Book Image

Google Cloud Platform for Architects

By : Vitthal Srinivasan, Loonycorn , Judy Raj
Book Image

Google Cloud Platform for Architects

By: Vitthal Srinivasan, Loonycorn , Judy Raj

Overview of this book

Using a public cloud platform was considered risky a decade ago, and unconventional even just a few years ago. Today, however, use of the public cloud is completely mainstream - the norm, rather than the exception. Several leading technology firms, including Google, have built sophisticated cloud platforms, and are locked in a fierce competition for market share. The main goal of this book is to enable you to get the best out of the GCP, and to use it with confidence and competence. You will learn why cloud architectures take the forms that they do, and this will help you become a skilled high-level cloud architect. You will also learn how individual cloud services are configured and used, so that you are never intimidated at having to build it yourself. You will also learn the right way and the right situation in which to use the important GCP services. By the end of this book, you will be able to make the most out of Google Cloud Platform design.
Table of Contents (19 chapters)
13
Logging and Monitoring

Identity and Access Management

We have seen a lot of GCP's resource offerings in previous chapters, but all of them would crumble if their access is not managed properly. IAM, which stands for Identity and Access Management, lets you control access to all of the GCP resources in terms of roles and permissions. All of the services related to IAM are completely free of charge, so we do not need to bother about billing in this chapter. Let's take a look into how IAM lets you manage resource access.

You will learn about the following:

  • IAM
  • Roles and permissions
  • Types of identities
  • Working with IAM

If you can keep this one diagram in mind, you're good. This is basically what you need to keep in mind about identity and access management on the GCP.

This diagram is quite involved though, so let's take it one step at a time:

Identity and Access Management = Identity...