Identity Authentication and Access Control
Identity Authentication
You can access DataArts Studio through the DataArts Studio console or open APIs. In either way, access requests are sent through the RESTful APIs provided by DataArts Studio.
DataArts Studio APIs can be accessed upon successful authentication. Requests sent through the console can be authenticated using tokens, and requests for calling APIs can be authenticated using tokens or AK/SK. For details, see Authentication.
Access Control Overview
You can use Identity and Access Management (IAM) to implement fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you secure access to your Huawei Cloud resources. For more information about IAM, see the IAM Service Overview.
- If both permissions contain the deny action, the deny policy prevails.
- The allow actions in the two permissions both take effect.
Role/Policy-based Permissions
Role/Policy-based authorization is a role-based access control (RBAC) model supported by IAM. It assigns permissions to users based on their roles. It provides two authorization mechanisms: system-defined roles and system-defined policies. Users assigned roles can quickly obtain permissions. This model is inflexible and cannot meet fine-grained permission control requirements. DataArts Studio supports system-defined roles (DAYU Administrator and DAYU User) but does not support system-defined policies or custom policies. DAYU Administrator grants all operation permissions to users. DAYU User grants permissions of instances, workspaces, and dependent services to users. Workspace roles grant operation permissions in a workspace. In this way, fine-grained permission control is available through system-defined roles and workspace roles.
- IAM Roles: IAM initially provides a coarse-grained authorization mechanism to define permissions based on users' job responsibilities. This mechanism provides only a limited number of service-level roles for authorization. However, traditional IAM roles are not an ideal choice for fine-grained authorization and secure access control.
- IAM Policies: A type of fine-grained authorization mechanism that defines permissions required to perform operations on specific cloud resources under certain conditions. This type of authorization is more flexible and is ideal for least privilege access.
Identity Policy-based Permissions
Identity policy-based authorization is the latest ABAC authorization model supported by IAM. Administrators can customize access control policies for fine-grained and flexible permission control. supports identity policy-based authorization. System-defined identity policies provide users with permissions of instances and workspaces. After the permissions of dependent services are configured, the service operation permissions in specific workspaces are provided by workspace roles. In this way, fine-grained permission control is available through system-defined identity policies, dependent service permissions, and workspace roles.
provides the following system-defined identity policies: DataArtsStudioFullAccessPolicy, DataArtsStudioOperatorPolicy, and DataArtsStudioOperatorPolicy. Identity policies only include the permissions of instances and workspaces. Users must also be assigned the permissions of dependent services and workspace roles so that they can perform service operations. In addition, policies define permissions based on APIs. For the actions supported by , see Permissions and Supported Actions.
|
Identity Policy Name |
Description |
Type |
|---|---|---|
|
DataArtsStudioFullAccessPolicy |
Permissions for managing DataArts Studio instances and workspaces, except service operation permissions in workspaces and permissions of dependent services. After users are assigned this policy, they must also be assigned any workspace role and dependent service permissions so that they can perform service operations. For details, see Table 5. |
System-defined identity policy |
|
DataArtsStudioOperatorPolicy |
Permissions for performing common operations on DataArts Studio instances and workspaces, except service operation permissions in workspaces and permissions of dependent services. After users are assigned this policy, they must also be assigned any workspace role and dependent service permissions so that they can perform service operations. For details, see Table 5. |
System-defined identity policy |
|
DataArtsStudioReadOnlyPolicy |
Permissions for viewing DataArts Studio instances and workspaces, except service operation permissions in workspaces and permissions of dependent services. After users are assigned this policy, they must also be assigned any workspace role and dependent service permissions so that they can perform service operations. For details, see Table 5. |
System-defined identity policy |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot

