAdmin","roleDescription":"組織とその下のプロジェクト内のすべてのカスタムロールを管理する権限を付与します。"}},"roles/iam.organizationRoleViewer":{"permissions":["iam.roles.get","iam.roles.list","resourcemanager.organizations.get","resourcemanager.organizations.getIamPolicy","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list"],"en":{"roleTitle":"Organization Role Viewer","roleName":"roles/iam.organizationRoleViewer","roleDescription":"Provides read access to all custom roles in the organization and the\nprojects below it."},"ja":{"roleTitle":"組織のロールの閲覧者","roleName":"roles/iam.organizationRoleViewer","roleDescription":"組織とその下のプロジェクト内のすべてのカスタムロールへの読み取り権限を付与します。"}},"roles/iam.roleAdmin":{"permissions":["iam.roles.*","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy"],"en":{"roleTitle":"Role Administrator","roleName":"roles/iam.roleAdmin","roleDescription":"Provides access to all custom roles in the project."},"ja":{"roleTitle":"ロールの管理者","roleName":"roles/iam.roleAdmin","roleDescription":"プロジェクト内のすべてのカスタムロールへのアクセス権を付与します。"}},"roles/iam.roleViewer":{"permissions":["iam.roles.get","iam.roles.list","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy"],"en":{"roleTitle":"Role Viewer","roleName":"roles/iam.roleViewer","roleDescription":"Provides read access to all custom roles in the project."},"ja":{"roleTitle":"ロールの閲覧者","roleName":"roles/iam.roleViewer","roleDescription":"プロジェクト内のすべてのカスタムロールへの読み取り権限を付与します。"}},"roles/secretmanager.admin":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","secretmanager.*"],"en":{"roleTitle":"Secret Manager Admin","roleName":"roles/secretmanager.admin","roleDescription":"Full access to administer Secret Manager resources."},"ja":{"roleTitle":"Secret Manager 管理者","roleName":"roles/secretmanager.admin","roleDescription":"Secret Manager リソースを管理するための完全アクセス権。"}},"roles/secretmanager.secretAccessor":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","secretmanager.versions.access"],"en":{"roleTitle":"Secret Manager Secret Accessor","roleName":"roles/secretmanager.secretAccessor","roleDescription":"Allows accessing the payload of secrets."},"ja":{"roleTitle":"Secret Manager のシークレット アクセサー","roleName":"roles/secretmanager.secretAccessor","roleDescription":"シークレットのペイロードへのアクセスを許可します。"}},"roles/secretmanager.secretVersionAdder":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","secretmanager.versions.add"],"en":{"roleTitle":"Secret Manager Secret Version Adder","roleName":"roles/secretmanager.secretVersionAdder","roleDescription":"Allows adding versions to existing secrets."},"ja":{"roleTitle":"Secret Manager のシークレット バージョンの追加","roleName":"roles/secretmanager.secretVersionAdder","roleDescription":"既存のシークレットにバージョンを追加できます。"}},"roles/secretmanager.secretVersionManager":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","secretmanager.versions.add","secretmanager.versions.destroy","secretmanager.versions.disable","secretmanager.versions.enable","secretmanager.versions.get","secretmanager.versions.list"],"en":{"roleTitle":"Secret Manager Secret Version Manager","roleName":"roles/secretmanager.secretVersionManager","roleDescription":"Allows creating and managing versions of existing secrets."},"ja":{"roleTitle":"Secret Manager のシークレット バージョンのマネージャー","roleName":"roles/secretmanager.secretVersionManager","roleDescription":"シークレットの作成と既存のシークレット バージョンの管理を許可します。"}},"roles/secretmanager.viewer":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","secretmanager.locations.*","secretmanager.secrets.get","secretmanager.secrets.getIamPolicy","secretmanager.secrets.list","secretmanager.versions.get","secretmanager.versions.list"],"en":{"roleTitle":"Secret Manager Viewer","roleName":"roles/secretmanager.viewer","roleDescription":"Allows viewing metadata of all Secret Manager resources"},"ja":{"roleTitle":"Secret Manager 閲覧者","roleName":"roles/secretmanager.viewer","roleDescription":"すべての Secret Manager リソースのメタデータを表示できます。"}},"roles/securitycenter.admin":{"permissions":["appengine.applications.get","cloudsecurityscanner.*","compute.addresses.list","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list","securitycenter.*","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Security Center Admin","roleName":"roles/securitycenter.admin","roleDescription":"Admin(super user) access to security center"},"ja":{"roleTitle":"セキュリティ センター管理者","roleName":"roles/securitycenter.admin","roleDescription":"セキュリティ センターに対する管理者(スーパー ユーザー)アクセス"}},"roles/securitycenter.adminEditor":{"permissions":["appengine.applications.get","cloudsecurityscanner.*","compute.addresses.list","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list","securitycenter.assets.*","securitycenter.assetsecuritymarks.*","securitycenter.bigQueryExports.*","securitycenter.containerthreatdetectionsettings.calculate","securitycenter.containerthreatdetectionsettings.get","securitycenter.eventthreatdetectionsettings.calculate","securitycenter.eventthreatdetectionsettings.get","securitycenter.findingexternalsystems.*","securitycenter.findings.*","securitycenter.findingsecuritymarks.*","securitycenter.muteconfigs.*","securitycenter.notificationconfig.*","securitycenter.organizationsettings.get","securitycenter.securitycentersettings.get","securitycenter.securityhealthanalyticssettings.calculate","securitycenter.securityhealthanalyticssettings.get","securitycenter.sources.get","securitycenter.sources.list","securitycenter.sources.update","securitycenter.subscription.*","securitycenter.userinterfacemetadata.*","securitycenter.virtualmachinethreatdetectionsettings.calculate","securitycenter.virtualmachinethreatdetectionsettings.get","securitycenter.websecurityscannersettings.calculate","securitycenter.websecurityscannersettings.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Security Center Admin Editor","roleName":"roles/securitycenter.adminEditor","roleDescription":"Admin Read-write access to security center"},"ja":{"roleTitle":"セキュリティ センター管理編集者","roleName":"roles/securitycenter.adminEditor","roleDescription":"セキュリティ センターに対する管理者の読み取り / 書き込み権限"}},"roles/securitycenter.adminViewer":{"permissions":["cloudsecurityscanner.crawledurls.*","cloudsecurityscanner.results.*","cloudsecurityscanner.scanruns.get","cloudsecurityscanner.scanruns.getSummary","cloudsecurityscanner.scanruns.list","cloudsecurityscanner.scans.get","cloudsecurityscanner.scans.list","resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list","securitycenter.assets.group","securitycenter.assets.list","securitycenter.assets.listAssetPropertyNames","securitycenter.bigQueryExports.get","securitycenter.bigQueryExports.list","securitycenter.containerthreatdetectionsettings.calculate","securitycenter.containerthreatdetectionsettings.get","securitycenter.eventthreatdetectionsettings.calculate","securitycenter.eventthreatdetectionsettings.get","securitycenter.findings.group","securitycenter.findings.list","securitycenter.findings.listFindingPropertyNames","securitycenter.muteconfigs.get","securitycenter.muteconfigs.list","securitycenter.notificationconfig.get","securitycenter.notificationconfig.list","securitycenter.organizationsettings.get","securitycenter.securitycentersettings.get","securitycenter.securityhealthanalyticssettings.calculate","securitycenter.securityhealthanalyticssettings.get","securitycenter.sources.get","securitycenter.sources.list","securitycenter.subscription.*","securitycenter.userinterfacemetadata.*","securitycenter.virtualmachinethreatdetectionsettings.calculate","securitycenter.virtualmachinethreatdetectionsettings.get","securitycenter.websecurityscannersettings.calculate","securitycenter.websecurityscannersettings.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Security Center Admin Viewer","roleName":"roles/securitycenter.adminViewer","roleDescription":"Admin Read access to security center"},"ja":{"roleTitle":"セキュリティ センター管理閲覧者","roleName":"roles/securitycenter.adminViewer","roleDescription":"セキュリティ センターに対する管理者の読み取り権限"}},"roles/securitycenter.assetSecurityMarksWriter":{"permissions":["securitycenter.assetsecuritymarks.*","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Asset Security Marks Writer","roleName":"roles/securitycenter.assetSecurityMarksWriter","roleDescription":"Write access to asset security marks"},"ja":{"roleTitle":"セキュリティ センターのアセット セキュリティ マーク編集者","roleName":"roles/securitycenter.assetSecurityMarksWriter","roleDescription":"アセット セキュリティ マークに対する書き込み権限"}},"roles/securitycenter.assetsDiscoveryRunner":{"permissions":["securitycenter.assets.runDiscovery","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Assets Discovery Runner","roleName":"roles/securitycenter.assetsDiscoveryRunner","roleDescription":"Run asset discovery access to assets"},"ja":{"roleTitle":"セキュリティ センターのアセット ディスカバリ実行者","roleName":"roles/securitycenter.assetsDiscoveryRunner","roleDescription":"アセットに対するアセット ディスカバリの実行権限"}},"roles/securitycenter.assetsViewer":{"permissions":["resourcemanager.folders.get","resourcemanager.organizations.get","resourcemanager.projects.get","securitycenter.assets.group","securitycenter.assets.list","securitycenter.assets.listAssetPropertyNames","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Assets Viewer","roleName":"roles/securitycenter.assetsViewer","roleDescription":"Read access to assets"},"ja":{"roleTitle":"セキュリティ センターのアセット閲覧者","roleName":"roles/securitycenter.assetsViewer","roleDescription":"アセットに対する読み取り権限"}},"roles/securitycenter.bigQueryExportsEditor":{"permissions":["resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list","securitycenter.bigQueryExports.*"],"en":{"roleTitle":"Security Center BigQuery Exports Editor","roleName":"roles/securitycenter.bigQueryExportsEditor","roleDescription":"Read-Write access to security center BigQuery Exports"},"ja":{"roleTitle":"セキュリティ センターの BigQuery Export 編集者","roleName":"roles/securitycenter.bigQueryExportsEditor","roleDescription":"セキュリティ センターの BigQuery Export に対する読み取り / 書き込みアクセス権"}},"roles/securitycenter.bigQueryExportsViewer":{"permissions":["resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list","securitycenter.bigQueryExports.get","securitycenter.bigQueryExports.list"],"en":{"roleTitle":"Security Center BigQuery Exports Viewer","roleName":"roles/securitycenter.bigQueryExportsViewer","roleDescription":"Read access to security center BigQuery Exports"},"ja":{"roleTitle":"セキュリティ センターの BigQuery Export 閲覧者","roleName":"roles/securitycenter.bigQueryExportsViewer","roleDescription":"セキュリティ センターの BigQuery Export に対する読み取りアクセス権"}},"roles/securitycenter.externalSystemsEditor":{"permissions":["securitycenter.findingexternalsystems.*"],"en":{"roleTitle":"Security Center External Systems Editor","roleName":"roles/securitycenter.externalSystemsEditor","roleDescription":"Write access to security center external systems"},"ja":{"roleTitle":"セキュリティ センター外部システム編集者","roleName":"roles/securitycenter.externalSystemsEditor","roleDescription":"セキュリティ センター外部システムに対する書き込みアクセス権"}},"roles/securitycenter.findingSecurityMarksWriter":{"permissions":["securitycenter.findingsecuritymarks.*","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Finding Security Marks Writer","roleName":"roles/securitycenter.findingSecurityMarksWriter","roleDescription":"Write access to finding security marks"},"ja":{"roleTitle":"セキュリティ センターの検出セキュリティ マーク編集者","roleName":"roles/securitycenter.findingSecurityMarksWriter","roleDescription":"検出セキュリティ マークに対する書き込み権限"}},"roles/securitycenter.findingsBulkMuteEditor":{"permissions":["securitycenter.findings.bulkMuteUpdate"],"en":{"roleTitle":"Security Center Findings Bulk Mute Editor","roleName":"roles/securitycenter.findingsBulkMuteEditor","roleDescription":"Ability to mute findings in bulk"},"ja":{"roleTitle":"セキュリティ センターの検出の一括ミュート編集者","roleName":"roles/securitycenter.findingsBulkMuteEditor","roleDescription":"検出を一括してミュート可能"}},"roles/securitycenter.findingsEditor":{"permissions":["resourcemanager.folders.get","resourcemanager.organizations.get","resourcemanager.projects.get","securitycenter.findings.bulkMuteUpdate","securitycenter.findings.group","securitycenter.findings.list","securitycenter.findings.listFindingPropertyNames","securitycenter.findings.setMute","securitycenter.findings.setState","securitycenter.findings.update","securitycenter.sources.get","securitycenter.sources.list","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Findings Editor","roleName":"roles/securitycenter.findingsEditor","roleDescription":"Read-write access to findings"},"ja":{"roleTitle":"セキュリティ センターの検出編集者","roleName":"roles/securitycenter.findingsEditor","roleDescription":"検出に対する読み取り / 書き込み権限"}},"roles/securitycenter.findingsMuteSetter":{"permissions":["securitycenter.findings.setMute"],"en":{"roleTitle":"Security Center Findings Mute Setter","roleName":"roles/securitycenter.findingsMuteSetter","roleDescription":"Set mute access to findings"},"ja":{"roleTitle":"セキュリティ センターの検出のミュート設定者","roleName":"roles/securitycenter.findingsMuteSetter","roleDescription":"検出に対するミュート アクセス権を設定します"}},"roles/securitycenter.findingsStateSetter":{"permissions":["securitycenter.findings.setState","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Findings State Setter","roleName":"roles/securitycenter.findingsStateSetter","roleDescription":"Set state access to findings"},"ja":{"roleTitle":"セキュリティ センターの検出状態設定者","roleName":"roles/securitycenter.findingsStateSetter","roleDescription":"検出状態の設定権限"}},"roles/securitycenter.findingsViewer":{"permissions":["resourcemanager.folders.get","resourcemanager.organizations.get","resourcemanager.projects.get","securitycenter.findings.group","securitycenter.findings.list","securitycenter.findings.listFindingPropertyNames","securitycenter.sources.get","securitycenter.sources.list","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Findings Viewer","roleName":"roles/securitycenter.findingsViewer","roleDescription":"Read access to findings"},"ja":{"roleTitle":"セキュリティ センターの検出閲覧者","roleName":"roles/securitycenter.findingsViewer","roleDescription":"検出に対する読み取り権限"}},"roles/securitycenter.findingsWorkflowStateSetter":{"permissions":["securitycenter.findings.setWorkflowState","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Findings Workflow State Setter","roleName":"roles/securitycenter.findingsWorkflowStateSetter","roleDescription":"Set workflow state access to findings"},"ja":{"roleTitle":"セキュリティ センターの検出ワークフロー状態設定者","roleName":"roles/securitycenter.findingsWorkflowStateSetter","roleDescription":"検出に対するワークフロー状態のアクセス権を設定します。"}},"roles/securitycenter.muteConfigsEditor":{"permissions":["securitycenter.muteconfigs.*"],"en":{"roleTitle":"Security Center Mute Configurations Editor","roleName":"roles/securitycenter.muteConfigsEditor","roleDescription":"Read-Write access to security center mute configurations"},"ja":{"roleTitle":"セキュリティ センターのミュート構成編集者","roleName":"roles/securitycenter.muteConfigsEditor","roleDescription":"セキュリティ センターのミュート構成に対する読み取り / 書き込みアクセス権"}},"roles/securitycenter.muteConfigsViewer":{"permissions":["securitycenter.muteconfigs.get","securitycenter.muteconfigs.list"],"en":{"roleTitle":"Security Center Mute Configurations Viewer","roleName":"roles/securitycenter.muteConfigsViewer","roleDescription":"Read access to security center mute configurations"},"ja":{"roleTitle":"セキュリティ センターのミュート構成閲覧者","roleName":"roles/securitycenter.muteConfigsViewer","roleDescription":"セキュリティ センターのミュート構成に対する読み取りアクセス権"}},"roles/securitycenter.notificationConfigEditor":{"permissions":["securitycenter.notificationconfig.*","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Notification Configurations Editor","roleName":"roles/securitycenter.notificationConfigEditor","roleDescription":"Write access to notification configurations"},"ja":{"roleTitle":"セキュリティ センター通知構成編集者","roleName":"roles/securitycenter.notificationConfigEditor","roleDescription":"通知構成に対する書き込みアクセス権"}},"roles/securitycenter.notificationConfigViewer":{"permissions":["securitycenter.notificationconfig.get","securitycenter.notificationconfig.list","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Notification Configurations Viewer","roleName":"roles/securitycenter.notificationConfigViewer","roleDescription":"Read access to notification configurations"},"ja":{"roleTitle":"セキュリティ センター通知構成閲覧者","roleName":"roles/securitycenter.notificationConfigViewer","roleDescription":"通知構成に対する読み取りアクセス権"}},"roles/securitycenter.settingsAdmin":{"permissions":["resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list","securitycenter.bigQueryExports.*","securitycenter.containerthreatdetectionsettings.*","securitycenter.eventthreatdetectionsettings.*","securitycenter.muteconfigs.*","securitycenter.notificationconfig.*","securitycenter.organizationsettings.*","securitycenter.securitycentersettings.*","securitycenter.securityhealthanalyticssettings.*","securitycenter.subscription.*","securitycenter.userinterfacemetadata.*","securitycenter.virtualmachinethreatdetectionsettings.*","securitycenter.websecurityscannersettings.*"],"en":{"roleTitle":"Security Center Settings Admin","roleName":"roles/securitycenter.settingsAdmin","roleDescription":"Admin(super user) access to security center settings"},"ja":{"roleTitle":"セキュリティ センター設定の管理者","roleName":"roles/securitycenter.settingsAdmin","roleDescription":"セキュリティ センターの設定に対する管理者(スーパー ユーザー)アクセス権"}},"roles/securitycenter.settingsEditor":{"permissions":["resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list","securitycenter.bigQueryExports.*","securitycenter.containerthreatdetectionsettings.*","securitycenter.eventthreatdetectionsettings.*","securitycenter.muteconfigs.*","securitycenter.notificationconfig.*","securitycenter.organizationsettings.*","securitycenter.securitycentersettings.*","securitycenter.securityhealthanalyticssettings.*","securitycenter.subscription.*","securitycenter.userinterfacemetadata.*","securitycenter.virtualmachinethreatdetectionsettings.*","securitycenter.websecurityscannersettings.*"],"en":{"roleTitle":"Security Center Settings Editor","roleName":"roles/securitycenter.settingsEditor","roleDescription":"Read-Write access to security center settings"},"ja":{"roleTitle":"セキュリティ センター設定の編集者","roleName":"roles/securitycenter.settingsEditor","roleDescription":"セキュリティ センターの設定に対する読み取り / 書き込みアクセス権"}},"roles/securitycenter.settingsViewer":{"permissions":["resourcemanager.folders.get","resourcemanager.folders.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.list","securitycenter.bigQueryExports.get","securitycenter.bigQueryExports.list","securitycenter.containerthreatdetectionsettings.calculate","securitycenter.containerthreatdetectionsettings.get","securitycenter.eventthreatdetectionsettings.calculate","securitycenter.eventthreatdetectionsettings.get","securitycenter.muteconfigs.get","securitycenter.muteconfigs.list","securitycenter.notificationconfig.get","securitycenter.notificationconfig.list","securitycenter.organizationsettings.get","securitycenter.securitycentersettings.get","securitycenter.securityhealthanalyticssettings.calculate","securitycenter.securityhealthanalyticssettings.get","securitycenter.subscription.*","securitycenter.userinterfacemetadata.*","securitycenter.virtualmachinethreatdetectionsettings.calculate","securitycenter.virtualmachinethreatdetectionsettings.get","securitycenter.websecurityscannersettings.calculate","securitycenter.websecurityscannersettings.get"],"en":{"roleTitle":"Security Center Settings Viewer","roleName":"roles/securitycenter.settingsViewer","roleDescription":"Read access to security center settings"},"ja":{"roleTitle":"セキュリティ センター設定の閲覧者","roleName":"roles/securitycenter.settingsViewer","roleDescription":"セキュリティ センターの設定に対する読み取りアクセス権"}},"roles/securitycenter.sourcesAdmin":{"permissions":["resourcemanager.organizations.get","securitycenter.sources.*","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Sources Admin","roleName":"roles/securitycenter.sourcesAdmin","roleDescription":"Admin access to sources"},"ja":{"roleTitle":"セキュリティ センターのソース管理者","roleName":"roles/securitycenter.sourcesAdmin","roleDescription":"ソースに対する管理者権限"}},"roles/securitycenter.sourcesEditor":{"permissions":["resourcemanager.organizations.get","securitycenter.sources.get","securitycenter.sources.list","securitycenter.sources.update","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Sources Editor","roleName":"roles/securitycenter.sourcesEditor","roleDescription":"Read-write access to sources"},"ja":{"roleTitle":"セキュリティ センターのソース編集者","roleName":"roles/securitycenter.sourcesEditor","roleDescription":"ソースに対する読み取り / 書き込み権限"}},"roles/securitycenter.sourcesViewer":{"permissions":["resourcemanager.organizations.get","securitycenter.sources.get","securitycenter.sources.list","securitycenter.userinterfacemetadata.*"],"en":{"roleTitle":"Security Center Sources Viewer","roleName":"roles/securitycenter.sourcesViewer","roleDescription":"Read access to sources"},"ja":{"roleTitle":"セキュリティ センターのソース閲覧者","roleName":"roles/securitycenter.sourcesViewer","roleDescription":"ソースに対する読み取り権限"}},"roles/vpcaccess.admin":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","vpcaccess.*"],"en":{"roleTitle":"Serverless VPC Access Admin","roleName":"roles/vpcaccess.admin","roleDescription":"Full access to all Serverless VPC Access resources"},"ja":{"roleTitle":"サーバーレス VPC アクセス管理者","roleName":"roles/vpcaccess.admin","roleDescription":"すべてのサーバーレス VPC アクセス リソースに対する完全アクセス権"}},"roles/vpcaccess.user":{"permissions":["compute.networks.access","resourcemanager.projects.get","resourcemanager.projects.list","vpcaccess.connectors.get","vpcaccess.connectors.list","vpcaccess.connectors.use","vpcaccess.locations.*","vpcaccess.operations.*"],"en":{"roleTitle":"Serverless VPC Access User","roleName":"roles/vpcaccess.user","roleDescription":"User of Serverless VPC Access connectors"},"ja":{"roleTitle":"サーバーレス VPC アクセス ユーザー","roleName":"roles/vpcaccess.user","roleDescription":"サーバーレス VPC アクセス コネクタのユーザー"}},"roles/vpcaccess.viewer":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list","vpcaccess.connectors.get","vpcaccess.connectors.list","vpcaccess.locations.*","vpcaccess.operations.*"],"en":{"roleTitle":"Serverless VPC Access Viewer","roleName":"roles/vpcaccess.viewer","roleDescription":"Viewer of all Serverless VPC Access resources"},"ja":{"roleTitle":"サーバーレス VPC アクセス閲覧者","roleName":"roles/vpcaccess.viewer","roleDescription":"すべてのサーバーレス VPC アクセス リソースの閲覧者"}},"roles/iam.serviceAccountAdmin":{"permissions":["iam.serviceAccounts.create","iam.serviceAccounts.delete","iam.serviceAccounts.disable","iam.serviceAccounts.enable","iam.serviceAccounts.get","iam.serviceAccounts.getIamPolicy","iam.serviceAccounts.list","iam.serviceAccounts.setIamPolicy","iam.serviceAccounts.undelete","iam.serviceAccounts.update","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Service Account Admin","roleName":"roles/iam.serviceAccountAdmin","roleDescription":"Create and manage service accounts."},"ja":{"roleTitle":"サービス アカウント管理者","roleName":"roles/iam.serviceAccountAdmin","roleDescription":"サービス アカウントを作成、管理します。"}},"roles/iam.serviceAccountCreator":{"permissions":["iam.serviceAccounts.create","iam.serviceAccounts.get","iam.serviceAccounts.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Create Service Accounts","roleName":"roles/iam.serviceAccountCreator","roleDescription":"Access to create service accounts."},"ja":{"roleTitle":"サービス アカウントの作成","roleName":"roles/iam.serviceAccountCreator","roleDescription":"サービス アカウントを作成するための権限。"}},"roles/iam.serviceAccountDeleter":{"permissions":["iam.serviceAccounts.delete","iam.serviceAccounts.get","iam.serviceAccounts.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Delete Service Accounts","roleName":"roles/iam.serviceAccountDeleter","roleDescription":"Access to delete service accounts."},"ja":{"roleTitle":"サービス アカウントの削除","roleName":"roles/iam.serviceAccountDeleter","roleDescription":"サービス アカウントを削除するための権限。"}},"roles/iam.serviceAccountKeyAdmin":{"permissions":["iam.serviceAccountKeys.*","iam.serviceAccounts.get","iam.serviceAccounts.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Service Account Key Admin","roleName":"roles/iam.serviceAccountKeyAdmin","roleDescription":"Create and manage (and rotate) service account keys."},"ja":{"roleTitle":"サービス アカウント キー管理者","roleName":"roles/iam.serviceAccountKeyAdmin","roleDescription":"サービス アカウント キーの作成と管理(とローテーション)を行います。"}},"roles/iam.serviceAccountTokenCreator":{"permissions":["iam.serviceAccounts.get","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","iam.serviceAccounts.implicitDelegation","iam.serviceAccounts.list","iam.serviceAccounts.signBlob","iam.serviceAccounts.signJwt","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Service Account Token Creator","roleName":"roles/iam.serviceAccountTokenCreator","roleDescription":"Impersonate service accounts (create OAuth2 access tokens, sign blobs or JWTs, etc)."},"ja":{"roleTitle":"サービス アカウント トークン作成者","roleName":"roles/iam.serviceAccountTokenCreator","roleDescription":"サービス アカウント権限を使用できます(OAuth2 アクセス トークンを作成し、blob または JWT などに署名します)。"}},"roles/iam.serviceAccountUser":{"permissions":["iam.serviceAccounts.actAs","iam.serviceAccounts.get","iam.serviceAccounts.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Service Account User","roleName":"roles/iam.serviceAccountUser","roleDescription":"Run operations as the service account."},"ja":{"roleTitle":"サービス アカウント ユーザー","roleName":"roles/iam.serviceAccountUser","roleDescription":"サービス アカウントとして操作を行います。"}},"roles/iam.serviceAccountViewer":{"permissions":["iam.serviceAccountKeys.get","iam.serviceAccountKeys.list","iam.serviceAccounts.get","iam.serviceAccounts.getIamPolicy","iam.serviceAccounts.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"View Service Accounts","roleName":"roles/iam.serviceAccountViewer","roleDescription":"Read access to service accounts, metadata, and keys."},"ja":{"roleTitle":"サービス アカウントの表示","roleName":"roles/iam.serviceAccountViewer","roleDescription":"サービス アカウント、メタデータ、鍵への読み取りアクセス権。"}},"roles/iam.workloadIdentityUser":{"permissions":["iam.serviceAccounts.get","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","iam.serviceAccounts.list"],"en":{"roleTitle":"Workload Identity User","roleName":"roles/iam.workloadIdentityUser","roleDescription":"Impersonate service accounts from GKE Workloads"},"ja":{"roleTitle":"Workload Identity ユーザー","roleName":"roles/iam.workloadIdentityUser","roleDescription":"GKE ワークロードのサービス アカウントを使用できます。"}},"roles/aiplatform.customCodeServiceAgent":{"permissions":["aiplatform.annotationSpecs.*","aiplatform.annotations.*","aiplatform.artifacts.*","aiplatform.batchPredictionJobs.*","aiplatform.contexts.*","aiplatform.customJobs.*","aiplatform.dataItems.*","aiplatform.dataLabelingJobs.*","aiplatform.datasets.*","aiplatform.deploymentResourcePools.*","aiplatform.edgeDeploymentJobs.*","aiplatform.edgeDeviceDebugInfo.*","aiplatform.edgeDevices.*","aiplatform.endpoints.*","aiplatform.entityTypes.*","aiplatform.executions.*","aiplatform.features.*","aiplatform.featurestores.*","aiplatform.humanInTheLoops.*","aiplatform.hyperparameterTuningJobs.*","aiplatform.indexEndpoints.*","aiplatform.indexes.*","aiplatform.locations.*","aiplatform.metadataSchemas.*","aiplatform.metadataStores.*","aiplatform.modelDeploymentMonitoringJobs.*","aiplatform.modelEvaluationSlices.*","aiplatform.modelEvaluations.*","aiplatform.models.*","aiplatform.nasJobs.*","aiplatform.operations.*","aiplatform.pipelineJobs.*","aiplatform.specialistPools.*","aiplatform.studies.*","aiplatform.tensorboardExperiments.*","aiplatform.tensorboardRuns.*","aiplatform.tensorboardTimeSeries.*","aiplatform.tensorboards.create","aiplatform.tensorboards.delete","aiplatform.tensorboards.get","aiplatform.tensorboards.list","aiplatform.tensorboards.update","aiplatform.trainingPipelines.*","aiplatform.trials.*","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.tags.get","artifactregistry.versions.get","bigquery.datasets.create","bigquery.datasets.get","bigquery.jobs.create","bigquery.jobs.get","bigquery.readsessions.create","bigquery.readsessions.getData","bigquery.tables.create","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.update","bigquery.tables.updateData","iam.serviceAccounts.get","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","iam.serviceAccounts.implicitDelegation","iam.serviceAccounts.list","iam.serviceAccounts.signBlob","iam.serviceAccounts.signJwt","logging.logEntries.create","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use","storage.buckets.create","storage.buckets.delete","storage.buckets.get","storage.buckets.list","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Vertex AI Custom Code Service Agent","roleName":"roles/aiplatform.customCodeServiceAgent","roleDescription":"Gives Vertex AI Custom Code the proper permissions."},"ja":{"roleTitle":"Vertex AI Custom Code サービス エージェント","roleName":"roles/aiplatform.customCodeServiceAgent","roleDescription":"Vertex AI Custom Code に適切な権限を付与します。"}},"roles/aiplatform.serviceAgent":{"permissions":["aiplatform.annotationSpecs.*","aiplatform.annotations.*","aiplatform.artifacts.*","aiplatform.batchPredictionJobs.*","aiplatform.contexts.*","aiplatform.customJobs.*","aiplatform.dataItems.*","aiplatform.dataLabelingJobs.*","aiplatform.datasets.*","aiplatform.deploymentResourcePools.*","aiplatform.edgeDeploymentJobs.*","aiplatform.edgeDeviceDebugInfo.*","aiplatform.edgeDevices.*","aiplatform.endpoints.*","aiplatform.entityTypes.*","aiplatform.executions.*","aiplatform.features.*","aiplatform.featurestores.*","aiplatform.humanInTheLoops.*","aiplatform.hyperparameterTuningJobs.*","aiplatform.indexEndpoints.*","aiplatform.indexes.*","aiplatform.locations.*","aiplatform.metadataSchemas.*","aiplatform.metadataStores.*","aiplatform.modelDeploymentMonitoringJobs.*","aiplatform.modelEvaluationSlices.*","aiplatform.modelEvaluations.*","aiplatform.models.*","aiplatform.nasJobs.*","aiplatform.operations.*","aiplatform.pipelineJobs.*","aiplatform.specialistPools.*","aiplatform.studies.*","aiplatform.tensorboardExperiments.*","aiplatform.tensorboardRuns.*","aiplatform.tensorboardTimeSeries.*","aiplatform.tensorboards.create","aiplatform.tensorboards.delete","aiplatform.tensorboards.get","aiplatform.tensorboards.list","aiplatform.tensorboards.update","aiplatform.trainingPipelines.*","aiplatform.trials.*","artifactregistry.repositories.create","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.uploadArtifacts","artifactregistry.tags.get","artifactregistry.versions.get","automl.datasets.export","automl.datasets.get","automl.datasets.list","automl.modelEvaluations.list","automl.models.get","automl.models.list","automl.operations.get","automl.tableSpecs.get","bigquery.datasets.create","bigquery.datasets.get","bigquery.jobs.create","bigquery.jobs.get","bigquery.models.export","bigquery.readsessions.create","bigquery.tables.create","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.update","bigquery.tables.updateData","bigtable.tables.get","bigtable.tables.list","bigtable.tables.readRows","compute.machineTypes.get","dataflow.jobs.*","dataflow.messages.*","dataflow.metrics.*","dataflow.snapshots.*","datalabeling.annotateddatasets.get","datalabeling.datasets.export","datalabeling.datasets.get","datalabeling.datasets.list","datalabeling.operations.get","iam.serviceAccounts.actAs","iam.serviceAccounts.getAccessToken","logging.logEntries.create","ml.models.list","ml.operations.get","ml.versions.get","ml.versions.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use","storage.buckets.create","storage.buckets.delete","storage.buckets.get","storage.buckets.list","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Vertex AI Service Agent","roleName":"roles/aiplatform.serviceAgent","roleDescription":"Gives Vertex AI the permissions it needs to function."},"ja":{"roleTitle":"Vertex AI サービス エージェント","roleName":"roles/aiplatform.serviceAgent","roleDescription":"動作に必要となる権限を Vertex AI に付与します。"}},"roles/anthos.serviceAgent":{"permissions":["gkehub.features.get","gkehub.locations.*","gkehub.memberships.get","gkehub.memberships.list","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Anthos Service Agent","roleName":"roles/anthos.serviceAgent","roleDescription":"Gives the Anthos service agent access to Google Cloud resources."},"ja":{"roleTitle":"Anthos サービス エージェント","roleName":"roles/anthos.serviceAgent","roleDescription":"Anthos サービス エージェントに Google Cloud リソースへのアクセス権を付与します。"}},"roles/anthosaudit.serviceAgent":{"permissions":["gkehub.features.get","gkehub.locations.*","gkehub.memberships.get","gkehub.memberships.list"],"en":{"roleTitle":"Anthos Audit Service Agent","roleName":"roles/anthosaudit.serviceAgent","roleDescription":"Gives the Anthos Audit service agent access to Cloud Platform resources."},"ja":{"roleTitle":"Anthos Audit サービス エージェント","roleName":"roles/anthosaudit.serviceAgent","roleDescription":"Anthos Audit サービス エージェントに Cloud Platform リソースに対するアクセス権を付与します。"}},"roles/anthosconfigmanagement.serviceAgent":{"permissions":["gkehub.features.get","gkehub.locations.*","gkehub.memberships.get","gkehub.memberships.list"],"en":{"roleTitle":"Anthos Config Management Service Agent","roleName":"roles/anthosconfigmanagement.serviceAgent","roleDescription":"Gives the Anthos Config Management service agent access to Google Cloud resources."},"ja":{"roleTitle":"Anthos Config Management サービス エージェント","roleName":"roles/anthosconfigmanagement.serviceAgent","roleDescription":"Anthos Config Management サービス エージェントに Google Cloud リソースへのアクセス権を付与します。"}},"roles/anthosidentityservice.serviceAgent":{"permissions":["gkehub.features.get","gkehub.locations.*","gkehub.memberships.get","gkehub.memberships.list"],"en":{"roleTitle":"Anthos Identity Service Agent","roleName":"roles/anthosidentityservice.serviceAgent","roleDescription":"Gives the Anthos Identity service agent access to Google Cloud resources."},"ja":{"roleTitle":"Anthos Identity サービス エージェント","roleName":"roles/anthosidentityservice.serviceAgent","roleDescription":"Anthos Identity サービス エージェントに Google Cloud リソースへのアクセス権を付与します。"}},"roles/anthosservicemesh.serviceAgent":{"permissions":["container.backendConfigs.*","container.clusterRoleBindings.*","container.clusterRoles.*","container.clusters.get","container.configMaps.*","container.customResourceDefinitions.create","container.customResourceDefinitions.get","container.customResourceDefinitions.list","container.customResourceDefinitions.update","container.daemonSets.create","container.daemonSets.delete","container.daemonSets.get","container.daemonSets.getStatus","container.daemonSets.list","container.daemonSets.update","container.deployments.get","container.deployments.list","container.events.get","container.events.list","container.mutatingWebhookConfigurations.create","container.mutatingWebhookConfigurations.get","container.mutatingWebhookConfigurations.list","container.mutatingWebhookConfigurations.update","container.namespaces.create","container.namespaces.get","container.namespaces.list","container.pods.get","container.pods.list","container.secrets.*","container.serviceAccounts.create","container.serviceAccounts.delete","container.serviceAccounts.get","container.serviceAccounts.list","container.serviceAccounts.update","container.services.get","container.services.list","container.thirdPartyObjects.create","container.thirdPartyObjects.get","container.thirdPartyObjects.list","container.thirdPartyObjects.update","container.validatingWebhookConfigurations.create","container.validatingWebhookConfigurations.get","container.validatingWebhookConfigurations.list","container.validatingWebhookConfigurations.update","gkehub.features.get","gkehub.locations.*","gkehub.memberships.get","gkehub.memberships.list","meshconfig.projects.init"],"en":{"roleTitle":"Anthos Service Mesh Service Agent","roleName":"roles/anthosservicemesh.serviceAgent","roleDescription":"Gives the Anthos Service Mesh service agent access to Cloud Platform resources."},"ja":{"roleTitle":"Anthos Service Mesh サービス エージェント","roleName":"roles/anthosservicemesh.serviceAgent","roleDescription":"Anthos Service Mesh サービス エージェントに Cloud Platform リソースへのアクセス権を付与します。"}},"roles/anthossupport.serviceAgent":{"permissions":["gkehub.features.get","gkehub.features.getIamPolicy","gkehub.features.list","gkehub.fleet.get","gkehub.gateway.get","gkehub.locations.*","gkehub.memberships.generateConnectManifest","gkehub.memberships.get","gkehub.memberships.getIamPolicy","gkehub.memberships.list","gkehub.operations.get","gkehub.operations.list","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.get"],"en":{"roleTitle":"Anthos Support Service Agent","roleName":"roles/anthossupport.serviceAgent","roleDescription":"Gives the Anthos Support Service Agent access to Cloud Platform resource."},"ja":{"roleTitle":"Anthos サポート サービス エージェント","roleName":"roles/anthossupport.serviceAgent","roleDescription":"Anthos サポート サービス エージェントに Cloud Platform リソースへのアクセス権を付与します。"}},"roles/apigateway.serviceAgent":{"permissions":["iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","servicemanagement.services.check","servicemanagement.services.quota","servicemanagement.services.report"],"en":{"roleTitle":"Cloud API Gateway Service Agent","roleName":"roles/apigateway.serviceAgent","roleDescription":"Gives Cloud API Gateway service account access to Service Management check and reports as well as impersonation on user-specified service accounts."},"ja":{"roleTitle":"Cloud API Gateway サービス エージェント","roleName":"roles/apigateway.serviceAgent","roleDescription":"Cloud API Gateway サービス アカウントに、サービス管理のチェックとレポートに対するアクセス権と、ユーザー指定のサービス アカウントの権限借用に対するアクセス権を付与します。"}},"roles/apigateway_management.serviceAgent":{"permissions":["iam.serviceAccounts.get","servicemanagement.services.create","servicemanagement.services.delete","servicemanagement.services.get","servicemanagement.services.list","servicemanagement.services.update","serviceusage.services.get"],"en":{"roleTitle":"Cloud API Gateway Management Service Agent","roleName":"roles/apigateway_management.serviceAgent","roleDescription":"Gives Cloud API Gateway service account access to retrieve a Service configuration."},"ja":{"roleTitle":"Cloud API Gateway Management サービス エージェント","roleName":"roles/apigateway_management.serviceAgent","roleDescription":"Cloud API Gateway サービス アカウントに、サービス構成を取得するためのアクセス権を付与します。"}},"roles/apigee.serviceAgent":{"permissions":["apigee.apiproducts.get","apigee.apiproducts.list","apigee.appkeys.create","apigee.appkeys.delete","apigee.appkeys.manage","apigee.apps.get","apigee.canaryevaluations.*","apigee.developerapps.*","apigee.developers.create","apigee.developers.get","apigee.environments.get","apigee.environments.getDataLocation","apigee.environments.manageRuntime","apigee.ingressconfigs.*","apigee.instances.reportStatus","apigee.operations.*","apigee.organizations.get","apigee.proxyrevisions.get","apigee.runtimeconfigs.*","cloudtrace.traces.patch","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","logging.buckets.create","logging.buckets.get","logging.buckets.list","logging.views.create","logging.views.get","logging.views.list","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create"],"en":{"roleTitle":"Apigee Service Agent","roleName":"roles/apigee.serviceAgent","roleDescription":"Service agent that grants access to Apigee resources - API Products, Developers, Developer Apps, and App Keys."},"ja":{"roleTitle":"Apigee サービス エージェント","roleName":"roles/apigee.serviceAgent","roleDescription":"Apigee リソース(API プロダクト、デベロッパー、デベロッパー アプリ、アプリキー)へのアクセス権を付与するサービス エージェント。"}},"roles/appdevelopmentexperience.serviceAgent":{"permissions":["container.clusters.get","container.clusters.update","gkehub.features.get","gkehub.locations.*","gkehub.memberships.get","gkehub.memberships.list"],"en":{"roleTitle":"App Development Experience Service Agent","roleName":"roles/appdevelopmentexperience.serviceAgent","roleDescription":"Give the App Development Experience service agent access to Cloud Platform resources."},"ja":{"roleTitle":"App Development Experience サービス エージェント","roleName":"roles/appdevelopmentexperience.serviceAgent","roleDescription":"App Development Experience サービス エージェントに Cloud Platform リソースに対するアクセス権を付与します。"}},"roles/appengineflex.serviceAgent":{"permissions":["billing.accounts.get","cloudbuild.builds.create","cloudbuild.builds.get","compute.addresses.create","compute.addresses.delete","compute.addresses.get","compute.addresses.list","compute.addresses.use","compute.autoscalers.create","compute.autoscalers.delete","compute.autoscalers.get","compute.autoscalers.update","compute.backendServices.create","compute.backendServices.delete","compute.backendServices.get","compute.backendServices.list","compute.backendServices.update","compute.backendServices.use","compute.disks.list","compute.firewalls.*","compute.forwardingRules.create","compute.forwardingRules.delete","compute.forwardingRules.get","compute.globalAddresses.create","compute.globalAddresses.delete","compute.globalAddresses.get","compute.globalAddresses.use","compute.globalForwardingRules.create","compute.globalForwardingRules.delete","compute.globalForwardingRules.get","compute.globalOperations.get","compute.healthChecks.create","compute.healthChecks.delete","compute.healthChecks.get","compute.healthChecks.update","compute.healthChecks.useReadOnly","compute.httpHealthChecks.create","compute.httpHealthChecks.delete","compute.httpHealthChecks.get","compute.httpHealthChecks.use","compute.httpHealthChecks.useReadOnly","compute.httpsHealthChecks.create","compute.httpsHealthChecks.delete","compute.httpsHealthChecks.get","compute.httpsHealthChecks.update","compute.httpsHealthChecks.use","compute.httpsHealthChecks.useReadOnly","compute.images.get","compute.images.useReadOnly","compute.instanceGroupManagers.create","compute.instanceGroupManagers.delete","compute.instanceGroupManagers.get","compute.instanceGroupManagers.update","compute.instanceGroupManagers.use","compute.instanceGroups.create","compute.instanceGroups.delete","compute.instanceGroups.get","compute.instanceGroups.update","compute.instanceTemplates.create","compute.instanceTemplates.delete","compute.instanceTemplates.get","compute.instanceTemplates.useReadOnly","compute.instances.attachDisk","compute.instances.create","compute.instances.delete","compute.instances.detachDisk","compute.instances.get","compute.instances.getGuestAttributes","compute.instances.getSerialPortOutput","compute.instances.list","compute.instances.reset","compute.instances.setLabels","compute.instances.setMetadata","compute.instances.setTags","compute.instances.start","compute.instances.stop","compute.instances.use","compute.machineTypes.get","compute.networks.create","compute.networks.delete","compute.networks.get","compute.networks.updatePolicy","compute.networks.use","compute.networks.useExternalIp","compute.projects.get","compute.projects.setCommonInstanceMetadata","compute.regionBackendServices.create","compute.regionBackendServices.delete","compute.regionBackendServices.get","compute.regionBackendServices.list","compute.regionBackendServices.update","compute.regionBackendServices.use","compute.regionOperations.get","compute.regions.get","compute.routes.get","compute.routes.list","compute.subnetworks.delete","compute.subnetworks.get","compute.targetHttpProxies.create","compute.targetHttpProxies.delete","compute.targetHttpProxies.get","compute.targetHttpProxies.use","compute.targetHttpsProxies.create","compute.targetHttpsProxies.delete","compute.targetHttpsProxies.get","compute.targetHttpsProxies.setSslCertificates","compute.targetHttpsProxies.use","compute.urlMaps.create","compute.urlMaps.delete","compute.urlMaps.get","compute.urlMaps.update","compute.urlMaps.use","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","deploymentmanager.compositeTypes.get","deploymentmanager.deployments.create","deploymentmanager.deployments.delete","deploymentmanager.deployments.get","deploymentmanager.deployments.list","deploymentmanager.deployments.update","deploymentmanager.manifests.*","deploymentmanager.operations.*","deploymentmanager.typeProviders.create","deploymentmanager.typeProviders.get","iam.serviceAccounts.actAs","iam.serviceAccounts.get","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.signBlob","iam.serviceAccounts.signJwt","logging.logEntries.create","logging.logMetrics.create","logging.logMetrics.delete","logging.logMetrics.get","logging.logMetrics.update","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.setIamPolicy","storage.buckets.create","storage.buckets.delete","storage.buckets.get","storage.buckets.getIamPolicy","storage.buckets.setIamPolicy","storage.buckets.update","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.getIamPolicy","storage.objects.list"],"en":{"roleTitle":"App Engine flexible environment Service Agent","roleName":"roles/appengineflex.serviceAgent","roleDescription":"Can edit and manage App Engine Flexible Environment apps. Includes access to service accounts."},"ja":{"roleTitle":"App Engine フレキシブル環境のサービス エージェント","roleName":"roles/appengineflex.serviceAgent","roleDescription":"App Engine フレキシブル環境アプリを編集して管理できます。サービス アカウントへのアクセスを含みます。"}},"roles/artifactregistry.serviceAgent":{"permissions":["artifactregistry.repositories.downloadArtifacts","pubsub.topics.publish"],"en":{"roleTitle":"Artifact Registry Service Agent","roleName":"roles/artifactregistry.serviceAgent","roleDescription":"Gives the Artifact Registry service account access to managed resources."},"ja":{"roleTitle":"Artifact Registry サービス エージェント","roleName":"roles/artifactregistry.serviceAgent","roleDescription":"Artifact Registry サービス アカウントにマネージド リソースへのアクセス権を付与します。"}},"roles/assuredworkloads.serviceAgent":{"permissions":["cloudkms.cryptoKeys.create","cloudkms.keyRings.create","serviceusage.services.enable","serviceusage.services.use"],"en":{"roleTitle":"Assured Workloads Service Agent","roleName":"roles/assuredworkloads.serviceAgent","roleDescription":"Gives the Assured Workloads service account access to create KMS keyrings and keys, and to monitor Assured Workloads."},"ja":{"roleTitle":"Assured Workloads サービス エージェント","roleName":"roles/assuredworkloads.serviceAgent","roleDescription":"Assured Workloads サービス アカウントに、KMS のキーリングと鍵を作成し、Assured Workloads をモニタリングするためのアクセス権を付与します。"}},"roles/automl.serviceAgent":{"permissions":["bigquery.datasets.create","bigquery.datasets.get","bigquery.jobs.create","bigquery.tables.create","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.update","bigquery.tables.updateData","bigtable.tables.get","bigtable.tables.list","bigtable.tables.readRows","serviceusage.services.use","storage.buckets.get","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"AutoML Service Agent","roleName":"roles/automl.serviceAgent","roleDescription":"AutoML service agent can act as Cloud Storage admin and export BigQuery tables, which can be backed by Cloud Storage and Cloud Bigtable."},"ja":{"roleTitle":"AutoML サービス エージェント","roleName":"roles/automl.serviceAgent","roleDescription":"AutoML サービス エージェントは、Cloud Storage 管理者のロールを果たし、BigQuery テーブルをエクスポートできます。これは Cloud Storage と Cloud Bigtable によってサポートされます。"}},"roles/automlrecommendations.serviceAgent":{"permissions":["bigquery.datasets.create","bigquery.datasets.get","bigquery.jobs.create","bigquery.jobs.get","bigquery.jobs.list","bigquery.jobs.update","bigquery.tables.create","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.list","bigquery.tables.updateData","cloudnotifications.*","dataflow.jobs.*","dataflow.messages.*","dataflow.metrics.*","logging.logEntries.create","monitoring.alertPolicies.get","monitoring.alertPolicies.list","monitoring.dashboards.get","monitoring.dashboards.list","monitoring.groups.get","monitoring.groups.list","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.notificationChannelDescriptors.*","monitoring.notificationChannels.get","monitoring.notificationChannels.list","monitoring.publicWidgets.get","monitoring.publicWidgets.list","monitoring.services.get","monitoring.services.list","monitoring.slos.get","monitoring.slos.list","monitoring.timeSeries.*","monitoring.uptimeCheckConfigs.get","monitoring.uptimeCheckConfigs.list","opsconfigmonitoring.resourceMetadata.list","resourcemanager.projects.get","resourcemanager.projects.list","stackdriver.projects.get","storage.buckets.create","storage.buckets.get","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Recommendations AI Service Agent","roleName":"roles/automlrecommendations.serviceAgent","roleDescription":"Recommendations AI service uploads catalog feeds from Cloud Storage, reports results to the customer Cloud Storage bucket, writes logs to customer projects, and writes and reads Stackdriver metrics for customer projects."},"ja":{"roleTitle":"Recommendations AI サービス エージェント","roleName":"roles/automlrecommendations.serviceAgent","roleDescription":"Recommendations AI サービスは、Cloud Storage からカタログ フィードをアップロードし、ユーザーの Cloud Storage バケットに結果を報告します。ユーザー プロジェクトにログを書き込み、ユーザー プロジェクトの Stackdriver 指標の書き込みと読み取りを行います。"}},"roles/bigqueryconnection.serviceAgent":{"permissions":["cloudsql.instances.connect","cloudsql.instances.get","logging.logEntries.create","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create"],"en":{"roleTitle":"BigQuery Connection Service Agent","roleName":"roles/bigqueryconnection.serviceAgent","roleDescription":"Gives BigQuery Connection Service access to Cloud SQL instances in user projects."},"ja":{"roleTitle":"BigQuery Connection Service エージェント","roleName":"roles/bigqueryconnection.serviceAgent","roleDescription":"BigQuery Connection Service にユーザー プロジェクトの Cloud SQL インスタンスに対するアクセス権を付与します。"}},"roles/bigquerydatatransfer.serviceAgent":{"permissions":["bigquery.config.get","bigquery.jobs.create","iam.serviceAccounts.getAccessToken","logging.logEntries.create","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"BigQuery Data Transfer Service Agent","roleName":"roles/bigquerydatatransfer.serviceAgent","roleDescription":"Gives BigQuery Data Transfer Service access to start BigQuery jobs in consumer project."},"ja":{"roleTitle":"BigQuery Data Transfer Service エージェント","roleName":"roles/bigquerydatatransfer.serviceAgent","roleDescription":"BigQuery Data Transfer Service に、ユーザー プロジェクトで BigQuery ジョブを開始するためのアクセス権を付与します。"}},"roles/binaryauthorization.serviceAgent":{"permissions":["binaryauthorization.attestors.get","binaryauthorization.attestors.list","binaryauthorization.attestors.verifyImageAttested","cloudasset.assets.exportResource","cloudasset.feeds.create","cloudasset.feeds.delete","cloudasset.feeds.get","cloudasset.feeds.update","containeranalysis.notes.get","containeranalysis.notes.list","containeranalysis.notes.listOccurrences","containeranalysis.occurrences.get","containeranalysis.occurrences.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Binary Authorization Service Agent","roleName":"roles/binaryauthorization.serviceAgent","roleDescription":"Can read Notes and Occurrences from the Container Analysis Service to find and verify signatures."},"ja":{"roleTitle":"Binary Authorization サービス エージェント","roleName":"roles/binaryauthorization.serviceAgent","roleDescription":"Container Analysis サービスからメモや発生した項目を読み取って、署名を特定、検証できます。"}},"roles/cloudasset.serviceAgent":{"permissions":["bigquery.datasets.get","bigquery.jobs.create","bigquery.jobs.get","bigquery.tables.create","bigquery.tables.delete","bigquery.tables.get","bigquery.tables.update","bigquery.tables.updateData","pubsub.topics.publish","storage.buckets.create","storage.buckets.get","storage.buckets.getIamPolicy","storage.objects.create","storage.objects.delete","storage.objects.get"],"en":{"roleTitle":"Cloud Asset Service Agent","roleName":"roles/cloudasset.serviceAgent","roleDescription":"Gives Cloud Asset service agent permissions to Cloud Storage and BigQuery for exporting Assets, and permission to publish to Cloud Pub/Sub topics for Asset Real Time Feed."},"ja":{"roleTitle":"Cloud Asset サービス エージェント","roleName":"roles/cloudasset.serviceAgent","roleDescription":"アセットをエクスポートするための Cloud Storage と BigQuery に対する権限、ならびにアセット リアルタイム フィードのために Cloud Pub/Sub トピックに対して公開する権限を、Cloud Asset サービス エージェントに付与します。"}},"roles/cloudbuild.serviceAgent":{"permissions":["artifactregistry.aptartifacts.*","artifactregistry.dockerimages.*","artifactregistry.files.*","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.repositories.uploadArtifacts","artifactregistry.tags.create","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.tags.update","artifactregistry.versions.get","artifactregistry.versions.list","artifactregistry.yumartifacts.*","binaryauthorization.attestors.create","binaryauthorization.attestors.delete","binaryauthorization.attestors.get","binaryauthorization.attestors.list","binaryauthorization.attestors.update","binaryauthorization.attestors.verifyImageAttested","cloudbuild.builds.create","cloudbuild.builds.get","cloudbuild.builds.list","cloudbuild.builds.update","cloudbuild.workerpools.use","compute.firewalls.get","compute.firewalls.list","compute.networks.get","compute.subnetworks.get","containeranalysis.notes.attachOccurrence","containeranalysis.notes.create","containeranalysis.notes.delete","containeranalysis.notes.get","containeranalysis.notes.list","containeranalysis.notes.update","containeranalysis.occurrences.create","containeranalysis.occurrences.delete","containeranalysis.occurrences.get","containeranalysis.occurrences.list","containeranalysis.occurrences.update","iam.serviceAccounts.get","iam.serviceAccounts.getAccessToken","logging.logEntries.create","logging.logEntries.list","logging.privateLogEntries.*","logging.views.access","pubsub.subscriptions.create","pubsub.subscriptions.delete","pubsub.subscriptions.get","pubsub.subscriptions.update","pubsub.topics.attachSubscription","pubsub.topics.create","pubsub.topics.publish","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use","source.repos.get","source.repos.list","storage.buckets.create","storage.buckets.get","storage.buckets.list","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Cloud Build Service Agent","roleName":"roles/cloudbuild.serviceAgent","roleDescription":"Gives Cloud Build service account access to managed resources."},"ja":{"roleTitle":"Cloud Build サービス エージェント","roleName":"roles/cloudbuild.serviceAgent","roleDescription":"Cloud Build サービス アカウントにマネージド リソースへのアクセス権を付与します。"}},"roles/clouddeploy.serviceAgent":{"permissions":["cloudbuild.builds.create","cloudbuild.builds.get","cloudbuild.builds.list","cloudbuild.workerpools.use","iam.serviceAccounts.actAs","logging.logEntries.create","pubsub.topics.get","pubsub.topics.publish","servicemanagement.services.report","serviceusage.services.use","storage.buckets.create","storage.buckets.get"],"en":{"roleTitle":"Cloud Deploy Service Agent","roleName":"roles/clouddeploy.serviceAgent","roleDescription":"Gives Cloud Deploy Service Account access to managed resources."},"ja":{"roleTitle":"Cloud Deploy サービス エージェント","roleName":"roles/clouddeploy.serviceAgent","roleDescription":"Cloud Deploy サービス アカウントに、マネージド リソースに対するアクセス権を付与します。"}},"roles/cloudfunctions.serviceAgent":{"permissions":["artifactregistry.*","clientauthconfig.clients.list","cloudbuild.builds.create","cloudbuild.builds.get","cloudbuild.builds.list","cloudbuild.builds.update","cloudbuild.workerpools.use","cloudfunctions.functions.invoke","compute.globalOperations.get","compute.networks.access","eventarc.locations.*","eventarc.operations.*","eventarc.triggers.create","eventarc.triggers.delete","eventarc.triggers.get","eventarc.triggers.getIamPolicy","eventarc.triggers.list","eventarc.triggers.undelete","eventarc.triggers.update","firebasedatabase.instances.get","firebasedatabase.instances.update","iam.serviceAccounts.actAs","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","iam.serviceAccounts.signBlob","pubsub.subscriptions.*","pubsub.topics.attachSubscription","pubsub.topics.create","pubsub.topics.get","pubsub.topics.list","recommender.locations.*","remotebuildexecution.blobs.get","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.list","run.configurations.*","run.locations.*","run.revisions.*","run.routes.*","run.services.create","run.services.delete","run.services.get","run.services.getIamPolicy","run.services.list","run.services.listEffectiveTags","run.services.listTagBindings","run.services.update","serviceusage.quotas.get","serviceusage.services.disable","serviceusage.services.enable","serviceusage.services.use","source.repos.get","source.repos.list","storage.buckets.create","storage.buckets.delete","storage.buckets.get","storage.buckets.update","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","vpcaccess.connectors.get","vpcaccess.connectors.use"],"en":{"roleTitle":"Cloud Functions Service Agent","roleName":"roles/cloudfunctions.serviceAgent","roleDescription":"Gives Cloud Functions service account access to managed resources."},"ja":{"roleTitle":"Cloud Functions サービス エージェント","roleName":"roles/cloudfunctions.serviceAgent","roleDescription":"Cloud Functions サービス アカウントにマネージド リソースに対するアクセス権を付与します。"}},"roles/cloudiot.serviceAgent":{"permissions":["logging.logEntries.create","pubsub.topics.publish"],"en":{"roleTitle":"Cloud IoT Core Service Agent","roleName":"roles/cloudiot.serviceAgent","roleDescription":"Grants the ability to manage Cloud IoT Core resources, including publishing data to Cloud Pub/Sub and writing device activity logs to Stackdriver. Warning: If this role is removed from the Cloud IoT service account, Cloud IoT Core will be unable to publish data or write device activity logs."},"ja":{"roleTitle":"Cloud IoT Core サービス エージェント","roleName":"roles/cloudiot.serviceAgent","roleDescription":"Cloud IoT Core リソースを管理する権限(Cloud Pub/Sub へのデータの公開、Stackdriver へのデバイス アクティビティ ログの書き込みを含む)を付与します。警告: このロールを Cloud IoT サービス アカウントから削除すると、Cloud IoT Core でデータの公開やデバイス アクティビティ ログの書き込みができなくなります。"}},"roles/cloudkms.serviceAgent":{"permissions":["cloudasset.assets.listCloudkmsCryptoKeys"],"en":{"roleTitle":"Cloud KMS Service Agent","roleName":"roles/cloudkms.serviceAgent","roleDescription":"Gives Cloud KMS service account access to managed resources."},"ja":{"roleTitle":"Cloud KMS サービス エージェント","roleName":"roles/cloudkms.serviceAgent","roleDescription":"Cloud KMS サービス アカウントにマネージド リソースへのアクセス権を付与します。"}},"roles/cloudoptimization.serviceAgent":{"permissions":["storage.buckets.get","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Cloud Optimization Service Agent","roleName":"roles/cloudoptimization.serviceAgent","roleDescription":"Grants Cloud Optimization Service Account access to read and write data in the user project."},"ja":{"roleTitle":"Cloud Optimization サービス エージェント","roleName":"roles/cloudoptimization.serviceAgent","roleDescription":"ユーザーのプロジェクトでデータの読み取りと書き込みを行うためのアクセス権を Cloud Optimization サービス アカウントに付与します。"}},"roles/cloudscheduler.serviceAgent":{"permissions":["iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","logging.logEntries.create","pubsub.topics.publish"],"en":{"roleTitle":"Cloud Scheduler Service Agent","roleName":"roles/cloudscheduler.serviceAgent","roleDescription":"Grants Cloud Scheduler Service Account access to manage resources."},"ja":{"roleTitle":"Cloud Scheduler サービス エージェント","roleName":"roles/cloudscheduler.serviceAgent","roleDescription":"Cloud Scheduler サービス アカウントにリソースを管理するためのアクセス権を付与します。"}},"roles/cloudsql.serviceAgent":{"permissions":["cloudsql.instances.get"],"en":{"roleTitle":"Cloud SQL Service Agent","roleName":"roles/cloudsql.serviceAgent","roleDescription":"Grants Cloud SQL access to services and APIs in the user project"},"ja":{"roleTitle":"Cloud SQL サービス エージェント","roleName":"roles/cloudsql.serviceAgent","roleDescription":"ユーザー プロジェクトのサービスと API に Cloud SQL へのアクセスを許可します。"}},"roles/cloudtasks.serviceAgent":{"permissions":["iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","logging.logEntries.create"],"en":{"roleTitle":"Cloud Tasks Service Agent","roleName":"roles/cloudtasks.serviceAgent","roleDescription":"Grants Cloud Tasks Service Account access to manage resources."},"ja":{"roleTitle":"Cloud Tasks サービス エージェント","roleName":"roles/cloudtasks.serviceAgent","roleDescription":"Cloud Tasks サービス アカウントにリソースを管理するためのアクセス権を付与します。"}},"roles/cloudtpu.serviceAgent":{"permissions":["compute.acceleratorTypes.*","compute.addresses.*","compute.autoscalers.*","compute.backendBuckets.*","compute.backendServices.*","compute.diskTypes.*","compute.disks.*","compute.externalVpnGateways.*","compute.firewallPolicies.get","compute.firewallPolicies.list","compute.firewallPolicies.use","compute.firewalls.*","compute.forwardingRules.*","compute.globalAddresses.*","compute.globalForwardingRules.*","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.delete","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.globalPublicDelegatedPrefixes.update","compute.globalPublicDelegatedPrefixes.updatePolicy","compute.healthChecks.*","compute.httpHealthChecks.*","compute.httpsHealthChecks.*","compute.images.*","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.interconnectAttachments.*","compute.interconnectLocations.*","compute.interconnects.*","compute.licenseCodes.*","compute.licenses.*","compute.machineImages.*","compute.machineTypes.*","compute.networkEndpointGroups.*","compute.networks.*","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.projects.setCommonInstanceMetadata","compute.publicDelegatedPrefixes.delete","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.publicDelegatedPrefixes.update","compute.publicDelegatedPrefixes.updatePolicy","compute.regionBackendServices.*","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.list","compute.regionFirewallPolicies.use","compute.regionHealthCheckServices.*","compute.regionHealthChecks.*","compute.regionNetworkEndpointGroups.*","compute.regionNotificationEndpoints.*","compute.regionOperations.get","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.*","compute.regionTargetHttpsProxies.*","compute.regionUrlMaps.*","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.*","compute.routers.*","compute.routes.*","compute.securityPolicies.get","compute.securityPolicies.list","compute.securityPolicies.use","compute.serviceAttachments.*","compute.snapshots.*","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.*","compute.subnetworks.*","compute.targetGrpcProxies.*","compute.targetHttpProxies.*","compute.targetHttpsProxies.*","compute.targetInstances.*","compute.targetPools.*","compute.targetSslProxies.*","compute.targetTcpProxies.*","compute.targetVpnGateways.*","compute.urlMaps.*","compute.vpnGateways.*","compute.vpnTunnels.*","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","iam.serviceAccounts.actAs","iam.serviceAccounts.get","iam.serviceAccounts.list","logging.logEntries.create","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create","networkconnectivity.locations.*","networkconnectivity.operations.*","networksecurity.*","networkservices.*","pubsub.*","resourcemanager.projects.get","resourcemanager.projects.list","servicedirectory.namespaces.create","servicedirectory.namespaces.delete","servicedirectory.services.create","servicedirectory.services.delete","servicenetworking.operations.get","servicenetworking.services.addPeering","servicenetworking.services.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","trafficdirector.*"],"en":{"roleTitle":"Cloud TPU V2 API Service Agent","roleName":"roles/cloudtpu.serviceAgent","roleDescription":"Give Cloud TPUs service account access to managed resources"},"ja":{"roleTitle":"Cloud TPU V2 API サービス エージェント","roleName":"roles/cloudtpu.serviceAgent","roleDescription":"Cloud TPU サービス アカウントにマネージド リソースへのアクセス権を付与します。"}},"roles/cloudtranslate.serviceAgent":{"permissions":["storage.buckets.get","storage.objects.create","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Cloud Translation API Service Agent","roleName":"roles/cloudtranslate.serviceAgent","roleDescription":"Gives Cloud Translation Service Account access to consumer resources."},"ja":{"roleTitle":"Cloud Translation API サービス エージェント","roleName":"roles/cloudtranslate.serviceAgent","roleDescription":"Cloud Translation サービス アカウントに、顧客のリソースへのアクセス権を付与します。"}},"roles/compliancescanning.ServiceAgent":{"permissions":["artifactregistry.dockerimages.*","artifactregistry.files.*","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.versions.get","artifactregistry.versions.list","compute.images.get","compute.images.list","compute.images.useReadOnly","compute.instances.get","compute.instances.getGuestAttributes","compute.instances.list","compute.zones.*","containeranalysis.notes.attachOccurrence","containeranalysis.notes.create","containeranalysis.notes.delete","containeranalysis.notes.get","containeranalysis.notes.list","containeranalysis.notes.update","containeranalysis.occurrences.create","containeranalysis.occurrences.delete","containeranalysis.occurrences.get","containeranalysis.occurrences.list","containeranalysis.occurrences.update","resourcemanager.projects.get","resourcemanager.projects.list","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Compliance Scanning Service Agent","roleName":"roles/compliancescanning.ServiceAgent","roleDescription":"Gives Compliance Scanning the access it needs to analyze containers and VMs for compliance and create occurrences using the Container Analysis API"},"ja":{"roleTitle":"コンプライアンス スキャン サービス エージェント","roleName":"roles/compliancescanning.ServiceAgent","roleDescription":"コンプライアンスのために Container Analysis API を使用してコンテナと VM を分析し、オカレンスを作成するため、コンプライアンス スキャンにコンテナと VM へのアクセス権を付与します。"}},"roles/composer.serviceAgent":{"permissions":["appengine.applications.get","appengine.applications.update","appengine.instances.*","appengine.operations.*","appengine.runtimes.*","appengine.services.*","appengine.versions.create","appengine.versions.delete","appengine.versions.get","appengine.versions.list","appengine.versions.update","artifactregistry.repositories.create","artifactregistry.repositories.delete","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.update","cloudnotifications.*","cloudsql.*","compute.acceleratorTypes.*","compute.addresses.*","compute.autoscalers.*","compute.backendBuckets.*","compute.backendServices.*","compute.diskTypes.*","compute.disks.*","compute.externalVpnGateways.*","compute.firewallPolicies.get","compute.firewallPolicies.list","compute.firewallPolicies.use","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.*","compute.globalAddresses.*","compute.globalForwardingRules.*","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.delete","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.globalPublicDelegatedPrefixes.update","compute.globalPublicDelegatedPrefixes.updatePolicy","compute.healthChecks.*","compute.httpHealthChecks.*","compute.httpsHealthChecks.*","compute.images.*","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.interconnectAttachments.*","compute.interconnectLocations.*","compute.interconnects.*","compute.licenseCodes.*","compute.licenses.*","compute.machineImages.*","compute.machineTypes.*","compute.networkEndpointGroups.*","compute.networks.*","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.projects.setCommonInstanceMetadata","compute.publicDelegatedPrefixes.delete","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.publicDelegatedPrefixes.update","compute.publicDelegatedPrefixes.updatePolicy","compute.regionBackendServices.*","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.list","compute.regionFirewallPolicies.use","compute.regionHealthCheckServices.*","compute.regionHealthChecks.*","compute.regionNetworkEndpointGroups.*","compute.regionNotificationEndpoints.*","compute.regionOperations.get","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.*","compute.regionTargetHttpsProxies.*","compute.regionUrlMaps.*","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.*","compute.routers.*","compute.routes.*","compute.securityPolicies.get","compute.securityPolicies.list","compute.securityPolicies.use","compute.serviceAttachments.*","compute.snapshots.*","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.*","compute.subnetworks.*","compute.targetGrpcProxies.*","compute.targetHttpProxies.*","compute.targetHttpsProxies.*","compute.targetInstances.*","compute.targetPools.*","compute.targetSslProxies.*","compute.targetTcpProxies.*","compute.targetVpnGateways.*","compute.urlMaps.*","compute.vpnGateways.*","compute.vpnTunnels.*","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","container.*","deploymentmanager.compositeTypes.*","deploymentmanager.deployments.cancelPreview","deploymentmanager.deployments.create","deploymentmanager.deployments.delete","deploymentmanager.deployments.get","deploymentmanager.deployments.list","deploymentmanager.deployments.stop","deploymentmanager.deployments.update","deploymentmanager.manifests.*","deploymentmanager.operations.*","deploymentmanager.resources.*","deploymentmanager.typeProviders.*","deploymentmanager.types.*","firebase.projects.get","iam.serviceAccounts.actAs","iam.serviceAccounts.get","iam.serviceAccounts.list","logging.buckets.create","logging.buckets.delete","logging.buckets.get","logging.buckets.list","logging.buckets.undelete","logging.buckets.update","logging.cmekSettings.*","logging.exclusions.*","logging.locations.*","logging.logEntries.create","logging.logMetrics.*","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.notificationRules.*","logging.operations.*","logging.sinks.*","logging.views.create","logging.views.delete","logging.views.get","logging.views.list","logging.views.update","monitoring.alertPolicies.get","monitoring.alertPolicies.list","monitoring.dashboards.get","monitoring.dashboards.list","monitoring.groups.get","monitoring.groups.list","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.notificationChannelDescriptors.*","monitoring.notificationChannels.get","monitoring.notificationChannels.list","monitoring.publicWidgets.get","monitoring.publicWidgets.list","monitoring.services.get","monitoring.services.list","monitoring.slos.get","monitoring.slos.list","monitoring.timeSeries.*","monitoring.uptimeCheckConfigs.get","monitoring.uptimeCheckConfigs.list","networkconnectivity.locations.*","networkconnectivity.operations.*","networksecurity.*","networkservices.*","opsconfigmonitoring.resourceMetadata.list","orgpolicy.policy.get","pubsub.*","recommender.cloudsqlIdleInstanceRecommendations.*","recommender.cloudsqlInstanceActivityInsights.*","recommender.cloudsqlInstanceCpuUsageInsights.*","recommender.cloudsqlInstanceDiskUsageTrendInsights.*","recommender.cloudsqlInstanceMemoryUsageInsights.*","recommender.cloudsqlInstanceOutOfDiskRecommendations.*","recommender.cloudsqlOverprovisionedInstanceRecommendations.*","resourcemanager.projects.get","resourcemanager.projects.list","servicedirectory.namespaces.create","servicedirectory.namespaces.delete","servicedirectory.services.create","servicedirectory.services.delete","servicenetworking.operations.get","servicenetworking.services.addPeering","servicenetworking.services.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","stackdriver.projects.get","storage.buckets.*","storage.multipartUploads.*","storage.objects.*","trafficdirector.*"],"en":{"roleTitle":"Cloud Composer API Service Agent","roleName":"roles/composer.serviceAgent","roleDescription":"Cloud Composer API service agent can manage environments."},"ja":{"roleTitle":"Cloud Composer API サービス エージェント","roleName":"roles/composer.serviceAgent","roleDescription":"Cloud Composer API サービス エージェントは環境を管理できます。"}},"roles/compute.serviceAgent":{"permissions":["cloudnotifications.*","compute.instanceGroupManagers.get","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","iam.serviceAccounts.signJwt","logging.logEntries.create","monitoring.alertPolicies.get","monitoring.alertPolicies.list","monitoring.dashboards.get","monitoring.dashboards.list","monitoring.groups.get","monitoring.groups.list","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.notificationChannelDescriptors.*","monitoring.notificationChannels.get","monitoring.notificationChannels.list","monitoring.publicWidgets.get","monitoring.publicWidgets.list","monitoring.services.get","monitoring.services.list","monitoring.slos.get","monitoring.slos.list","monitoring.timeSeries.list","monitoring.uptimeCheckConfigs.get","monitoring.uptimeCheckConfigs.list","opsconfigmonitoring.resourceMetadata.list","resourcemanager.projects.get","resourcemanager.projects.list","stackdriver.projects.get"],"en":{"roleTitle":"Compute Engine Service Agent","roleName":"roles/compute.serviceAgent","roleDescription":"Gives Compute Engine Service Account access to assert service account authority. Includes access to service accounts."},"ja":{"roleTitle":"Compute Engine サービス エージェント","roleName":"roles/compute.serviceAgent","roleDescription":"Compute Engine サービス アカウントにサービス アカウント権限を表明するためのアクセス権を付与します。サービス アカウントに対するアクセス権を含みます。"}},"roles/contactcenterinsights.serviceAgent":{"permissions":["bigquery.datasets.create","bigquery.datasets.get","bigquery.jobs.create","bigquery.jobs.get","bigquery.tables.create","bigquery.tables.get","bigquery.tables.update","bigquery.tables.updateData","datalabeling.dataitems.*","datalabeling.datasets.create","datalabeling.datasets.delete","datalabeling.datasets.export","datalabeling.datasets.get","datalabeling.datasets.import","datalabeling.operations.get","datalabeling.operations.list","dialogflow.conversationDatasets.*","dialogflow.conversationModels.*","dialogflow.documents.*","dialogflow.operations.*","dialogflow.participants.suggest","dialogflow.sessions.detectIntent","pubsub.topics.get","pubsub.topics.publish","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Contact Center AI Insights Service Agent","roleName":"roles/contactcenterinsights.serviceAgent","roleDescription":"Allows Contact Center AI to read and write APIs including BigQuery, Dialogflow, and Storage."},"ja":{"roleTitle":"Contact Center AI Insights サービス エージェント","roleName":"roles/contactcenterinsights.serviceAgent","roleDescription":"Contact Center AI に BigQuery、Dialogflow、Storage などの API の読み取りと書き込みを許可します。"}},"roles/container.serviceAgent":{"permissions":["bigquery.datasets.create","bigquery.datasets.get","bigquery.tables.create","bigquery.tables.get","bigquery.tables.update","bigquery.tables.updateData","binaryauthorization.policy.evaluatePolicy","certificatemanager.certmapentries.create","certificatemanager.certmapentries.delete","certificatemanager.certmapentries.get","certificatemanager.certmapentries.getIamPolicy","certificatemanager.certmapentries.list","certificatemanager.certmapentries.update","certificatemanager.certmaps.create","certificatemanager.certmaps.delete","certificatemanager.certmaps.get","certificatemanager.certmaps.getIamPolicy","certificatemanager.certmaps.list","certificatemanager.certmaps.update","certificatemanager.certmaps.use","certificatemanager.certs.create","certificatemanager.certs.delete","certificatemanager.certs.get","certificatemanager.certs.getIamPolicy","certificatemanager.certs.list","certificatemanager.certs.update","certificatemanager.certs.use","certificatemanager.dnsauthorizations.create","certificatemanager.dnsauthorizations.delete","certificatemanager.dnsauthorizations.get","certificatemanager.dnsauthorizations.getIamPolicy","certificatemanager.dnsauthorizations.list","certificatemanager.dnsauthorizations.update","certificatemanager.dnsauthorizations.use","compute.acceleratorTypes.*","compute.addresses.*","compute.autoscalers.*","compute.backendBuckets.*","compute.backendServices.*","compute.diskTypes.*","compute.disks.*","compute.externalVpnGateways.*","compute.firewallPolicies.*","compute.firewalls.*","compute.forwardingRules.*","compute.globalAddresses.*","compute.globalForwardingRules.*","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.delete","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.globalPublicDelegatedPrefixes.update","compute.globalPublicDelegatedPrefixes.updatePolicy","compute.healthChecks.*","compute.httpHealthChecks.*","compute.httpsHealthChecks.*","compute.images.*","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.interconnectAttachments.*","compute.interconnectLocations.*","compute.interconnects.*","compute.licenseCodes.*","compute.licenses.*","compute.machineImages.*","compute.machineTypes.*","compute.networkEndpointGroups.*","compute.networks.*","compute.nodeGroups.get","compute.packetMirrorings.*","compute.projects.get","compute.projects.setCommonInstanceMetadata","compute.publicDelegatedPrefixes.delete","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.publicDelegatedPrefixes.update","compute.publicDelegatedPrefixes.updatePolicy","compute.regionBackendServices.*","compute.regionFirewallPolicies.*","compute.regionHealthCheckServices.*","compute.regionHealthChecks.*","compute.regionNetworkEndpointGroups.*","compute.regionNotificationEndpoints.*","compute.regionOperations.get","compute.regionOperations.list","compute.regionSslCertificates.*","compute.regionTargetHttpProxies.*","compute.regionTargetHttpsProxies.*","compute.regionUrlMaps.*","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.*","compute.routers.*","compute.routes.*","compute.securityPolicies.*","compute.serviceAttachments.*","compute.snapshots.*","compute.sslCertificates.*","compute.sslPolicies.*","compute.subnetworks.*","compute.targetGrpcProxies.*","compute.targetHttpProxies.*","compute.targetHttpsProxies.*","compute.targetInstances.*","compute.targetPools.*","compute.targetSslProxies.*","compute.targetTcpProxies.*","compute.targetVpnGateways.*","compute.urlMaps.*","compute.vpnGateways.*","compute.vpnTunnels.*","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","container.*","dns.changes.*","dns.dnsKeys.*","dns.managedZoneOperations.*","dns.managedZones.*","dns.networks.*","dns.policies.create","dns.policies.delete","dns.policies.get","dns.policies.list","dns.policies.update","dns.projects.*","dns.resourceRecordSets.*","dns.responsePolicies.*","dns.responsePolicyRules.*","file.*","iam.serviceAccounts.actAs","iam.serviceAccounts.get","logging.logEntries.create","meshconfig.projects.get","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.timeSeries.*","networkconnectivity.locations.*","networkconnectivity.operations.*","networksecurity.*","networkservices.*","pubsub.topics.create","pubsub.topics.get","pubsub.topics.publish","resourcemanager.projects.get","resourcemanager.projects.list","servicedirectory.namespaces.create","servicedirectory.namespaces.delete","servicedirectory.services.create","servicedirectory.services.delete","servicenetworking.operations.get","servicenetworking.services.addPeering","servicenetworking.services.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","tpu.locations.*","tpu.nodes.create","tpu.nodes.delete","tpu.nodes.get","tpu.nodes.list","tpu.operations.*","trafficdirector.*"],"en":{"roleTitle":"Kubernetes Engine Service Agent","roleName":"roles/container.serviceAgent","roleDescription":"Gives Kubernetes Engine account access to manage cluster resources. Includes access to service accounts."},"ja":{"roleTitle":"Kubernetes Engine サービス エージェント","roleName":"roles/container.serviceAgent","roleDescription":"Kubernetes Engine アカウントに、クラスタ リソースを管理するためのアクセス権を付与します。サービス アカウントへのアクセス権を含みます。"}},"roles/containeranalysis.ServiceAgent":{"permissions":["artifactregistry.dockerimages.*","artifactregistry.files.*","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.versions.get","artifactregistry.versions.list","containeranalysis.occurrences.create","containeranalysis.occurrences.delete","containeranalysis.occurrences.get","containeranalysis.occurrences.list","containeranalysis.occurrences.update","pubsub.schemas.attach","pubsub.schemas.create","pubsub.schemas.delete","pubsub.schemas.get","pubsub.schemas.list","pubsub.schemas.validate","pubsub.snapshots.create","pubsub.snapshots.delete","pubsub.snapshots.get","pubsub.snapshots.list","pubsub.snapshots.seek","pubsub.snapshots.update","pubsub.subscriptions.consume","pubsub.subscriptions.create","pubsub.subscriptions.delete","pubsub.subscriptions.get","pubsub.subscriptions.list","pubsub.subscriptions.update","pubsub.topics.attachSubscription","pubsub.topics.create","pubsub.topics.delete","pubsub.topics.detachSubscription","pubsub.topics.get","pubsub.topics.list","pubsub.topics.publish","pubsub.topics.update","pubsub.topics.updateTag","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Container Analysis Service Agent","roleName":"roles/containeranalysis.ServiceAgent","roleDescription":"Gives Container Analysis API the access it needs to function"},"ja":{"roleTitle":"Container Analysis サービス エージェント","roleName":"roles/containeranalysis.ServiceAgent","roleDescription":"Container Analysis API に、動作に必要となるアクセス権を付与します。"}},"roles/containerregistry.ServiceAgent":{"permissions":["pubsub.topics.publish","storage.objects.get","storage.objects.getIamPolicy","storage.objects.list"],"en":{"roleTitle":"Container Registry Service Agent","roleName":"roles/containerregistry.ServiceAgent","roleDescription":"Access for Container Registry"},"ja":{"roleTitle":"Container Registry サービス エージェント","roleName":"roles/containerregistry.ServiceAgent","roleDescription":"Container Registry のアクセス権"}},"roles/containerscanning.ServiceAgent":{"permissions":["artifactregistry.dockerimages.*","artifactregistry.files.*","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.versions.get","artifactregistry.versions.list","containeranalysis.occurrences.create","containeranalysis.occurrences.delete","containeranalysis.occurrences.get","containeranalysis.occurrences.list","containeranalysis.occurrences.update","resourcemanager.projects.get","resourcemanager.projects.list","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Container Scanner Service Agent","roleName":"roles/containerscanning.ServiceAgent","roleDescription":"Gives Container Scanner the access it needs to analyze containers for vulnerabilities and create occurrences using the Container Analysis API"},"ja":{"roleTitle":"Container Scanner サービス エージェント","roleName":"roles/containerscanning.ServiceAgent","roleDescription":"Container Scanner に、Container Analysis API を使用して脆弱性がないかコンテナを分析して、オカレンスを作成するために必要なアクセス権を付与します。"}},"roles/containerthreatdetection.serviceAgent":{"permissions":["container.apiServices.get","container.apiServices.getStatus","container.apiServices.list","container.auditSinks.get","container.auditSinks.list","container.backendConfigs.get","container.backendConfigs.list","container.bindings.get","container.bindings.list","container.certificateSigningRequests.get","container.certificateSigningRequests.getStatus","container.certificateSigningRequests.list","container.clusterRoleBindings.*","container.clusterRoles.bind","container.clusterRoles.create","container.clusterRoles.delete","container.clusterRoles.get","container.clusterRoles.list","container.clusterRoles.update","container.clusters.get","container.clusters.list","container.componentStatuses.*","container.configMaps.get","container.configMaps.list","container.controllerRevisions.get","container.controllerRevisions.list","container.cronJobs.get","container.cronJobs.getStatus","container.cronJobs.list","container.csiDrivers.get","container.csiDrivers.list","container.csiNodeInfos.get","container.csiNodeInfos.list","container.csiNodes.get","container.csiNodes.list","container.customResourceDefinitions.get","container.customResourceDefinitions.getStatus","container.customResourceDefinitions.list","container.daemonSets.*","container.deployments.get","container.deployments.getScale","container.deployments.getStatus","container.deployments.list","container.endpointSlices.get","container.endpointSlices.list","container.endpoints.get","container.endpoints.list","container.events.get","container.events.list","container.frontendConfigs.get","container.frontendConfigs.list","container.horizontalPodAutoscalers.get","container.horizontalPodAutoscalers.getStatus","container.horizontalPodAutoscalers.list","container.ingresses.get","container.ingresses.getStatus","container.ingresses.list","container.initializerConfigurations.get","container.initializerConfigurations.list","container.jobs.get","container.jobs.getStatus","container.jobs.list","container.leases.get","container.leases.list","container.limitRanges.get","container.limitRanges.list","container.managedCertificates.get","container.managedCertificates.list","container.mutatingWebhookConfigurations.get","container.mutatingWebhookConfigurations.list","container.namespaces.get","container.namespaces.getStatus","container.namespaces.list","container.networkPolicies.get","container.networkPolicies.list","container.networkPolicies.update","container.nodes.get","container.nodes.getStatus","container.nodes.list","container.operations.*","container.persistentVolumeClaims.get","container.persistentVolumeClaims.getStatus","container.persistentVolumeClaims.list","container.persistentVolumes.get","container.persistentVolumes.getStatus","container.persistentVolumes.list","container.petSets.get","container.petSets.list","container.podDisruptionBudgets.get","container.podDisruptionBudgets.getStatus","container.podDisruptionBudgets.list","container.podPresets.get","container.podPresets.list","container.podSecurityPolicies.get","container.podSecurityPolicies.list","container.podTemplates.get","container.podTemplates.list","container.pods.attach","container.pods.create","container.pods.delete","container.pods.exec","container.pods.get","container.pods.getLogs","container.pods.getStatus","container.pods.list","container.pods.portForward","container.pods.update","container.priorityClasses.get","container.priorityClasses.list","container.replicaSets.get","container.replicaSets.getScale","container.replicaSets.getStatus","container.replicaSets.list","container.replicationControllers.get","container.replicationControllers.getScale","container.replicationControllers.getStatus","container.replicationControllers.list","container.resourceQuotas.get","container.resourceQuotas.getStatus","container.resourceQuotas.list","container.roleBindings.