Updated on 2025-11-14 GMT+08:00

Permissions

If you need to grant your enterprise personnel permission to access your CodeArts PerfTest resources, use Identity and Access Management (IAM). IAM provides identity authentication, fine-grained permissions management, and access control. IAM helps you secure access to your Huawei Cloud resources. If your Huawei Cloud account does not require IAM for permissions management, you can skip this section.

IAM is a free service. You only pay for the resources in your account.

With IAM, you can control access to specific Huawei Cloud resources. For example, if you want some software developers in your enterprise to be able to use CodeArts PerfTest resources but do not want them to be able to delete resources or perform any other high-risk operations, you can create IAM users and grant permission to use CodeArts PerfTest resources but not permission to delete them.

IAM supports role/policy-based authorization and identity policy-based authorization.

The following table describes the differences between these two authorization models.

Table 1 Differences between role/policy-based and identity policy-based authorization

Authorization Model

Core Relationship

Permissions

Authorization Method

Scenario

Role/Policy

User-permission-authorization scope

  • System-defined roles
  • System-defined policies
  • Custom policies

Assigning roles or policies to principals

To authorize a user, you need to add it to a user group first and then specify the scope of authorization. It provides a limited number of condition keys and cannot meet the requirements of fine-grained permissions control. This method is suitable for small- and medium-sized enterprises.

Identity policy

User-policy

  • System-defined identity policies
  • Custom identity policies
  • Assigning identity policies to principals
  • Attaching identity policies to principals

You can authorize a user by attaching an identity policy to it. User-specific authorization and a variety of key conditions allow for more fine-grained permissions control. However, this model can be hard to set up. It requires a certain amount of expertise and is suitable for medium- and large-sized enterprises.

Assume that you want to grant IAM users permission to create ECSs in CN North-Beijing4 and OBS buckets in CN South-Guangzhou. With role/policy-based authorization, the administrator needs to create two custom policies and assign both to the IAM users. With identity policy-based authorization, the administrator only needs to create one custom identity policy and configure the condition key g:RequestedRegion for the policy, and then attach the policy to the users or grant the users the access permissions to the specified regions. Identity policy-based authorization is more flexible than role/policy-based authorization.

Policies and actions in the two authorization models are not interoperable. You are advised to use the identity policy-based authorization model. For details about system-defined permissions, see Role/Policy-based Authorization and Identity Policy-based Authorization.

For more information about IAM, see IAM Service Overview.

Role/Policy-based Authorization

CodeArts PerfTest supports system role-based authorization but does not support system policy-based authorization. New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and then attach policies or roles to these groups. The users then inherit permissions from the groups and can perform specified operations on cloud services based on the permissions they have been assigned.

CodeArts PerfTest is a project-level service deployed for specific regions. When you set Scope to Region-specific projects and select projects (for example, ap-southeast-3) in the specified regions (for example, AP-Singapore), the users only have permissions for CodeArts resources in the selected projects. If you set Scope to All resources, the users have permissions for CodeArts resources in all region-specific projects. When accessing CodeArts PerfTest, the users need to switch to the authorized region.

Table 2 lists all the system permissions for CodeArts PerfTest.

Table 2 System-defined roles for CodeArts PerfTest

Role Name

Description

Dependencies

CodeArts PerfTest Administrator

Administrator permissions for CodeArts PerfTest. Users with these permissions can perform all operations on CodeArts PerfTest and test resources of the current tenant and all IAM users, such as adding, deleting, modifying, and querying resources.

This role depends on the Server Administrator, Tenant Guest, CCE Administrator, and VPCEndpoint Administrator roles.

CodeArts PerfTest Developer

Developer permissions for CodeArts PerfTest. Users with these permissions can perform all operations, such as adding, deleting, modifying, and querying resources, only on a user's own CodeArts PerfTest and test resources.

This role depends on the Tenant Guest role.

CodeArts PerfTest Operator

Operator permissions for CodeArts PerfTest. Users with these permissions can only read their own CodeArts PerfTest and test resources.

This role depends on the Tenant Guest role.

CodeArts PerfTest Resource Administrator

Resource administrator permissions for CodeArts PerfTest. Users with these permissions have all permissions related to test resources in CodeArts PerfTest.

This role depends on the Tenant Guest, CCE Administrator, and VPCEndpoint Administrator roles.

CodeArts PerfTest Resource Developer

Resource developer permissions for CodeArts PerfTest. Users with these permissions can only view and use CodeArts PerfTest resources, but cannot create, update, or delete infrastructure resources.

This role depends on the Tenant Guest role.

The following table lists the common operations supported by system-defined permissions for CodeArts PerfTest.

Table 3 Common operations supported by system-defined permissions (performance test design)

Operation

CodeArts PerfTest Administrator

CodeArts PerfTest Developer

CodeArts PerfTest Operator

Querying subscribed CodeArts PerfTest packages on the console

Querying all PerfTest projects of a tenant on the console

×

×

Querying all PerfTest projects of the current user on the console

Editing all PerfTest projects, test cases, and tasks of a tenant on the console

×

×

Editing a PerfTest project, test case, or task of the current user on the console

×

Querying all JMeter projects of a tenant on the console

×

×

Querying JMeter projects of the current user on the console

Editing all JMeter projects, test plans, and thread groups of a tenant on the console

×

×

Editing a JMeter project, test plan, or thread group of the current user on the console

×

Table 4 Common operations supported by system-defined permissions (performance test execution)

Operation

CodeArts PerfTest Administrator

CodeArts PerfTest Resource Administrator

CodeArts PerfTest Resource Developer

Adding, deleting, and modifying test resources on the console

×

Querying test resources on the console

Querying test resources on the console when starting a PerfTest/JMeter task

Role/Policy Dependencies of the CodeArts PerfTest Console

Table 5 Role/Policy dependencies of the CodeArts PerfTest console

Console Function

Dependency

Role/Policy Required

Test resources

Cloud Container Engine (CCE)

An IAM user can access the CCE cluster information only after being granted the CCE Administrator permission.

VPC Endpoint (VPCEP)

An IAM user can enable communication between debugging and execution nodes and CodeArts PerfTest only after being granted the VPCEndpoint Administrator permission.

Intelligent analysis

Application Performance Management (APM)

IAM users can query the APM application group list only after being granted the APM ReadOnlyAccess permission.

Application Operations Management (AOM)

IAM users can query AOM nodes only after being granted the AOM ReadOnlyAccess permission.

Identity Policy-based Authorization

CodeArts PerfTest supports identity policy-based authorization. Table 6 lists all the system-defined identity policies for CodeArts PerfTest.

Table 6 System-defined identity policies for CodeArts PerfTest

Identity Policy Name

Description

Type

CodeArtsPerfTestFullAccessPolicy

Full permissions for CodeArts PerfTest

System-defined identity policy

CodeArtsPerfTestReadOnlyPolicy

Read-only permissions for CodeArts PerfTest

System-defined identity policy

CodeArtsPerfTestResourceFullAccessPolicy

Administrator permissions for CodeArts PerfTest resources

System-defined identity policy

CodeArtsPerfTestResourceDeveloperPolicy

Developer permissions for CodeArts PerfTest resources

System-defined identity policy

The following table lists the common operations supported by system-defined identity policies for CodeArts PerfTest.

Table 7 Common operations supported by system-defined policies (performance test design)

Operation

CodeArtsPerfTestFullAccessPolicy

CodeArtsPerfTestReadOnlyPolicy

Querying subscribed CodeArts PerfTest packages on the console

Subscribing to a CodeArts PerfTest package on the console

×

Querying all PerfTest projects of a tenant on the console

Editing all PerfTest projects, test cases, and tasks of a tenant on the console

×

Querying all JMeter projects of a tenant on the console

Editing all JMeter projects, test plans, and thread groups of a tenant on the console

×

Table 8 Common operations supported by system-defined policies (performance test execution)

Operation

CodeArtsPerfTestFullAccessPolicy

CodeArtsPerfTestResourceFullAccessPolicy

CodeArtsPerfTestResourceDeveloperPolicy

Adding, deleting, and modifying test resources on the console

×

Querying test resources on the console

Querying test resources on the console when starting a PerfTest/JMeter task

Identity Policy Dependencies of the CodeArts PerfTest Console

The CodeArtsPerfTestFullAccessPolicy identity policy already contains all the permissions required by the CodeArts PerfTest console. No additional identity policies are needed. If you use an identity policy other than CodeArtsPerfTestFullAccessPolicy, add the identity policy of the dependent service by referring to Table 9.

Table 9 Identity policy dependencies of the CodeArts PerfTest console

Console Function

Dependency

Role/Policy Required

Test resources

Cloud Container Engine (CCE)

To create and edit a private resource group, you must be granted the CCEFullPolicy permission to access the CCE cluster information.

Identity and Access Management (IAM)

To create and edit a private resource group, you must be granted the iam:agencies:createV5 and iam:agencies:attachPolicyV5 permissions to create the perftest_admin_trust tenant agency.

VPC Endpoint (VPCEP)

To create and edit a private resource group, you must be granted the VPCEPFullAccessPolicy permission to enable your ECSs to communicate with CodeArts PerfTest.

Intelligent analysis

Application Performance Management (APM)

To use Java probes, you must have the APMFullAccessPolicy policy assigned.