Permissions
If you need to assign different permissions to employees in your enterprise to access your SFS Turbo resources on Huawei Cloud, Identity and Access Management (IAM) is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you to securely access your Huawei Cloud resources.
With IAM, you can use your Huawei Cloud account to create IAM users, and assign permissions to the users to control their access to specific resources. For example, some software developers in your enterprise need to use SFS Turbo resources but should not be allowed to delete the resources or perform any other high-risk operations. In this scenario, you can create IAM users for the software developers and grant them only the permissions required for using SFS Turbo resources.
If your Huawei Cloud account does not require individual IAM users for permissions management, skip this section.
IAM is a free service. You only pay for the resources in your account. For more information about IAM, see IAM Service Overview.
SFS Turbo Permissions
New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and then attach policies or roles to these groups. The users then inherit permissions from the groups and can perform specified operations on cloud services based on the permissions they have been assigned.
You can grant permissions by using roles and policies.
- Roles: A coarse-grained authorization strategy that defines permissions by job responsibility. Only a limited number of service-level roles are available for authorization. When using roles to grant permissions, you need to also assign other roles on which the permissions depend to take effect. However, roles are not ideal for fine-grained authorization and least privilege access.
- Policies: A fine-grained authorization strategy that defines permissions required to perform operations on specific cloud resources under certain conditions. This type of authorization is more flexible and is ideal for least privilege access. For example, you can grant users only permission to manage a certain type of ECSs. Most policies define permissions based on APIs. For the API actions supported by SFS Turbo, see section "Permissions Policies and Supported Actions" in the Scalable File Service API Reference.
Policy/Role Name |
Description |
Type |
Dependencies |
---|---|---|---|
SFS Turbo FullAccess |
Administrator permissions for SFS Turbo. Users with these permissions can perform any operation on all SFS Turbo resources under the account. |
System-defined policy |
None |
SFS Turbo ReadOnlyAccess |
Read-only permissions for SFS Turbo. Users with these permissions can only view SFS Turbo data. |
System-defined policy |
None |
Table 2 lists the common operations supported by system-defined policies for SFS Turbo.
Operation |
SFS Turbo FullAccess |
SFS Turbo ReadOnlyAccess |
---|---|---|
Querying the AD domain configuration |
Supported |
Supported |
Obtaining SFS Turbo specifications |
Supported |
Supported |
Querying a specific permissions rule of a file system |
Supported |
Supported |
Querying details of a file system |
Supported |
Supported |
Obtaining details about a file system asynchronous task |
Supported |
Supported |
Querying task status details |
Supported |
Supported |
Querying NIC details of an SFS Turbo file system |
Supported |
Supported |
Querying details of a storage backend |
Supported |
Supported |
Querying details about an import or export task |
Supported |
Supported |
Listing NICs of an SFS Turbo file system |
Supported |
Supported |
Querying SFS Turbo quotas |
Supported |
Supported |
Querying the LDAP configuration |
Supported |
Supported |
Querying details of all file systems |
Supported |
Supported |
Querying the resource usage of a directory |
Supported |
Supported |
Querying quota limits of a directory |
Supported |
Supported |
Checking whether a directory exists |
Supported |
Supported |
Querying tags of a file system |
Supported |
Supported |
Obtaining the AZ information |
Supported |
Supported |
Modifying the LDAP configuration |
Supported |
Not supported |
Joining an AD domain |
Supported |
Not supported |
Deleting a directory from a file system |
Supported |
Not supported |
Deleting tags from a file system |
Supported |
Not supported |
Changing the billing mode of a file system from pay-per-use to yearly/monthly |
Supported |
Not supported |
Deleting a permissions rule |
Supported |
Not supported |
Deleting file systems |
Supported |
Not supported |
Creating file systems |
Supported |
Not supported |
Canceling and deleting an interworking task |
Supported |
Not supported |
Modifying a permissions rule |
Supported |
Not supported |
Configuring auto synchronization for an OBS backend |
Supported |
Not supported |
Canceling or deleting an asynchronous task of a file system |
Supported |
Not supported |
Removing quota limits from a directory |
Supported |
Not supported |
Updating quota limits of a directory |
Supported |
Not supported |
Creating quota limits for a directory |
Supported |
Not supported |
Adding a storage backend |
Supported |
Not supported |
Creating a permissions rule |
Supported |
Not supported |
Adding a tag to a file system |
Supported |
Not supported |
Adding NICs |
Supported |
Not supported |
Updating a file system |
Supported |
Not supported |
Creating directories |
Supported |
Not supported |
Expanding the capacity or changing the security group of a file system |
Supported |
Not supported |
Creating an asynchronous task for a file system |
Supported |
Not supported |
Checking the name of a file system |
Supported |
Not supported |
Batch adding tags to a file system |
Supported |
Not supported |
Removing a storage backend |
Supported |
Not supported |
Creating an import or export task |
Supported |
Not supported |
Modifying the AD domain configuration |
Supported |
Not supported |
Creating and binding the LDAP configuration |
Supported |
Not supported |
Deleting the LDAP configuration |
Supported |
Not supported |
Leaving an AD domain |
Supported |
Not supported |
Removing NICs |
Supported |
Not supported |
Querying the permissions rules of a file system |
Supported |
Supported |
Listing storage backends |
Supported |
Supported |
Listing the asynchronous tasks of a file system |
Supported |
Supported |
Listing import and export tasks |
Supported |
Supported |
Querying tags of all file systems of a tenant |
Supported |
Supported |
Role/Policy Dependencies of the SFS Turbo Console
Console Function |
Dependent Services |
Role/Policy Required |
---|---|---|
Creating a file system |
VPC Billing Center DSS ECS |
|
Querying file system details |
VPC |
|
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot