IAM Permissions
You can create IAM users under a registered cloud service account, and then use IAM policies to control users' access permissions to cloud resources.
IAM permissions define the actions that can be performed on your cloud resources. In other words, IAM permissions specify what actions are allowed or denied.
IAM permissions with OBS permissions take effect on all OBS buckets and objects. To grant an IAM user the permission to operate OBS resources, you need to assign one or more OBS permission sets to the user group to which the user belongs.
For details about OBS permissions controlled by IAM policies, see Permissions Management.
IAM Permissions Application Scenarios
IAM permissions are used to authorize IAM users under an account.
- Controlling permissions to cloud resources as a whole under an account
- Controlling permissions to all OBS buckets and objects under an account
- Controlling permissions to specified cloud resources under an account
Policy Structure and Syntax
A policy consists of a version and statements. Each policy can have multiple statements.
Policy syntax example:
{
"Version": "1.1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"obs:bucket:HeadBucket",
"obs:bucket:ListBucket",
"obs:bucket:GetBucketLocation"
],
"Resource": [
"obs:*:*:bucket:*"
],
"Condition": {
"StringEndWithIfExsits": {
"g:UserName": ["specialCharactor"]
},
"Bool": {
"g:MFAPresent": ["true"]
}
}
}
]
} | Parameter | Description |
|---|---|
| Version | The version number of a policy.
|
| Statement | Permissions defined by a policy, including Effect, Action, Resource, and Condition. Condition is optional.
|
- Fine-grained permission control at the Resource level will be deployed in regions one after another. Before using this feature, ensure that the region where your bucket resides supports the feature.
- To use the fine-grained permission control at the Resource level, submit a service ticket to OBS.
Authentication of IAM Permissions
The authentication of IAM permissions starts from the Deny statements. The following figure shows the authentication logic for resource access.
The actions in each policy bear the OR relationship.
- A user accesses the system and makes an operation request.
- The system evaluates all the permission policies assigned to the user.
- In these policies, the system looks for explicit deny permissions. If the system finds an explicit deny that applies, it returns a decision of Deny, and the authentication ends.
- If no explicit deny is found, the system looks for allow permissions that would apply to the request. If the system finds an explicit allow permission that applies, it returns a decision of Allow, and the authentication ends.
- If no explicit allow permission is found, IAM returns a decision of Deny, and the authentication ends.
Last Article: Permission Control Mechanisms
Next Article: Bucket Policies and Object Policies
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.