Stay organized with collections
Save and categorize content based on your preferences.
Forrester names Google a Leader
in The Forrester Wave™: Infrastructure as a Service (IaaS) Platform
Native Security Q2 2023.
Access the report.
Identity and Access Management (IAM)
Fine-grained access control and visibility for
centrally managing cloud resources.
View documentation
for this product.
Enterprise-grade access control
Identity and Access
Management (IAM) lets administrators authorize who can take action
on specific resources, giving you full control and visibility to
manage Google Cloud resources centrally. For enterprises with
complex organizational structures, hundreds of workgroups, and many
projects, IAM provides a unified view into security policy across
your entire organization, with built-in auditing to ease compliance
processes.
Simplicity first
We recognize that an organization’s internal structure and
policies can get complex fast. Projects, workgroups, and
managing who has authorization to do what all change
dynamically. IAM is designed with simplicity in mind: a clean,
universal interface lets you manage access control across all
Google Cloud resources consistently. So you learn it once,
then apply everywhere.
The right roles
IAM provides tools to manage resource permissions with
minimum fuss and high automation. Map job functions within
your company to groups and roles. Users get access only to
what they need to get the job done, and admins can easily
grant default permissions to entire groups of users.
Smart access control
Permissions management can be a time-consuming task.
Recommender
helps admins remove unwanted access to Google Cloud resources
by using machine learning to make smart access control
recommendations. With Recommender, security teams can
automatically detect overly permissive access and rightsize
them based on similar users in the organization and their
access patterns.
Get granular with context-aware access
IAM enables you to grant access to cloud resources at
fine-grained levels, well beyond project-level access. Create
more granular access control policies to resources based on
attributes like device security status, IP address, resource
type, and date/time. These policies help ensure that the
appropriate security controls are in place when granting
access to cloud resources.
Streamline compliance with a built-in audit trail
A full audit trail history of permissions authorization,
removal, and delegation gets surfaced automatically for your
admins. IAM lets you focus on business policies around your
resources and makes compliance easy.
Enterprise identity made easy
Leverage
Cloud Identity,
Google Cloud’s built-in managed identity to easily create or
sync user accounts across applications and projects. It's easy
to provision and manage users and groups, set up single
sign-on, and configure two-factor authentication (2FA)
directly from the Google Admin Console. You also get access to
the Google Cloud Organization, which enables you to centrally
manage projects using
Resource Manager.
Workforce Identity Federation
Workforce Identity Federation
lets you use an external identity provider (IdP) to
authenticate and authorize a workforce—a group of users, such
as employees, partners, and contractors—using IAM, so that the
users can access Google Cloud services. Workforce Identity
Federation uses an identity federation approach instead of
directory synchronization, eliminating the need to maintain
separate identities across multiple platforms.
Organization Policies
Organization Policies
provides security guardrails to enforce which resource
configurations are allowed or denied to help you address your
cloud governance requirements. Organization policy service
gives you centralized control over your cloud resources and
lets you create granular resource policies to help you meet
your security and compliance goals.
Single access control interface
IAM provides a simple and consistent access control
interface for all Google Cloud services. Learn one access
control interface and apply that knowledge to all Google
Cloud resources.
Fine-grained control
Grant access to users at a resource level of granularity,
rather than just project level. For example, you can create
an IAM access control policy that grants the Subscriber role
to a user for a particular Pub/Sub topic.
Automated access control recommendations
Remove unwanted access to Google Cloud resources with smart
access control recommendations. Using Recommender, you can
automatically detect overly permissive access and rightsize
them based on similar users in the organization and their
access patterns.
Context-aware access
Control access to resources based on
contextual
attributes like device security status, IP address, resource
type, and date/time.
Flexible roles
Prior to IAM, you could only grant Owner, Editor, or Viewer
roles to users. A wide range of services and resources now
surface additional IAM roles out of the box. For example,
the Pub/Sub service exposes Publisher and Subscriber roles
in addition to the Owner, Editor, and Viewer roles.
Web, programmatic, and command-line access
Create and manage IAM policies using the Google Cloud
Console, the IAM methods, and the gcloud command line tool.
Built-in audit trail
To ease compliance processes for your organization, a full
audit trail is made available to admins without any
additional effort.
Free of charge
IAM is offered at no additional charge for all Google Cloud
customers. You will be charged only for use of other Google
Cloud services. For information on the pricing of other
Google Cloud services, see the
Google Cloud Pricing Calculator.
"IAM will give Snapchat the
ability to grant fine-grained access control to resources within a
project. This allows us to compartmentalize access based on workgroups
and to manage sensitive resources around individual access needs."
