Help Center> Cloud Phone Host> User Guide> Permission Management> Example Permission Configuration
Updated on 2023-10-11 GMT+08:00

Example Permission Configuration

You can select roles and policies to grant permissions. This section provides common permission configuration examples. For details about how to configure permissions, see Creating a User and Granting CPH Permissions.

Example permission configuration:

  1. Granting all permissions

To grant all permissions for CPH to your IAM users, authorize the CPH Administrator role, the dependent Security Administrator role, and the dependent VPC FullAccess policy.

Figure 1 Granting all permissions
  1. Granting operation permissions

Operation permissions allow IAM users to operate but not to create or delete cloud phone servers or cloud phones. To grant the CPH operation permissions to IAM users, you need to assign the CPH Administrator role, the VPC FullAccess policy, and custom policies that deny the Create action to the IAM users. Figure 2 shows how to create a custom policy. For details about how to create a custom policy, see Creating a Custom Policy. Figure 3 shows how to grant operation permissions.

Figure 2 Creating a custom policy
Figure 3 Granting operation permissions
  1. Granting read-only permissions

To grant the read-only permissions for CPH to IAM users, authorize the CPH User and Tenant Guest roles.

Figure 4 Granting read-only permissions
  1. Granting permissions to perform specified operations

To grant an IAM user the permissions to perform specified operations on CPH, create a custom policy for allowing or denying specified operations. Figure 5 shows how to create a custom policy. For details about how to create a custom policy, see Creating a Custom Policy.

Figure 5 Creating a custom policy for allowing or denying specified operations