Permission Management
If you need to assign different permissions to employees in your enterprise to access your DataArts Studio resources, IAM is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you secure access to Huawei Cloud resources. If your Huawei Cloud account does not require IAM for permissions management, you can skip this section.
IAM can be used free of charge. You pay only for the resources in your account. For more information about IAM, see IAM Service Overview.
With IAM, you can use your Huawei Cloud account to create IAM users for your employees, and assign permissions to the users to control their access to specific resource types. For example, if you want to allow some software developers in your enterprise to use DataArts Studio resources but disallow them to delete workspaces or perform any high-risk operations, you can create IAM users for the software developers and grant them only the permissions required for using DataArts Studio resources.
IAM supports role/policy-based authorization and identity policy-based authorization. The following table describes their differences.
|
Authorization Model |
Core Relationship |
Permissions |
Authorization Method |
Scenario |
|---|---|---|---|---|
|
Role/Policy |
User-permission-authorization scope |
NOTE:
DataArts Studio supports system-defined roles (DAYU Administrator, DAYU User, and DataArts Studio User) but does not support system-defined policies and custom policies. |
Assigning roles or policies to principals |
To authorize a user, you need to add it to a user group first and then specify the scope of authorization. It provides a limited number of condition keys and cannot meet the requirements of fine-grained permissions control. This method is suitable for small- and medium-sized enterprises. |
|
Identity policy |
User-policy |
|
|
You can authorize a user by attaching an identity policy to it. User-specific authorization and a variety of key conditions allow for more fine-grained permissions control. However, this model can be hard to set up. It requires a certain amount of expertise and is suitable for medium- and large-sized enterprises. |
Assume that you want to grant IAM users permission to create ECSs in CN North-Beijing4 and OBS buckets in CN South-Guangzhou. With role/policy-based authorization, the administrator needs to create two custom policies and assign both to the IAM users. With identity policy-based authorization, the administrator only needs to create one custom identity policy and configure the condition key g:RequestedRegion for the policy, and then attach the policy to the users or grant the users the access permissions to the specified regions. Identity policy-based authorization is more flexible than role/policy-based authorization.
- If both permissions contain the deny action, the deny policy prevails.
- The allow actions in the two permissions both take effect.
Role/Policy-based Permissions Management
By default, new IAM users do not have any permissions. To assign permissions to a user, add the user to one or more groups and assign permissions policies or roles to these groups. The user then inherits permissions from the groups it is a member of After authorization, the users can perform specified operations.
Role/Policy-based authorization is a role-based access control (RBAC) model supported by IAM. It assigns permissions to users based on their roles. It provides two authorization mechanisms: system-defined roles and system-defined policies. Users assigned roles can quickly obtain permissions. This model is inflexible and cannot meet fine-grained permission control requirements. DataArts Studio supports system-defined roles (DAYU Administrator and DAYU User) but does not support system-defined policies or custom policies. DAYU Administrator grants all operation permissions to users. DAYU User grants permissions of instances, workspaces, and dependent services to users. Workspace roles grant operation permissions in a workspace. In this way, fine-grained permission control is available through system-defined roles and workspace roles.
- IAM Roles: IAM initially provides a coarse-grained authorization mechanism to define permissions based on users' job responsibilities. This mechanism provides only a limited number of service-level roles for authorization. However, traditional IAM roles are not an ideal choice for fine-grained authorization and secure access control.
- IAM Policies: A type of fine-grained authorization mechanism that defines permissions required to perform operations on specific cloud resources under certain conditions. This type of authorization is more flexible and is ideal for least privilege access.
DataArts Studio is a project-level service deployed in specific physical regions. To assign ServiceStage permissions to a user group, specify the scope as region-specific projects and select projects for the permissions to take effect. If All projects is selected, the permissions will take effect for the user group in all region-specific projects. When accessing DataArts Studio, users need to switch to a region where they are authorized to use cloud services.
|
Role |
Description |
Category |
Dependency |
|---|---|---|---|
|
DAYU Administrator |
Instance administrator who has all management permissions on a DataArts Studio instance and its workspaces, permissions of dependent services, and service operation permissions in all workspaces.
