Hello Team, as per the documentation given here we are trying to opt in the early enforcement and ran this DDL statement by putting the correct PROJECT_ID and REGION. This statement returned the result as the enforcement got applied.
ALTER PROJECT PROJECT_ID SET OPTIONS ( `region-REGION.enable_fine_grained_dataset_acls_option` = TRUE);
So, we are doing the POC to check what are those custom roles are there which may fail after the enforcement got applied. So tested with one custom role which has the following permissions:
"bigquery.datasets.create",
"bigquery.datasets.delete",
"bigquery.datasets.get",
"bigquery.datasets.update",
Now, user with this role should not access BQ dataset ACLs since it doesn't have the bigquery.dataset.getIamPolicy permission. But users with this role are able to get the ACLs and also able to update the ACLs.
Can you please help in this regards
Hi @ps533i,
Welcome to Google Cloud Community!
Here are some suggestions that may help resolve the issue:
Was this helpful? If so, please accept this answer as “Solution”. If you need additional assistance, reply here within 2 business days and I’ll be happy to help.