*","container.roles.get","container.roles.list","container.runtimeClasses.get","container.runtimeClasses.list","container.scheduledJobs.get","container.scheduledJobs.list","container.secrets.create","container.secrets.delete","container.secrets.list","container.secrets.update","container.serviceAccounts.create","container.serviceAccounts.delete","container.serviceAccounts.get","container.serviceAccounts.list","container.serviceAccounts.update","container.services.get","container.services.getStatus","container.services.list","container.statefulSets.get","container.statefulSets.getScale","container.statefulSets.getStatus","container.statefulSets.list","container.storageClasses.get","container.storageClasses.list","container.storageStates.get","container.storageStates.getStatus","container.storageStates.list","container.storageVersionMigrations.get","container.storageVersionMigrations.getStatus","container.storageVersionMigrations.list","container.thirdPartyObjects.get","container.thirdPartyObjects.list","container.thirdPartyResources.get","container.thirdPartyResources.list","container.tokenReviews.*","container.updateInfos.get","container.updateInfos.list","container.validatingWebhookConfigurations.get","container.validatingWebhookConfigurations.list","container.volumeAttachments.get","container.volumeAttachments.getStatus","container.volumeAttachments.list","container.volumeSnapshotClasses.get","container.volumeSnapshotClasses.list","container.volumeSnapshotContents.get","container.volumeSnapshotContents.getStatus","container.volumeSnapshotContents.list","container.volumeSnapshots.get","container.volumeSnapshots.list","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Container Threat Detection Service Agent","roleName":"roles/containerthreatdetection.serviceAgent","roleDescription":"Gives Container Threat Detection service account access to enable/disable Container Threat Detection and manage the Container Threat Detection Agent on Google Kubernetes Engine clusters."},"ja":{"roleTitle":"Container Threat Detection サービス エージェント","roleName":"roles/containerthreatdetection.serviceAgent","roleDescription":"Container Threat Detection を有効または無効にして Google Kubernetes Engine クラスタ上の Container Threat Detection エージェントを管理するためのアクセス権を Container Threat Detection サービス アカウントに付与します。"}},"roles/contentwarehouse.serviceAgent":{"permissions":["cloudfunctions.functions.invoke","pubsub.topics.publish","pubsublite.topics.publish","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Content Warehouse Service Agent","roleName":"roles/contentwarehouse.serviceAgent","roleDescription":"Gives the Content Warehouse service account to manage customer resources"},"ja":{"roleTitle":"Content Warehouse サービス エージェント","roleName":"roles/contentwarehouse.serviceAgent","roleDescription":"Content Warehouse サービス アカウントにお客様のリソースに対する管理権限を付与します。"}},"roles/dataconnectors.serviceAgent":{"permissions":["compute.globalOperations.get","compute.networks.access","vpcaccess.connectors.get","vpcaccess.connectors.use"],"en":{"roleTitle":"Data Connectors Service Agent","roleName":"roles/dataconnectors.serviceAgent","roleDescription":"Gives Data Connectors service agent permission to access the virtual private cloud"},"ja":{"roleTitle":"Data Connectors サービス エージェント","roleName":"roles/dataconnectors.serviceAgent","roleDescription":"Data Connectors サービス エージェントに Virtual Private Cloud にアクセスするための権限を付与します"}},"roles/dataflow.serviceAgent":{"permissions":["bigquery.bireservations.*","bigquery.capacityCommitments.*","bigquery.config.*","bigquery.connections.*","bigquery.dataPolicies.*","bigquery.datasets.*","bigquery.jobs.*","bigquery.models.*","bigquery.readsessions.*","bigquery.reservationAssignments.*","bigquery.reservations.*","bigquery.routines.*","bigquery.rowAccessPolicies.create","bigquery.rowAccessPolicies.delete","bigquery.rowAccessPolicies.getIamPolicy","bigquery.rowAccessPolicies.list","bigquery.rowAccessPolicies.overrideTimeTravelRestrictions","bigquery.rowAccessPolicies.setIamPolicy","bigquery.rowAccessPolicies.update","bigquery.savedqueries.*","bigquery.tables.*","bigquery.transfers.*","bigquerymigration.translation.*","clouddebugger.breakpoints.list","clouddebugger.breakpoints.listActive","clouddebugger.breakpoints.update","clouddebugger.debuggees.create","cloudnotifications.*","compute.acceleratorTypes.*","compute.addresses.*","compute.autoscalers.*","compute.backendBuckets.*","compute.backendServices.*","compute.diskTypes.*","compute.disks.*","compute.externalVpnGateways.*","compute.firewallPolicies.get","compute.firewallPolicies.list","compute.firewallPolicies.use","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.*","compute.globalAddresses.*","compute.globalForwardingRules.*","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.delete","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.globalPublicDelegatedPrefixes.update","compute.globalPublicDelegatedPrefixes.updatePolicy","compute.healthChecks.*","compute.httpHealthChecks.*","compute.httpsHealthChecks.*","compute.images.*","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.interconnectAttachments.*","compute.interconnectLocations.*","compute.interconnects.*","compute.licenseCodes.*","compute.licenses.*","compute.machineImages.*","compute.machineTypes.*","compute.networkEndpointGroups.*","compute.networks.*","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.publicDelegatedPrefixes.delete","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.publicDelegatedPrefixes.update","compute.publicDelegatedPrefixes.updatePolicy","compute.regionBackendServices.*","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.list","compute.regionFirewallPolicies.use","compute.regionHealthCheckServices.*","compute.regionHealthChecks.*","compute.regionNetworkEndpointGroups.*","compute.regionNotificationEndpoints.*","compute.regionOperations.get","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.*","compute.regionTargetHttpsProxies.*","compute.regionUrlMaps.*","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.*","compute.routers.*","compute.routes.*","compute.securityPolicies.get","compute.securityPolicies.list","compute.securityPolicies.use","compute.serviceAttachments.*","compute.snapshots.*","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.*","compute.subnetworks.*","compute.targetGrpcProxies.*","compute.targetHttpProxies.*","compute.targetHttpsProxies.*","compute.targetInstances.*","compute.targetPools.*","compute.targetSslProxies.*","compute.targetTcpProxies.*","compute.targetVpnGateways.*","compute.urlMaps.*","compute.vpnGateways.*","compute.vpnTunnels.*","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","firebase.projects.get","iam.serviceAccounts.actAs","iam.serviceAccounts.get","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.implicitDelegation","iam.serviceAccounts.list","iam.serviceAccounts.signBlob","iam.serviceAccounts.signJwt","logging.buckets.create","logging.buckets.delete","logging.buckets.get","logging.buckets.list","logging.buckets.undelete","logging.buckets.update","logging.cmekSettings.*","logging.exclusions.*","logging.locations.*","logging.logEntries.create","logging.logMetrics.*","logging.logServiceIndexes.*","logging.logServices.*","logging.logs.list","logging.notificationRules.*","logging.operations.*","logging.sinks.*","logging.views.create","logging.views.delete","logging.views.get","logging.views.list","logging.views.update","monitoring.alertPolicies.get","monitoring.alertPolicies.list","monitoring.dashboards.get","monitoring.dashboards.list","monitoring.groups.get","monitoring.groups.list","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.notificationChannelDescriptors.*","monitoring.notificationChannels.get","monitoring.notificationChannels.list","monitoring.publicWidgets.get","monitoring.publicWidgets.list","monitoring.services.get","monitoring.services.list","monitoring.slos.get","monitoring.slos.list","monitoring.timeSeries.*","monitoring.uptimeCheckConfigs.get","monitoring.uptimeCheckConfigs.list","networkconnectivity.locations.*","networkconnectivity.operations.*","networksecurity.*","networkservices.*","opsconfigmonitoring.resourceMetadata.list","orgpolicy.policy.get","pubsub.*","resourcemanager.projects.get","resourcemanager.projects.list","servicedirectory.namespaces.create","servicedirectory.namespaces.delete","servicedirectory.services.create","servicedirectory.services.delete","servicenetworking.operations.get","servicenetworking.services.addPeering","servicenetworking.services.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","stackdriver.projects.get","storage.buckets.*","storage.multipartUploads.*","storage.objects.*","trafficdirector.*"],"en":{"roleTitle":"Cloud Dataflow Service Agent","roleName":"roles/dataflow.serviceAgent","roleDescription":"Gives Cloud Dataflow service account access to managed resources. Includes access to service accounts."},"ja":{"roleTitle":"Cloud Dataflow サービス エージェント","roleName":"roles/dataflow.serviceAgent","roleDescription":"Cloud Dataflow サービス アカウントに、マネージド リソースに対するアクセス権を付与します。サービス アカウントへのアクセスを含みます。"}},"roles/dataform.serviceAgent":{"permissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Dataform Service Agent","roleName":"roles/dataform.serviceAgent","roleDescription":"Gives permission for the Dataform API to access a secret from Secret Manager"},"ja":{"roleTitle":"Dataform サービス エージェント","roleName":"roles/dataform.serviceAgent","roleDescription":"Dataform API が Secret Manager のシークレットにアクセスするための権限を付与します"}},"roles/datafusion.serviceAgent":{"permissions":["bigquery.config.get","bigquery.dataPolicies.*","bigquery.datasets.*","bigquery.jobs.create","bigquery.models.*","bigquery.routines.*","bigquery.rowAccessPolicies.create","bigquery.rowAccessPolicies.delete","bigquery.rowAccessPolicies.getIamPolicy","bigquery.rowAccessPolicies.list","bigquery.rowAccessPolicies.setIamPolicy","bigquery.rowAccessPolicies.update","bigquery.tables.*","bigtable.*","compute.acceleratorTypes.*","compute.addresses.get","compute.addresses.list","compute.autoscalers.get","compute.autoscalers.list","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.list","compute.disks.listTagBindings","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalOperations.get","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.listTagBindings","compute.instanceGroupManagers.get","compute.instanceGroupManagers.list","compute.instanceGroups.get","compute.instanceGroups.list","compute.instances.get","compute.instances.getGuestAttributes","compute.instances.getScreenshot","compute.instances.getSerialPortOutput","compute.instances.list","compute.instances.listReferrers","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.machineTypes.*","compute.networks.addPeering","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.networks.removePeering","compute.networks.update","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.regionBackendServices.get","compute.regionBackendServices.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regions.*","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.listTagBindings","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.list","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zones.*","dataproc.autoscalingPolicies.create","dataproc.autoscalingPolicies.delete","dataproc.autoscalingPolicies.get","dataproc.autoscalingPolicies.list","dataproc.autoscalingPolicies.update","dataproc.autoscalingPolicies.use","dataproc.batches.*","dataproc.clusters.create","dataproc.clusters.delete","dataproc.clusters.get","dataproc.clusters.list","dataproc.clusters.start","dataproc.clusters.stop","dataproc.clusters.update","dataproc.clusters.use","dataproc.jobs.cancel","dataproc.jobs.create","dataproc.jobs.delete","dataproc.jobs.get","dataproc.jobs.list","dataproc.jobs.update","dataproc.operations.cancel","dataproc.operations.delete","dataproc.operations.get","dataproc.operations.list","dataproc.workflowTemplates.create","dataproc.workflowTemplates.delete","dataproc.workflowTemplates.get","dataproc.workflowTemplates.instantiate","dataproc.workflowTemplates.instantiateInline","dataproc.workflowTemplates.list","dataproc.workflowTemplates.update","dns.managedZones.create","dns.managedZones.delete","dns.managedZones.get","dns.managedZones.list","dns.networks.bindPrivateDNSZone","dns.networks.targetWithPeeringZone","firebase.projects.get","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.*","networkconnectivity.locations.*","networkconnectivity.operations.get","networkconnectivity.operations.list","networksecurity.authorizationPolicies.get","networksecurity.authorizationPolicies.list","networksecurity.clientTlsPolicies.get","networksecurity.clientTlsPolicies.list","networksecurity.locations.*","networksecurity.operations.get","networksecurity.operations.list","networksecurity.serverTlsPolicies.get","networksecurity.serverTlsPolicies.list","networkservices.endpointConfigSelectors.get","networkservices.endpointConfigSelectors.list","networkservices.endpointPolicies.get","networkservices.endpointPolicies.list","networkservices.gateways.get","networkservices.gateways.list","networkservices.grpcRoutes.get","networkservices.grpcRoutes.list","networkservices.httpFilters.get","networkservices.httpFilters.list","networkservices.httpRoutes.get","networkservices.httpRoutes.list","networkservices.httpfilters.get","networkservices.httpfilters.list","networkservices.locations.*","networkservices.meshes.get","networkservices.meshes.list","networkservices.operations.get","networkservices.operations.list","networkservices.serviceBindings.get","networkservices.serviceBindings.list","networkservices.tcpRoutes.get","networkservices.tcpRoutes.list","orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","servicenetworking.services.get","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","spanner.databaseOperations.*","spanner.databases.beginOrRollbackReadWriteTransaction","spanner.databases.beginPartitionedDmlTransaction","spanner.databases.beginReadOnlyTransaction","spanner.databases.getDdl","spanner.databases.list","spanner.databases.partitionQuery","spanner.databases.partitionRead","spanner.databases.read","spanner.databases.select","spanner.databases.updateDdl","spanner.databases.write","spanner.instanceConfigs.*","spanner.instances.get","spanner.instances.list","spanner.sessions.*","storage.buckets.*","storage.multipartUploads.*","storage.objects.*","trafficdirector.*"],"en":{"roleTitle":"Cloud Data Fusion API Service Agent","roleName":"roles/datafusion.serviceAgent","roleDescription":"Gives Cloud Data Fusion service account access to Service Networking, Cloud Dataproc, Cloud Storage, BigQuery, Cloud Spanner, and Cloud Bigtable resources."},"ja":{"roleTitle":"Cloud Data Fusion API サービス エージェント","roleName":"roles/datafusion.serviceAgent","roleDescription":"Cloud Data Fusion サービス アカウントに、Service Networking、Cloud Dataproc、Cloud Storage、BigQuery、Cloud Spanner、Cloud Bigtable の各リソースに対するアクセス権を付与します。"}},"roles/datalabeling.serviceAgent":{"permissions":["automl.annotationSpecs.*","automl.annotations.*","automl.columnSpecs.*","automl.datasets.create","automl.datasets.delete","automl.datasets.export","automl.datasets.get","automl.datasets.import","automl.datasets.list","automl.datasets.update","automl.examples.*","automl.humanAnnotationTasks.*","automl.locations.get","automl.locations.list","automl.modelEvaluations.*","automl.models.create","automl.models.delete","automl.models.deploy","automl.models.export","automl.models.get","automl.models.list","automl.models.predict","automl.models.undeploy","automl.operations.*","automl.tableSpecs.*","bigquery.datasets.create","bigquery.datasets.get","bigquery.jobs.create","bigquery.jobs.get","bigquery.tables.create","bigquery.tables.get","bigquery.tables.getData","ml.jobs.create","ml.jobs.get","ml.jobs.getIamPolicy","ml.jobs.list","ml.locations.*","ml.models.*","ml.operations.get","ml.operations.list","ml.projects.*","ml.studies.*","ml.trials.*","ml.versions.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.list","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Data Labeling Service Agent","roleName":"roles/datalabeling.serviceAgent","roleDescription":"Gives Data Labeling service account read/write access to Cloud Storage, read/write BigQuery, update CMLE model versions, editor access to Annotation service and AutoML service."},"ja":{"roleTitle":"Data Labeling Service エージェント","roleName":"roles/datalabeling.serviceAgent","roleDescription":"Data Labeling サービス アカウントに、Cloud Storage に対する読み取り / 書き込みアクセス権、BigQuery に対する読み取り / 書き込み、CMLE モデル バージョンの更新、アノテーション サービスと AutoML サービスに対する編集アクセス権を付与します。"}},"roles/datapipelines.serviceAgent":{"permissions":["appengine.applications.get","cloudscheduler.*","compute.machineTypes.get","compute.projects.get","compute.regions.list","compute.zones.list","dataflow.jobs.*","dataflow.messages.*","dataflow.metrics.*","dataflow.snapshots.*","firebase.projects.get","iam.serviceAccounts.actAs","iam.serviceAccounts.get","iam.serviceAccounts.list","orgpolicy.policy.get","recommender.dataflowDiagnosticsInsights.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.get","serviceusage.services.list","storage.buckets.*","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Datapipelines Service Agent","roleName":"roles/datapipelines.serviceAgent","roleDescription":"Gives Datapipelines service permissions to create Dataflow & Cloud Scheduler jobs in the user project."},"ja":{"roleTitle":"Datapipelines サービス エージェント","roleName":"roles/datapipelines.serviceAgent","roleDescription":"ユーザー プロジェクト内に Dataflow ジョブと Cloud Scheduler ジョブを作成する権限を Datapipelines サービスに付与します。"}},"roles/dataplex.serviceAgent":{"permissions":["bigquery.bireservations.*","bigquery.capacityCommitments.*","bigquery.config.*","bigquery.connections.*","bigquery.dataPolicies.*","bigquery.datasets.*","bigquery.jobs.*","bigquery.models.*","bigquery.readsessions.*","bigquery.reservationAssignments.*","bigquery.reservations.*","bigquery.routines.*","bigquery.rowAccessPolicies.create","bigquery.rowAccessPolicies.delete","bigquery.rowAccessPolicies.getIamPolicy","bigquery.rowAccessPolicies.list","bigquery.rowAccessPolicies.overrideTimeTravelRestrictions","bigquery.rowAccessPolicies.setIamPolicy","bigquery.rowAccessPolicies.update","bigquery.savedqueries.*","bigquery.tables.*","bigquery.transfers.*","bigquerymigration.translation.*","dataplex.assets.getIamPolicy","dataplex.environments.get","dataplex.lakes.get","dataplex.lakes.getIamPolicy","dataplex.zones.getIamPolicy","dataproc.autoscalingPolicies.create","dataproc.batches.cancel","dataproc.batches.create","dataproc.batches.get","dataproc.jobs.delete","dataproc.jobs.get","dataproc.operations.cancel","dataproc.operations.get","dataproc.operations.list","dataproc.workflowTemplates.instantiateInline","firebase.projects.get","iam.serviceAccounts.actAs","logging.logEntries.create","metastore.services.get","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create","orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","servicemanagement.services.report","serviceusage.services.use","storage.buckets.*","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Cloud Dataplex Service Agent","roleName":"roles/dataplex.serviceAgent","roleDescription":"Gives the Dataplex service account access to project resources. This access will be used in data discovery, data management and data workload management."},"ja":{"roleTitle":"Cloud Dataplex サービス エージェント","roleName":"roles/dataplex.serviceAgent","roleDescription":"Dataplex サービス アカウントに、プロジェクト リソースに対するアクセス権を付与します。このアクセス権は、データの検出、データ管理、データ ワークロード管理で使用されます。"}},"roles/dataprep.serviceAgent":{"permissions":["bigquery.bireservations.get","bigquery.capacityCommitments.get","bigquery.capacityCommitments.list","bigquery.config.get","bigquery.datasets.create","bigquery.datasets.get","bigquery.datasets.getIamPolicy","bigquery.datasets.updateTag","bigquery.jobs.create","bigquery.jobs.list","bigquery.models.*","bigquery.readsessions.*","bigquery.reservationAssignments.list","bigquery.reservationAssignments.search","bigquery.reservations.get","bigquery.reservations.list","bigquery.routines.*","bigquery.savedqueries.get","bigquery.savedqueries.list","bigquery.tables.create","bigquery.tables.createIndex","bigquery.tables.createSnapshot","bigquery.tables.delete","bigquery.tables.deleteIndex","bigquery.tables.export","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.getIamPolicy","bigquery.tables.list","bigquery.tables.restoreSnapshot","bigquery.tables.update","bigquery.tables.updateData","bigquery.tables.updateTag","bigquery.transfers.get","bigquerymigration.translation.*","compute.acceleratorTypes.*","compute.addresses.get","compute.addresses.list","compute.autoscalers.get","compute.autoscalers.list","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.getIamPolicy","compute.backendServices.list","compute.commitments.get","compute.commitments.list","compute.diskTypes.*","compute.disks.get","compute.disks.getIamPolicy","compute.disks.list","compute.disks.listTagBindings","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewallPolicies.get","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.get","compute.globalNetworkEndpointGroups.list","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.get","compute.images.getFromFamily","compute.images.getIamPolicy","compute.images.list","compute.images.listTagBindings","compute.instanceGroupManagers.get","compute.instanceGroupManagers.list","compute.instanceGroups.get","compute.instanceGroups.list","compute.instanceTemplates.get","compute.instanceTemplates.getIamPolicy","compute.instanceTemplates.list","compute.instances.get","compute.instances.getEffectiveFirewalls","compute.instances.getGuestAttributes","compute.instances.getIamPolicy","compute.instances.getScreenshot","compute.instances.getSerialPortOutput","compute.instances.getShieldedInstanceIdentity","compute.instances.getShieldedVmIdentity","compute.instances.list","compute.instances.listReferrers","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.get","compute.licenseCodes.getIamPolicy","compute.licenseCodes.list","compute.licenses.get","compute.licenses.getIamPolicy","compute.licenses.list","compute.machineImages.get","compute.machineImages.getIamPolicy","compute.machineImages.list","compute.machineTypes.