Skip to content

Latest commit

 

History

History
109 lines (90 loc) · 4.64 KB

manage-access.md

File metadata and controls

109 lines (90 loc) · 4.64 KB
copyright lastupdated keywords subcollection
years
2017, 2019
2019-04-03
user permissions, manage access, IAM roles
key-protect

{:shortdesc: .shortdesc} {:codeblock: .codeblock} {:screen: .screen} {:new_window: target="_blank"} {:pre: .pre} {:tip: .tip} {:note: .note} {:important: .important}

Managing user access

{: #manage-access}

{{site.data.keyword.keymanagementservicefull}} supports a centralized access control system, governed by {{site.data.keyword.iamlong}}, to help you manage users and access for your encryption keys. {: shortdesc}

A good practice is to grant access permissions as you invite new users to your account or service. For example, consider the following guidelines:

  • Enable user access to the resources in your account by assigning Cloud IAM roles. Rather than sharing your admin credentials, create new policies for users who need access to the encryption keys in your account. If you are the admin for your account, you are automatically assigned a Manager policy with access to all resources under the account.
  • Grant roles and permissions at the smallest scope needed. For example, if a user needs to access only a high-level view of keys within a specified space, grant the Reader role to the user for that space.
  • Regularly audit who can manage access control and delete key resources. Remember that granting a Manager role to a user means that the user can modify service policies for other users, in addition to destroying resources.

Roles and permissions

{: #roles}

With {{site.data.keyword.iamshort}} (IAM), you can manage and define access for users and resources in your account.

To simplify access, {{site.data.keyword.keymanagementserviceshort}} aligns with Cloud IAM roles so that each user has a different view of the service, according to the role the user is assigned. If you are a security admin for your service, you can assign Cloud IAM roles that correspond to the specific {{site.data.keyword.keymanagementserviceshort}} permissions you want to grant to members of your team.

The following table shows how identity and access roles map to {{site.data.keyword.keymanagementserviceshort}} permissions:

Table 1. Describes how identity and access roles map to {{site.data.keyword.keymanagementserviceshort}} permissions
Service access role Description Actions

Reader

A reader can browse a high-level view of keys and perform wrap and unwrap actions. Readers cannot access or modify key material.

  • View keys
  • Wrap keys
  • Unwrap keys

Writer

A writer can create keys, modify keys, rotate keys, and access key material.

  • Create keys
  • View keys
  • Rotate keys
  • Wrap keys
  • Unwrap keys

Manager

A manager can perform all actions that a reader and writer can perform, including the ability to set rotation policies for keys, delete keys, invite new users, and assign access policies for other users.

  • All actions that a reader or a writer can perform
  • Assign user access policies
  • Set key rotation policies
  • Delete keys

Cloud IAM user roles provide access at the service or service instance level. Cloud Foundry roles External link icon{: new_window} are separate and define access at the organization or the space level. To learn more about {{site.data.keyword.iamshort}}, check out User roles and permissions External link icon{: new_window}. {: note}

What's next

{: #manage-access-next-steps}

Account owners and admins can invite users and set service policies that correspond to the {{site.data.keyword.keymanagementserviceshort}} actions the users can perform.

  • For more information about assigning user roles in the {{site.data.keyword.cloud_notm}} UI, see Managing IAM access External link icon{: new_window}.