Creating a User and Granting Permissions

Policy Content

A fine-grained policy consists of the policy version (the Version field) and statement (the Statement field).

Example Policies

Authentication Logic

IAM authenticates users according to the permissions that the users have been granted. The authentication logic is as follows:

Figure 1 Authentication logic

The actions in each policy bear the OR relationship.

  1. A user accesses the system and makes an operation request.
  2. The system evaluates all the permissions policies assigned to the user.
  3. In these policies, the system looks for explicit deny permissions. If the system finds an explicit deny that applies, it returns a decision of Deny, and the authentication ends.
  4. If no explicit deny is found, the system looks for allow permissions that would apply to the request. If the system finds an explicit allow permission that applies, it returns a decision of Allow, and the authentication ends.
  5. If no explicit allow permission is found, the system returns a decision of Deny, and the authentication ends.