Cloud Key Management Service roles and permissions Stay organized with collections Save and categorize content based on your preferences.
This page lists the IAM roles and permissions for Cloud Key Management Service. Tosearch through all roles and permissions, see therole andpermission index.
Cloud Key Management Service roles
| Role | Permissions |
|---|---|
Cloud KMS Admin( Provides access to Cloud KMS resources, except for access to restricted resource types and cryptographic operations. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Autokey Admin( Enables management of AutokeyConfig. |
|
Cloud KMS Autokey User( Grants ability to use KeyHandle resources. |
|
Cloud KMS CryptoKey Decrypter( Provides ability to use Cloud KMS resources for decrypt operationsonly. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Decrypter Via Delegation( Enables Decrypt operations via other Google Cloud services Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter( Provides ability to use Cloud KMS resources for encrypt operationsonly. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter/Decrypter( Provides ability to use Cloud KMS resources for encrypt and decryptoperations only. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation( Enables Encrypt and Decrypt operations via other Google Cloud services Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter Via Delegation( Enables Encrypt operations via other Google Cloud services Lowest-level resources where you can grant this role:
|
|
Cloud KMS Crypto Operator( Enables all Crypto Operations. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey DecapsulatorBeta( Enables Decapsulate and GetPublicKey operations |
|
Cloud KMS EkmConnections Admin( Enables management of EkmConnections. |
|
Cloud KMS Expert Raw AES-CBC Key Manager( Enables raw AES-CBC keys management. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Expert Raw AES-CTR Key Manager( Enables raw AES-CTR keys management. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Expert Raw PKCS#1 Key Manager( Enables raw PKCS#1 keys management. Lowest-level resources where you can grant this role:
|
|
Cloud KMS single-tenant HSM Executor( Grants ability to execute SingleTenantHsmInstanceProposal resources. |
|
Cloud KMS single-tenant HSM Key Creator( Grants ability to use single-tenant HSM instances to create keys. This role must be combined with another role that grants the ability to create cryptoKeys. |
|
Cloud KMS single-tenant HSM Proposer( Grants ability to create SingleTenantHsmInstances and SingleTenantHsmInstanceProposals. |
|
Cloud KMS single-tenant HSM Quorum Member( Grants ability to approve SingleTenantHsmInstanceProposal resources. |
|
Cloud KMS Importer( Enables ImportCryptoKeyVersion, CreateImportJob, ListImportJobs, and GetImportJob operations |
|
Key Access Justifications Enrollment ViewerBeta( Grant ability to view Key Access Justification enrollment configs of a project. |
|
Key Access Justifications Policy Config AdminBeta( Grant ability to manage Key Access Justifications Policy at parent resource level. |
|
Cloud KMS Organization Service Agent( Gives Cloud KMS organization-level service account access to managed resources. Warning: Do not grant service agent roles to any principals exceptservice agents. |
|
Cloud KMS Protected Resources Viewer( Enables viewing protected resources. |
|
Cloud KMS CryptoKey Public Key Viewer( Enables GetPublicKey operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS Service Agent( Gives Cloud KMS service account access to managed resources. Warning: Do not grant service agent roles to any principals exceptservice agents. |
|
Cloud KMS CryptoKey Signer( Enables Sign operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Signer/Verifier( Enables Sign, Verify, and GetPublicKey operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Verifier( Enables Verify and GetPublicKey operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS Viewer( Enables Get and List operations. Lowest-level resources where you can grant this role:
