Creating a User and Granting NAT Gateway Permissions

This section describes how to use IAM to implement fine-grained permissions control for your NAT Gateway resources. With IAM, you can:

If your account does not require individual IAM users, skip this section.

This section describes the procedure for granting permissions (see Figure 1).

Prerequisites

Learn about the permissions supported by NAT Gateway and choose policies or roles according to your requirements. For details, see Permissions. For the permissions of other services, see Permissions.

Process Flow

Figure 1 Process for granting NAT Gateway permissions

  1. Create a user group and assign permissions.

    Create a user group on the IAM console, and attach the policy to the group.

  2. Create an IAM user and add it to a user group.

    Create a user on the IAM console and add the user to the group created in 1.

  3. Log in and verify permissions.

    Log in to the management console as the created user. Switch to the authorized region and verify the permissions.

    • Choose Service List > NAT Gateway. Then click Create NAT Gateway. If a message appears indicating that you have insufficient permissions to perform the operation, the ReadOnlyAccess policy has already taken effect.
    • Choose any other service in Service List. If a message appears indicating that you have insufficient permissions to access the service, the NAT ReadOnlyAccess policy has already taken effect.