Cloud Storage offers layers of increasingly granular access
control. For most purposes, Cloud IAM is sufficient, and roles are inherited
from project to bucket to object. Access control lists (ACL) offer finer
control. And for detailed control, signed URLs provide a cryptographic key that
gives time-limited access to a bucket or object. A signed policy document
further refines the control by determining what kind of file can be uploaded by
someone with a signed URL
Cloud IAM
Works with Cloud Storage just as with using Cloud IAM with
any other resource. Project Owners are automatically granted Bucket Owner role
for all buckets in the project.
Note that ACLs and Cloud IAM are independent, so
Project-level Cloud IAM permissions will not appear in bucket or object ACLs.
Signed URLs
A signed URL gives you the ability to grant access to a
bucket without Cloud IAM user authentication for a limited period of time. e.g.,
when you don’t want to require users to have Google accounts.
ACLs
ACL permissions are concentric, meaning that the greater
access level includes the lesser. Permission is the action that can be
performed. Scope (sometimes called "grantee") is the identity that
can perform the action. Applied to bucket or to object.
"Owner" is called "FULL_CONTROL" in the
API. Predefined ACLs provide a convenient way to change permissions for common scenarios,
for example, revoking access from everyone.
Informative blog. Thank you for sharing with us..
ReplyDeleteGCP Training Online
Online GCP Training
Thank you for sharing wonderful information with us to get some idea about it.
ReplyDeleteWorkday Studio Online Training
Workday Studio Online Training India