A user is an identity for access control, created by an account or a user with permissions. After a user is granted permissions (Policy), they can log into the console or use the Access Key to invoke the API to access cloud resources. For more user information and related operations, see User Management .
A user group is a collection of users. When a user group is associated with a policy, all users in the same user group will have the corresponding policy permissions. The same user can exist in multiple user groups and have the permissions of multiple user groups simultaneously. For more information about user groups and related operations, see User Group Management .
A role is a virtual identity in access control. Roles cannot directly access Cloud as a Service. They need to configure a trust relationship to trust other identities. The trusted identity obtains temporary security credentials through an AssumeRole, and then accesses cloud resources. For more roles and related operations, see Role Management .
The trusted identity of a role supports several types:
warning
An IAM role is both an identity and a resource. When a role acts as an identity, an associated permissions policy is required to express the access permissions that the role has (in relation to the temporary credential permissions generated by the role play). When a role acts as a resource, an associated trust policy is required to express the identity by which the role can be accessed (i.e., the identity by which the role can be played).
A policy is a set of permissions described by a grammatical structure. In the policy, the scope of operation, resource scope, and permission effective conditions can be defined. IAM users, user groups, or roles need to be granted permissions through associated policies.
The newly created IAM user, user group or role does not have any permissions by default, and requires the main account as its authorization policy. After authorization, the IAM user, user group or role can manage and access the cloud resources under the main account. In order to ensure the data security of resources, the principle of least privilege should be followed when authorizing, and the corresponding IAM user, user group or role should be granted just enough permissions.
Policy Type: IAM supports **system preset policies **and **custom policies **.
Strategy Sentence: IAM policies have a fixed syntax, allowing you to create richer and more diverse IAM policies on demand. For more information, see IAM policy syntax .
scope of policy
When adding an IAM policy to an IAM identity, you need to select the scope in which the IAM policy takes effect. The following two permission scopes are currently supported:
Single sign-on is also known as federated sign-on. Volcano Engine supports SSO based on SAML 2.0, providing two SSO methods: user SSO and role SSO. Customers can use IAM's SSO capabilities to enable single sign-on to the Volcano Engine console through their own IdP.