Identity Authentication and Access Control
Identity authentication
CSE can be authenticated by role-based access control (RBAC).
You can use an account associated with the admin role to create an account and associate a proper role with the account based on service requirements. Users using this account have the permissions to access and perform operations on the microservice engine. For details, see Security Authentication Overview.
Configuring Access Control
If you need to assign different permissions to employees in your enterprise to access your CSE resources, Identity and Access Management (IAM) is a good choice for fine-grained permissions management.
Access Policy |
Description |
Documentation |
---|---|---|
IAM permissions |
IAM permissions define which actions on your cloud resources are allowed and which actions are denied, to control access to your resources. After creating an IAM user, the administrator needs to add it to a user group and grant the permissions required by CSE to the user group. Then, all users in this group automatically inherit the granted permissions. |
|
Custom permissions |
A microservice engine may be used by multiple users. Different users must have different microservice engine access and operation permissions based on their responsibilities and permissions. The exclusive microservice engine with security authentication enabled provides the RBAC-based system management through the microservice console. You can customize policies for roles based on service requirements. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot