Updated on 2022-08-15 GMT+08:00

Creating a User and Granting AS Permissions

Scenarios

This section describes how to use IAM to implement fine-grained permissions control for your AS resources. With IAM, you can:

  • Create IAM users for employees based on your enterprise's organizational structure. Each IAM user will have their own security credentials for accessing AS resources.
  • Grant only the permissions required for users to perform a specific task.
  • Use to entrust an account or cloud service to perform efficient O&M on your AS resources.

If your account does not require individual IAM users, skip this section.

This section describes the procedure for granting permissions (see Figure 1).

Prerequisites

Learn about the permissions (see Permissions Management) supported by AS and choose policies or roles according to your requirements. For the permissions of other services, see Permission Description.

Process Flow

Figure 1 Process for granting AS permissions
  1. Create a user group and assign permissions to it.

    Create a user group on the IAM console, and attach the AutoScaling ReadOnlyAccess policy to the group.

  2. Create an IAM user and add it to the user group.

    Create a user on the IAM console and add the user to the group created in 1.

  3. Log in and verify permissions.

    Log in to the AS console as the created user, and verify the user's permissions for AS.

    • Choose Service List > Auto Scaling. Then, click Create AS Group on the AS console. If a message appears indicating that you have insufficient permissions to perform the operation, the AutoScaling ReadOnlyAccess policy has already taken effect.
    • Choose any other service in the Service List. If a message appears indicating that you have insufficient permissions to access the service, the AutoScaling ReadOnlyAccess policy has already taken effect.