Permissions Management
If you need to grant your enterprise personnel permission to access your ServiceStage resources, use Identity and Access Management (IAM). IAM provides identity authentication, fine-grained permissions management, and access control. IAM helps you secure access to your cloud resources.
With IAM, you can create IAM users and grant them permission to access only specific resources. For example, if you want some software developers in your enterprise to be able to use ServiceStage resources but do not want them to be able to delete ServiceStage resources or perform any other high-risk operations, you can create IAM users and grant permission to use ServiceStage resources but not permission to delete them.
If your cloud account does not require individual IAM users for permissions management, you can skip this section.
IAM is free of charge. You pay only for the resources in your account. For details, see IAM Service Overview
ServiceStage Permissions
New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and then attach policies or roles to these groups. The users then inherit permissions from the groups and can perform specified operations on cloud services based on the permissions they have been assigned.
ServiceStage is a project-level service deployed for specific regions. To assign ServiceStage permissions to a user group, specify the scope as region-specific projects and select projects for the permissions to take effect. If All projects is selected, the permissions will take effect for the user group in all region-specific projects. When accessing ServiceStage, the users need to switch to the authorized region.
You can grant permissions by using roles and policies.
- Roles: A coarse-grained authorization strategy that defines permissions by job responsibility. Only a limited number of service-level roles are available for authorization. When you grant permissions using roles, you also need to attach any existing role dependencies. Roles are not ideal for fine-grained authorization and least privilege access.
- Policies: A fine-grained authorization strategy that defines permissions required to perform operations on specific cloud resources under certain conditions. This type of authorization is more flexible and is ideal for least privilege access.
Table 1 lists all the system-defined policies for ServiceStage. System policies are recommended. System roles are used only for compatibility with existing permission configurations.
Role/Policy Name |
Description |
Type |
Dependency |
---|---|---|---|
ServiceStage FullAccess |
Full permissions for ServiceStage. |
System-defined policy |
None |
ServiceStage ReadOnlyAccess |
Read-only permissions for ServiceStage. |
System-defined policy |
None |
ServiceStage Development |
ServiceStage developer, including permissions for operating applications, components, and environments, but excluding permissions for approving and for creating infrastructure. |
System-defined policy |
None |
CSE FullAccess |
Administrator permissions for microservice engines. |
System-defined policy |
None |
CSE ReadOnlyAccess |
View permissions for microservice engines. |
System-defined policy |
None |
ServiceStage Administrator |
ServiceStage administrator, who has full permissions for this service. |
System-defined role |
Permissions to create Tenant Guest, Server Administrator, CCE Administrator, , and APM Administrator. |
ServiceStage Operator |
ServiceStage operator, who has the read-only permission for this service. |
System-defined role |
Tenant Guest |
ServiceStage Developer |
ServiceStage developer, who has full permissions for this service but does not have the permission for creating infrastructure. |
System-defined role |
Tenant Guest |
If these policies do not meet actual requirements, you can customize policies based on Table 2 and Table 3. For more information, see Creating a Custom Policy. √: supported; x: not supported.
Operation |
ServiceStage ReadOnlyAccess |
ServiceStage Development |
ServiceStage FullAccess |
---|---|---|---|
Creating an application |
x |
√ |
√ |
Modifying an application |
x |
√ |
√ |
Querying an application |
√ |
√ |
√ |
Deleting an application |
x |
√ |
√ |
Creating a component |
x |
√ |
√ |
Searching for a component |
√ |
√ |
√ |
Deploying a component |
x |
√ |
√ |
Maintaining a component |
x |
√ |
√ |
Deleting a component |
x |
√ |
√ |
Creating a build job |
x |
√ |
√ |
Modifying a build job |
x |
√ |
√ |
Querying a build job |
√ |
√ |
√ |
Starting a build job |
x |
√ |
√ |
Deleting a build job |
x |
√ |
√ |
Creating a pipeline |
x |
√ |
√ |
Modifying a pipeline |
x |
√ |
√ |
Querying a pipeline |
√ |
√ |
√ |
Starting a pipeline |
x |
√ |
√ |
Cloning a pipeline |
x |
√ |
√ |
Deleting a pipeline |
x |
√ |
√ |
Creating repository authorization |
x |
√ |
√ |
Modifying repository authorization |
x |
√ |
√ |
Querying repository authorization |
√ |
√ |
√ |
Deleting repository authorization |
x |
√ |
√ |
Operation |
CSE ReadOnlyAccess |
CSE FullAccess |
---|---|---|
Creating a microservice engine |
x |
√ |
Maintaining a microservice engine |
x |
√ |
Querying a microservice engine |
√ |
√ |
Deleting a microservice engine |
x |
√ |
Creating a microservice |
x |
√ |
Querying a microservice |
√ |
√ |
Maintaining a microservice |
x |
√ |
Deleting a microservice |
x |
√ |
Creating microservice configurations |
x |
√ |
Querying microservice configurations |
√ |
√ |
Editing microservice configurations |
x |
√ |
Deleting microservice configurations |
x |
√ |
Creating a microservice governance policy |
x |
√ |
Querying a microservice governance policy |
√ |
√ |
Editing a microservice governance policy |
x |
√ |
Deleting a microservice governance policy |
x |
√ |
Fine-grained Permissions
- SWR does not support fine-grained permissions. Related permissions need to be authorized separately.
