Every Eventarc trigger is associated with an Identity and Access Management (IAM) service account at the time the trigger is created. The trigger uses the service account as its default identity.
By default, you can't create an IAM service account in one Google Cloud project and attach it to a resource in another project. However, you might have centralized the service accounts for your organization in separate projects, which can make the service accounts easier to manage. This document outlines the steps required to support attaching a service account in one project to an Eventarc trigger in another project.
If you don't have the permissions to perform these steps, ask an administrator to complete them.
Enable cross-project service account usage
Complete the following steps in the service account project.
In the Google Cloud console, go to the Organization policies page.
If the Disable Cross-Project Service Account Usage policy is enforced, you must disable it.
For more information, see Enable service accounts to be attached across projects.
Create your service account and note its name.
Grant permissions for service account authentication
Principals can use service accounts to authenticate in a few different ways. Each type of authentication requires the principal to have specific IAM permissions on the service account. For more information, see Roles for service account authentication.
Grant the Service Account Token Creator (
roles/iam.serviceAccountTokenCreator
) IAM role to the Eventarc service agent of the Google Cloud project that contains the trigger. This permits the service agent to manage the cross-project access for the service account. A service agent is the identity of a given Google Cloud service for a particular project. For more information, see Service agents.Console
In the Google Cloud console, go to the Service accounts page.
Select the project that owns the service account that you will attach to the Eventarc trigger.
Click the email address of the service account that you previously created.
Click the Permissions tab.
In the Principals with access to this service account section, click
Grant access.In the New principals field, enter the email address of the Eventarc service agent:
service-EVENTARC_PROJECT_NUMBER@gcp-sa-eventarc.iam.gserviceaccount.com
Replace
EVENTARC_PROJECT_NUMBER
with the Google Cloud project number of the project that contains the trigger.Click Add another role.
In the Select a role list, filter for Service Account Token Creator, and then select the role.
Click Save.
gcloud
Run the
gcloud iam service-accounts add-iam-policy-binding
command:gcloud iam service-accounts add-iam-policy-binding \ SERVICE_ACCOUNT_NAME@SERVICE_ACCOUNT_PROJECT_ID.iam.gserviceaccount.com \ --member='serviceAccount:service-EVENTARC_PROJECT_NUMBER@gcp-sa-eventarc.iam.gserviceaccount.com' \ --role='roles/iam.serviceAccountTokenCreator'
Replace the following:
SERVICE_ACCOUNT_NAME
: the name of your service accountSERVICE_ACCOUNT_PROJECT_ID
: the Google Cloud project ID of the project that owns the service accountEVENTARC_PROJECT_NUMBER
: the Google Cloud project number of the project that contains the trigger
Grant the Service Account User (
roles/iam.serviceAccountUser
) IAM role to all principals who create triggers—for example, the Eventarc service agent of the Google Cloud project that contains the trigger. This predefined role contains theiam.serviceAccounts.actAs
permission, which is required to attach a service account to a resource.Console
Grant the role on the project to allow the principal to impersonate multiple service accounts:
In the Google Cloud console, go to the IAM page.
Select the project that owns the service account.
Click
Grant access.In the New principals field, enter the email address of the principal.
In the Select a role list, filter for Service Account User, and then select the role.
Click Save.
Or, grant the role on the service account to allow the principal to impersonate only a specific service account:
In the Google Cloud console, go to the Service accounts page.
Select the project that owns the service account.
Click the email address of the service account that you previously created.
Click the Permissions tab.
In the Principals with access to this service account section, click
Grant access.In the New principals field, enter the email address of the principal.
Click Add another role.
In the Select a role list, filter for Service Account User, and then select the role.
Click Save.
gcloud
Run the
gcloud projects add-iam-policy-binding
command and grant the role on the project to allow the principal to impersonate multiple service accounts:gcloud projects add-iam-policy-binding SERVICE_ACCOUNT_PROJECT_ID \ --member=PRINCIPAL \ --role='roles/iam.serviceAccountUser'
Or, run the
gcloud iam service-accounts add-iam-policy-binding
command and grant the role on the service account to allow the principal to impersonate only a specific service account:gcloud iam service-accounts add-iam-policy-binding SERVICE_ACCOUNT_RESOURCE_NAME \ --member=PRINCIPAL \ --role='roles/iam.serviceAccountUser'
Replace the following:
SERVICE_ACCOUNT_PROJECT_ID
: the Google Cloud project ID of the project that owns the service accountPRINCIPAL
: an identifier for the trigger creator in the formatuser|group|serviceAccount:email
ordomain:domain
. For example:user:[email protected]
group:[email protected]
serviceAccount:[email protected]
domain:example.domain.com
m
SERVICE_ACCOUNT_RESOURCE_NAME
: the full resource name of the service account. For example:projects/SERVICE_ACCOUNT_PROJECT_ID/serviceAccounts/SERVICE_ACCOUNT_NAME@SERVICE_ACCOUNT_PROJECT_ID.iam.gserviceaccount.com
Where:
SERVICE_ACCOUNT_PROJECT_ID
is the Google Cloud project ID that owns the service accountSERVICE_ACCOUNT_NAME
is the name of your service account
Grant permissions to support event routing
Before creating an Eventarc trigger, you must grant other IAM permissions to support routing events using Eventarc.
Grant the appropriate permissions based on what resources the Eventarc trigger must access to do its work, and the event provider and destination. For more information see All roles and permissions.
Create your trigger using the cross-project service account.