Help Center/ Application Performance Management/ Service Overview(2.0)/ Permissions Policies and Supported Actions
Updated on 2025-11-19 GMT+08:00

Permissions Policies and Supported Actions

If you need to assign different permissions to employees in your enterprise to access your APM resources, Identity and Access Management (IAM) is a good choice for fine-grained permissions management. IAM provides identity authentication, fine-grained permissions management, and access control. IAM helps you secure access to your Huawei Cloud resources. If your HUAWEI ID does not require IAM for permissions management, you can skip this section.

IAM is a free service. You only pay for the resources in your account.

With IAM, you can control access to specific Huawei Cloud resources. For example, if you want some software developers in your enterprise to use APM resources but do not want them to delete APM resources or perform any other high-risk operations, you can grant permission to use APM resources but not permission to delete them.

IAM supports role/policy-based authorization and identity policy-based authorization.

The following table describes the differences between these two authorization models.

Table 1 Differences between role/policy-based authorization and identity policy-based authorization

Authorization Model

Authorization Using

Permissions

Authorization Method

Scenario

Role/Policy-based authorization

User-permission-authorization scope

  • System-defined roles
  • System-defined policies
  • Custom policies

Assigning roles or policies to principals

To authorize a user, you need to add it to a user group first and then specify the scope of authorization. It provides a limited number of condition keys and cannot meet the requirements of fine-grained permissions control. This method is suitable for small- and medium-sized enterprises.

Identity policy-based authorization

User-policy

  • System-defined identity policies
  • Custom identity policies
  • Assigning identity policies to principals
  • Attaching identity policies to principals

You can authorize a user by attaching an identity policy to it. User-specific authorization and a variety of key conditions allow for more fine-grained permissions control. However, this model is hard to set up. It requires a certain amount of expertise and is suitable for medium- and large-sized enterprises.

Assume that you want to grant IAM users permission to create ECSs in CN North-Beijing4 and OBS buckets in CN South-Guangzhou. With role/policy-based authorization, the administrator needs to create two custom policies and assign both to the IAM users. With identity policy-based authorization, the administrator only needs to create one custom identity policy and configure the condition key g:RequestedRegion for the policy, and then attach the policy to the users or grant the users the access permissions to the specified regions. Identity policy-based authorization is more flexible than role/policy-based authorization.

Policies/Identity policies and actions in the two authorization models are not interoperable. You are advised to use the identity policy-based authorization model. For details about system-defined permissions, see Role/Policy-based Authorization and Identity Policy-based Authorization.

For more information about IAM, see IAM Service Overview.

Constraints

Traces and Agent statistics do not involve your entity resources. To ensure statistics integrity, authorized users can check the trace and Agent statistics in all enterprise projects of a tenant.

Role/Policy-based Authorization

APM supports role/policy-based authorization. New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and then attach policies or roles to these groups. The users then inherit permissions from the user group and can perform specified operations on cloud services.

APM is a global service. By default, the APM permissions granted to a user take effect in all regions supported by APM. APM resources are isolated by tenant. All users under a tenant share resources. To isolate resources, use enterprise projects.

APM is a global service and can be accessed without specifying a physical region. During authorization, choose Enterprise > Project Management to set permissions.

Table 2 lists all the system permissions supported by APM.

Table 2 System permissions supported by APM

Role

Description

Category

Dependencies

APM FullAccess

Full permissions for APM

System-defined policy

None

APM ReadOnlyAccess

Read-only permissions for APM

System-defined policy

None

Table 3 lists the common operations supported by each system-defined policy or role of APM. Choose policies or roles as required.