- When an exclusive microservice engine is created and its Billing Mode is set to Yearly/monthly:
- If you do not pay for orders, you must have the BSS Operator permission (queries cost analysis, budget details, and cost tags in the Cost Center).
- If you pay for orders, you must have the BSS Administrator permission (performs all operations in the Cost Center).
To use a custom fine-grained policy, log in to the IAM console as an administrator and select the desired fine-grained permissions for ServiceStage and CSE.
- Table 4 describes fine-grained permission dependencies of CSE.
- Table 5 describes fine-grained permission dependencies of ServiceStage.
Permission Name |
Description |
Permission Dependency |
Scenario |
---|---|---|---|
cse:engine:list |
Lists all microservice engines. |
None |
Engine list view |
cse:engine:get |
Views engine information. |
cse:engine:list |
Engine details view (supported by only exclusive microservice engines) |
cse:engine:modify |
Modifies an engine. |
|
Engine modification, including enabling or disabling public access, enabling or disabling security authentication, and retrying failed tasks, supported by only exclusive microservice engines |
cse:engine:upgrade |
Upgrades an engine. |
|
Engine upgrade, including upgrading the engine version, supported by only exclusive microservice engines. |
cse:engine:delete |
Deletes an engine. |
|
Engine deletion (supported by only exclusive microservice engines.) |
cse:engine:create |
Creates an engine. |
|
Engine creation, including creating an engine and creating a backup or restoration task, supported by only exclusive microservice engines. |
cse:config:modify |
Modifies configuration and management functions. |
|
Modification on global and governance configurations |
cse:config:get |
Views configuration and management functions. |
|
Service configuration view |
cse:governance:modify |
Modifies the governance center. |
|
Service governance creation and modification |
cse:governance:get |
Views the governance center. |
|
Service governance view |
cse:registry:modify |
Modifies service registry and management. |
|
Service modification |
cse:dashboard:modify |
Modifies the dashboard. |
|
Dashboard modification |
cse:dashboard:get |
Views the dashboard. |
|
Dashboard view |
cse:registry:get |
Views service registry and management. |
|
Service catalog view |
The dashboard does not need to be authenticated but requires registry permissions, because it uses the service catalog function to distinguish services.
Permission Name |
Description |
Permission Dependency |
Scenario |
---|---|---|---|
servicestage:app:get |
Views application information. |
servicestage:app:list |
Application information view |
servicestage:app:create |
Creates an application. |
|
Application creation |
servicestage:app:modify |
Updates an application. |
|
Application update |
servicestage:app:delete |
Deletes an application. |
|
Application deletion |
servicestage:app:list |
Views the environment and application list. |
None |
Environment and application list view |
servicestage:environment:create |
Creates an environment. |
|
Environment creation |
servicestage:environment:modify |
Updates an environment. |
|
Environment update |
servicestage:environment:delete |
Deletes an environment. |
|
Environment deletion |
servicestage:pipeline:get |
Views pipeline information. |
|
Pipeline information view |
servicestage:pipeline:create |
Creates a pipeline. |
|
Pipeline creation |
servicestage:pipeline:modify |
Modifies a pipeline. |
|
Pipeline modification |
servicestage:pipeline:delete |
Deletes a pipeline. |
|
Pipeline deletion |
servicestage:pipeline:list |
Views the pipeline list. |
|
Pipeline list view |
servicestage:pipeline:execute |
Executes a pipeline. |
|
Pipeline execution. |
servicestage:assembling:get |
Views the build information. |
servicestage:assembling:list |
Build information view |
servicestage:assembling:create |
Creates a build job. |
|
Build job creation. |
servicestage:assembling:modify |
Modifies a build job. |
|
Build job modification |
servicestage:assembling:delete |
Deletes a build job. |
|
Build job deletion |
servicestage:assembling:list |
Views the build list. |
None |
Build list view |
Roles/Policies Dependencies of ServiceStage Console
To grant an IAM user the permissions to view or use resources of other cloud services on the ServiceStage console, you must first grant the ServiceStage Administrator, ServiceStage FullAccess, or ServiceStage ReadOnlyAccess policy to the user group to which the user belongs and then grant the dependency policies listed in Table 6 to the user. These dependency policies will allow the IAM user to access resources of other cloud services.