|
|
Cloud KMS KACLS Service Agent( Grants Cloud KMS KACLS Service Agent access to KMS resource permissions to perform DEK encryption/decryption. Warning: Do not grant service agent roles to any principals exceptservice agents. |
|
Cloud Key Management Service permissions
| Permission | Included in roles |
|---|---|
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS Autokey Admin ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( |
| Owner ( Editor ( Cloud KMS Admin ( Cloud KMS Autokey Admin ( |
| Owner ( Editor ( Cloud KMS Admin ( |
| Owner ( Cloud KMS Admin ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS Viewer ( Kubernetes Engine KMS Crypto Key User ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Admin ( Security Auditor ( Security Reviewer ( Site Reliability Engineer ( Support User ( |
| Owner ( Cloud KMS Expert Raw AES-CBC Key Manager ( |
| Owner ( Cloud KMS Expert Raw AES-CTR Key Manager ( |
| Owner ( Cloud KMS Expert Raw PKCS#1 Key Manager ( |
| Owner ( Cloud KMS Admin ( |
| Owner ( Editor ( Cloud KMS Admin ( |
| Owner ( Cloud KMS Crypto Operator ( Cloud KMS CryptoKey Decapsulator ( |
| Owner ( Cloud KMS CryptoKey Decrypter ( Cloud KMS CryptoKey Encrypter/Decrypter ( Cloud KMS Crypto Operator ( Data Scientist ( Dev Ops ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Cloud KMS Admin ( Cloud KMS CryptoKey Decrypter Via Delegation ( Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation ( |
| Owner ( Cloud KMS CryptoKey Encrypter ( Cloud KMS CryptoKey Encrypter/Decrypter ( Cloud KMS Crypto Operator ( Data Scientist ( Dev Ops ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Cloud KMS Admin ( Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation ( Cloud KMS CryptoKey Encrypter Via Delegation ( |
| Owner ( Cloud KMS Crypto Operator ( Cloud KMS CryptoKey Signer ( Cloud KMS CryptoKey Signer/Verifier ( Kubernetes Engine KMS Crypto Key User ( |
| Owner ( Cloud KMS Crypto Operator ( Cloud KMS CryptoKey Signer/Verifier ( Cloud KMS CryptoKey Verifier ( Kubernetes Engine KMS Crypto Key User ( |
| Owner ( Cloud KMS Crypto Operator ( Cloud KMS CryptoKey Decapsulator ( Cloud KMS CryptoKey Public Key Viewer ( Cloud KMS CryptoKey Signer/Verifier ( Cloud KMS CryptoKey Verifier ( Kubernetes Engine KMS Crypto Key User ( |
| Owner ( Editor ( Cloud KMS Admin ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS Viewer ( Kubernetes Engine KMS Crypto Key User ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( SLZ BQDW Blueprint Project Level Remediator ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Security Admin ( Security Auditor ( Security Reviewer ( Support User ( SLZ BQDW Blueprint Project Level Remediator ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Admin ( Security Auditor ( Security Reviewer ( Site Reliability Engineer ( Support User ( SLZ BQDW Blueprint Project Level Remediator ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Cloud KMS Admin ( Security Admin ( SLZ BQDW Blueprint Project Level Remediator ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Cloud KMS Admin ( SLZ BQDW Blueprint Project Level Remediator ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS EkmConnections Admin ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Security Admin ( Security Auditor ( Security Reviewer ( Support User ( |
| Owner ( Cloud KMS Admin ( Security Admin ( |
| Owner ( Editor ( Cloud KMS Admin ( Cloud KMS EkmConnections Admin ( |
