doc-exports/docs/kms/umn/kms_01_0135.html
Li, Qiao d9e750baf4 KMS User Guide 20231019 version.
Reviewed-by: Rogal, Marcel <mrogal@noreply.gitea.eco.tsi-dev.otc-service.com>
Co-authored-by: Li, Qiao <qiaoli@huawei.com>
Co-committed-by: Li, Qiao <qiaoli@huawei.com>
2024-06-10 13:07:34 +00:00

5.8 KiB

Creating a User and Authorizing the User the Permission to Access KMS

This section describes IAM's fine-grained permissions management for your KMS resources. With IAM, you can:

  • Create IAM users for employees based on the organizational structure of your enterprise. Each IAM user has its own security credentials to access KMS resources.
  • Grant users only the permissions required to perform a task.
  • Entrust an account or cloud service to perform efficient O&M on your KMS resources.

If your account does not need individual IAM users, skip this chapter.

This section describes the procedure for granting permissions (see Figure 1).

Prerequisites

Before granting permissions to a user group, you need to understand the available KMS permissions, and grant permissions based on the real-life scenario. The following tables describe the permissions supported in KMS.

Table 1 KMS permissions

Role/Policy

Description

Type

KMS Administrator

Administrator permissions for the encryption key

Role

KMS CMKFullAccess

All permissions for the encryption keys

Policy

KMS CMK Admin

All permissions for the encryption keys

Policy

KMS CMKReadOnlyAccess

Read-only permission for encryption keys

Policy

Authorization Process

Figure 1 Authorizing the KMS access permission to a user
  1. Create a user group on the IAM console and grant the user group the permission (indicating full permissions for keys).

  2. Create a user on the IAM console and add the user to the user group created in 1.

  3. Log in to the console as newly created user, and verify that the user only has the assigned permissions.