Console Function |
Dependent Services |
Policy/Role Required |
---|---|---|
|
Application Operations Management (AOM) |
|
Performance management |
Application Performance Management (APM) |
To use a Java probe, you must have the AOM FullAccess and APM FullAccess permissions assigned. |
Component management |
Auto Scaling (AS) |
To use AS resources to deploy components in the VM environment, you must have the AutoScaling FullAccess permissions assigned. |
Cloud Container Engine (CCE) |
To use CCE resources to deploy components in the container environment, you must have the CCE FullAccess permissions assigned. |
|
Elastic Cloud Server (ECS) |
To use ECS resources to deploy components in the VM environment, you must have the ECS ReadOnlyAccess permissions assigned. |
|
Object Storage Service (OBS) |
If the component to be deployed comes from the software package stored in OBS, you must have the OBS ReadOnlyAccess permissions assigned. |
|
Microservice engine |
Cloud Service Engine (CSE) |
To bind CSE to microservice components for service registration, service governance, and configuration management, you must have the CSE FullAccess permissions assigned. |
Distributed cache |
Distributed Cache Service (DCS) |
To bind DCS to a component deployed in a container environment to read environment variables to obtain distributed cache information during application running, you must have the DCS ReadOnlyAccess permissions assigned. |
Data storage |
EVS |
If the components deployed in the container environment need to use EVS disks to store data, you must have the EVS ReadOnlyAccess permissions assigned. |
SFS |
If components deployed in a container environment need to use SFS to store data, you must have the SFS Turbo ReadOnlyAccess permissions assigned. |
|
OBS |
If components deployed in a container environment need to store data in object storage mode, you must have the OBS ReadOnlyAccess permissions assigned. |
|
Cloud database |
Relational Database Service (RDS) |
To bind RDS to components deployed in a container environment for persistent storage of application data, you must have the RDS ReadOnlyAccess permissions assigned. |
|
Elastic Load Balance (ELB) |
To set intra-VPC access or domain name access for a component to use its services, you must have the ELB ReadOnlyAccess permissions assigned. |
Public network access of components |
NAT Gateway |
To set NAT public network access for a component to use its services, you must have the NAT ReadOnlyAccess permissions assigned. |
Elastic IP (EIP) |
To set EIP public network access for a component to use its services, you must have the EIP ReadOnlyAccess permissions assigned. |
|
Elastic Load Balance (ELB) |
To set ELB public network access for a component to use its services, you must have the ELB ReadOnlyAccess permissions assigned. |
|
Component logs |
Log Tank Service (LTS) |
To interconnect with LTS to view, search for, and export LTS logs for troubleshooting and resolving problems that occur during component running, you must have the LTS FullAccess permissions assigned. |
Threshold rules |
Simple Message Notification (SMN) |
To enable SMN to send threshold alarm messages generated by components deployed in a container environment to users, you must have the SMN ReadOnlyAccess permissions assigned. |
Image repositories |
SoftWare Repository for Container (SWR) |
If the components deployed in the container environment come from the image package stored in SWR, you must have the SWR FullAccess permissions assigned. |
Tag management |
Tag Management Service (TMS) |
To use TMS to set tags for managed objects such as components for management and selection, you must have the TMS ReadOnlyAccess permissions assigned. |
Environment management |
Virtual Private Cloud (VPC) |
A VPC is used to isolate basic resources, such as computing, network, and middleware resources, used for component deployment and running in the same virtual network environment during environment creation. The VPC ReadOnlyAccess permission needs to be set. |
Helpful Links
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot