Help Center/ Cloud Connect/ Service Overview/ Permissions Management
Updated on 2025-11-14 GMT+08:00

Permissions Management

If you need to assign different permissions to personnel in your enterprise to access your Cloud Connect resources, Identity and Access Management (IAM) is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you to securely access your Huawei Cloud resources. If your HUAWEI IDaccount does not require IAM for permissions management, you can skip this section.

IAM is a free service. You only pay for the resources in your account.

With IAM, you can control access to specific Huawei Cloud resources. For example, if you want some software developers in your enterprise to use Cloud Connect resources but do not want them to delete the resources or perform any other high-risk operations, you can grant permission to use the resources but not permission to delete them.

IAM supports role/policy-based authorization and identity policy-based authorization.

The following table describes the differences between the two authorization models.

Table 1 Differences between role/policy-based authorization and identity policy-based authorization

Name

Authorization Using

Permissions

Authorization Method

Scenario

Role/Policy

User-permission-authorization scope

  • System-defined roles
  • System-defined policies
  • Custom policies

Assigning roles or policies to principals

To authorize a user, you need to add it to a user group first and then specify the scope of authorization. It is hard to provide fine-grained permissions control using authorization by user groups and a limited number of condition keys. This method is suitable for small- and medium-sized enterprises.

Identity policy

User-policy

  • System-defined policies
  • Custom identity policies
  • Assigning identity policies to principals
  • Attaching identity policies to principals

You can authorize a user by directly attaching an identity policy to it. You can customize policies and attach them to specified users. Identity policies allow you to perform refined access control more efficiently and flexibly. However, this model is more complex and requires higher personnel expertise. It is more suitable for medium- and large-sized enterprises.

Assume that you want to grant IAM users the permission to create ECSs in CN North-Beijing4 and OBS buckets in CN South-Guangzhou. With role/policy-based authorization, the administrator needs to create two custom policies and assign both to the IAM users. With identity policy-based authorization, the administrator only needs to create one custom policy and configure the condition key g:RequestedRegion for the policy and attach the policy to the users or grant the users the access permissions to the specified regions. Identity policy-based authorization is more flexible than role/policy-based authorization.

The two authorization models require independent policies and permissions. You are advised to use identity policies for authorization. For details about system-defined permissions, see Role/Policy-based Permissions Management and Identity Policy-based Permissions Management.

For more information about IAM, see IAM Service Overview.

Role/Policy-based Permissions Management

Cloud Connect supports authorization with roles and policies. New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and attach policies or roles to these groups. The users then inherit permissions from the groups and can perform specified operations on cloud services based on the permissions they have been assigned.

Cloud Connect is a global service deployed for all regions. When you set the authorization scope to Global services, users have permission to access Cloud Connect in all regions.

Table 2 lists all the system-defined policies for Cloud Connect in role/policy-based authorization. System-defined policies in role/policy-based authorization and identity policy-based authorization are not interoperable.

Table 2 System-defined permissions for Cloud Connect

Role/Policy Name

Description

Type

Dependencies

Cross Connect Administrator

Administrator permissions for Cloud Connect. Users with these permissions can perform all operations on Cloud Connect. To have these permissions, users must also have the Tenant Guest and VPC Administrator permissions.

System-defined role

Tenant Guest and VPC Administrator

  • VPC Administrator: project-level policy, which must be assigned for the same project
  • Tenant Guest: project-level policy, which must be assigned for the same project

CC FullAccess

All permissions on Cloud Connect.

System-defined policy

CC Network Depend QueryAccess

CC ReadOnlyAccess

Read-only permissions for Cloud Connect. Users who have these permissions can only view Cloud Connect resources.

System-defined policy

-

CC Network Depend QueryAccess

Read-only permissions required to access dependency resources when using Cloud Connect.

Users who have these permissions can view VPCs or virtual gateways.

System-defined policy

-

Table 3 lists common operations supported by system-defined permissions.