| Owner ( Editor ( Cloud KMS Admin ( Cloud KMS EkmConnections Admin ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS EkmConnections Admin ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Security Admin ( Security Auditor ( Security Reviewer ( Support User ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS EkmConnections Admin ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Admin ( Security Auditor ( Security Reviewer ( Site Reliability Engineer ( Support User ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Cloud KMS Admin ( Security Admin ( |
| Owner ( Editor ( Cloud KMS Admin ( Cloud KMS EkmConnections Admin ( |
| Owner ( Editor ( Cloud KMS Admin ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS EkmConnections Admin ( Support User ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Cloud KMS Admin ( Cloud KMS Importer ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS Importer ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Security Admin ( Security Auditor ( Security Reviewer ( Support User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS Importer ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Admin ( Security Auditor ( Security Reviewer ( Site Reliability Engineer ( Support User ( |
| Owner ( Cloud KMS Admin ( Security Admin ( |
| Owner ( Editor ( Cloud KMS Admin ( Cloud KMS Importer ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Key Access Justifications Policy Config Admin ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( |
| Owner ( Editor ( Cloud KMS Admin ( Key Access Justifications Policy Config Admin ( |
| Owner ( Editor ( AlloyDB Admin ( Artifact Registry Administrator ( BigQuery Admin ( BigQuery Data Editor ( BigQuery Data Owner ( BigQuery Studio Admin ( BigQuery Studio User ( BigQuery User ( Bigtable Administrator ( Cloud KMS Admin ( Cloud KMS Autokey User ( Cloud SQL Admin ( Composer Administrator ( Environment and Storage Object Administrator ( Composer Worker ( Compute Admin ( Compute Instance Admin (beta) ( Compute Instance Admin (v1) ( Compute Storage Admin ( Dataflow Admin ( Dataflow Developer ( Dataproc Administrator ( Dataproc Editor ( Dataproc Serverless Editor ( DLP Organization Data Profiles Driver ( DLP Project Data Profiles Driver ( Firebase Admin ( Firebase Develop Admin ( Data Scientist ( Databases Admin ( Dev Ops ( Infrastructure Administrator ( ML Engineer ( Network Administrator ( Site Reliability Engineer ( Notebooks Legacy Admin ( Pub/Sub Admin ( Pub/Sub Editor ( Cloud Memorystore Redis Admin ( Cloud Run Source Developer ( Secret Manager Admin ( Secure Source Manager Admin ( Secure Source Manager Instance Owner ( Cloud Spanner Admin ( Cloud Spanner Database Admin ( Storage Admin ( |
| Owner ( Editor ( Viewer ( AlloyDB Admin ( Artifact Registry Administrator ( BigQuery Admin ( BigQuery Data Editor ( BigQuery Data Owner ( BigQuery Studio Admin ( BigQuery Studio User ( BigQuery User ( Bigtable Administrator ( Cloud KMS Admin ( Cloud KMS Autokey User ( Cloud KMS Viewer ( Cloud SQL Admin ( Composer Administrator ( Environment and Storage Object Administrator ( Composer Worker ( Compute Admin ( Compute Instance Admin (beta) ( Compute Instance Admin (v1) ( Compute Storage Admin ( Dataflow Admin ( Dataflow Developer ( Dataproc Administrator ( Dataproc Editor ( Dataproc Serverless Editor ( DLP Organization Data Profiles Driver ( DLP Project Data Profiles Driver ( Firebase Admin ( Firebase Develop Admin ( Data Scientist ( Databases Admin ( Dev Ops ( Infrastructure Administrator ( ML Engineer ( Network Administrator ( Security Auditor ( Site Reliability Engineer ( Support User ( Notebooks Legacy Admin ( Pub/Sub Admin ( Pub/Sub Editor ( Cloud Memorystore Redis Admin ( Cloud Run Source Developer ( Secret Manager Admin ( Secure Source Manager Admin ( Secure Source Manager Instance Owner ( Cloud Spanner Admin ( Cloud Spanner Database Admin ( Storage Admin ( |
