Updated on 2022-10-29 GMT+08:00

Concepts

  • Account

    The account has full access permissions for all of its cloud services and resources. It can be used to reset user passwords and grant user permissions. For security purposes, do not directly use the account to perform routine management. Instead, create IAM users and grant them permissions for routine management.

  • User

    A user is created using an account, for access to cloud services. Each user has their own identity credentials (password and access keys).

    An IAM user can view the account ID and user ID on the My Credentials page of the console. The account name, username, and password will be required for API authentication.

  • Region

    Regions are divided based on geographical location and network latency. Public services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS), Object Storage Service (OBS), Virtual Private Cloud (VPC), Elastic IP (EIP), and Image Management Service (IMS), are accessible within the same region. Regions are classified as universal regions and dedicated regions. A universal region provides universal cloud services for common tenants. A dedicated region provides specific services for specific tenants.

  • AZ

    An AZ contains one or more physical data centers. It has independent cooling, fire extinguishing, moisture-proof, and electricity facilities. Within an AZ, computing, network, storage, and other resources are logically divided into multiple clusters. AZs within a region are interconnected using high-speed optical fibers to allow you to build cross-AZ high-availability systems.

  • Project

    Projects isolate resources (including compute, storage, and network resources) across physical regions. A default project is provided for each cloud service region, and subprojects can be created under each default project. Users can be granted permissions to access all resources in a specific project. For more refined access control, create subprojects under a project and create resources in the subprojects. Users can then be assigned permissions to access specific resources in the subprojects.

    Figure 1 Project isolation model