doc-exports/docs/iam/umn/en-us_topic_0079496985.html
Wei, Hongmin f37f5291ef IAM UMN 930 version
Reviewed-by: Hasko, Vladimir <vladimir.hasko@t-systems.com>
Co-authored-by: Wei, Hongmin <weihongmin1@huawei.com>
Co-committed-by: Wei, Hongmin <weihongmin1@huawei.com>
2023-02-02 16:20:41 +00:00

2.5 KiB

Managing Users and Permissions

As a security administrator, you can grant permissions to a user group and add users to it. The users inherit the permissions of the user group and can access the cloud system based on assigned permissions.

  1. Create projects in a region to isolate resources.

    Figure 1 Project isolating model

  2. Plan user groups according to user responsibilities and grant the required permissions to the user groups.

    Figure 2 User group authorization model

  3. Create users and add them to the corresponding user groups.

    Figure 3 User authorization model

  4. Log in as the users and access the cloud system based on assigned permissions.