Updated on 2025-11-06 GMT+08:00

Access Control

IAM uses fine-grained authorization policies and ACLs to control access.

Table 1 IAM access control

Access Policy

Description

Reference

IAM Fine-grained Authorization Policy

IAM service permissions are divided into fine-grained policies. Identity policies define the user operations allowed or rejected by IAM. For example, if a user or user group has the IAM ReadOnlyAccessPolicy permissions, the user or user group only has the read-only permissions for IAM service data. IAM also supports custom identity policies to assign IAM service permissions.

IAM Permissions

ACL

With ACL, you can set access control policies to allow users to log in to the IAM console only from specified IP address ranges and network segments.

Login authentication policy