You can grant and restrict access to Vertex AI Workbench for an organization or a project. To do so, you define an organization policy using the GDCHRestrictedService
policy type, which lets you restrict which service you can use on Google Distributed Cloud (GDC) air-gapped. When applied, the policy prevents the use of the APIs that it references.
For example, you can use this policy type to restrict the use of Vertex AI Workbench to specific projects. Only non-restricted organizations or projects can create or update JupyterLab notebooks. You can also use the policy to completely restrict access to the Vertex AI Workbench service because you want to run tests before allowing your teams to use it.
This page describes how to grant and restrict access to Vertex AI Workbench using the GDCHRestrictedService
policy type. To learn more about organization policies and how to edit the GDCHRestrictedService
organization policy, see Configure organization policies.
Before you begin
To get the permissions you need to grant or restrict access to Vertex AI Workbench for an organization or a project, ask your Organization IAM Admin to grant you the GDC Restricted Service Policy Admin (gdchrestrictedservice-policy-admin
) cluster role in your project namespace.
For more information about this role, see Prepare IAM permissions.
Restrict access to Vertex AI Workbench for your organization
To restrict access to Vertex AI Workbench for your organization, edit the GDCHRestrictedService
policy type by adding the aiplatform.gdc.goog
API group and the Notebook
kind to the kinds
field of the policy.
The following example shows how the kinds
field looks in the GDCHRestrictedService
policy type when you restrict access to Vertex AI Workbench for your entire organization:
apiVersion: constraints.gatekeeper.sh/v1beta1 kind: GDCHRestrictedService metadata: name: restrict-notebook-for-organization spec: match: scope: "Namespaced" kinds: - apiGroups: - "aiplatform.gdc.goog" kinds: - Notebook [...]
To restore an organization's access to Vertex AI Workbench, see Grant access to Vertex AI Workbench for your organization.
Restrict access to Vertex AI Workbench for a project
To restrict access to Vertex AI Workbench for a project, edit the GDCHRestrictedService
policy type by adding the aiplatform.gdc.goog
API group and the Notebook
kind to the kinds
field of the policy for the project namespace.
The difference with restricting access for an organization is that you must specify the namespace that the policy should impact. Add the namespaces
field to the policy with your project namespace.
The following example shows how the kinds
field looks in the GDCHRestrictedService
policy type when you restrict access to Vertex AI Workbench for a project:
apiVersion: constraints.gatekeeper.sh/v1beta1 kind: GDCHRestrictedService metadata: name: restrict-notebook-for-organization spec: match: scope: "Namespaced" namespaces: [PROJECT_NAMESPACE] kinds: - apiGroups: - "aiplatform.gdc.goog" kinds: - Notebook [...]
Replace PROJECT_NAMESPACE
with the namespace of the project where you want to restrict access to Vertex AI Workbench.
Grant access to Vertex AI Workbench for your organization
By default, Distributed Cloud organizations have access to Vertex AI Workbench. However, if you restricted access to Vertex AI Workbench for your organization, you can grant access again.
Follow these steps to grant access to Vertex AI Workbench for all the projects in your organization:
Identify the
GDCHRestrictedService
policy type in your organization.Find the
aiplatform.gdc.goog
API group and theNotebook
kind in the policy.If the
aiplatform.gdc.goog
API group and theNotebook
kind are the only content in thekinds
field of the policy, delete theGDCHRestrictedService
resource.If the
GDCHRestrictedService
policy contains other restricted services, remove theaiplatform.gdc.goog
API group and theNotebook
kind from thekinds
field and save the changes to the policy.