Creating a User and Authorizing the User the Permission to Access DEW
This section describes IAM's fine-grained permissions management for your DEW resources. With IAM, you can:
- Create IAM users for employees based on the organizational structure of your enterprise. Each IAM user has its own security credentials to access DEW resources.
- Grant users only the permissions required to perform a task.
- Entrust a cloud account or cloud service to perform professional, efficient O&M on your DEW resources.
If your account does not need individual IAM users, skip this chapter.
This section describes the procedure for granting permissions (see Figure 1).
Prerequisites
Before granting permissions to a user group, you need to understand the available DEW permissions, and grant permissions based on the real-life scenario. The following tables describe the permissions supported in DEW.
For details about the permissions of other services, see .
|
Role/Policy |
Description |
Type |
|---|---|---|
|
KMS Administrator |
Administrator permissions for the encryption key |
Role |
|
KMS CMK Admin |
All permissions for the encryption keys |
Policy |
Authorization Process
- .
Create a user group on the IAM console and grant the user group the KMS CMK Admin permission (indicating full permissions for keys).
-
Create a user on the IAM console and add the user to the user group created in 1.
- and verify permissions.
Log in to the console as newly created user, and verify that the user only has the assigned permissions.
Tenant Guest Roles
If you have configured Tenant Guest permissions for the IAM account, apart from the read-only permissions for all cloud services except Identity and Access Management (IAM), you also have the following KMS permissions:
- kms:cmk:create: Create a key.
- kms:cmk:createDataKey: Create a DEK.
- kms:cmk:createDataKeyWithoutPlaintext: Create a plaintext-free DEK.
- kms:cmk:encryptDataKey: Encrypt the DEK.
- kms:cmk:decryptDataKey: Decrypt a DEK.
- kms:cmk:retireGrant: Retire a grant.
- kms:cmk:decryptData: Decrypt data.
- kms:cmk:encryptData: Encrypt data.
- kms::generateRandom: Generate a random number.
If you want to configure the Tenant Guest role for an IAM user but do not want to have the preceding permissions, you need to configure a custom deny policy for the IAM user. For details about how to configure a custom policy, see Creating a Custom DEW Policy.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot
