What if you
want to give permissions to a Compute Engine virtual machine rather than to a
person? That’s what service accounts are for. For instance, maybe you have an application
running in a virtual machine that needs to store data in Google Cloud Storage.
But you don’t want to let just anyone on the Internet have access to that data;
only that virtual machine. So you’d create a service account to authenticate
your VM to Cloud Storage. Service accounts are named with an email address, but
instead of passwords they use cryptographic keys to access resources.
Service Accounts control server-to-server
interactions:
Provide an
identity for carrying out server-to-server interactions in a project
Used to
authenticate from one service to another
Used to
control privileges used by resources
So that applications can perform
actions on behalf of authenticated end users
Identified
with an email address:
PROJECT_NUMBER-compute@developer.gserviceaccount.com
PROJECT_ID@appspot.gserviceaccount.com
Service Accounts and IAM
·
Service accounts authenticate using keys.
o
Google manages keys for Compute Engine and App Engine.
·
You can assign a predefined or custom IAM role
to the service account.
Example
Service AccountàInstance Admin Roleà Compute Instances
Identity IAM Role Resource
Check below Google document link for creating Service Account.
https://cloud.google.com/iam/docs/creating-managing-service-account-keys
Comments
Post a Comment