Confidential Computing roles and permissions Stay organized with collections Save and categorize content based on your preferences.
This page lists the IAM roles and permissions for Confidential Computing. Tosearch through all roles and permissions, see therole andpermission index.
Confidential Computing roles
| Role | Permissions |
|---|---|
Confidential Space Workload User( Grants the ability to generate an attestation token and run a workload in a VM. Intended for service accounts that run on Confidential Space VMs. |
|
Confidential Computing permissions
| Permission | Included in roles |
|---|---|
| Owner ( Editor ( Confidential Space Workload User ( |
| Owner ( Editor ( Confidential Space Workload User ( |
| Owner ( Editor ( Viewer ( Confidential Space Workload User ( Support User ( |
| Owner ( Editor ( Viewer ( Confidential Space Workload User ( Security Admin ( Security Auditor ( Security Reviewer ( Support User ( |
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-02-18 UTC.