IAM roles and permissions Stay organized with collections Save and categorize content based on your preferences.
This page describes Developer Connect roles and permissions.
Access control in Developer Connect is controlled usingIdentity and Access Management (IAM). IAM lets you create andmanage permissions for Google Cloud resources. Developer Connect provides aspecific set ofpredefined IAM roleswhere each role contains a set of permissions suited to a particular type ofaccess or action. We recommend that you adopt thesecurity principle of least privilege,and grant only the necessary access to your resources.
Predefined Developer Connect roles
You assign permissions to accounts through the use of roles. The following tablelists the roles available for Developer Connect and the permissions thatthey include:
| Role | Permissions |
|---|---|
Name: Title: Developer Connect Admin Grants full access to Developer Connect resources. |
|
Name: Title: Developer Connect Read Token Accessor Grants access to read-only tokens. Also grants access to view the Git repository link. |
|
Name: Title: Developer Connect Token Accessor Grants access to read/write and read-only tokens. Also grants access to view the Git repository link. |
|
Name: Title: Developer Connect User Grants access to view the connection and access to the features that interact with the Git repository, such as reading content from the Git repository, or linking to the Git repository. |
|
Name: Title: Developer Connect Viewer Grants read-only access to Developer Connect resources. |
|
Name: Title: Developer Connect Git Proxy Reader Grants read-only access to repositories through the Git proxy. |
|
Name: Title: Developer Connect Git Proxy User Grants read and write access to repositories through the Git proxy. |
|
Name: Title: Developer Connect Account Connector Proxy User Grants access to account connectors through Git and HTTP proxies. |
|
Name: Title: Developer Connect OAuth Admin Grants read and write access to Account Connector resources. |
|
Name: Title: Developer Connect OAuth User Grants read and write access to User resources, and read access to Account Connectors. |
|
Name: Title: Developer Connect Insights Admin Grants full access to Developer Connect insights, and read-only access to Resource Manager resources. |
|
Name: Title: Developer Connect Insights Agent Grants read-only access to Cloud Asset Inventory assets, read and create access to Cloud Asset Inventory feeds, read-only access to, read-only access to Artifact Analysis occurrences, and the ability to createCloud Logging log entries. |
|
Name: Title: Developer Connect Insights Viewer Grants read-only access to Resource Manager projects and to Developer Connect operations, locations, and insights. |
|
Developer Connect service account
Developer Connect uses aservice agent to execute tasks on your behalfwhen communicating with other services. This service agent is createdautomatically when you first interact with Developer Connect (create arepository connection or account connector).
The identifier for the Developer Connectservice agent is as follows, wherePROJECT_NUMBER is your Google Cloudproject number.
service-PROJECT_NUMBER@gcp-sa-devconnect.iam.gserviceaccount.comYou use this identifier to grant or modify IAM roles andpermissions.
Configure access to resources
For specific steps on granting roles, seeGranting, changing, and revoking access to resources.
What's next
- Learn aboutIAM.
- Connect to a GitHub repository.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-02-19 UTC.