Help Center/ DataArts Fabric/ Service Overview/ Permissions Management
Updated on 2025-07-08 GMT+08:00

Permissions Management

If you need to assign different permissions to employees in your enterprise to access your DataArtsFabric resources, IAM is a good choice for fine-grained permissions management. This service provides identity authentication, permissions management, and access control, helping you to securely access your Huawei Cloud resources. If your Huawei Cloud account does not require IAM for permissions management, you can skip this section.

IAM can be used free of charge. You pay only for the resources in your account.

With IAM, you can assign permissions to control users' access to specific resources. For example, if you want some software developers in your enterprise to be able to use DataArtsFabric resources but do not want them to be able to delete resources or perform any other high-risk operations, you can create IAM users and grant permission to use DataArtsFabric resources but not permission to delete them.

DataArtsFabric supports role/policy-based authorization.

Table 1 Role/Policy-based authorization

Policy

Core Relationship

Permission

Authorization Method

Application Scenario

Role/Policy-based authorization

User-permission-authorization scope

  • System-defined roles
  • System-defined policies
  • Custom policies

Assigning roles or policies to principals

To authorize a user, you need to add it to a user group first and then specify the scope of authorization. It provides a limited number of condition keys and cannot meet the requirements of fine-grained permissions control. This method is suitable for small- and medium-sized enterprises.

Assume that you want to grant IAM users permission to create ECSs in CN North-Beijing4 region A and OBS buckets in CN South-Guangzhou region B. With role/policy-based authorization, the administrator needs to create two custom policies and assign both to the IAM users. With identity policy-based authorization, you only need to create one custom identity policy, use the condition key g:RequestedRegion for the policy, and then attach the policy to the users or grant the users the access permissions to the specified regions. Identity policy-based authorization is more flexible than role/policy-based authorization.

For more information about IAM, see IAM Service Overview.

Role/Policy-based Authorization

DataArtsFabric supports role/policy-based authorization. By default, new IAM users do not have any permissions. You need to add a user to one or more groups, and assign permissions policies or roles to these groups. Users inherit permissions of the groups to which they are added. This process is called authorization. The users then inherit permissions from the groups and can perform specified operations on cloud services.

DataArtsFabric is a project-level service deployed and accessed in specific physical regions. When you set Scope to Region-specific projects and select the specified projects (for example, cn-north-4) in the specified regions (for example, CN North-Beijing4), the users only have permissions for resources in the selected projects. If you set Scope to All resources, the users have permissions for resources in all region-specific projects. When accessing DataArtsFabric, the users need to switch to a region where they have been authorized to use this service.

The following table lists all system-defined permissions of DataArtsFabric.

Table 2 System-defined permissions for DataArtsFabric

Role/Policy Name

Description

Category

Dependency

DataArtsFabricFullPolicy

Full permissions for DataArtsFabric.

System-defined policy

  • IAM Agency Management FullAccess
  • OBS OperateAccess
  • LakeFormation ReadOnlyAccess
  • KMS Administrator (optional)

DataArtsFabricConsoleFullPolicy

All permissions for using DataArtsFabric on the console, including all permissions of DataArtsFabricFullPolicy and some permissions required on the console.

System-defined policy

  • IAM Agency Management FullAccess
  • OBS OperateAccess
  • LakeFormation ReadOnlyAccess
  • IAM PolicyFullAccess
  • KMS Administrator (optional)

DataArtsFabricReadOnlyPolicy

Read-only permissions for DataArtsFabric.

System-defined policy

LakeFormation ReadOnlyAccess

The following table lists the common operations supported by system-defined permissions for DataArtsFabric. You can refer to this table to select the permissions as required.

Table 3 Common DataArtsFabric operations supported by system-defined permissions

Operation

DataArtsFabricConsoleFullPolicy

DataArtsFabricFullPolicy

DataArtsFabricReadOnlyPolicy

Listing workspaces

Creating a workspace

×

Modifying a workspace

×

Modifying workspace monitoring configuration

×

Deleting a workspace

×

Querying compute resources

Creating a computing resource

×

Modifying a compute resource

×

Deleting a compute resource

×

Listing the endpoints of a workspace

Creating an endpoint for a workspace

×

Querying the endpoint details of a workspace

Modifying an endpoint of a workspace

×

Deleting an endpoint of a workspace

×

Listing jobs

Creating a job

×

Querying a job

Modifying a job

×

Deleting a job

×

Listing services

Creating a service

×

Modifying a service

×

Querying a service

Deleting a service

×

Creating a model

×

Listing models

Querying a model

Deleting a model

×

Modifying a model

×

Creating a tag

×

Deleting a tag

×

Listing tags

Querying tags of a specific resource

Listing resources by tag

Creating a notification policy

×

Listing notification policies

Deleting a notification policy

×

Listing running jobs

Running a job

×

Querying a running job

Deleting a running job

×

Canceling a running job

×

Invoking an inference service instance

×

Listing routes

Querying session information

Subscribing to a public endpoint

×

Role/Policy Dependencies of the DataArtsFabric Console

Table 4 Roles or policies that are required for performing operations on the DataArtsFabric console

Console Function

Dependency

Role/Policy Required

Granting service permissions

IAM

Granting permissions on the authorization page requires the IAM user to have the IAM Agency Management FullAccess policy.

Creating a workspace

LakeFormation

Users with the DataArtsFabricFullPolicy policy can create workspaces. Specifying a LakeFormation metastore during workspace creation requires the LakeFormation ReadOnlyAccess policy.

Creating a model

OBS

To create a model and specify its OBS file path on the model management page, an IAM user must have the DataArtsFabricFullPolicy and OBS OperateAccess policies.

Creating a notification policy

IAM

SMN

Creating a notification policy requires an IAM user to have the DataArtsFabricFullPolicy, IAM Agency Management ReadOnly, and SMN ReadOnlyAccess policies.