gcp-iam-catalog
Roles
Permissions
🔐
roles/run.serviceAgent
📋 Copy
Title
Cloud Run Service Agent
Stage
GA
Role Type
Service Agent
Permissions
75
Description
Gives Cloud Run service account access to managed resources.
Permissions
Compare
🔍
artifactregistry.attachments.get
artifactregistry.attachments.list
artifactregistry.dockerimages.get
artifactregistry.dockerimages.list
artifactregistry.files.download
artifactregistry.files.get
artifactregistry.files.list
artifactregistry.locations.get
artifactregistry.locations.list
artifactregistry.mavenartifacts.get
artifactregistry.mavenartifacts.list
artifactregistry.npmpackages.get
artifactregistry.npmpackages.list
artifactregistry.packages.get
artifactregistry.packages.list
artifactregistry.projectsettings.get
artifactregistry.pythonpackages.get
artifactregistry.pythonpackages.list
artifactregistry.repositories.downloadArtifacts
artifactregistry.repositories.exportArtifacts
artifactregistry.repositories.get
artifactregistry.repositories.list
artifactregistry.repositories.listEffectiveTags
artifactregistry.repositories.listTagBindings
artifactregistry.repositories.readViaVirtualRepository
artifactregistry.repositories.uploadArtifacts
artifactregistry.rules.get
artifactregistry.rules.list
artifactregistry.tags.get
artifactregistry.tags.list
artifactregistry.versions.get
artifactregistry.versions.list
binaryauthorization.platformPolicies.evaluatePolicy
binaryauthorization.policy.evaluatePolicy
clientauthconfig.clients.list
cloudbuild.builds.create
cloudbuild.builds.get
compute.addresses.create
compute.addresses.createInternal
compute.addresses.delete
compute.addresses.deleteInternal
compute.addresses.get
compute.addresses.list
compute.globalOperations.get
compute.networks.access
compute.networks.get
compute.regionOperations.get
compute.subnetworks.get
compute.subnetworks.use
compute.zoneOperations.get
iam.serviceAccounts.actAs
iam.serviceAccounts.getAccessToken
iam.serviceAccounts.getOpenIdToken
iam.serviceAccounts.signBlob
networkservices.meshes.get
resourcemanager.projects.get
resourcemanager.projects.getIamPolicy
resourcemanager.projects.list
run.routes.invoke
serviceusage.services.get
serviceusage.services.use
storage.buckets.create
storage.buckets.get
storage.buckets.update
storage.folders.get
storage.folders.list
storage.managedFolders.get
storage.managedFolders.list
storage.objects.create
storage.objects.delete
storage.objects.get
storage.objects.list
storage.objects.update
vpcaccess.connectors.get
vpcaccess.connectors.use
Compare with another role:
🔍
roles/run.serviceAgent
0
Shared
0
Other role
0