| Owner ( Editor ( Viewer ( AlloyDB Admin ( Artifact Registry Administrator ( BigQuery Admin ( BigQuery Data Editor ( BigQuery Data Owner ( BigQuery Studio Admin ( BigQuery Studio User ( BigQuery User ( Bigtable Administrator ( Cloud KMS Admin ( Cloud KMS Autokey User ( Cloud KMS Viewer ( Cloud SQL Admin ( Composer Administrator ( Environment and Storage Object Administrator ( Composer Worker ( Compute Admin ( Compute Instance Admin (beta) ( Compute Instance Admin (v1) ( Compute Storage Admin ( Dataflow Admin ( Dataflow Developer ( Dataproc Administrator ( Dataproc Editor ( Dataproc Serverless Editor ( DLP Organization Data Profiles Driver ( DLP Project Data Profiles Driver ( Firebase Admin ( Firebase Develop Admin ( Data Scientist ( Databases Admin ( Dev Ops ( Infrastructure Administrator ( ML Engineer ( Network Administrator ( Security Admin ( Security Auditor ( Security Reviewer ( Site Reliability Engineer ( Support User ( Notebooks Legacy Admin ( Pub/Sub Admin ( Pub/Sub Editor ( Cloud Memorystore Redis Admin ( Cloud Run Source Developer ( Secret Manager Admin ( Secure Source Manager Admin ( Secure Source Manager Instance Owner ( Cloud Spanner Admin ( Cloud Spanner Database Admin ( Storage Admin ( |
| Owner ( Editor ( Cloud KMS Admin ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Cloud KMS Admin ( DLP Organization Data Profiles Driver ( DLP Project Data Profiles Driver ( Tag User ( |
| Owner ( Cloud KMS Admin ( DLP Organization Data Profiles Driver ( DLP Project Data Profiles Driver ( Tag User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Security Admin ( Security Auditor ( Security Reviewer ( Support User ( SLZ BQDW Blueprint Project Level Remediator ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Admin ( Security Auditor ( Security Reviewer ( Site Reliability Engineer ( Support User ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( DLP Organization Data Profiles Driver ( DLP Project Data Profiles Driver ( Security Auditor ( Support User ( Tag User ( Tag Viewer ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( DLP Organization Data Profiles Driver ( DLP Project Data Profiles Driver ( Security Auditor ( Support User ( Tag User ( Tag Viewer ( |
| Owner ( Cloud KMS Admin ( Security Admin ( SLZ BQDW Blueprint Project Level Remediator ( |
| Owner ( Editor ( Viewer ( Cloud KMS Crypto Operator ( Support User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS CryptoKey Decrypter ( Cloud KMS CryptoKey Decrypter Via Delegation ( Cloud KMS CryptoKey Encrypter ( Cloud KMS CryptoKey Encrypter/Decrypter ( Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation ( Cloud KMS CryptoKey Encrypter Via Delegation ( Cloud KMS Crypto Operator ( Cloud KMS CryptoKey Decapsulator ( Cloud KMS Expert Raw AES-CBC Key Manager ( Cloud KMS Expert Raw AES-CTR Key Manager ( Cloud KMS Expert Raw PKCS#1 Key Manager ( Cloud KMS Importer ( Cloud KMS CryptoKey Public Key Viewer ( Cloud KMS CryptoKey Signer ( Cloud KMS CryptoKey Signer/Verifier ( Cloud KMS CryptoKey Verifier ( Cloud KMS Viewer ( Kubernetes Engine KMS Crypto Key User ( Data Scientist ( Databases Admin ( Dev Ops ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS CryptoKey Decrypter ( Cloud KMS CryptoKey Decrypter Via Delegation ( Cloud KMS CryptoKey Encrypter ( Cloud KMS CryptoKey Encrypter/Decrypter ( Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation ( Cloud KMS CryptoKey Encrypter Via Delegation ( Cloud KMS Crypto Operator ( Cloud KMS CryptoKey Decapsulator ( Cloud KMS Expert Raw AES-CBC Key Manager ( Cloud KMS Expert Raw AES-CTR Key Manager ( Cloud KMS Expert Raw PKCS#1 Key Manager ( Cloud KMS Importer ( Cloud KMS CryptoKey Public Key Viewer ( Cloud KMS CryptoKey Signer ( Cloud KMS CryptoKey Signer/Verifier ( Cloud KMS CryptoKey Verifier ( Cloud KMS Viewer ( Kubernetes Engine KMS Crypto Key User ( Data Scientist ( Databases Admin ( Dev Ops ( ML Engineer ( Security Admin ( Security Auditor ( Security Reviewer ( Site Reliability Engineer ( Support User ( Service agent roles Warning: Don't grant service agent roles to any principals exceptservice agents.
