Help Center/ Cloud Service Engine/ Service Overview/ Security/ Identity Authentication and Access Control
Updated on 2023-11-27 GMT+08:00

Identity Authentication and Access Control

Identity authentication

CSE can be authenticated by role-based access control (RBAC).

You can use an account associated with the admin role to create an account and associate a proper role with the account based on service requirements. Users using this account have the permissions to access and perform operations on the microservice engine. For details, see Security Authentication Overview.

Configuring Access Control

If you need to assign different permissions to employees in your enterprise to access your CSE resources, Identity and Access Management (IAM) is a good choice for fine-grained permissions management.

Access Policy

Description

Documentation

IAM permissions

IAM permissions define which actions on your cloud resources are allowed and which actions are denied, to control access to your resources. After creating an IAM user, the administrator needs to add it to a user group and grant the permissions required by CSE to the user group. Then, all users in this group automatically inherit the granted permissions.

Permissions

Custom permissions

A microservice engine may be used by multiple users. Different users must have different microservice engine access and operation permissions based on their responsibilities and permissions. The exclusive microservice engine with security authentication enabled provides the RBAC-based system management through the microservice console. You can customize policies for roles based on service requirements.

System Management Overview