doc-exports/docs/obs/umn/obs_03_0110.html
zhangyue 7492b7b30f OBS UMN doc
Reviewed-by: Hasko, Vladimir <vladimir.hasko@t-systems.com>
Co-authored-by: zhangyue <zhangyue164@huawei.com>
Co-committed-by: zhangyue <zhangyue164@huawei.com>
2023-02-27 19:04:41 +00:00

73 lines
7.3 KiB
HTML

<a name="obs_03_0110"></a><a name="obs_03_0110"></a>
<h1 class="topictitle1">IAM Policies</h1>
<div id="body1557026128761"><p id="obs_03_0110__p1214113528254">You can create IAM users under a registered cloud service account, and then use IAM policies to control users' access permissions to cloud resources.</p>
<p id="obs_03_0110__p1917517275013"><span id="obs_03_0110__ph9419171385810">IAM policies</span> define the actions that can be performed on your cloud resources. In other words, <span id="obs_03_0110__ph236280132513">IAM policies</span> specify what actions are allowed or denied.</p>
<p id="obs_03_0110__p05651517436"><span id="obs_03_0110__ph1176871632515">IAM policies</span> with OBS permissions take effect on all OBS buckets and objects. To grant an IAM user the permission to operate OBS resources, you need to assign one or more OBS permission sets to the user group to which the user belongs.</p>
<p id="obs_03_0110__p91962611510">For details about OBS permissions controlled by IAM policies, see <a href="obs_03_0045.html">Permissions Management</a>.</p>
<div class="section" id="obs_03_0110__section01904185241"><h4 class="sectiontitle"><span id="obs_03_0110__ph6172205042519">IAM policies</span> Application Scenarios</h4><p id="obs_03_0110__p101714434165"><span id="obs_03_0110__ph3383454122516">IAM policies</span> are used to authorize IAM users under an account.</p>
<ul id="obs_03_0110__ul319124042416"><li id="obs_03_0110__li244101111715">Controlling permissions to cloud resources as a whole under an account</li><li id="obs_03_0110__li81911640122419">Controlling permissions to all OBS buckets and objects under an account</li></ul>
</div>
<div class="section" id="obs_03_0110__section9268135516548"><h4 class="sectiontitle">Policy Structure and Syntax</h4><p id="obs_03_0110__p232429165515">A policy consists of a version and statements. Each policy can have multiple statements.</p>
<div class="fignone" id="obs_03_0110__fig378124416551"><span class="figcap"><b>Figure 1 </b>Policy structure</span><br><span><img id="obs_03_0110__image1778118444554" src="en-us_image_0170580428.png" title="Click to enlarge" class="imgResize"></span></div>
<p id="obs_03_0110__p88641011565">Policy syntax example:</p>
<pre class="screen" id="obs_03_0110__screen1733411319613">{
"Version": "1.0",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:ListAllMyBuckets",
"s3:HeadBucket",
"s3:GetBucketLocation",
"s3:ListBucket"
]
}
]
}</pre>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" id="obs_03_0110__table987212714414" frame="border" border="1" rules="all"><caption><b>Table 1 </b>Policy syntax parameters</caption><thead align="left"><tr id="obs_03_0110__row19873102713411"><th align="left" class="cellrowborder" valign="top" width="50%" id="mcps1.3.6.6.2.3.1.1"><p id="obs_03_0110__p178737272043">Parameter</p>
</th>
<th align="left" class="cellrowborder" valign="top" width="50%" id="mcps1.3.6.6.2.3.1.2"><p id="obs_03_0110__p1887302718414">Description</p>
</th>
</tr>
</thead>
<tbody><tr id="obs_03_0110__row17873027842"><td class="cellrowborder" valign="top" width="50%" headers="mcps1.3.6.6.2.3.1.1 "><p id="obs_03_0110__p48732027743">Version</p>
</td>
<td class="cellrowborder" valign="top" width="50%" headers="mcps1.3.6.6.2.3.1.2 "><div class="p" id="obs_03_0110__p829912213615">The version number of a policy.<ul id="obs_03_0110__ul1484412128619"><li id="obs_03_0110__li577602617611"><strong id="obs_03_0110__b11365145614458">1.0</strong>: RBAC policies. An RBAC policy consists of permissions for an entire service. Users in a group with such a policy assigned are granted all of the permissions required for that service.</li></ul>
</div>
</td>
</tr>
<tr id="obs_03_0110__row187317273414"><td class="cellrowborder" valign="top" width="50%" headers="mcps1.3.6.6.2.3.1.1 "><p id="obs_03_0110__p108731927249">Statement</p>
</td>
<td class="cellrowborder" valign="top" width="50%" headers="mcps1.3.6.6.2.3.1.2 "><p id="obs_03_0110__p10869111617713">Permissions defined by a policy, including <strong id="obs_03_0110__b1953163904712">Effect</strong> and <strong id="obs_03_0110__b15171134334712">Action</strong>.</p>
<div class="p" id="obs_03_0110__p151471577233"><ul id="obs_03_0110__ul1802181615716"><li id="obs_03_0110__li480221610716"><strong id="obs_03_0110__b8423527069271">Effect</strong><p id="obs_03_0110__p1880291618711">The valid values for <strong id="obs_03_0110__b453725310478">Effect</strong> are <strong id="obs_03_0110__b1496385664715">Allow</strong> and <strong id="obs_03_0110__b172848592477">Deny</strong>. System policies contain only <strong id="obs_03_0110__b132351212154812">Allow</strong> statements.</p>
</li><li id="obs_03_0110__li980219163715"><strong id="obs_03_0110__b53451317470">Action</strong><p id="obs_03_0110__p14803201610710">Permissions of specific operations on resources. A policy can contain one or more permissions. The wildcard (*) is allowed to indicate all of the services, resource types, or operations depending on its location in the action. </p>
</li></ul>
</div>
</td>
</tr>
</tbody>
</table>
</div>
</div>
<div class="section" id="obs_03_0110__section477513429495"><h4 class="sectiontitle">Authentication of <span id="obs_03_0110__ph34931313182620">IAM policies</span></h4><p id="obs_03_0110__p15598157105013">The authentication of <span id="obs_03_0110__ph594911718268">IAM policies</span> starts from the Deny statements. The following figure shows the authentication logic for resource access.</p>
<div class="fignone" id="obs_03_0110__fig1757455075016"><span class="figcap"><b>Figure 2 </b>Authentication logic</span><br><span><img id="obs_03_0110__image957465075018" src="en-us_image_0170555653.png"></span></div>
<div class="note" id="obs_03_0110__note45325275118"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="obs_03_0110__p874985965112">The actions in each policy bear the OR relationship.</p>
</div></div>
<ol id="obs_03_0110__ol1830433816514"><li id="obs_03_0110__li530413865118">A user accesses the system and makes an operation request.</li><li id="obs_03_0110__li83046389517">The system evaluates all the permission policies assigned to the user.</li><li id="obs_03_0110__li1630423818518">In these policies, the system looks for explicit deny permissions. If the system finds an explicit deny that applies, it returns a decision of Deny, and the authentication ends.</li><li id="obs_03_0110__li330413810512">If no explicit deny is found, the system looks for allow permissions that would apply to the request. If the system finds an explicit allow permission that applies, it returns a decision of Allow, and the authentication ends.</li><li id="obs_03_0110__li1130463812513">If no explicit allow permission is found, IAM returns a decision of Deny, and the authentication ends.</li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="obs_03_0109.html">Permission Control Mechanisms</a></div>
</div>
</div>
<script language="JavaScript">
<!--
image_size('.imgResize');
var msg_imageMax = "view original image";
var msg_imageClose = "close";
//--></script>