Help Center/ Ubiquitous Cloud Native Service/ FAQs/ Permissions/ How Do I Configure Access Permissions for Each Function of the UCS Console?
Updated on 2025-07-29 GMT+08:00

How Do I Configure Access Permissions for Each Function of the UCS Console?

Symptom

The functions of the UCS console are controlled by IAM. When an unauthorized user accesses a page on the UCS console, an error message is displayed, indicating that the user does not have the access permissions or permission authentication fails.

Solution

The administrator needs to grant users the permissions for using functions of the UCS console. IAM system policies (including UCS FullAccess, UCS CommonOperations, UCS CIAOperations, and UCS ReadOnlyAccess) are used to define user permissions.

Table 1 System-defined permissions for UCS

Policy Name

Description

Type

UCS FullAccess

Administrator permissions for UCS. Users with these permissions can perform all operations on UCS resources, for example, creating permission policies and security policies.

System-defined policy

UCS CommonOperations

Common operation permissions for UCS. Users with these permissions can create workloads, distribute traffic, and perform other operations.

System-defined policy

UCS CIAOperations

Administrator permissions for Container Intelligent Analysis.

System-defined policy

UCS ReadOnlyAccess

Read-only permissions for UCS (except for Container Intelligent Analysis)

System-defined policy

Services on Huawei Cloud are interdependent, so UCS depends on other cloud services to implement some functions such as image repository and domain name resolution. The preceding system policies are often used together with roles or policies of other cloud services for refined authorization. When granting permissions to IAM users, the administrator must comply with the principle of least privilege. Table 2 lists the least-privilege permissions required by the Admin, Operator, and Viewer roles to use each UCS function.

For details about how to grant IAM system policies and UCS RBAC permissions to users, see UCS Resource Permissions and Kubernetes Resource Permissions in a Cluster, respectively.

Table 2 Least-privilege permissions required by each UCS function

Function

Permission Type

Permissions

Least-Privilege Permissions

Fleets

Administrator

  • Creating and deleting a fleet
  • Registering a Huawei Cloud cluster (CCE standard cluster or CCE Turbo cluster), an on-premises cluster, or an attached cluster
  • Unregistering a cluster
  • Adding a cluster to or removing a cluster from a fleet
  • Adding permissions for a cluster or fleet
  • Enabling cluster federation and performing federation management operations (such as creating a workload and creating a DNS policy)

UCS FullAccess

Viewer

Querying the list or details of clusters or fleets

UCS ReadOnlyAccess

Huawei Cloud clusters

Administrator

Read-write permissions on Huawei Cloud clusters and all Kubernetes resource objects (such as nodes, workloads, jobs, and Services)

UCS FullAccess + CCE Administrator

Developer

Read-write permissions on Huawei Cloud clusters and most Kubernetes resource objects and read-only permissions on Kubernetes resource objects such as namespaces and resource quotas

UCS CommonOperations + CCE Administrator

Viewer

Read-only permissions on Huawei Cloud clusters and all Kubernetes resource objects (such as nodes, workloads, jobs, and Services)

UCS ReadOnlyAccess + CCE Administrator

On-premises/Attached clusters

Administrator

Read-write permissions on on-premises/attached clusters and all Kubernetes resource objects (such as nodes, workloads, jobs, and Services)

UCS FullAccess

Developer

Read-write permissions on on-premises/attached clusters and most Kubernetes resource objects and read-only permissions on Kubernetes resource objects such as namespaces and resource quotas

UCS CommonOperations + UCS RBAC (The list permission for namespaces is required.)

Viewer

Read-only permissions on on-premises/attached clusters and all Kubernetes resource objects (such as nodes, workloads, jobs, and Services)

UCS ReadOnlyAccess + UCS RBAC (The list permission for namespaces is required.)

Image Repositories

Administrator

All permissions on SoftWare Repository for Container (SWR), including creating organizations, pushing images, viewing the image list or details, and pulling images

SWR Administrator

Permissions

Administrator

  • Creating and deleting permissions
  • Viewing the permission list or details
NOTE:

When creating permissions, you need to grant the IAM ReadOnlyAccess permissions (read-only permissions on IAM) to IAM users to obtain the IAM user list.

UCS FullAccess + IAM ReadOnlyAccess

Viewer

Viewing the permission list or details

UCS ReadOnlyAccess + IAM ReadOnlyAccess

Policy Center

Administrator

  • Enabling Policy Center
  • Creating and disabling a policy instance
  • Viewing the policy list
  • Viewing policy implementation details

UCS FullAccess

Viewer

Viewing the policy list and policy implementation details of fleets and clusters with Policy Center enabled

UCS CommonOperations or UCS ReadOnlyAccess

Traffic Distribution

Administrator

Creating a traffic policy, suspending and deleting a scheduling policy, and performing other operations

  • UCS CommonOperations + DNS Administrator (recommended)
  • UCS FullAccess + DNS Administrator

Viewer

Viewing the traffic policy list or details

UCS ReadOnlyAccess + DNS Administrator

Container Intelligent Analysis

Administrator

  • Connecting clusters or canceling cluster connection
  • Viewing the monitoring data of infrastructures, workloads, and other resources

UCS CIAOperations