Subhash
Sankuratripati, Security Engineer, Snapchat
IAM is available to you at no additional charge.
Take the next step
Start building on Google Cloud with
$300 in free credits and 20+ always free products.
Need help getting started?
Work with a trusted partner
Take the next step
Start your next project, explore
interactive tutorials, and manage your account.
Need help getting started?
Work with a trusted partner
Get tips & best practices
A product or feature listed on this
page is in beta. Learn more about
product launch stages.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],[],[],[],null,["# Identity and Access Management\n\nForrester names Google a Leader in The Forrester Wave™: Infrastructure as a Service (IaaS) Platform Native Security Q2 2023. [Access the report](/resources/forrester-ipns-wave-report).\n\nIdentity and Access Management (IAM)\n====================================\n\nFine-grained access control and visibility for\ncentrally managing cloud resources.\n[Try it free](https://console.cloud.google.com/freetrial?_ga=2.247735687.-1601732544.1557910070) [Contact sales](/contact) \n[Go to console](https://console.cloud.google.com/iam-admin/?tutorial=iam--quickstart) \n\n[View documentation](https://cloud.google.com/iam/docs/)\nfor this product. \n\nEnterprise-grade access control\n-------------------------------\n\nIdentity and Access Management (IAM) lets administrators authorize who can take action on specific resources, giving you full control and visibility to manage Google Cloud resources centrally. For enterprises with complex organizational structures, hundreds of workgroups, and many projects, IAM provides a unified view into security policy across your entire organization, with built-in auditing to ease compliance processes. \n\n#### Simplicity first\n\nWe recognize that an organization's internal structure and\npolicies can get complex fast. Projects, workgroups, and\nmanaging who has authorization to do what all change\ndynamically. IAM is designed with simplicity in mind: a clean,\nuniversal interface lets you manage access control across all\nGoogle Cloud resources consistently. So you learn it once,\nthen apply everywhere. \n\n#### The right roles\n\nIAM provides tools to manage resource permissions with\nminimum fuss and high automation. Map job functions within\nyour company to groups and roles. Users get access only to\nwhat they need to get the job done, and admins can easily\ngrant default permissions to entire groups of users. \n\n#### Smart access control\n\nPermissions management can be a time-consuming task.\n[Recommender](https://cloud.google.com/recommender)\nhelps admins remove unwanted access to Google Cloud resources\nby using machine learning to make smart access control\nrecommendations. With Recommender, security teams can\nautomatically detect overly permissive access and rightsize\nthem based on similar users in the organization and their\naccess patterns. \n\n#### Get granular with context-aware access\n\nIAM enables you to grant access to cloud resources at\nfine-grained levels, well beyond project-level access. Create\nmore granular access control policies to resources based on\nattributes like device security status, IP address, resource\ntype, and date/time. These policies help ensure that the\nappropriate security controls are in place when granting\naccess to cloud resources. \n\n#### Streamline compliance with a built-in audit trail\n\nA full audit trail history of permissions authorization,\nremoval, and delegation gets surfaced automatically for your\nadmins. IAM lets you focus on business policies around your\nresources and makes compliance easy. \n\n#### Enterprise identity made easy\n\nLeverage\n[Cloud Identity](https://cloud.google.com/identity),\nGoogle Cloud's built-in managed identity to easily create or\nsync user accounts across applications and projects. It's easy\nto provision and manage users and groups, set up single\nsign-on, and configure two-factor authentication (2FA)\ndirectly from the Google Admin Console. You also get access to\nthe Google Cloud Organization, which enables you to centrally\nmanage projects using\n[Resource Manager](https://cloud.google.com/resource-manager). \n\n#### Workforce Identity Federation\n\n\n[Workforce Identity Federation](https://cloud.google.com/workforce-identity-federation)\nlets you use an external identity provider (IdP) to\nauthenticate and authorize a workforce---a group of users, such\nas employees, partners, and contractors---using IAM, so that the\nusers can access Google Cloud services. Workforce Identity\nFederation uses an identity federation approach instead of\ndirectory synchronization, eliminating the need to maintain\nseparate identities across multiple platforms. \n\n#### Organization Policies\n\n\n[Organization Policies](https://cloud.google.com/resource-manager/docs/organization-policy/overview)\nprovides security guardrails to enforce