D toc |
---|
This section covers changes between release on the following topics:
- Authorization to the platform
- User roles
- Permissions of roles
- Required permissions
- Authentication methods
- User management
Release 8.2
None.
Release 8.1
Fine-grained sharing permissions on individual objects
Beginning in this release, you can change the permissions to a shared object for individual users. These fine-grained permissions can be assigned at the time of sharing by the object's Owner or a workspace admin. They can also be changed at a later time.
Info |
---|
NOTE: In this release, fine-grained sharing permissions apply to flows and connections only. |
For more information, see Overview of Sharing.
Release 8.0
Scheduled outputs now inherit service account settings
D s ed | ||
---|---|---|
|
Previously, when companion service accounts were enabled for use, outputs for scheduled jobs that had already been created did not inherit the use of the companion service accounts. Without a companion service account, these scheduled outputs cannot be executed, and their jobs would fail with a No Dataflow service account provided
error message. The issue and prior workaround are described below.
Beginning in Release 8.0, scheduled outputs that do not have a companion service account inherit the companion service account defined in the user's preferences.
Info |
---|
NOTE: The workaround described below to fix scheduled outputs is no longer required. |
See User Profile Page.
Release 7.10
Changes to IAM roles for service accounts
D s ed | ||
---|---|---|
|
Recently, Google announced changes to the required permissions for IAM roles used by service accounts to access platform resources.
Info | |
---|---|
NOTE: The following changes will be deployed by Google on January 27, 2021. These changes have been enacted by Google and are outside of the platform. All administrators of
|
D s product | ||
---|---|---|
|
Steps:
- Login as an administrator.
- From the left nav bar, select User menu > Admin console > Project settings.
Locate the following setting: Manage access to data using user IAM permissions. Check the current setting:
Setting Description Enabled
Users in your deployment are using IAM permissions. Please review and complete the following steps. Disabled
Users in your deployment are not affected. No further action is required. See "Other product editions" below for details. Default
Default setting is Disabled
. See previous.For more information, see Dataprep Project Settings Page.
New requirements:
Info | |
---|---|
NOTE: With this change, users who connect to platform resources using IAM roles must meet one of the following requirements to run jobs on
|
- User must have
iam.serviceAccounts.actAs
permission on a compute service account, which must be specified during job execution. - User must have
iam.serviceAccounts.actAs
permission specified at the project level or in the default compute service account. Project owners are not affected.
Recommendations:
For uninterrupted service, please do one of the following:
Project administrators can grant their users the
iam.serviceAccounts.actAs
permission on the default compute service account:Code Block <project-number>-compute@developer.gserviceaccount.com
(preferred) Project administrators should provision compute service accounts of narrower scope for their users. Users should be educated on how to use them.
Warning If users are now using companion service accounts, the outputs of any scheduled jobs must be updated. See "Fixing schedules" below.
Fixing schedules:
If individual users are now using companion service accounts to run jobs, all affected schedules must be updated.
Steps:
Info |
---|
NOTE: Each user should complete the following steps for each of flow that they own. |
- Identify if the flow contains a schedule:
- Open the flow in Flow View.
- At the top of the page, you may see one of the following icons.
- This icon indicates that there is an enabled schedule. Its outputs must be updated. Please see Step 2.
- This icon indicates that there is a schedule, but it is disabled. Its outputs must be updated. Please see Step 2.
- If neither icon is present, then the flow does not have a schedule. Please go to the next flow.
- For flows that do contain enabled or disabled schedules, please do the following:
- Locate the scheduled outputs. In the Flow View canvas, these outputs are labeled Scheduled Output.
- Select a scheduled output.
- In the right panel, under Scheduled Destinations click Edit.
- In the Scheduled publishing settings, click the Advanced Settings caret to open it.
- In the Service Account textbox, insert the new companion service account that you should use for the scheduled job.
- Repeat Step 2 for any other scheduled outputs in the flow.
- Repeat these steps for other scheduled flows that you own.
References:
- https://cloud.google.com/dataflow/docs/concepts/security-and-permissions#security_and_permissions_for_pipelines_on_google_cloud_platform
- For more information on
permissions, see Required Dataprep User Permissions.D s product
Other product editions
No action is required. Actions on
D s dataflow |
---|
For more information on
D s product |
---|
Release 7.9
Manage access to data using IAM permissions
D s ed | ||
---|---|---|
|
You can optionally configure the workspace to manage access to BigQuery and
D s storage |
---|
- This feature must be enabled. See Dataprep Project Settings Page.
- For more information on the required set of IAM permissions, see Required Dataprep User Permissions.
Reduced scope of minimum required permissions
D s ed | ||
---|---|---|
|
Prior to Release 7.9, the required IAM permissions for
D s product | ||
---|---|---|
|
However, many of these previously required permissions do not directly apply to use of the product. Beginning in Release 7.9, the list of required permissions has been reduced to only those required to access the
D s webapp |
---|
Info |
---|
NOTE: Permissions that are needed for access to other services are now considered optional for use of the product itself. In the list below, these optional permissions are primarily tied to use of BigQuery. |
Info |
---|
NOTE: The storage.buckets.list permission must be enabled at the project level. All other storage.* permissions only need to be enabled on the staging bucket. |
Info |
---|
NOTE: The bigquery.jobs.create permission is required if you wish to use to BigQuery at all. The other permissions are optional and can be applied at the project or dataset level. |
Area | Permission | Release 7.8 and earlier | Release 7.9 and later | ||
---|---|---|---|---|---|
General | resourcemanager.projects.get | required | required | ||
dataprep.projects.use | required | required | |||
BigQuery | bigquery.datasets.get | required | optional | ||
bigquery.jobs.create | required | optional
| |||
bigquery.tables.create | required | optional | |||
bigquery.tables.get | required | optional | |||
bigquery.tables.getData | required | optional | |||
bigquery.tables.list | required | optional | |||
| compute.machineTypes.get | required | required | ||
dataflow.jobs.create | required | required | |||
dataflow.jobs.get | required | required | |||
dataflow.messages.list | required | required | |||
dataflow.metrics.get | required | required | |||
base storage | storage.buckets.get | required | required | ||
storage.buckets.list | required | required
| |||
storage.objects.create | required | required | |||
storage.objects.delete | required | required | |||
storage.objects.get | required | required | |||
storage.objects.list | required | required | |||
storage.objects.update | required | optional |
New permissions
The following permissions are newly tracked for use with
D s product | ||
---|---|---|
|
Info |
---|
NOTE: Please verify that any newly required permissions are added to user roles. |
Area | Permission | Release 7.8 and earlier | Release 7.9 and later | ||
---|---|---|---|---|---|
BigQuery | bigquery.tables.delete | n/a | optional
| ||
bigquery.datasets.create | n/a | optional | |||
bigquery.datasets.update | n/a | optional | |||
| dataflow.jobs.cancel | n/a | optional |
For more information, see Required Dataprep User Permissions.