Skip to content

Latest commit

 

History

History
110 lines (69 loc) · 6.39 KB

managing-resources-and-users.md

File metadata and controls

110 lines (69 loc) · 6.39 KB
copyright lastupdated keywords subcollection
years
2019, 2024
2024-10-21
identity, access management, iam, managing virtual servers, platform access roles, user access scenarios
power-iaas

{{site.data.keyword.attribute-definition-list}}

Managing identity and access management (IAM) for {{site.data.keyword.powerSysFull}}s

{: #managing-resources-and-users}


{{site.data.keyword.off-prem-fname}}: [{{site.data.keyword.off-prem}}]{: tag-blue}

{{site.data.keyword.on-prem-fname}}: [{{site.data.keyword.on-prem}}]{: tag-red}


IAM enables you to securely authenticate users, control access to {{site.data.keyword.powerSysShort}} resources with resource groups, and allow access to specific resources for a set of users with access groups. IAM is your one-stop shop for all user and resource management in the {{site.data.keyword.cloud_notm}}. {: shortdesc}

[{{site.data.keyword.on-prem}}]{: tag-red} To display the Infrastructure capacity navigation menu for the IBM {{site.data.keyword.powerSys_notm}} ({{site.data.keyword.on-prem}}) when you use a custom role with the power-iaas.pod-capacity.view IAM action, ensure that you have a Viewer role that is assigned in the IAM Access Management service. {: important}

For more information about IAM, review the following information:

Platform access roles

{: #platform-access-roles}

You can use platform access roles to enable users to complete tasks on {{site.data.keyword.cloud_notm}} resources, such as creating users or adding services.

The following table displays the IAM platform access roles and the corresponding type of control that is allowed by the {{site.data.keyword.powerSys_notm}}:

Platform access role Type of access allowed
Viewer View instances and list instances.
Operator View instances and manage aliases, bindings (IBM {{site.data.keyword.powerSys_notm}} ({{site.data.keyword.on-prem}}) only), and credentials.
Editor View instances, list instances, create instances, and delete instances.
Administrator View instances, list instances, create instances, delete instances, and assign policies to other users.
{: caption="IAM platform access roles" caption-side="bottom"}

Service access roles

{: #service-access-roles}

You can use the service access roles to define the actions that the users can perform on {{site.data.keyword.powerSys_notm}} resources. The following table displays the IAM service access roles and the corresponding actions that a user can complete by using the {{site.data.keyword.powerSys_notm}}:

Service access role Description of actions
Reader View all resources (such as SSH keys, storage volumes, and network settings). You cannot make changes to the resources.
Manager Configure all resources. You can perform the following actions: \n * Create instances \n * Increase storage volume sizes \n * Create SSH keys \n * Modify network settings \n * Create boot images \n * Delete storage volumes
{: caption="IAM service access roles" caption-side="bottom"}

To see the complete list of actions for each specific role, see the IAM roles and actions page in IBM Cloud documentation.

Resources supported for {{site.data.keyword.powerSys_notm}} IAM access policies

{: #res-supported}

When you assign access to the {{site.data.keyword.powerSys_notm}} service, you can scope access to any of the following resources:

  • All resources
  • Specific resources, which support the following selections:
    • Resource group
    • Service instance

Although you can select a Resource type from the Attribute type drop-down, it is not supported. Any roles and actions that are assigned to the Resource type are ignored. {: note}

Access role requirements for {{site.data.keyword.powerSys_notm}}

{: #access-roles-requirement}

{{site.data.keyword.powerSys_notm}} requires extra access for features such as Direct Link, Transit Gateway service, and Virtual Private Cloud. You might require these extra access based on your resource requirements. For example, to create a Cloud connection, you need accessto the Direct Link service.

The following table displays the additional access roles that are required for the corresponding type of services that are allowed by {{site.data.keyword.powerSys_notm}}:

Additional access role Resources Attributes
Editor, Manager, Operator, Reader, Viewer {{site.data.keyword.powerSys_notm}} service
Editor, Manager, Operator, Reader, Viewer, VPN Client VPC Infrastructure Services service
Editor, Operator, Viewer Transit Gateway service
Reader, Viewer All resources in account (Including future IAM enabled services)
Editor, Operator, Viewer Direct Link service
Viewer All resource group
Viewer Satellite service [{{site.data.keyword.on-prem}}]{: tag-red}
{: caption="Additional access roles" caption-side="bottom"}

User access scenarios

{: #user-access-scenarios}

For more information about managing and assigning access by using IAM policies, see Managing access to resources.