which resource\nconfigurations are allowed or denied to help you address your\ncloud governance requirements. Organization policy service\ngives you centralized control over your cloud resources and\nlets you create granular resource policies to help you meet\nyour security and compliance goals. \n\nFeatures\n--------\n\n### Single access control interface\n\nIAM provides a simple and consistent access control\ninterface for all Google Cloud services. Learn one access\ncontrol interface and apply that knowledge to all Google\nCloud resources. \n\n### Fine-grained control\n\nGrant access to users at a resource level of granularity,\nrather than just project level. For example, you can create\nan IAM access control policy that grants the Subscriber role\nto a user for a particular Pub/Sub topic. \n\n### Automated access control recommendations\n\nRemove unwanted access to Google Cloud resources with smart\naccess control recommendations. Using Recommender, you can\nautomatically detect overly permissive access and rightsize\nthem based on similar users in the organization and their\naccess patterns. \n\n### Context-aware access\n\nControl access to resources based on\n[contextual](https://cloud.google.com/context-aware-access)\nattributes like device security status, IP address, resource\ntype, and date/time. \n\n### Flexible roles\n\nPrior to IAM, you could only grant Owner, Editor, or Viewer\nroles to users. A wide range of services and resources now\nsurface additional IAM roles out of the box. For example,\nthe Pub/Sub service exposes Publisher and Subscriber roles\nin addition to the Owner, Editor, and Viewer roles. \n\n### Web, programmatic, and command-line access\n\nCreate and manage IAM policies using the Google Cloud\nConsole, the IAM methods, and the gcloud command line tool. \n\n### Built-in audit trail\n\nTo ease compliance processes for your organization, a full\naudit trail is made available to admins without any\nadditional effort. \n\n### Support for Cloud Identity\n\nIAM supports standard Google Accounts. Create IAM policies\ngranting permission to a\n[Google group](https://groups.google.com/forum/#!overview),\na\n[Google-hosted domain](https://workspace.google.com/products/sites/?_ga=2.264742220.-2128414995.1539775849),\na\n[service account](https://cloud.google.com/iam/docs/understanding-service-accounts),\nor specific\n[Google Account](https://myaccount.google.com/?pli=1)\nholders using Cloud Identity. Centrally manage users and\ngroups through the\n[Google Admin Console](https://cloud.google.com/identity). \n\n### Free of charge\n\nIAM is offered at no additional charge for all Google Cloud\ncustomers. You will be charged only for use of other Google\nCloud services. For information on the pricing of other\nGoogle Cloud services, see the\n[Google Cloud Pricing Calculator](/products/calculator). \n\n\"IAM will give Snapchat the\nability to grant fine-grained access control to resources within a\nproject. This allows us to compartmentalize access based on workgroups\nand to manage sensitive resources around individual access needs.\"\n\nSubhash\nSankuratripati, Security Engineer, Snapchat \n\nTechnical resources\n-------------------\n\n- [IAM concepts\n View documentation](/iam/docs/overview)\n- [IAM how-to guides\n View documentation](https://cloud.google.com/iam/docs/how-to)\n- [IAM quickstart\n View quickstart](/iam/docs/grant-role-console)\n- [IAM client library quickstart tutorial\n View tutorial](https://console.cloud.google.com/iam-admin/?tutorial=iam--api_quickstart_index)\n- [Introduction to IAM video\n Watch video](https://www.youtube.com/watch?v=zd5d9Vv1ZFE)\n- [Next '23: Full-stack Identity and Access Management (IAM)\n Watch video](https://www.youtube.com/watch?v=aaPvEUCXvvw)\n\n### Pricing\n\nIAM is available to you at no additional charge. \n\nTake the next step\n------------------\n\nStart building on Google Cloud with\n$300 in free credits and 20+ always free products. \n[Try it free](https://console.cloud.google.com/freetrial?_ga=2.247735687.-1601732544.1557910070) \nNeed help getting started? \n[Contact sales](https://cloud.google.com/contact/) \nWork with a trusted partner \n[Find a partner](https://cloud.google.com/find-a-partner/) \nContinue browsing \n[See all products](https://cloud.google.com/products/) \n\nTake the next step\n------------------\n\nStart your next project, explore\ninteractive tutorials, and manage your account. \n[Go to console](https://console.cloud.google.com/iam-admin/?tutorial=iam--quickstart) \nNeed help getting started? \n[Contact sales](https://cloud.google.com/contact/) \nWork with a trusted partner \n[Find a partner](https://cloud.google.com/find-a-partner/) \nGet tips \\& best practices \n[See tutorials](https://cloud.google.com/docs/tutorials)\n\nA product or feature listed on this\npage is in beta. Learn more about\n[product launch stages](https://cloud.google.com/terms/launch-stages)."]]