Updated on 2024-11-27 GMT+08:00

Creating a User and Granting ECS Permissions

Use IAM to implement fine-grained permissions control over your ECSs. With IAM, you can:

  • Create IAM users for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing ECS resources.
  • Grant only the permissions required for users to perform a specific task.
  • Delegate access to other accounts or cloud services for efficient O&M.

If your account does not require individual IAM users, you can skip this section.

This section describes the procedure for granting permissions (see Process Flow).

Prerequisites

Before assigning permissions to user groups, you should learn about system policies supported by ECS and select the policies based on service requirements.

For more information about system policies supported by ECS, see Permissions Management.

Process Flow

Figure 1 Process for granting ECS permissions

  1. Create a user group and assign permissions.

    Create a user group on the IAM console and click Authorize in the Operation column to assign the ECS ReadOnlyAccess permissions to the group.

  2. Create a user and add the user to the user group.

    Create a user on the IAM console and add it to the user group created in 1 by choosing Authorize in the Operation column.

  3. Log in to the management console as the created user.

    In the authorized region, perform the following operations:

    • Choose Compute > Elastic Cloud Server in the service list. On the ECS console, click Create ECS. If the creation attempt failed, the ECSReadOnlyAccess policy has already taken effect.
    • Choose any service other than ECS in the service list. If a message appears indicating that you have insufficient permissions to access the service, the ECSReadOnlyAccess policy has already taken effect.