NOTE:
Users assigned the Tenant Administrator role have all permissions for all services except IAM. In other words, users with the Tenant Administrator role can perform all operations in DataArts Studio. |
System-defined role |
None |
|
DAYU User |
Common user who has permissions to view a DataArts Studio instance and its workspaces, and the permissions of dependent services. After assigned a role, a common user has permissions of the role to perform service operations.
Workspace roles include the preset admin, developer, deployer, operator, and viewer, and other custom roles. For details about the operation permissions of each role, see Permissions.
|
System-defined role |
None |
|
DataArts Studio User |
Common user who has permissions to view a DataArts Studio instance and its workspaces, but does not have the permissions of dependent services. After assigned a role and the permissions of dependent services, a common user has permissions of the role to perform service operations.
|
System-defined role |
None |
Identity Policy-based Permissions Management
New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and then attach policies or roles to these groups. After authorization, the users can perform specified operations.
Identity policy-based authorization is the latest ABAC authorization model supported by IAM. Administrators can customize access control policies for fine-grained and flexible permission control. supports identity policy-based authorization. System-defined identity policies provide users with permissions of instances and workspaces. After the permissions of dependent services are configured, the service operation permissions in specific workspaces are provided by workspace roles. In this way, fine-grained permission control is available through system-defined identity policies, dependent service permissions, and workspace roles.
provides the following system-defined identity policies: DataArtsStudioFullAccessPolicy, DataArtsStudioOperatorPolicy, and DataArtsStudioOperatorPolicy. Identity policies only include the permissions of instances and workspaces. Users must also be assigned the permissions of dependent services and workspace roles so that they can perform service operations. In addition, policies define permissions based on APIs. For the actions supported by , see Permissions and Supported Actions.
|
Identity Policy Name |
Description |
Type |
|---|---|---|
|
DataArtsStudioFullAccessPolicy |
Permissions for managing DataArts Studio instances and workspaces, except service operation permissions in workspaces and permissions of dependent services. After users are assigned this policy, they must also be assigned any workspace role and dependent service permissions so that they can perform service operations. For details, see Table 5. |
System-defined identity policy |
|
DataArtsStudioOperatorPolicy |
Permissions for performing common operations on DataArts Studio instances and workspaces, except service operation permissions in workspaces and permissions of dependent services. After users are assigned this policy, they must also be assigned any workspace role and dependent service permissions so that they can perform service operations. For details, see Table 5. |
System-defined identity policy |
|
DataArtsStudioReadOnlyPolicy |
Permissions for viewing DataArts Studio instances and workspaces, except service operation permissions in workspaces and permissions of dependent services. After users are assigned this policy, they must also be assigned any workspace role and dependent service permissions so that they can perform service operations. For details, see Table 5. |
System-defined identity policy |
- Admin: This role has all operation permissions in a workspace. You are advised to assign the admin role to the project owner, development owner, and O&M administrator.
- Developer: This role has permissions to create and manage resources in a workspace. You are advised to assign this role to users who develop and process tasks.
- Operator: This role has the operation permissions of services such as O&M and scheduling in a workspace, but cannot modify resources or configurations. You are advised to assign this role to users responsible for O&M management and status monitoring.
- Viewer: This role can view data in a workspace but cannot perform any other operation. You are advised to assign this role to users who only need to view data in a workspace but do not need to perform operations.
- Deployer: This role is unique to the enterprise mode and has permissions to release task packages in a workspace. In enterprise mode, when a developer submits a script or job version, the system generates a release task. After the developer confirms the release and the deployer approves the release request, the modified job is synchronized to the production environment.
- Custom roles: If the preset roles cannot meet your requirements, you can create custom roles. You can configure permissions for such roles to meet the principle of least privilege (PoLP).
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot

