Advanced
Тема интерфейса

Creating a User Group and Assigning Permissions

Эта статья полезна?
Язык статьи: Английский
Перевести

Scenarios

If you do not want to create an account for every person in your enterprise, you can use Identity and Access Management (IAM). Only the enterprise's administrator needs to create an account. The account can be used to create user groups and assign permissions. Then, the IAM users created for the enterprise personnel can be added to different user groups based on their job responsibilities.

The following shows how an enterprise administrator uses IAM to create user groups and assign permissions.

Procedure

Step

Description

Create a user group, which is the minimum authorization unit.

Assign permissions defined by roles or policies to the user group. Users added to this group can inherit the assigned permissions from it.

Step 1: Create a User Group

  1. Log in to the management console and choose Identity and Access Management.
  2. On the IAM console, choose User Groups and click Create User Group.

    Figure 1 Creating a user group


  3. In the displayed dialog box, enter a name for the developer user group.

    Only letters (case-sensitive), digits, spaces, hyphens (-), and underscores (_) are allowed.

    Figure 2 Setting user group details


  4. Click OK to create a developer user group.

    You will be redirected to the user group list and the created developer user group is displayed in the list.

Step 2: Assign Permissions to the User Group

Assume that developers in the enterprise need to use ECS and OBS, so the administrator needs to perform the following operations to assign the required permissions to the developer user group to enable access to these services. For details about the permissions of all cloud services, see "Permissions".

  1. Determine the permissions required by the users in the user group.

    Table 1 lists the required permissions. The application scope is determined by geographic areas where services are deployed.

    • Region-specific project-level services: If permissions are assigned for a region-specific project, the permissions are only applied in that project. For example, if you assign permissions only for a region-specific project, IAM users have no permissions to access resources in other projects.
    • Global services: Global services are deployed in all regions. You do not need to switch regions when accessing global services. For example, if you grant OBS permissions to an IAM user, the user can access OBS resources in all region-specific projects.
    Table 1 Required permissions

    Cloud Service

    Application Scope

    Permissions

    ECS

    Region-specific projects

    ECS Admin

    OBS

    Global regions

    OBS Buckets Viewer

  2. In the user group list, click Authorize in the row containing the developer user group.

    Figure 3 Authorizing a user group


  3. Assign permissions to the user group for region-specific projects.

    1. As shown in Table 1, ECS is a region-specific project-level service. Select desired permissions for the project-level service and click Next.

    2. Select Region-specific projects for Scope, select target projects, and click OK.

      Then users in the developer user group can only access resources in the authorized regions.

  4. In the user group list, click Authorize in the row containing the developer user group.

    Figure 4 Authorizing a user group


  5. Assign permissions to the user group for global services.

    1. Select OBS Buckets Viewer and click Next.
    2. Select Global services for Scope and click OK.

    After the permissions are assigned, click the name of the developer user group to view the assigned permissions on the Permissions tab of the user details page.

    Note

    OBS permissions will be applied about 15 to 30 minutes after the authorization is complete.