Help Center> Anti-DDoS Service> Service Overview> Permissions Management> CNAD Basic (Anti-DDoS) Permissions

CNAD Basic (Anti-DDoS) Permissions

If you need to assign different permissions to employees in your enterprise to access your CNAD Basic (Anti-DDoS) resources, IAM is an ideal choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you efficiently manage access to your CNAD Basic (Anti-DDoS) resources.

With IAM, you can use your HUAWEI CLOUD account to create IAM users for your employees, and assign permissions to the users to control their access to specific resource types. For example, some software developers in your enterprise need to use Anti-DDoS resources but must not delete them or perform any high-risk operations. To achieve this purpose, you can create IAM users for the software developers and grant them only the permissions required for using Anti-DDoS resources.

If your HUAWEI CLOUD account does not need individual IAM users for permissions management, skip this topic.

IAM is free. You pay only for the resources in your account. For more information about IAM, see the IAM Service Overview.

Anti-DDoS Permissions

By default, new IAM users do not have any permissions. You need to add a user to one or more groups, and attach permission policies or roles to these groups. Users inherit permissions from their groups and can perform specified operations on cloud services based on the permissions.

Anti-DDoS is a project-level service deployed in specific physical regions. Therefore, Anti-DDoS permissions are assigned to users in specific regions (such as CN North-Beijing1) and only take effect for these regions. If you want the permissions to take effect for all regions, you need to assign the permissions to users in each region. When accessing Anti-DDoS, the users need to switch to a region where they have been authorized.

Table 1 lists all the system policies supported by Anti-DDoS. HUAWEI CLOUD services interwork with each other, and roles of Anti-DDoS are dependent on roles of other services to take effect. When assigning Anti-DDoS permissions to users, you also need to assign dependent roles for the Anti-DDoS permissions to take effect.

Table 1 Anti-DDoS system policies

Policy Name

Description

Dependency

Anti-DDoS Administrator

Administrator permissions for Anti-DDoS.

It depends on the Tenant Guest role.

Tenant Guest: a global role, which must be assigned in the Global project