|
| Owner ( Cloud KMS Admin ( |
| Owner ( Editor ( Viewer ( AlloyDB Admin ( Artifact Registry Administrator ( BigQuery Admin ( BigQuery Data Editor ( BigQuery Data Owner ( BigQuery Studio Admin ( BigQuery Studio User ( BigQuery User ( Bigtable Administrator ( Cloud KMS Admin ( Cloud KMS Autokey User ( Cloud KMS single-tenant HSM Executor ( Cloud KMS single-tenant HSM Proposer ( Cloud KMS single-tenant HSM Quorum Member ( Cloud KMS Viewer ( Cloud SQL Admin ( Composer Administrator ( Environment and Storage Object Administrator ( Composer Worker ( Compute Admin ( Compute Instance Admin (beta) ( Compute Instance Admin (v1) ( Compute Storage Admin ( Dataflow Admin ( Dataflow Developer ( Dataproc Administrator ( Dataproc Editor ( Dataproc Serverless Editor ( DLP Organization Data Profiles Driver ( DLP Project Data Profiles Driver ( Firebase Admin ( Firebase Develop Admin ( Data Scientist ( Databases Admin ( Dev Ops ( Infrastructure Administrator ( ML Engineer ( Network Administrator ( Security Auditor ( Site Reliability Engineer ( Support User ( Notebooks Legacy Admin ( Pub/Sub Admin ( Pub/Sub Editor ( Cloud Memorystore Redis Admin ( Cloud Run Source Developer ( Secret Manager Admin ( Secure Source Manager Admin ( Secure Source Manager Instance Owner ( Cloud Spanner Admin ( Cloud Spanner Database Admin ( Storage Admin ( |
| Owner ( Editor ( Viewer ( AlloyDB Admin ( Artifact Registry Administrator ( BigQuery Admin ( BigQuery Data Editor ( BigQuery Data Owner ( BigQuery Studio Admin ( BigQuery Studio User ( BigQuery User ( Bigtable Administrator ( Cloud KMS Admin ( Cloud KMS Autokey Admin ( Cloud KMS Autokey User ( Cloud SQL Admin ( Composer Administrator ( Environment and Storage Object Administrator ( Composer Worker ( Compute Admin ( Compute Instance Admin (beta) ( Compute Instance Admin (v1) ( Compute Storage Admin ( Dataflow Admin ( Dataflow Developer ( Dataproc Administrator ( Dataproc Editor ( Dataproc Serverless Editor ( DLP Organization Data Profiles Driver ( DLP Project Data Profiles Driver ( Firebase Admin ( Firebase Develop Admin ( Data Scientist ( Databases Admin ( Dev Ops ( Infrastructure Administrator ( ML Engineer ( Network Administrator ( Site Reliability Engineer ( Support User ( Notebooks Legacy Admin ( Pub/Sub Admin ( Pub/Sub Editor ( Cloud Memorystore Redis Admin ( Cloud Run Source Developer ( Secret Manager Admin ( Secure Source Manager Admin ( Secure Source Manager Instance Owner ( Cloud Spanner Admin ( Cloud Spanner Database Admin ( Storage Admin ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Key Access Justifications Enrollment Viewer ( Support User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Key Access Justifications Policy Config Admin ( Support User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Protected Resources Viewer ( Support User ( |
| Owner ( Editor ( Cloud KMS single-tenant HSM Quorum Member ( |
| Owner ( Editor ( Cloud KMS single-tenant HSM Proposer ( |
| Owner ( Editor ( Cloud KMS Admin ( Cloud KMS single-tenant HSM Proposer ( |
| Owner ( Editor ( Cloud KMS single-tenant HSM Executor ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS single-tenant HSM Executor ( Cloud KMS single-tenant HSM Proposer ( Cloud KMS single-tenant HSM Quorum Member ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS single-tenant HSM Executor ( Cloud KMS single-tenant HSM Proposer ( Cloud KMS single-tenant HSM Quorum Member ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Admin ( Security Auditor ( Security Reviewer ( Site Reliability Engineer ( Support User ( |
| Owner ( Editor ( Cloud KMS Admin ( Cloud KMS single-tenant HSM Proposer ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS single-tenant HSM Executor ( Cloud KMS single-tenant HSM Key Creator ( Cloud KMS single-tenant HSM Proposer ( Cloud KMS single-tenant HSM Quorum Member ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Auditor ( Site Reliability Engineer ( Support User ( |
| Owner ( Editor ( Viewer ( Cloud KMS Admin ( Cloud KMS single-tenant HSM Executor ( Cloud KMS single-tenant HSM Key Creator ( Cloud KMS single-tenant HSM Proposer ( Cloud KMS single-tenant HSM Quorum Member ( Cloud KMS Viewer ( Databases Admin ( ML Engineer ( Security Admin ( Security Auditor ( Security Reviewer ( Site Reliability Engineer ( Support User ( |
| Owner ( Editor ( Cloud KMS Admin ( Cloud KMS single-tenant HSM Key Creator ( |
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-12-16 UTC.