Skip to content
Merged
Changes from all commits
Commits
Show all changes
15 commits
Select commit Hold shift + click to select a range
9b2f419
Update gcp-dynamic-secrets.md
harrison-akeyless Mar 11, 2026
59f598d
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 11, 2026
b29e3ae
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 11, 2026
c834f26
Merge branch 'DOCS-205-gcp-dynamic-secret-missing-permissions-in-the-…
harrison-akeyless Mar 11, 2026
2d6aa6e
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 12, 2026
3402a1d
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 16, 2026
582565f
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 16, 2026
2d6bb88
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 18, 2026
65d71e0
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 18, 2026
7c8594d
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 18, 2026
6cc3c7e
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 19, 2026
6ad9af3
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 23, 2026
24211e0
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 26, 2026
abfa6e9
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 27, 2026
75cdcdf
Merge branch 'v1.0' into DOCS-205-gcp-dynamic-secret-missing-permissi…
harrison-akeyless Mar 31, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,12 @@ For example:

* A [privileged service account roles](https://cloud.google.com/iam/docs/granting-changing-revoking-access#granting-console) includes `Service Account Key Admin` and `Service Account Token Creator`.

* For **Dynamic Service Account** mode, the privileged service account also needs permissions to create and delete temporary service accounts and to update IAM bindings on target resources:

* Add [Service Account Admin](https://cloud.google.com/iam/docs/understanding-roles#iam.serviceAccountAdmin) (`roles/iam.serviceAccountAdmin`) to allow temporary service account lifecycle operations (for example, `iam.serviceAccounts.create`).

* If your role bindings target project resources, add [Project IAM Admin](https://cloud.google.com/iam/docs/understanding-roles#resourcemanager.projectIamAdmin) (`roles/resourcemanager.projectIamAdmin`) to allow IAM policy changes on the project.

* A [key](https://cloud.google.com/iam/docs/creating-managing-service-account-keys) of the privilege service account.

Example list of GCP Service Account permissions:
Expand All @@ -69,6 +75,8 @@ iam.serviceAccountKeys.create
iam.serviceAccountKeys.delete
iam.serviceAccountKeys.get
iam.serviceAccountKeys.list
resourcemanager.projects.getIamPolicy
resourcemanager.projects.setIamPolicy
```

## Create a Dynamic GCP Secret with the CLI
Expand Down
Loading