Help Center/ Cloud Eye/ User Guide/ Using IAM to Grant Access to Cloud Eye/ Granting Permissions by Cloud Service
Updated on 2025-11-21 GMT+08:00

Granting Permissions by Cloud Service

If your account has multiple cloud service resources that report monitoring data to Cloud Eye, you can assign different management permissions to various service operators at different levels to ease management.

In the current service scenarios, different cloud services might have different owners. So, you should grant permissions to each owner based on their specific cloud service to manage access.

This section describes how to grant permissions by cloud service.

Constraints

This feature is available only in the new IAM version.

Prerequisites

You have created a user group and an IAM user

Creating Custom Identity Policies

  1. Use the Huawei Cloud account to log in to the IAM console as an administrator.
  2. On the IAM console, click Go to New Console in the upper right corner.
  3. In the navigation pane on the left, choose Identity Policies.
  4. On the Identity Policies page, click Create Identity Policy in the upper right corner.
  5. On the Create Identity Policy page, enter a policy name, set Policy View to Visual editor, and configure the policy content.
    • To configure permissions except ces:widgets:put, perform the following steps:
      1. Select Allow for Policy Content.
      2. Select the operations that support cloud service–based authorization. For details, see Actions That Support Authorization by Cloud Service. You can select all operations except ces:widgets:put.
      3. Click All resources. All resources is selected by default.
      4. Click (Optional) Add request condition.
      5. Click Add Request Condition. In the displayed dialog box, set parameters and click OK. Table 1 uses OBS, ECS, and EVS as an example to describe how to configure parameters. To authorize other cloud services, change the parameter value.
        Table 1 Configuring a request condition

        Parameter

        Description

        Example Value

        Condition Key

        A key in the Condition element of a statement.

        ces:namespace

        Qualifier

        The value can be Default, For any value in the request, or For all values in the request.

        For any value in the request

        Operator

        Used together with a condition key and condition value to form a complete condition statement.

        StringEquals

        Value

        Used together with a condition key and an operator that requires a keyword, to form a complete condition statement.

        The condition value is the namespace of the cloud service to be authorized. To configure multiple cloud services, click Add and enter the namespace of each cloud service.

        CAUTION:

        Some monitoring data of ECS and BMS depends on the Agent. To authorize ECS, you need to configure SYS.ECS and AGT.ECS. For BMS, configure SYS.ECS and SERVICE.BMS.

        SYS.OBS

        SYS.ECS

        AGT.ECS

        SYS.EVS

        Figure 1 Configuring the policy content for permission 1
    • If you also need to configure the ces:widgets:put operation permission, click Add Permissions under Policy Content and perform the following steps:
      1. Select Allow for Policy Content.
      2. Search for ces:widgets:put and select it.
      3. Click All resources. All resources is selected by default.
      4. Click (Optional) Add request condition.
      5. Click Add Request Condition. In the displayed dialog box, set parameters as described in Table 1 and select If exists next to Operator.
      6. Click OK.
        Figure 2 Configuring the policy content for permission 2

  6. On the Create Identity Policy page, click OK in the lower right corner.

Authorizing a User Group or User

After creating an identity policy, you can authorize a user or user group. To authorize all users in a user group, you need to authorize the user group. To authorize a single user in a user group, you need to authorize the IAM user. Once authorized, you can log in to the Cloud Eye console and check that only authorized cloud services can be operated. For more on authorizing operations by cloud service, see Actions That Support Authorization by Cloud Service.

After creating an identity policy, you can authorize a user or user group. To authorize all users in a user group, you need to authorize the user group.

  1. In the navigation pane of the new IAM console, choose User Groups.
  2. Locate the user group to be authorized and click Authorize in the Operation column.
  3. On the Select Identity Policies page, search for and select the system identity policy CESServiceFullAccessWithoutNamespacePolicy and the new identity policy.
  4. Click OK. In the displayed Information dialog box, click OK.
  5. On the Finish page, you can view the authorization results. Then, click Finish.

Once authorized, all users in the group have the corresponding permissions. If you need to change the permissions of a user, you can add the user to or remove the user from the authorized user group. For details, see Adding Users to or Removing Users from a Group.

In addition to granting permissions to user groups, IAM also allows you to grant permissions to individual users in a user group.

  1. In the navigation pane of the new IAM console, choose Users.
  2. Locate the user to be authorized and click Authorize in the Operation column.
  3. On the Assign Permissions page, set Assign By to Identity policy. Search for and select system identity policy CESServiceFullAccessWithoutNamespacePolicy and the created identity policy.
  4. Click OK. In the displayed Information dialog box, click OK.
  5. On the Finish page, you can view the authorization results. Then, click Finish.

Actions That Support Authorization by Cloud Service

Table 2 lists the actions that support authorization by cloud service and their application scenarios. You can select an action as needed.

Table 2 Actions that support authorization by cloud service

Action

Scenario

Description

ces:alarms:create

Grants permission to create an alarm rule.

  • Authorization by cloud service is supported when you select All resources for Monitoring Scope and click Select Resources to Exclude to not monitor specified resources.
  • Authorization by cloud service is supported when you select Specified resources for Monitoring Scope.

ces:widgets:create

Grants permission to add a graph.

Authorization by cloud service is supported when you select Specified resources for Monitoring Scope.

ces:dashboard:listCloudServiceResources

Grants permission to view cloud service monitoring details.

--

ces:dashboard:listServiceResourcesStatistics

Grants permission to view cloud service monitoring details.

--

ces:metaData:get

Grants permission to view cloud service monitoring details (old edition).

--

ces:metrics:listKeyMetrics

Overview

--

ces:namespacesDimensions:get

Grants permission to create a custom graph.

Authorization by cloud service is supported when you select Specified resources for Monitoring Scope.

Grants permission to create a resource group.

Authorization by cloud service is supported when you select Manually for Add Resources.

Grants permission to create an alarm rule.

  • Authorization by cloud service is supported when you select All resources for Monitoring Scope and click Select Resources to Exclude to not monitor specified resources.
  • Authorization by cloud service is supported when you select All resources for Monitoring Scope.

Grants permission to export cloud service monitoring data.

--

ces:namespacesDimensions:list

Overview

--

Grants permission to add a custom graph.

Authorization by cloud service is supported when you select Specified resources for Monitoring Scope.

Grants permission to view custom monitoring dashboards.

Authorization by cloud service is supported when you select Specified resources for Monitoring Scope.

Grants permission to create a resource group.

Authorization by cloud service is supported when you select Manually for Add Resources.

Grants permission to create or modify alarm rules.

  • Authorization by cloud service is supported when you select All resources for Monitoring Scope and click Select Resources to Exclude to not monitor specified resources.
  • Authorization by cloud service is supported when you select All resources for Monitoring Scope.

Grants permission to monitor servers.

--

Grants permission to view cloud service monitoring details.

--

Grants permission to export cloud service monitoring data.

--

ces:namespacesDimensions:listInstances

Grants permission to add or configure a custom graph.

Authorization by cloud service is supported when you select Specified resources for Monitoring Scope.

Grants permission to create or modify resource groups.

Authorization by cloud service is supported when you select Manually for Add Resources.

Grants permission to export cloud service monitoring data.

--

Grants permission to create or modify alarm rules.

  • Authorization by cloud service is supported when you select All resources for Monitoring Scope and click Select Resources to Exclude to not monitor specified resources.
  • Authorization by cloud service is supported when you select All resources for Monitoring Scope.

ces:resourcesMetadata:list

Grants permission to view custom monitoring dashboard details.

Authorization by cloud service is supported when you select Specified resources for Monitoring Scope.

Grants permission to add or configure a custom graph.

Authorization by cloud service is supported when you select Specified resources for Monitoring Scope.

Grants permission to view cloud service monitoring details.

--

Grants permission to view the cloud service monitoring list.

--

Grants permission to create or modify resource groups.

Authorization by cloud service is supported when you select Manually for Add Resources.

ces:resourcesConsole:list

Grants permission to view the server monitoring list.

--

ces:monitorOverview:listServiceResources

Grants permission to view resources in a resource group.

Authorization by cloud service is supported when you select Manually for Add Resources.

ces:widgets:put

Grants permission to configure a custom graph.

Authorization by cloud service is supported when you select Specified resources for Monitoring Scope.