Table 3 Common operations supported by system-defined permissions

Operation

Cross Connect Administrator

CC FullAccess

CC ReadOnlyAccess

Creating a cloud connection

×

Viewing a cloud connection

Modifying a cloud connection

×

Deleting a cloud connection

×

Binding a bandwidth package to a cloud connection

×

Unbinding a bandwidth package from a cloud connection

×

Loading a network instance

×

Viewing a network instance

Updating a network instance

×

Removing a network instance

×

Buying a bandwidth package

×

Viewing a bandwidth package

Modifying a bandwidth package

×

Unsubscribing from a yearly/monthly bandwidth package

×

Renewing a yearly/monthly bandwidth package

×

Assigning an inter-region bandwidth

×

Viewing an inter-region bandwidth

Modifying an inter-region bandwidth

×

Deleting an inter-region bandwidth

×

Viewing monitoring Data of an inter-region bandwidth

Viewing routes

Asking others to authorize the permission to access their VPCs

×

Viewing authorization

Viewing the other users' VPCs that you are allowed to access

Canceling authorization

×

Creating a central network

×

×

Updating a central network

×

×

Deleting a central network

×

×

Viewing a central network

×

Querying central networks

×

Adding a central network policy

×

×

Applying a central network policy

×

×

Deleting a central network policy

×

×

Querying central network policies

×

Querying policy changes

×

Querying central network connections

×

Updating a central network connection

×

×

Adding a global DC gateway to a central network as an attachment

×

×

Updating a global DC gateway on a central network

×

×

Viewing a global DC gateway on a central network

×

Querying the global DC gateways on a central network

×

Removing an attachment from a central network

×

×

Querying the attachments on a central network

×

Querying quotas

Querying the capabilities

Identity Policy-based Permissions Management

Cloud Connect supports authorization with identity policies. Table 4 lists all the system-defined policies for Cloud Connect in identity policy-based authorization. System-defined policies in role/policy-based authorization and identity policy-based authorization are not interoperable.

Table 4 Identity policies for Cloud Connect

Policy Name

Description

Policy Type

CCFullAccessPolicy

All permissions on Cloud Connect.

System-defined identity policy

CCReadOnlyPolicy

Read-only permissions for Cloud Connect.

System-defined identity policy

Table 5 lists common operations supported by system-defined identity policies of Cloud Connect.

Table 5 Common operations supported by each system-defined identity policy of Cloud Connect

Operation

CCFullAccessPolicy

CCReadOnlyPolicy

Creating a cloud connection

×

Deleting a cloud connection

×

Updating a cloud connection

×

Viewing a cloud connection

Querying cloud connections

Creating a network instance

×

Removing a network instance

×

Updating a network instance

×

Querying network instance details

Querying network instances

Requesting a bandwidth package

×

Deleting a bandwidth package

×

Updating a bandwidth package

×

Querying bandwidth package details

Querying bandwidth packages

Binding a bandwidth package

×

Unbinding a bandwidth package

×

Assigning an inter-region bandwidth

×

Deleting an inter-region bandwidth

×

Updating an inter-region bandwidth

×

Querying inter-region bandwidth details

Querying inter-region bandwidths

Viewing a cloud connection route

Querying cloud connection routes

Querying the quotas

Querying cloud connection and central network capabilities

Creating a central network

×

Deleting a central network

×

Updating a central network

×

Querying details of a central network

Querying central networks

Adding a central network policy

×

Applying a central network policy

×

Deleting a central network policy

×

Querying central network policies

Querying the changes between the current policy and the applied policy

Querying central network connections

Updating a central network connection

×

Adding a global DC gateway to a central network as an attachment

×

Updating a global DC gateway on a central network

×

Querying details of a global DC gateway on a central network

Querying the global DC gateways on a central network

Adding an enterprise router route table to a central network as an attachment

×

Updating an enterprise router route table added to a central network as an attachment

×

Querying details of an enterprise router route table added to a central network as an attachment

Querying enterprise router route tables added to a central network as an attachment

Removing an attachment from a central network

×

Querying the attachments on a central network

×

Roles or Policies that the Cloud Connect Console Depends on

Table 6 Roles or policies that the Cloud Connect console depends on

Function

Dependent Cloud Service/Resource

Roles or Policies Required

Assigning cross-site connection bandwidths on a central network

Global connection bandwidth

CCFullAccessPolicy and CC ReadOnlyAccess

Modifying cross-site connection bandwidths on a central network

Global connection bandwidth

CCFullAccessPolicy and CC ReadOnlyAccess

Viewing cross-site connection bandwidths on a central network

Global connection bandwidth

CCFullAccessPolicy and CC ReadOnlyAccess