Table 3 Common operations supported by each system-defined policy or role of APM

Operation

APM FullAccess

APM ReadOnlyAccess

Querying the alarm list

Querying alarm details

Querying alarm notification details

Obtaining application configuration

Creating application configuration

x

Deleting application configuration

x

Modifying application configuration

x

Querying a tag

Adding a tag

x

Deleting a tag

x

Modifying a tag

x

Querying a resource tag

Adding a resource tag

x

Deleting a resource tag

x

Modifying a resource tag

x

Querying an alarm template

Adding an alarm template

x

Deleting an alarm template

x

Modifying an alarm template

x

Obtaining a notification

Deleting a notification

x

Adding a notification

x

Modifying a notification

x

Obtaining URL tracing configuration

Deleting URL tracing configuration

x

Adding a URL for tracing

x

Modifying URL tracing configuration

x

Querying a URL tracing view

Obtaining the URL tracing list

Obtaining the global topology

Querying a sub-application

Querying environment configuration

Adding environment configuration

x

Deleting environment configuration

x

Modifying environment configuration

x

Obtaining an instance

Deleting an instance

x

Modifying an instance

x

Querying a monitoring item

Modifying a monitoring item

x

Obtaining collection status

Obtaining a custom alarm policy

Deleting a custom alarm policy

x

Modifying a custom alarm policy

x

Creating a custom alarm policy

x

Obtaining the environment topology

Obtaining a metric view

Obtaining the trace list

Obtaining trace details

Obtaining collector information

Obtaining an access key

x

Modifying an access key

x

Deleting an access key

x

Adding an access key

x

Obtaining general configuration

Modifying general configuration

x

Checking Agent statistics

Associating traces with logs

x

Roles/Policies Required by APM Dependency Services

Table 4 Roles/Policies required by APM dependency services

Console Function

Dependency Service

Policy/Role Required

  • Workload monitoring
  • Cluster monitoring
  • Prometheus for CCE

CCE

To use workload and cluster monitoring and Prometheus for CCE, you need to set the CCE FullAccess and CCE Namespace permissions.

Data subscription

DMS for Kafka

To use data subscription, you need to set the DMS ReadOnlyAccess permission.

  • Application monitoring
  • Performance monitoring
  • Open tracing
  • Web monitoring
  • App monitoring
  • System management

APM

To use application monitoring, performance monitoring, open tracing, web monitoring, app monitoring, and alarm rule functions, you need to set the APM FullAccess permission. For details about fine-grained policies, see section "Permissions Management."

Enterprise projects

Enterprise Project Management Service (EPS)

To use enterprise projects, you need to set the EPS ReadOnlyAccess permission. For details about the fine-grained policy permissions, see Permissions.

Identity Policy-based Authorization

APM supports identity policy-based authorization. Table 5 lists all the system-defined identity policies for APM. System-defined policies in identity policy-based authorization are not interoperable with those in role/policy-based authorization.

Table 5 System-defined identity policies supported by APM

Identity Policy Name

Description

Type

APMAdministratorPolicy

Full permissions for APM

System-defined identity policy

APMFullPolicy

Full permissions for APM

System-defined identity policy

APMReadOnlyPolicy

Read-only permissions for APM

System-defined identity policy

Table 6 lists the common operations supported by system-defined identity policies for APM.

Table 6 Common operations supported by system-defined identity policies

Operation

APMAdministratorPolicy

APMFullPolicy

APMReadOnlyPolicy

Querying the alarm list

x

Querying alarm details

x

Querying alarm notification details

x

Obtaining application configuration

x

Creating application configuration

x

Deleting application configuration

x

Modifying application configuration

x

Querying a tag

x

Adding a tag

x

Deleting a tag

x

Modifying a tag

x

Querying a resource tag

x

Adding a resource tag

x

Deleting a resource tag

x

Modifying a resource tag

x

Querying an alarm template

x

Adding an alarm template

x

Deleting an alarm template

x

Modifying an alarm template

x

Obtaining a notification

x

Deleting a notification

x

Adding a notification

x

Modifying a notification

x

Obtaining URL tracing configuration

x

Deleting URL tracing configuration

x

Adding a URL for tracing

x

Modifying URL tracing configuration

x

Querying a URL tracing view

x

Obtaining the URL tracing list

x

Obtaining the global topology

x

Querying a sub-application

x

Querying environment configuration

x

Adding environment configuration

x

Deleting environment configuration

x

Modifying environment configuration

x

Obtaining an instance

x

Deleting an instance

x

Modifying an instance

x

Querying a monitoring item

x

Modifying a monitoring item

x

Obtaining collection status

x

Obtaining a custom alarm policy

x

Deleting a custom alarm policy

x

Modifying a custom alarm policy

x

Creating a custom alarm policy

x

Obtaining the environment topology

x

Obtaining a metric view

x

Obtaining the trace list

x

Obtaining trace details

x

Obtaining collector information

x

Obtaining an access key

x

x

Modifying an access key

x

Deleting an access key

x

Adding an access key

x

Obtaining general configuration

x

Modifying general configuration

x

Checking Agent statistics

Associating traces with logs

x