Updated on 2023-07-03 GMT+08:00

Configuring Access Control

IAM uses fine-grained authorization policies and ACLs to control access.

Table 1 IAM access control

Access Policy

Description

Reference

IAM Fine-grained Authorization Policy

IAM service permissions are divided into roles or fine-grained policies. Roles and policies define the user operations allowed or rejected by IAM. For example, if a user or user group has the IAM ReadOnlyAccess permission, the user or user group only has the read-only permission on IAM service data. IAM also supports custom policies to assign IAM service permissions.

IAM Permissions

ACL

With ACL, you can set access control policies to allow users to log in to the IAM console or open APIs only from specified IP address ranges, network segments, and VPC endpoints.

ACL