*","compute.maintenancePolicies.get","compute.maintenancePolicies.getIamPolicy","compute.maintenancePolicies.list","compute.networkEndpointGroups.get","compute.networkEndpointGroups.getIamPolicy","compute.networkEndpointGroups.list","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.nodeGroups.get","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeTemplates.get","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTypes.*","compute.organizations.listAssociations","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.publicAdvertisedPrefixes.get","compute.publicAdvertisedPrefixes.list","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.regionBackendServices.get","compute.regionBackendServices.getIamPolicy","compute.regionBackendServices.list","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.getIamPolicy","compute.regionFirewallPolicies.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.get","compute.regionNetworkEndpointGroups.list","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regionUrlMaps.validate","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.get","compute.resourcePolicies.list","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.securityPolicies.get","compute.securityPolicies.getIamPolicy","compute.securityPolicies.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.get","compute.snapshots.getIamPolicy","compute.snapshots.list","compute.snapshots.listTagBindings","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.getIamPolicy","compute.subnetworks.list","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.urlMaps.validate","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.getIamPolicy","compute.zoneOperations.list","compute.zones.*","dataflow.jobs.*","dataflow.messages.*","dataflow.metrics.*","dataflow.snapshots.*","iam.serviceAccounts.actAs","iam.serviceAccounts.get","iam.serviceAccounts.list","orgpolicy.policy.get","recommender.dataflowDiagnosticsInsights.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.buckets.get","storage.buckets.list","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Dataprep Service Agent","roleName":"roles/dataprep.serviceAgent","roleDescription":"Dataprep service identity. Includes access to service accounts."},"ja":{"roleTitle":"Dataprep サービス エージェント","roleName":"roles/dataprep.serviceAgent","roleDescription":"Dataprep サービス ID。サービス アカウントへのアクセスを含みます。"}},"roles/dataproc.serviceAgent":{"permissions":["compute.acceleratorTypes.*","compute.addresses.createInternal","compute.addresses.deleteInternal","compute.addresses.get","compute.addresses.list","compute.addresses.use","compute.addresses.useInternal","compute.autoscalers.*","compute.diskTypes.*","compute.disks.create","compute.disks.createSnapshot","compute.disks.delete","compute.disks.get","compute.disks.list","compute.disks.resize","compute.disks.setLabels","compute.disks.update","compute.disks.use","compute.disks.useReadOnly","compute.firewalls.get","compute.firewalls.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalAddresses.use","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.list","compute.images.get","compute.images.getFromFamily","compute.images.list","compute.images.useReadOnly","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.licenses.get","compute.licenses.list","compute.machineImages.*","compute.machineTypes.*","compute.networkEndpointGroups.*","compute.networks.get","compute.networks.list","compute.networks.use","compute.networks.useExternalIp","compute.nodeGroups.get","compute.nodeTypes.get","compute.projects.get","compute.regionNetworkEndpointGroups.*","compute.regionOperations.get","compute.regionOperations.list","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.targetPools.get","compute.targetPools.list","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","container.clusterRoleBindings.*","container.clusterRoles.*","container.clusters.get","container.clusters.update","container.customResourceDefinitions.create","container.customResourceDefinitions.delete","container.customResourceDefinitions.get","container.customResourceDefinitions.list","container.customResourceDefinitions.update","container.namespaces.create","container.namespaces.delete","container.namespaces.get","container.namespaces.list","container.namespaces.update","container.operations.get","container.roleBindings.*","container.roles.bind","container.roles.escalate","dataproc.autoscalingPolicies.create","dataproc.autoscalingPolicies.delete","dataproc.autoscalingPolicies.get","dataproc.autoscalingPolicies.getIamPolicy","dataproc.autoscalingPolicies.list","dataproc.autoscalingPolicies.update","dataproc.autoscalingPolicies.use","dataproc.clusters.*","dataproc.jobs.*","firebase.projects.get","iam.serviceAccounts.actAs","metastore.services.get","orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","storage.buckets.*","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Dataproc Service Agent","roleName":"roles/dataproc.serviceAgent","roleDescription":"Gives Dataproc Service Account access to service accounts, compute resources, storage resources, and kubernetes resources. Includes access to service accounts."},"ja":{"roleTitle":"Dataproc サービス エージェント","roleName":"roles/dataproc.serviceAgent","roleDescription":"Dataproc サービス アカウントに、サービス アカウント、コンピューティング リソース、ストレージ リソース、Kubernetes リソースに対するアクセス権を付与します。サービス アカウントへのアクセスを含みます。"}},"roles/datastudio.serviceAgent":{"permissions":["bigquery.jobs.create"],"en":{"roleTitle":"Data Studio Service Agent","roleName":"roles/datastudio.serviceAgent","roleDescription":"Grants Data Studio Service Account access to manage resources."},"ja":{"roleTitle":"データポータル サービス エージェント","roleName":"roles/datastudio.serviceAgent","roleDescription":"データポータル サービス アカウントにリソースを管理するためのアクセス権を付与します。"}},"roles/dialogflow.serviceAgent":{"permissions":["cloudfunctions.functions.invoke","dialogflow.agents.export","dialogflow.agents.get","dialogflow.agents.list","dialogflow.agents.search","dialogflow.agents.searchResources","dialogflow.answerrecords.get","dialogflow.answerrecords.list","dialogflow.callMatchers.list","dialogflow.changelogs.*","dialogflow.contexts.*","dialogflow.conversationDatasets.get","dialogflow.conversationDatasets.list","dialogflow.conversationModels.get","dialogflow.conversationModels.list","dialogflow.conversationProfiles.get","dialogflow.conversationProfiles.list","dialogflow.conversations.*","dialogflow.documents.get","dialogflow.documents.list","dialogflow.entityTypes.get","dialogflow.entityTypes.list","dialogflow.environments.get","dialogflow.environments.list","dialogflow.flows.get","dialogflow.flows.list","dialogflow.fulfillments.get","dialogflow.integrations.get","dialogflow.integrations.list","dialogflow.intents.get","dialogflow.intents.list","dialogflow.knowledgeBases.get","dialogflow.knowledgeBases.list","dialogflow.messages.*","dialogflow.modelEvaluations.*","dialogflow.operations.*","dialogflow.pages.get","dialogflow.pages.list","dialogflow.participants.*","dialogflow.phoneNumberOrders.get","dialogflow.phoneNumberOrders.list","dialogflow.phoneNumbers.list","dialogflow.securitySettings.get","dialogflow.securitySettings.list","dialogflow.sessionEntityTypes.*","dialogflow.sessions.*","dialogflow.smartMessagingEntries.get","dialogflow.smartMessagingEntries.list","dialogflow.transitionRouteGroups.get","dialogflow.transitionRouteGroups.list","dialogflow.versions.get","dialogflow.versions.list","dialogflow.webhooks.get","dialogflow.webhooks.list","dlp.deidentifyTemplates.get","dlp.deidentifyTemplates.list","dlp.inspectTemplates.get","dlp.inspectTemplates.list","logging.logEntries.create","pubsub.topics.publish","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.use","speech.adaptations.*","speech.customClasses.get","speech.customClasses.list","speech.phraseSets.get","speech.phraseSets.list","storage.objects.create","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Dialogflow Service Agent","roleName":"roles/dialogflow.serviceAgent","roleDescription":"Gives Dialogflow Service Account access to resources on behalf of user project for intent detection in integrations (Facebook Messenger, Slack, Telephony, etc.)."},"ja":{"roleTitle":"Dialogflow サービス エージェント","roleName":"roles/dialogflow.serviceAgent","roleDescription":"Facebook Messenger、Slack、Telephony などの統合を集中的に検出するために、ユーザー プロジェクトに代わって Dialogflow サービス アカウントがリソースにアクセスできるようにします。"}},"roles/dlp.serviceAgent":{"permissions":["appengine.applications.get","bigquery.config.get","bigquery.dataPolicies.*","bigquery.datasets.*","bigquery.jobs.create","bigquery.jobs.get","bigquery.jobs.update","bigquery.models.*","bigquery.readsessions.*","bigquery.routines.*","bigquery.rowAccessPolicies.create","bigquery.rowAccessPolicies.delete","bigquery.rowAccessPolicies.getIamPolicy","bigquery.rowAccessPolicies.list","bigquery.rowAccessPolicies.setIamPolicy","bigquery.rowAccessPolicies.update","bigquery.tables.*","cloudasset.assets.analyzeIamPolicy","cloudasset.assets.exportResource","cloudkms.cryptoKeyVersions.useToDecrypt","cloudkms.locations.get","cloudkms.locations.list","datacatalog.categories.fineGrainedGet","datacatalog.tagTemplates.*","datastore.databases.get","datastore.databases.getMetadata","datastore.entities.*","datastore.indexes.list","datastore.namespaces.get","datastore.namespaces.list","datastore.statistics.*","dlp.analyzeRiskTemplates.get","dlp.analyzeRiskTemplates.list","dlp.deidentifyTemplates.get","dlp.deidentifyTemplates.list","dlp.inspectTemplates.get","dlp.inspectTemplates.list","dlp.jobs.*","dlp.kms.*","firebase.projects.get","orgpolicy.policy.get","pubsub.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","serviceusage.services.use","storage.buckets.*","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"DLP API Service Agent","roleName":"roles/dlp.serviceAgent","roleDescription":"Gives the Cloud DLP API service agent permissions for BigQuery, Cloud Storage, Datastore, Pub/Sub, and Cloud KMS."},"ja":{"roleTitle":"DLP API サービス エージェント","roleName":"roles/dlp.serviceAgent","roleDescription":"BigQuery、Cloud Storage、Datastore、Pub/Sub、Cloud KMS への権限を Cloud DLP API サービス エージェントに付与します。"}},"roles/documentaicore.serviceAgent":{"permissions":["automl.models.predict","storage.buckets.get","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"DocumentAI Core Service Agent","roleName":"roles/documentaicore.serviceAgent","roleDescription":"Gives DocumentAI Core Service Account access to consumer resources."},"ja":{"roleTitle":"DocumentAI コアサービス エージェント","roleName":"roles/documentaicore.serviceAgent","roleDescription":"DocumentAI コアサービス アカウントに、顧客のリソースに対するアクセス権を付与します。"}},"roles/endpoints.serviceAgent":{"permissions":["servicemanagement.services.check","servicemanagement.services.get","servicemanagement.services.quota","servicemanagement.services.report"],"en":{"roleTitle":"Cloud Endpoints Service Agent","roleName":"roles/endpoints.serviceAgent","roleDescription":"Gives the Cloud Endpoints service account access to Endpoints services and the ability to act as a service controller."},"ja":{"roleTitle":"Cloud Endpoints サービス エージェント","roleName":"roles/endpoints.serviceAgent","roleDescription":"Cloud Endpoints サービス アカウントに、Endpoints サービスへのアクセス権と、サービス コントローラとして操作する権限を付与します。"}},"roles/endpointsportal.serviceAgent":{"permissions":["servicemanagement.services.get","servicemanagement.services.list","source.repos.get"],"en":{"roleTitle":"Endpoints Portal Service Agent","roleName":"roles/endpointsportal.serviceAgent","roleDescription":"Can access information about Endpoints services for consumer portal management, and can read Source Repositories for consumer portal custom content."},"ja":{"roleTitle":"Endpoints Portal サービス エージェント","roleName":"roles/endpointsportal.serviceAgent","roleDescription":"ユーザー ポータルの管理のために Endpoints サービスに関する情報にアクセスして、ユーザー ポータルのカスタム コンテンツに対するソース リポジトリを読み取ることができます。"}},"roles/enterpriseknowledgegraph.serviceAgent":{"permissions":["bigquery.config.get","bigquery.datasets.create","bigquery.datasets.get","bigquery.jobs.create","bigquery.readsessions.create","bigquery.readsessions.getData","bigquery.tables.create","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.list","bigquery.tables.update","bigquery.tables.updateData","resourcemanager.projects.get","resourcemanager.projects.list","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Enterprise Knowledge Graph Service Agent","roleName":"roles/enterpriseknowledgegraph.serviceAgent","roleDescription":"Gives Enterprise Knowledge Graph Service Account access to consumer resources."},"ja":{"roleTitle":"Enterprise Knowledge Graph サービス エージェント","roleName":"roles/enterpriseknowledgegraph.serviceAgent","roleDescription":"Enterprise Knowledge Graph サービス アカウントに、顧客のリソースへのアクセス権を付与します。"}},"roles/eventarc.serviceAgent":{"permissions":["compute.instanceGroupManagers.get","container.clusters.get","container.deployments.create","container.deployments.delete","container.deployments.get","container.deployments.list","container.deployments.update","container.namespaces.create","container.namespaces.delete","container.namespaces.get","container.namespaces.list","container.serviceAccounts.create","container.serviceAccounts.delete","container.serviceAccounts.get","container.serviceAccounts.list","container.services.get","container.services.list","iam.serviceAccounts.actAs","iam.serviceAccounts.getAccessToken","monitoring.timeSeries.create","pubsub.subscriptions.consume","pubsub.subscriptions.create","pubsub.subscriptions.delete","pubsub.subscriptions.get","pubsub.subscriptions.list","pubsub.subscriptions.update","pubsub.topics.attachSubscription","pubsub.topics.create","pubsub.topics.delete","pubsub.topics.get","pubsub.topics.list","pubsub.topics.publish","pubsub.topics.update","run.services.get","serviceusage.services.use","storage.buckets.get","storage.buckets.update","workflows.workflows.get"],"en":{"roleTitle":"Eventarc Service Agent","roleName":"roles/eventarc.serviceAgent","roleDescription":"Gives Eventarc service account access to managed resources."},"ja":{"roleTitle":"Eventarc サービス エージェント","roleName":"roles/eventarc.serviceAgent","roleDescription":"Eventarc サービス アカウントにマネージド リソースに対するアクセス権を付与します。"}},"roles/file.serviceAgent":{"permissions":["compute.globalOperations.get","compute.networks.addPeering","compute.networks.get","compute.networks.removePeering","compute.networks.update","compute.networks.updatePeering","compute.routes.list","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Filestore Service Agent","roleName":"roles/file.serviceAgent","roleDescription":"Gives Cloud Filestore service account access to managed resources."},"ja":{"roleTitle":"Cloud Filestore サービス エージェント","roleName":"roles/file.serviceAgent","roleDescription":"Cloud Filestore サービス アカウントにマネージド リソースへのアクセス権を付与します。"}},"roles/firebase.appDistributionSdkServiceAgent":{"permissions":["firebaseappdistro.*"],"en":{"roleTitle":"Firebase App Distribution Admin SDK Service Agent","roleName":"roles/firebase.appDistributionSdkServiceAgent","roleDescription":"Read and write access to Firebase App Distribution with the Admin SDK"},"ja":{"roleTitle":"Firebase App Distribution Admin SDK サービス エージェント","roleName":"roles/firebase.appDistributionSdkServiceAgent","roleDescription":"Admin SDK による Firebase App Distribution への読み取り / 書き込みアクセス権"}},"roles/firebase.managementServiceAgent":{"permissions":["apikeys.keys.create","apikeys.keys.get","apikeys.keys.list","apikeys.keys.update","appengine.applications.*","appengine.operations.get","appengine.services.list","clientauthconfig.brands.create","clientauthconfig.brands.update","clientauthconfig.clients.create","clientauthconfig.clients.getWithSecret","clientauthconfig.clients.list","clientauthconfig.clients.update","firebase.clients.create","firebase.clients.delete","firebase.clients.get","firebase.projects.*","firebaseauth.configs.create","firebaseauth.configs.get","firebaseauth.configs.update","firebaserules.releases.create","firebaserules.releases.delete","firebaserules.releases.get","firebaserules.rulesets.create","iam.roles.get","iam.serviceAccounts.create","iam.serviceAccounts.get","iam.serviceAccounts.list","resourcemanager.organizations.get","resourcemanager.projects.get","resourcemanager.projects.getIamPolicy","resourcemanager.projects.setIamPolicy","resourcemanager.projects.update","servicemanagement.services.bind","serviceusage.services.enable","serviceusage.services.get","serviceusage.services.use","storage.buckets.create","storage.buckets.get","storage.buckets.getIamPolicy","storage.buckets.list","storage.buckets.setIamPolicy"],"en":{"roleTitle":"Firebase Service Management Service Agent","roleName":"roles/firebase.managementServiceAgent","roleDescription":"Access to create new service agents for Firebase projects; assign roles to service agents; provision GCP resources as required by Firebase services."},"ja":{"roleTitle":"Firebase Service Management サービス エージェント","roleName":"roles/firebase.managementServiceAgent","roleDescription":"Firebase プロジェクト用の新しいサービス エージェントを作成するためのアクセス権。サービス エージェントにロールを割り当てます。Firebase サービスの要求に応じて GCP リソースをプロビジョニングします。"}},"roles/firebase.sdkAdminServiceAgent":{"permissions":["appengine.applications.get","cloudconfig.*","cloudmessaging.*","datastore.databases.get","datastore.databases.getMetadata","datastore.databases.list","datastore.entities.*","datastore.indexes.get","datastore.indexes.list","datastore.namespaces.get","datastore.namespaces.list","datastore.statistics.*","firebase.clients.*","firebase.projects.get","firebase.projects.update","firebaseappcheck.*","firebaseauth.configs.create","firebaseauth.configs.get","firebaseauth.configs.update","firebaseauth.users.*","firebasedatabase.*","firebasehosting.*","firebaseml.*","firebasenotifications.*","firebaserules.releases.get","firebaserules.releases.list","firebaserules.releases.update","firebaserules.rulesets.create","firebaserules.rulesets.delete","firebaserules.rulesets.get","firebaserules.rulesets.list","orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","resourcemanager.projects.update","storage.buckets.create","storage.buckets.delete","storage.buckets.get","storage.buckets.list","storage.buckets.update","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"Firebase Admin SDK Administrator Service Agent","roleName":"roles/firebase.sdkAdminServiceAgent","roleDescription":"Read and write access to Firebase products available in the Admin SDK"},"ja":{"roleTitle":"Firebase Admin SDK 管理者サービス エージェント","roleName":"roles/firebase.sdkAdminServiceAgent","roleDescription":"Admin SDK で使用可能な Firebase サービスへの読み取り / 書き込みアクセス権"}},"roles/firebase.sdkProvisioningServiceAgent":{"permissions":["apikeys.keys.list","clientauthconfig.clients.list","cloudmessaging.*","firebase.clients.create","servicemanagement.services.bind","serviceusage.services.enable"],"en":{"roleTitle":"Firebase SDK Provisioning Service Agent","roleName":"roles/firebase.sdkProvisioningServiceAgent","roleDescription":"Access to provision apps with the Admin SDK."},"ja":{"roleTitle":"Firebase SDK プロビジョニング サービス エージェント","roleName":"roles/firebase.sdkProvisioningServiceAgent","roleDescription":"Admin SDK を使用してプロビジョニング アプリにアクセスします。"}},"roles/firebaseappcheck.serviceAgent":{"permissions":["recaptchaenterprise.assessments.*"],"en":{"roleTitle":"Firebase App Check Service Agent","roleName":"roles/firebaseappcheck.serviceAgent","roleDescription":"Grants Firebase App Check Service Account access to consumer app attestation resources, such as reCAPTCHA Enterprise."},"ja":{"roleTitle":"Firebase App Check サービス エージェント","roleName":"roles/firebaseappcheck.serviceAgent","roleDescription":"Firebase App Check サービス アカウントに、reCAPTCHA Enterprise などの、コンシューマ アプリ証明書リソースへのアクセス権を付与します。"}},"roles/firebasemods.serviceAgent":{"permissions":["appengine.applications.get","artifactregistry.packages.delete","cloudfunctions.functions.getIamPolicy","cloudfunctions.functions.setIamPolicy","cloudtasks.locations.*","cloudtasks.queues.*","cloudtasks.tasks.create","cloudtasks.tasks.fullView","deploymentmanager.compositeTypes.*","deploymentmanager.deployments.cancelPreview","deploymentmanager.deployments.create","deploymentmanager.deployments.delete","deploymentmanager.deployments.get","deploymentmanager.deployments.list","deploymentmanager.deployments.stop","deploymentmanager.deployments.update","deploymentmanager.manifests.*","deploymentmanager.operations.*","deploymentmanager.resources.*","deploymentmanager.typeProviders.*","deploymentmanager.types.*","iam.serviceAccounts.create","iam.serviceAccounts.get","iam.serviceAccounts.list","resourcemanager.projects.get","resourcemanager.projects.list","resourcemanager.projects.updateLiens","run.services.getIamPolicy","run.services.setIamPolicy","serviceusage.quotas.get","serviceusage.services.enable","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Firebase Extensions API Service Agent","roleName":"roles/firebasemods.serviceAgent","roleDescription":"Grants Firebase Extensions API Service Account access to manage resources."},"ja":{"roleTitle":"Firebase Extensions API サービス エージェント","roleName":"roles/firebasemods.serviceAgent","roleDescription":"Firebase Extensions API サービス アカウントに、リソースを管理するためのアクセス権を付与します。"