.serviceAccounts.getAccessToken permission`. You can also create a custom role. You can specify a list of service accounts, separated with commas. This creates an impersonation delegation chain in which each service account delegates its permissions to the next service account in the chain. Each service account in the list must have the `roles/iam.serviceAccountTokenCreator` role on the next service account in the list. For example, when `--impersonate-service-account=` ``SERVICE_ACCOUNT_1'',``SERVICE_ACCOUNT_2'', the active account must have the `roles/iam.serviceAccountTokenCreator` role on ``SERVICE_ACCOUNT_1'', which must have the `roles/iam.serviceAccountTokenCreator` role on ``SERVICE_ACCOUNT_2''. ``SERVICE_ACCOUNT_1'' is the impersonated service account and ``SERVICE_ACCOUNT_2'' is the delegate. )