This guide explains how to update access permissions (Read or Write) for a GCP account connected using the Manual connection method.
To apply the latest configuration, you need to update the existing custom IAM role used for the integration and then refresh the connection in the platform.
Before You Start
You will need:
Access to Google Cloud Console
Permission to manage IAM custom roles
Your Project ID or Organization ID
The custom role created during the initial setup of the integration
Step-by-Step Guide
1. Open Google Cloud Console
Sign in to Google Cloud Console
Select the project used for the connection
2. Open Cloud Shell
Click Activate Cloud Shell
3. Download role templates
This command downloads the specified role-template.yaml file from the provided URL and saves it in your current directory. It requests a specific version of the file and will overwrite any existing local file with the same name.
It does not make any changes in your account and does not create resources or modify roles.
Run the following commands:
curl -o full-role-template.yaml \
"https://uniskai-eu-templates.s3.eu-central-1.amazonaws.com/gcp/full-role-template.yaml?versionId=kxI6vglugnYawMdfMjMCBotEhXKUe6Mn"
curl -o role-template.yaml \
"https://uniskai-eu-templates.s3.eu-central-1.amazonaws.com/gcp/role-template.yaml?versionId=du7HFyHAUefOCCV2WMtz_U5rHlvrOCV8"
You only need to download the template that matches the access level you want to apply (Read-only or Read/Write). Downloading both files is optional.
4. Update the existing role
Use the custom role that was created during the initial setup.
The role name may vary depending on your setup
This step updates the existing custom role you specify by changing its permissions to match the selected access level. It does not create a new role and does not affect any other roles in your environment.
Project level
Change from Read/Write β Read-only
gcloud iam roles update "YOUR_ROLE_ID" \
--project="YOUR_PROJECT_ID" \
--file=role-template.yaml
Change from Read-only β Read/Write
gcloud iam roles update "YOUR_ROLE_ID" \
--project="YOUR_PROJECT_ID" \
--file=full-role-template.yaml
Organization level
Change from Read/Write β Read-only
gcloud iam roles update "YOUR_ROLE_ID" \
--organization="YOUR_ORGANIZATION_ID" \
--file=role-template.yaml
Change from Read-only β Read/Write
gcloud iam roles update "YOUR_ROLE_ID" \
--organization="YOUR_ORGANIZATION_ID" \
--file=full-role-template.yaml
Confirm changes in Cloud Shell
After running the command:
Type
Yand press Enter to confirmConfirm again if prompted
After running the command, you will be prompted to confirm the changes in Cloud Shell.
Type Y and press Enter to proceed
Confirm again if prompted
Replace:
YOUR_ROLE_IDwith your custom role nameYOUR_PROJECT_IDwith your project IDYOUR_ORGANIZATION_IDwith your organization ID
5. Refresh the connection in the platform
Return to the platform
Open your connected GCP account
Click Refresh now
6. Verify updated access
Navigate to CloudSitter
Confirm that:
Resources are visible (Read access)
Actions are available (Write access)
Expected Result
The existing custom role is updated with the required permissions
The platform reflects the updated access level after refresh
Notes
Always update the existing role, do not create a new one
Make sure you are using the correct Project ID or Organization ID
Changes will not appear in the platform until you click Refresh now