}},"roles/firebasestorage.serviceAgent":{"permissions":["storage.buckets.get","storage.buckets.getIamPolicy","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.getIamPolicy","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Cloud Storage for Firebase Service Agent","roleName":"roles/firebasestorage.serviceAgent","roleDescription":"Access to Cloud Storage for Firebase through API and SDK."},"ja":{"roleTitle":"Cloud Storage for Firebase サービス エージェント","roleName":"roles/firebasestorage.serviceAgent","roleDescription":"API と SDK による Cloud Storage for Firebase へのアクセス権。"}},"roles/firestore.serviceAgent":{"permissions":["storage.buckets.get","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list"],"en":{"roleTitle":"Firestore Service Agent","roleName":"roles/firestore.serviceAgent","roleDescription":"Gives Firestore service account access to managed resources."},"ja":{"roleTitle":"Firestore サービス エージェント","roleName":"roles/firestore.serviceAgent","roleDescription":"Firestore サービス アカウントにマネージド リソースへのアクセス権を付与します。"}},"roles/firewallinsights.serviceAgent":{"permissions":["compute.backendServices.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.list","compute.healthChecks.list","compute.httpHealthChecks.list","compute.httpsHealthChecks.list","compute.instanceGroups.list","compute.instances.get","compute.instances.list","compute.networks.getEffectiveFirewalls","compute.networks.list","compute.projects.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.subnetworks.list","compute.targetHttpProxies.list","compute.targetHttpsProxies.list","compute.targetPools.list","compute.targetSslProxies.list","compute.targetTcpProxies.list","compute.targetVpnGateways.list","compute.urlMaps.list","compute.vpnGateways.list","compute.vpnTunnels.list"],"en":{"roleTitle":"Cloud Firewall Insights Service Agent","roleName":"roles/firewallinsights.serviceAgent","roleDescription":"Gives Cloud Firewall Insights service agent permissions to retrieve Firewall, VM and route resources on user behalf."},"ja":{"roleTitle":"Cloud Firewall Insights サービス エージェント","roleName":"roles/firewallinsights.serviceAgent","roleDescription":"ファイアウォール、VM、ルートに関するリソースをユーザーの代理で取得する権限を、Cloud Firewall Insights サービス エージェントに付与します。"}},"roles/fleetengine.serviceAgent":{"permissions":["bigquery.config.get","bigquery.datasets.get","bigquery.jobs.create","bigquery.tables.getData","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"FleetEngine Service Agent","roleName":"roles/fleetengine.serviceAgent","roleDescription":"Grants the FleetEngine Service Account access to manage resources."},"ja":{"roleTitle":"FleetEngine サービス エージェント","roleName":"roles/fleetengine.serviceAgent","roleDescription":"FleetEngine サービス アカウントに、リソースを管理するためのアクセス権を付与します。"}},"roles/gameservices.serviceAgent":{"permissions":["container.apiServices.*","container.auditSinks.*","container.backendConfigs.*","container.bindings.*","container.certificateSigningRequests.create","container.certificateSigningRequests.delete","container.certificateSigningRequests.get","container.certificateSigningRequests.list","container.certificateSigningRequests.update","container.certificateSigningRequests.updateStatus","container.clusterRoleBindings.create","container.clusterRoleBindings.get","container.clusterRoleBindings.list","container.clusterRoleBindings.update","container.clusterRoles.bind","container.clusterRoles.create","container.clusterRoles.escalate","container.clusterRoles.get","container.clusterRoles.list","container.clusterRoles.update","container.clusters.create","container.clusters.delete","container.clusters.get","container.clusters.list","container.clusters.update","container.componentStatuses.*","container.configMaps.*","container.controllerRevisions.get","container.controllerRevisions.list","container.cronJobs.*","container.csiDrivers.*","container.csiNodeInfos.*","container.csiNodes.*","container.customResourceDefinitions.*","container.daemonSets.*","container.deployments.*","container.endpointSlices.*","container.endpoints.*","container.events.*","container.frontendConfigs.*","container.horizontalPodAutoscalers.*","container.ingresses.*","container.initializerConfigurations.*","container.jobs.*","container.leases.*","container.limitRanges.*","container.localSubjectAccessReviews.*","container.managedCertificates.*","container.mutatingWebhookConfigurations.*","container.namespaces.*","container.networkPolicies.*","container.nodes.*","container.operations.*","container.persistentVolumeClaims.*","container.persistentVolumes.*","container.petSets.*","container.podDisruptionBudgets.*","container.podPresets.*","container.podSecurityPolicies.get","container.podSecurityPolicies.list","container.podTemplates.*","container.pods.*","container.priorityClasses.*","container.replicaSets.*","container.replicationControllers.*","container.resourceQuotas.*","container.roleBindings.create","container.roleBindings.get","container.roleBindings.list","container.roles.bind","container.roles.create","container.roles.escalate","container.roles.get","container.roles.list","container.runtimeClasses.*","container.scheduledJobs.*","container.secrets.*","container.selfSubjectAccessReviews.*","container.selfSubjectRulesReviews.*","container.serviceAccounts.*","container.services.*","container.statefulSets.*","container.storageClasses.*","container.storageStates.*","container.storageVersionMigrations.*","container.subjectAccessReviews.*","container.thirdPartyObjects.*","container.thirdPartyResources.*","container.tokenReviews.*","container.updateInfos.*","container.validatingWebhookConfigurations.*","container.volumeAttachments.*","container.volumeSnapshotClasses.*","container.volumeSnapshotContents.*","container.volumeSnapshots.*","gkehub.features.get","gkehub.features.getIamPolicy","gkehub.features.list","gkehub.fleet.get","gkehub.locations.*","gkehub.memberships.generateConnectManifest","gkehub.memberships.get","gkehub.memberships.getIamPolicy","gkehub.memberships.list","gkehub.operations.get","gkehub.operations.list","iam.serviceAccounts.actAs","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Game Services Service Agent","roleName":"roles/gameservices.serviceAgent","roleDescription":"Gives Game Services Service Account access to GCP resources."},"ja":{"roleTitle":"ゲームサービスのサービス エージェント","roleName":"roles/gameservices.serviceAgent","roleDescription":"ゲームサービスのサービス アカウントに GCP リソースへのアクセス権を付与します。"}},"roles/genomics.serviceAgent":{"permissions":["compute.acceleratorTypes.*","compute.addresses.createInternal","compute.addresses.deleteInternal","compute.addresses.get","compute.addresses.list","compute.addresses.use","compute.addresses.useInternal","compute.autoscalers.*","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.list","compute.diskTypes.*","compute.disks.*","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalAddresses.use","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.*","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.*","compute.licenses.*","compute.machineImages.*","compute.machineTypes.*","compute.networkEndpointGroups.*","compute.networks.get","compute.networks.list","compute.networks.use","compute.networks.useExternalIp","compute.projects.get","compute.projects.setCommonInstanceMetadata","compute.regionBackendServices.get","compute.regionBackendServices.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.*","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.*","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.*","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","iam.serviceAccounts.actAs","pubsub.topics.publish","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","serviceusage.services.use"],"en":{"roleTitle":"Genomics Service Agent","roleName":"roles/genomics.serviceAgent","roleDescription":"Gives Genomics Service Account access to compute resources. Includes access to service accounts."},"ja":{"roleTitle":"Genomics サービス エージェント","roleName":"roles/genomics.serviceAgent","roleDescription":"Genomics サービス アカウントに、コンピューティング リソースに対するアクセス権を付与します。サービス アカウントへのアクセスを含みます。"}},"roles/gkebackup.serviceAgent":{"permissions":["compute.disks.create","compute.disks.createSnapshot","compute.disks.get","compute.disks.useReadOnly","compute.globalOperations.get","compute.regionOperations.get","compute.snapshots.delete","compute.snapshots.get","compute.zoneOperations.get","container.apiServices.*","container.auditSinks.*","container.backendConfigs.*","container.bindings.*","container.certificateSigningRequests.create","container.certificateSigningRequests.delete","container.certificateSigningRequests.get","container.certificateSigningRequests.list","container.certificateSigningRequests.update","container.certificateSigningRequests.updateStatus","container.clusterRoleBindings.get","container.clusterRoleBindings.list","container.clusterRoles.get","container.clusterRoles.list","container.clusters.get","container.clusters.list","container.componentStatuses.*","container.configMaps.*","container.controllerRevisions.get","container.controllerRevisions.list","container.cronJobs.*","container.csiDrivers.*","container.csiNodeInfos.*","container.csiNodes.*","container.customResourceDefinitions.*","container.daemonSets.*","container.deployments.*","container.endpointSlices.*","container.endpoints.*","container.events.*","container.frontendConfigs.*","container.horizontalPodAutoscalers.*","container.ingresses.*","container.initializerConfigurations.*","container.jobs.*","container.leases.*","container.limitRanges.*","container.localSubjectAccessReviews.*","container.managedCertificates.*","container.mutatingWebhookConfigurations.get","container.mutatingWebhookConfigurations.list","container.namespaces.*","container.networkPolicies.*","container.nodes.*","container.persistentVolumeClaims.*","container.persistentVolumes.*","container.petSets.*","container.podDisruptionBudgets.*","container.podPresets.*","container.podSecurityPolicies.get","container.podSecurityPolicies.list","container.podTemplates.*","container.pods.*","container.priorityClasses.*","container.replicaSets.*","container.replicationControllers.*","container.resourceQuotas.*","container.roleBindings.get","container.roleBindings.list","container.roles.get","container.roles.list","container.runtimeClasses.*","container.scheduledJobs.*","container.secrets.*","container.selfSubjectAccessReviews.*","container.selfSubjectRulesReviews.*","container.serviceAccounts.*","container.services.*","container.statefulSets.*","container.storageClasses.*","container.storageStates.*","container.storageVersionMigrations.*","container.subjectAccessReviews.*","container.thirdPartyObjects.*","container.thirdPartyResources.*","container.tokenReviews.*","container.updateInfos.*","container.validatingWebhookConfigurations.get","container.validatingWebhookConfigurations.list","container.volumeAttachments.*","container.volumeSnapshotClasses.*","container.volumeSnapshotContents.*","container.volumeSnapshots.*","gkebackup.operations.get","resourcemanager.projects.get","resourcemanager.projects.list","resourcemanager.projects.updateLiens"],"en":{"roleTitle":"Backup for GKE Service Agent","roleName":"roles/gkebackup.serviceAgent","roleDescription":"Grants the Backup for GKE Service Account access to managed resources."},"ja":{"roleTitle":"Backup for GKE サービス エージェント","roleName":"roles/gkebackup.serviceAgent","roleDescription":"Backup for GKE サービス アカウントにマネージド リソースへのアクセス権を付与します。"}},"roles/gkehub.serviceAgent":{"permissions":["container.clusterRoleBindings.*","container.clusterRoles.*","container.clusters.get","container.customResourceDefinitions.create","container.customResourceDefinitions.delete","container.customResourceDefinitions.get","container.customResourceDefinitions.list","container.customResourceDefinitions.update","container.namespaces.get","container.thirdPartyObjects.*","gkehub.features.create","gkehub.features.get","gkehub.features.list","gkehub.fleet.create","gkehub.fleet.get","gkehub.locations.*","gkehub.memberships.create","gkehub.memberships.generateConnectManifest","gkehub.memberships.get","gkehub.memberships.list","gkehub.operations.get","gkemulticloud.awsClusters.get","gkemulticloud.azureClusters.get","gkeonprem.vmwareClusters.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"GKE Hub Service Agent","roleName":"roles/gkehub.serviceAgent","roleDescription":"Gives the GKE Hub service agent access to Cloud Platform resources."},"ja":{"roleTitle":"GKE Hub サービス エージェント","roleName":"roles/gkehub.serviceAgent","roleDescription":"GKE Hub サービス エージェントに Cloud Platform リソースへのアクセス権を付与します。"}},"roles/gkemulticloud.serviceAgent":{"permissions":["gkehub.features.*","gkehub.fleet.*","gkehub.locations.*","gkehub.memberships.*","gkehub.operations.*","gkemulticloud.awsClusters.delete","gkemulticloud.awsNodePools.delete","gkemulticloud.azureClients.delete","gkemulticloud.azureClusters.delete","gkemulticloud.azureNodePools.delete","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Anthos Multi-Cloud Service Agent","roleName":"roles/gkemulticloud.serviceAgent","roleDescription":"Grants the Anthos Multi-Cloud Service Account access to manage resources."},"ja":{"roleTitle":"Anthos マルチクラウド サービス エージェント","roleName":"roles/gkemulticloud.serviceAgent","roleDescription":"Anthos マルチクラウド サービス アカウントに、リソースを管理するためのアクセス権を付与します。"}},"roles/healthcare.serviceAgent":{"permissions":["cloudnotifications.*","monitoring.alertPolicies.get","monitoring.alertPolicies.list","monitoring.dashboards.get","monitoring.dashboards.list","monitoring.groups.get","monitoring.groups.list","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.notificationChannelDescriptors.*","monitoring.notificationChannels.get","monitoring.notificationChannels.list","monitoring.publicWidgets.get","monitoring.publicWidgets.list","monitoring.services.get","monitoring.services.list","monitoring.slos.get","monitoring.slos.list","monitoring.timeSeries.*","monitoring.uptimeCheckConfigs.get","monitoring.uptimeCheckConfigs.list","opsconfigmonitoring.resourceMetadata.list","pubsub.snapshots.seek","pubsub.subscriptions.consume","pubsub.topics.attachSubscription","pubsub.topics.publish","resourcemanager.projects.get","resourcemanager.projects.list","stackdriver.projects.get"],"en":{"roleTitle":"Healthcare Service Agent","roleName":"roles/healthcare.serviceAgent","roleDescription":"Gives the Healthcare Service Account access to networks,Kubernetes engine, and pubsub resources."},"ja":{"roleTitle":"Healthcare サービス エージェント","roleName":"roles/healthcare.serviceAgent","roleDescription":"Healthcare サービス アカウントに、ネットワーク、Kubernetes Engine、pubsub の各リソースへのアクセス権を付与します。"}},"roles/kuberun.eventsControlPlaneServiceAgent":{"permissions":["cloudscheduler.jobs.create","cloudscheduler.jobs.delete","cloudscheduler.jobs.get","logging.sinks.create","logging.sinks.delete","logging.sinks.get","pubsub.subscriptions.create","pubsub.subscriptions.delete","pubsub.subscriptions.get","pubsub.topics.attachSubscription","pubsub.topics.create","pubsub.topics.delete","pubsub.topics.get","pubsub.topics.getIamPolicy","pubsub.topics.setIamPolicy","resourcemanager.projects.get","storage.buckets.get","storage.buckets.update"],"en":{"roleTitle":"KubeRun Events Control Plane Service Agent","roleName":"roles/kuberun.eventsControlPlaneServiceAgent","roleDescription":"Service account role used to setup authentication for the control plane used by KubeRun Events."},"ja":{"roleTitle":"KubeRun イベント コントロール プレーン サービス エージェント","roleName":"roles/kuberun.eventsControlPlaneServiceAgent","roleDescription":"KubeRun イベントによって使用されるコントロール プレーンの認証を設定するために使用されるサービス アカウント ロール。"}},"roles/kuberun.eventsDataPlaneServiceAgent":{"permissions":["cloudtrace.traces.patch","monitoring.timeSeries.create","pubsub.subscriptions.consume","pubsub.subscriptions.get","pubsub.topics.get","pubsub.topics.publish","resourcemanager.projects.get"],"en":{"roleTitle":"KubeRun Events Data Plane Service Agent","roleName":"roles/kuberun.eventsDataPlaneServiceAgent","roleDescription":"Service account role used to setup authentication for the data plane used by KubeRun Events."},"ja":{"roleTitle":"KubeRun イベントデータ プレーン サービス エージェント","roleName":"roles/kuberun.eventsDataPlaneServiceAgent","roleDescription":"KubeRun イベントによって使用されるデータプレーンの認証を設定するために使用されるサービス アカウント ロール。"}},"roles/lifesciences.serviceAgent":{"permissions":["compute.acceleratorTypes.*","compute.addresses.createInternal","compute.addresses.deleteInternal","compute.addresses.get","compute.addresses.list","compute.addresses.use","compute.addresses.useInternal","compute.autoscalers.*","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.list","compute.diskTypes.*","compute.disks.*","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalAddresses.use","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.*","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.*","compute.licenses.*","compute.machineImages.*","compute.machineTypes.*","compute.networkEndpointGroups.*","compute.networks.get","compute.networks.list","compute.networks.use","compute.networks.useExternalIp","compute.projects.get","compute.projects.setCommonInstanceMetadata","compute.regionBackendServices.get","compute.regionBackendServices.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.*","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.*","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.*","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.list","compute.zones.*","iam.serviceAccounts.actAs","pubsub.topics.publish","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list","serviceusage.services.use"],"en":{"roleTitle":"Cloud Life Sciences Service Agent","roleName":"roles/lifesciences.serviceAgent","roleDescription":"Gives Cloud Life Sciences Service Account access to compute resources. Includes access to service accounts."},"ja":{"roleTitle":"Cloud Life Sciences サービス エージェント","roleName":"roles/lifesciences.serviceAgent","roleDescription":"Cloud Life Sciences Service Account にコンピューティング リソースに対するアクセス権を付与します。サービス アカウントへのアクセスを含みます。"}},"roles/livestream.serviceAgent":{"permissions":["storage.objects.create","storage.objects.delete","storage.objects.update"],"en":{"roleTitle":"Live Stream Service Agent","roleName":"roles/livestream.serviceAgent","roleDescription":"Uploads media files to customer Cloud Storage buckets."},"ja":{"roleTitle":"ライブ ストリーム サービス エージェント","roleName":"roles/livestream.serviceAgent","roleDescription":"お客様の Cloud Storage バケットにメディア ファイルをアップロードします。"}},"roles/logging.serviceAgent":{"permissions":["bigquery.datasets.create"],"en":{"roleTitle":"Cloud Logging Service Agent","roleName":"roles/logging.serviceAgent","roleDescription":"Grants a Cloud Logging Service Account the ability to create and link datasets."},"ja":{"roleTitle":"Cloud Logging サービス エージェント","roleName":"roles/logging.serviceAgent","roleDescription":"Cloud Logging サービス アカウントに、データセットを作成してリンクする権限を付与します。"}},"roles/managedidentities.serviceAgent":{"permissions":["compute.globalOperations.get","compute.networks.addPeering","compute.networks.get","compute.networks.removePeering","compute.networks.update","compute.routes.list","dns.changes.*","dns.dnsKeys.*","dns.managedZoneOperations.*","dns.managedZones.*","dns.networks.bindPrivateDNSPolicy","dns.networks.bindPrivateDNSZone","dns.policies.create","dns.policies.delete","dns.policies.get","dns.policies.list","dns.policies.update","dns.projects.*","dns.resourceRecordSets.*","dns.responsePolicies.*","dns.responsePolicyRules.*","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Managed Identities Service Agent","roleName":"roles/managedidentities.serviceAgent","roleDescription":"Gives Managed Identities service account access to managed resources."},"ja":{"roleTitle":"Cloud Managed Identities サービス エージェント","roleName":"roles/managedidentities.serviceAgent","roleDescription":"Managed Identities サービス アカウントに、マネージド リソースに対するアクセス権を付与します。"}},"roles/mediaasset.serviceAgent":{"permissions":["pubsub.topics.get","pubsub.topics.publish","storage.objects.create","storage.objects.delete","storage.objects.get","transcoder.jobs.create","transcoder.jobs.delete","transcoder.jobs.get"],"en":{"roleTitle":"Media Asset Service Agent","roleName":"roles/mediaasset.serviceAgent","roleDescription":"Downloads and uploads media files from and to customer Cloud Storage buckets."},"ja":{"roleTitle":"Media Asset サービス エージェント","roleName":"roles/mediaasset.serviceAgent","roleDescription":"顧客の Cloud Storage バケットとの間でメディア ファイルのダウンロードとアップロードを実行します。"}},"roles/memcache.serviceAgent":{"permissions":["compute.globalOperations.get","compute.networks.addPeering","compute.networks.get","compute.networks.removePeering","compute.networks.update","compute.routes.get","compute.routes.list","compute.subnetworks.get","compute.subnetworks.list","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud Memorystore Memcached Service Agent","roleName":"roles/memcache.serviceAgent","roleDescription":"Gives Cloud Memorystore Memcached service account access to managed resource"},"ja":{"roleTitle":"Cloud Memorystore Memcached サービス エージェント","roleName":"roles/memcache.serviceAgent","roleDescription":"Cloud Memorystore Memcached サービス アカウントにマネージド リソースへのアクセス権を付与します。"}},"roles/meshconfig.serviceAgent":{"permissions":["compute.backendServices.create","compute.backendServices.delete","compute.backendServices.get","compute.backendServices.list","compute.backendServices.setSecurityPolicy","compute.backendServices.update","compute.backendServices.use","compute.firewalls.