Creating a User and Granting Permissions
This section describes IAM's fine-grained permissions management for your HSS resources. With IAM, you can:
- Create IAM users for employees based on the organizational structure of your enterprise. Each IAM user has their own security credentials, providing access to HSS resources.
- Grant only the permissions required for users to perform a specific task.
- Entrust a cloud account or cloud service to perform professional and efficient O&M on your HSS resources.
If your account does not require individual IAM users, skip this chapter.
This section describes the procedure for granting permissions (see Figure 1).
Prerequisite
Role/Policy Name |
Description |
Type |
Dependency |
---|---|---|---|
HSS Administrator |
HSS administrator, who has all permissions of HSS |
System-defined role |
|
HSS FullAccess |
All HSS permissions |
System-defined policy |
None |
HSS ReadOnlyAccess |
Read-only permission for HSS |
System-defined policy |
None |
Authorization Process
- Create a user group and assign permissions. On the IAM console, grant the HSS Administrator permission.
- Create a user and add it to the group. On the IAM console, add the user to the group created in 1.
- Log in and verify permissions.
Log in to the HSS console as the created user, and verify that the user only has read permissions for HSS.
In Service List on the console, select any other services (for example, there is only the HSS Administrator policy). If a message indicating that the permission is insufficient is displayed, the HSS Administrator permission takes effect.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot