|
8 | 8 |
|
9 | 9 | When you attach the `Owner` role to the service account that you create, you grant that service account all permissions, including those that are required to install {product-title}. |
10 | 10 |
|
11 | | -If your organization’s security policies require a more restrictive set of permissions, you can create link:https://cloud.google.com/iam/docs/creating-custom-roles[custom roles] with the necessary permissions. The following permissions are required for the installer-provisioned infrastructure for creating and deleting the {product-title} cluster. |
| 11 | +If your organization's security policies require a more restrictive set of permissions, you can create link:https://cloud.google.com/iam/docs/creating-custom-roles[custom roles] with the necessary permissions. The following permissions are required for the installer-provisioned infrastructure for creating and deleting the {product-title} cluster. |
12 | 12 |
|
13 | 13 | .Required permissions for creating network resources |
14 | 14 | [%collapsible] |
@@ -96,13 +96,15 @@ If your organization’s security policies require a more restrictive set of per |
96 | 96 | * `iam.serviceAccountKeys.get` |
97 | 97 | * `iam.serviceAccountKeys.list` |
98 | 98 | * `iam.serviceAccounts.actAs` |
| 99 | +** This permission can be limited to act as the control plane and compute service accounts. Alternatively, you may grant the service account that the installation program uses the `iam.serviceAccountUser` role on the control plane and compute service accounts. |
99 | 100 | * `iam.serviceAccounts.create` |
100 | 101 | * `iam.serviceAccounts.delete` |
101 | 102 | * `iam.serviceAccounts.get` |
102 | 103 | * `iam.serviceAccounts.list` |
103 | 104 | * `resourcemanager.projects.get` |
104 | 105 | * `resourcemanager.projects.getIamPolicy` |
105 | 106 | * `resourcemanager.projects.setIamPolicy` |
| 107 | +** This permission is not required if you use `credentialsMode: Manual` and supply your own service accounts for compute and control plane nodes. |
106 | 108 | ==== |
107 | 109 |
|
108 | 110 | .Required permissions for creating compute resources |
@@ -268,7 +270,6 @@ If your organization’s security policies require a more restrictive set of per |
268 | 270 | * `iam.serviceAccounts.get` |
269 | 271 | * `iam.serviceAccounts.list` |
270 | 272 | * `resourcemanager.projects.getIamPolicy` |
271 | | -* `resourcemanager.projects.setIamPolicy` |
272 | 273 | ==== |
273 | 274 |
|
274 | 275 | .Required permissions for deleting compute resources |
|
0 commit comments