*","compute.globalForwardingRules.create","compute.globalForwardingRules.delete","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.setLabels","compute.globalForwardingRules.setTarget","compute.globalOperations.get","compute.globalOperations.list","compute.healthChecks.*","compute.networkEndpointGroups.get","compute.networkEndpointGroups.list","compute.networkEndpointGroups.use","compute.networks.get","compute.networks.updatePolicy","compute.networks.use","compute.subnetworks.use","compute.targetHttpProxies.*","compute.targetHttpsProxies.*","compute.targetSslProxies.*","compute.targetTcpProxies.*","compute.urlMaps.*","networksecurity.clientTlsPolicies.create","networksecurity.clientTlsPolicies.delete","networksecurity.clientTlsPolicies.get","networksecurity.clientTlsPolicies.list","networksecurity.clientTlsPolicies.update","networksecurity.serverTlsPolicies.create","networksecurity.serverTlsPolicies.delete","networksecurity.serverTlsPolicies.get","networksecurity.serverTlsPolicies.list","networksecurity.serverTlsPolicies.update","networkservices.endpointConfigSelectors.create","networkservices.endpointConfigSelectors.delete","networkservices.endpointConfigSelectors.get","networkservices.endpointConfigSelectors.list","networkservices.endpointConfigSelectors.update","networkservices.httpFilters.create","networkservices.httpFilters.delete","networkservices.httpFilters.get","networkservices.httpFilters.list","networkservices.httpFilters.update","networkservices.httpfilters.create","networkservices.httpfilters.delete","networkservices.httpfilters.get","networkservices.httpfilters.list","networkservices.httpfilters.update"],"en":{"roleTitle":"Mesh Config Service Agent","roleName":"roles/meshconfig.serviceAgent","roleDescription":"Apply mesh configuration"},"ja":{"roleTitle":"メッシュ構成サービス エージェント","roleName":"roles/meshconfig.serviceAgent","roleDescription":"メッシュ構成を適用します。"}},"roles/meshcontrolplane.serviceAgent":{"permissions":["container.apiServices.*","container.auditSinks.*","container.backendConfigs.*","container.bindings.*","container.certificateSigningRequests.*","container.clusterRoleBindings.*","container.clusterRoles.*","container.clusters.get","container.clusters.getCredentials","container.clusters.list","container.componentStatuses.*","container.configMaps.*","container.controllerRevisions.*","container.cronJobs.*","container.csiDrivers.*","container.csiNodeInfos.*","container.csiNodes.*","container.customResourceDefinitions.*","container.daemonSets.*","container.deployments.*","container.endpointSlices.*","container.endpoints.*","container.events.*","container.frontendConfigs.*","container.horizontalPodAutoscalers.*","container.hostServiceAgent.*","container.ingresses.*","container.initializerConfigurations.*","container.jobs.*","container.leases.*","container.limitRanges.*","container.localSubjectAccessReviews.*","container.managedCertificates.*","container.mutatingWebhookConfigurations.*","container.namespaces.*","container.networkPolicies.*","container.nodes.*","container.operations.*","container.persistentVolumeClaims.*","container.persistentVolumes.*","container.petSets.*","container.podDisruptionBudgets.*","container.podPresets.*","container.podSecurityPolicies.*","container.podTemplates.*","container.pods.*","container.priorityClasses.*","container.replicaSets.*","container.replicationControllers.*","container.resourceQuotas.*","container.roleBindings.*","container.roles.*","container.runtimeClasses.*","container.scheduledJobs.*","container.secrets.*","container.selfSubjectAccessReviews.*","container.selfSubjectRulesReviews.*","container.serviceAccounts.*","container.services.*","container.statefulSets.*","container.storageClasses.*","container.storageStates.*","container.storageVersionMigrations.*","container.subjectAccessReviews.*","container.thirdPartyObjects.*","container.thirdPartyResources.*","container.tokenReviews.*","container.updateInfos.*","container.validatingWebhookConfigurations.*","container.volumeAttachments.*","container.volumeSnapshotClasses.*","container.volumeSnapshotContents.*","container.volumeSnapshots.*","gkehub.features.get","gkehub.features.getIamPolicy","gkehub.features.list","gkehub.fleet.get","gkehub.gateway.*","gkehub.locations.*","gkehub.memberships.generateConnectManifest","gkehub.memberships.get","gkehub.memberships.getIamPolicy","gkehub.memberships.list","gkehub.operations.get","gkehub.operations.list","logging.logEntries.create","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.services.get","serviceusage.services.use"],"en":{"roleTitle":"Mesh Managed Control Plane Service Agent","roleName":"roles/meshcontrolplane.serviceAgent","roleDescription":"Anthos Service Mesh Managed Control Plane Agent"},"ja":{"roleTitle":"Mesh が管理するコントロール プレーン サービス エージェント","roleName":"roles/meshcontrolplane.serviceAgent","roleDescription":"Anthos Service Mesh が管理するコントロール プレーン エージェント"}},"roles/meshdataplane.serviceAgent":{"permissions":["cloudtrace.traces.patch","compute.forwardingRules.get","compute.globalForwardingRules.get","logging.logEntries.create","meshconfig.projects.get","monitoring.metricDescriptors.create","monitoring.metricDescriptors.get","monitoring.metricDescriptors.list","monitoring.monitoredResourceDescriptors.*","monitoring.timeSeries.create","serviceusage.services.use"],"en":{"roleTitle":"Mesh Data Plane Service Agent","roleName":"roles/meshdataplane.serviceAgent","roleDescription":"Run user-space Istio components"},"ja":{"roleTitle":"メッシュ データ プレーン サービス エージェント","roleName":"roles/meshdataplane.serviceAgent","roleDescription":"ユーザー空間 Istio コンポーネントを実行します。"}},"roles/metastore.serviceAgent":{"permissions":["compute.addresses.createInternal","compute.addresses.deleteInternal","compute.addresses.get","compute.addresses.use","compute.forwardingRules.create","compute.forwardingRules.delete","compute.forwardingRules.get","compute.forwardingRules.pscCreate","compute.forwardingRules.pscDelete","compute.globalAddresses.createInternal","compute.globalAddresses.deleteInternal","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalOperations.get","compute.globalOperations.list","compute.networks.addPeering","compute.networks.get","compute.networks.removePeering","compute.networks.updatePeering","compute.networks.use","compute.regionOperations.get","compute.subnetworks.get","compute.subnetworks.use","metastore.databases.setIamPolicy","metastore.services.get","metastore.tables.setIamPolicy","servicedirectory.namespaces.create","servicedirectory.namespaces.delete","servicedirectory.services.create","servicedirectory.services.delete","storage.buckets.create","storage.buckets.delete","storage.buckets.get","storage.buckets.update","storage.objects.create","storage.objects.delete","storage.objects.get","storage.objects.list","storage.objects.update"],"en":{"roleTitle":"Dataproc Metastore Service Agent","roleName":"roles/metastore.serviceAgent","roleDescription":"Gives the Dataproc Metastore service account access to managed resources."},"ja":{"roleTitle":"Dataproc Metastore サービス エージェント","roleName":"roles/metastore.serviceAgent","roleDescription":"Dataproc Metastore サービス アカウントにマネージド リソースに対するアクセス権を付与します。"}},"roles/ml.serviceAgent":{"permissions":["artifactregistry.dockerimages.*","artifactregistry.files.*","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.versions.get","artifactregistry.versions.list","bigquery.datasets.create","bigquery.datasets.get","bigquery.jobs.create","bigquery.jobs.get","bigquery.jobs.list","bigquery.jobs.update","bigquery.tables.create","bigquery.tables.get","bigquery.tables.getData","bigquery.tables.list","bigquery.tables.updateData","firebase.projects.get","iam.serviceAccounts.get","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.getOpenIdToken","iam.serviceAccounts.implicitDelegation","iam.serviceAccounts.list","iam.serviceAccounts.signBlob","iam.serviceAccounts.signJwt","logging.logEntries.create","orgpolicy.policy.get","resourcemanager.projects.get","resourcemanager.projects.list","storage.buckets.*","storage.multipartUploads.*","storage.objects.*"],"en":{"roleTitle":"AI Platform Service Agent","roleName":"roles/ml.serviceAgent","roleDescription":"AI Platform service agent can act as log writer, Cloud Storage admin, Artifact Registry Reader, BigQuery writer, and service account access token creator."},"ja":{"roleTitle":"AI Platform サービス エージェント","roleName":"roles/ml.serviceAgent","roleDescription":"AI Platform サービス エージェントは、ログ書き込み、Cloud Storage 管理者、Artifact Registry 読み取り、BigQuery 書き込み、サービス アカウント アクセス トークン作成者のロールを果たすことができます。"}},"roles/monitoring.notificationServiceAgent":{"permissions":["servicedirectory.networks.access","servicedirectory.services.resolve","serviceusage.services.use"],"en":{"roleTitle":"Monitoring Service Agent","roleName":"roles/monitoring.notificationServiceAgent","roleDescription":"Grants permissions to deliver notifications directly to resources within the target project, such as delivering to Pub/Sub topics within the project."},"ja":{"roleTitle":"Monitoring サービス エージェント","roleName":"roles/monitoring.notificationServiceAgent","roleDescription":"プロジェクト内の Pub/Sub トピックに配信するなど、ターゲット プロジェクト内のリソースに通知を直接配信するための権限を付与します。"}},"roles/multiclusteringress.serviceAgent":{"permissions":["certificatemanager.certmapentries.create","certificatemanager.certmapentries.delete","certificatemanager.certmapentries.get","certificatemanager.certmapentries.getIamPolicy","certificatemanager.certmapentries.list","certificatemanager.certmapentries.update","certificatemanager.certmaps.create","certificatemanager.certmaps.delete","certificatemanager.certmaps.get","certificatemanager.certmaps.getIamPolicy","certificatemanager.certmaps.list","certificatemanager.certmaps.update","certificatemanager.certmaps.use","certificatemanager.certs.create","certificatemanager.certs.delete","certificatemanager.certs.get","certificatemanager.certs.getIamPolicy","certificatemanager.certs.list","certificatemanager.certs.update","certificatemanager.certs.use","certificatemanager.dnsauthorizations.create","certificatemanager.dnsauthorizations.delete","certificatemanager.dnsauthorizations.get","certificatemanager.dnsauthorizations.getIamPolicy","certificatemanager.dnsauthorizations.list","certificatemanager.dnsauthorizations.update","certificatemanager.dnsauthorizations.use","compute.addresses.create","compute.addresses.createInternal","compute.addresses.delete","compute.addresses.deleteInternal","compute.addresses.get","compute.addresses.list","compute.addresses.use","compute.addresses.useInternal","compute.backendServices.*","compute.firewalls.*","compute.forwardingRules.*","compute.globalAddresses.create","compute.globalAddresses.delete","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalAddresses.use","compute.globalForwardingRules.*","compute.healthChecks.*","compute.networkEndpointGroups.get","compute.networkEndpointGroups.use","compute.networks.updatePolicy","compute.networks.use","compute.regionBackendServices.*","compute.regionHealthChecks.*","compute.regionSslCertificates.*","compute.regionTargetHttpProxies.*","compute.regionTargetHttpsProxies.*","compute.regionUrlMaps.*","compute.securityPolicies.use","compute.sslCertificates.*","compute.sslPolicies.use","compute.subnetworks.list","compute.subnetworks.use","compute.targetHttpProxies.*","compute.targetHttpsProxies.*","compute.urlMaps.*","container.backendConfigs.*","container.clusters.get","container.customResourceDefinitions.create","container.customResourceDefinitions.delete","container.customResourceDefinitions.get","container.customResourceDefinitions.update","container.deployments.*","container.events.create","container.events.update","container.frontendConfigs.*","container.namespaces.list","container.secrets.get","container.secrets.list","container.services.*","container.thirdPartyObjects.*","gkehub.features.get","gkehub.locations.*","gkehub.memberships.get","gkehub.memberships.list","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"Multi Cluster Ingress Service Agent","roleName":"roles/multiclusteringress.serviceAgent","roleDescription":"Gives the Multi Cluster Ingress service agent access to CloudPlatform resources."},"ja":{"roleTitle":"マルチクラスタ Ingress サービス エージェント","roleName":"roles/multiclusteringress.serviceAgent","roleDescription":"複数クラスタ Ingress サービス エージェントに Cloud Platform リソースへのアクセス権を付与します。"}},"roles/multiclustermetering.serviceAgent":{"permissions":["gkehub.features.get","gkehub.locations.*","gkehub.memberships.get","gkehub.memberships.list"],"en":{"roleTitle":"Multi-cluster metering Service Agent","roleName":"roles/multiclustermetering.serviceAgent","roleDescription":"Gives the Multi-cluster metering service agent access to CloudPlatform resources."},"ja":{"roleTitle":"Multi-cluster metering サービス エージェント","roleName":"roles/multiclustermetering.serviceAgent","roleDescription":"Multi-cluster metering サービス エージェントに Cloud Platform リソースへのアクセス権を付与します。"}},"roles/networkmanagement.serviceAgent":{"permissions":["cloudsql.instances.get","cloudsql.instances.list","compute.addresses.get","compute.addresses.list","compute.backendServices.get","compute.backendServices.list","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalNetworkEndpointGroups.get","compute.globalNetworkEndpointGroups.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.instanceGroups.get","compute.instanceGroups.list","compute.instances.get","compute.instances.list","compute.networkEndpointGroups.get","compute.networkEndpointGroups.list","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.regionBackendServices.get","compute.regionBackendServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.get","compute.regionNetworkEndpointGroups.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.subnetworks.get","compute.subnetworks.list","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","container.clusters.get","container.clusters.list","container.nodes.get","container.nodes.list"],"en":{"roleTitle":"GCP Network Management Service Agent","roleName":"roles/networkmanagement.serviceAgent","roleDescription":"Grants the GCP Network Management API the authority to complete analysis based on network configurations from Compute Engine and Container Engine."},"ja":{"roleTitle":"GCP Network Management Service エージェント","roleName":"roles/networkmanagement.serviceAgent","roleDescription":"Compute Engine と Container Engine のネットワーク構成に基づいて分析を完了する権限を GCP Network Management API に付与します。"}},"roles/notebooks.serviceAgent":{"permissions":["aiplatform.customJobs.cancel","aiplatform.customJobs.create","aiplatform.customJobs.get","aiplatform.customJobs.list","compute.acceleratorTypes.*","compute.addresses.createInternal","compute.addresses.deleteInternal","compute.addresses.get","compute.addresses.list","compute.addresses.use","compute.addresses.useInternal","compute.autoscalers.*","compute.backendBuckets.get","compute.backendBuckets.list","compute.backendServices.get","compute.backendServices.getIamPolicy","compute.backendServices.list","compute.commitments.get","compute.commitments.list","compute.diskTypes.*","compute.disks.*","compute.externalVpnGateways.get","compute.externalVpnGateways.list","compute.firewallPolicies.get","compute.firewallPolicies.getIamPolicy","compute.firewallPolicies.list","compute.firewalls.get","compute.firewalls.list","compute.forwardingRules.get","compute.forwardingRules.list","compute.globalAddresses.get","compute.globalAddresses.list","compute.globalAddresses.use","compute.globalForwardingRules.get","compute.globalForwardingRules.list","compute.globalForwardingRules.pscGet","compute.globalNetworkEndpointGroups.*","compute.globalOperations.get","compute.globalOperations.getIamPolicy","compute.globalOperations.list","compute.globalPublicDelegatedPrefixes.get","compute.globalPublicDelegatedPrefixes.list","compute.healthChecks.get","compute.healthChecks.list","compute.httpHealthChecks.get","compute.httpHealthChecks.list","compute.httpsHealthChecks.get","compute.httpsHealthChecks.list","compute.images.*","compute.instanceGroupManagers.*","compute.instanceGroups.*","compute.instanceTemplates.*","compute.instances.*","compute.interconnectAttachments.get","compute.interconnectAttachments.list","compute.interconnectLocations.*","compute.interconnects.get","compute.interconnects.list","compute.licenseCodes.*","compute.licenses.*","compute.machineImages.*","compute.machineTypes.*","compute.maintenancePolicies.get","compute.maintenancePolicies.getIamPolicy","compute.maintenancePolicies.list","compute.networkEndpointGroups.*","compute.networks.get","compute.networks.getEffectiveFirewalls","compute.networks.getRegionEffectiveFirewalls","compute.networks.list","compute.networks.listPeeringRoutes","compute.networks.use","compute.networks.useExternalIp","compute.nodeGroups.get","compute.nodeGroups.getIamPolicy","compute.nodeGroups.list","compute.nodeTemplates.get","compute.nodeTemplates.getIamPolicy","compute.nodeTemplates.list","compute.nodeTypes.*","compute.organizations.listAssociations","compute.packetMirrorings.get","compute.packetMirrorings.list","compute.projects.get","compute.projects.setCommonInstanceMetadata","compute.publicAdvertisedPrefixes.get","compute.publicAdvertisedPrefixes.list","compute.publicDelegatedPrefixes.get","compute.publicDelegatedPrefixes.list","compute.regionBackendServices.get","compute.regionBackendServices.getIamPolicy","compute.regionBackendServices.list","compute.regionFirewallPolicies.get","compute.regionFirewallPolicies.getIamPolicy","compute.regionFirewallPolicies.list","compute.regionHealthCheckServices.get","compute.regionHealthCheckServices.list","compute.regionHealthChecks.get","compute.regionHealthChecks.list","compute.regionNetworkEndpointGroups.*","compute.regionNotificationEndpoints.get","compute.regionNotificationEndpoints.list","compute.regionOperations.get","compute.regionOperations.getIamPolicy","compute.regionOperations.list","compute.regionSslCertificates.get","compute.regionSslCertificates.list","compute.regionTargetHttpProxies.get","compute.regionTargetHttpProxies.list","compute.regionTargetHttpsProxies.get","compute.regionTargetHttpsProxies.list","compute.regionUrlMaps.get","compute.regionUrlMaps.list","compute.regionUrlMaps.validate","compute.regions.*","compute.reservations.get","compute.reservations.list","compute.resourcePolicies.*","compute.routers.get","compute.routers.list","compute.routes.get","compute.routes.list","compute.securityPolicies.get","compute.securityPolicies.getIamPolicy","compute.securityPolicies.list","compute.serviceAttachments.get","compute.serviceAttachments.list","compute.snapshots.*","compute.sslCertificates.get","compute.sslCertificates.list","compute.sslPolicies.get","compute.sslPolicies.list","compute.sslPolicies.listAvailableFeatures","compute.subnetworks.get","compute.subnetworks.getIamPolicy","compute.subnetworks.list","compute.subnetworks.use","compute.subnetworks.useExternalIp","compute.targetGrpcProxies.get","compute.targetGrpcProxies.list","compute.targetHttpProxies.get","compute.targetHttpProxies.list","compute.targetHttpsProxies.get","compute.targetHttpsProxies.list","compute.targetInstances.get","compute.targetInstances.list","compute.targetPools.get","compute.targetPools.list","compute.targetSslProxies.get","compute.targetSslProxies.list","compute.targetTcpProxies.get","compute.targetTcpProxies.list","compute.targetVpnGateways.get","compute.targetVpnGateways.list","compute.urlMaps.get","compute.urlMaps.list","compute.urlMaps.validate","compute.vpnGateways.get","compute.vpnGateways.list","compute.vpnTunnels.get","compute.vpnTunnels.list","compute.zoneOperations.get","compute.zoneOperations.getIamPolicy","compute.zoneOperations.list","compute.zones.*","dataproc.clusters.get","dataproc.clusters.use","dataproc.jobs.cancel","dataproc.jobs.create","dataproc.jobs.delete","dataproc.jobs.get","dataproc.jobs.list","dataproc.jobs.update","iam.serviceAccounts.actAs","iam.serviceAccounts.get","iam.serviceAccounts.getAccessToken","iam.serviceAccounts.list","ml.jobs.create","ml.jobs.get","ml.jobs.list","notebooks.*","resourcemanager.projects.get","resourcemanager.projects.list","serviceusage.quotas.get","serviceusage.services.get","serviceusage.services.list"],"en":{"roleTitle":"AI Platform Notebooks Service Agent","roleName":"roles/notebooks.serviceAgent","roleDescription":"Provide access for notebooks service agent to manage notebook instances in user projects"},"ja":{"roleTitle":"AI Platform Notebooks サービス エージェント","roleName":"roles/notebooks.serviceAgent","roleDescription":"ノートブックのサービス エージェントでユーザー プロジェクトのノートブック インスタンスを管理するためのアクセス権を付与します。"}},"roles/osconfig.serviceAgent":{"permissions":["compute.instances.get","compute.instances.getGuestAttributes","compute.instances.list","compute.instances.setMetadata","compute.zones.*","containeranalysis.notes.attachOccurrence","containeranalysis.notes.create","containeranalysis.notes.delete","containeranalysis.notes.get","containeranalysis.notes.list","containeranalysis.notes.update","containeranalysis.occurrences.create","containeranalysis.occurrences.delete","containeranalysis.occurrences.get","containeranalysis.occurrences.list","containeranalysis.occurrences.update","iam.serviceAccounts.actAs","resourcemanager.projects.get","resourcemanager.projects.list"],"en":{"roleTitle":"Cloud OS Config Service Agent","roleName":"roles/osconfig.serviceAgent","roleDescription":"Grants OS Config Service Account access to Google Compute Engine instances."},"ja":{"roleTitle":"Cloud OS C
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment