Identity and Access Management (IAM)

Identity and Access Management (IAM) is an identity management service that provides user identity authentication, permission allocation, access control and other functions. You can use IAM to safely control user access audit to Inspur Cloud resources.

  • Product Advantages
  • Product functions
  • Application scenarios
  • solution

Product Advantages

  • 2c98bdc984a29ef98300184c796a7287f2c.png
    Secure and reliable

    It supports a variety of security policy configurations to provide security protection for user resources and information.

  • 16697957878852c98bdc984a29ef97450184c795b46d7eb2.png
    Flexible management

    Set up user groups for batch authorization, or grant refined authorization to individual users.

  • 智能决策支持.png
    Easy to expand

    Provide authentication and authorization for other services of Inspur Cloud.

Product functions

  • Manage users and keys

    Centralized management is supported, the identity of the access user is identified through the AK, and the signature verification is performed by the SK.

  • Batch authorization of user groups

    Set up multiple user groups and grant corresponding permissions to user groups for batch authorization to IAM users.

  • Refined permission management

    Custom policies are supported to achieve refined authorization and higher management flexibility.

  • Provide certification and authorization

    Provide authentication and authorization for other services of Inspur Cloud, and use other services according to permissions.

Application scenarios

  • Management and decentralization of enterprise sub-accounts

  • Cross-enterprise entrusted management

  • Temporary authorization management for mobile device apps

  • Implement on-demand fine-grained permission management and control of resource instances

    Users purchase multiple resources for projects A and B, and need to allocate resources to different employees or applications. In order to avoid sharing your account password, you can create sub-accounts and group them to grant permissions for projects A and B to user groups, so that the user groups have the permissions for projects A and B.

  • Resource operation and authorization management between different enterprises

    Enterprise A has purchased multiple resources in Inspur Cloud and wants enterprise B to participate in the management of part of A's resources, at this time, enterprise B can create an IAM user, and enterprise A can set the corresponding permission policy role A and grant permissions to the IAM user created by enterprise B, so that enterprise B user can access the resources purchased by enterprise A.

  • Temporary authorization management for mobile apps

    Enterprises need to directly connect to the object storage system when developing an app, and the user terminal device is not controlled, and the enterprise creates a role in IAM to authorize AppServer to use it as an IAM user. When an app is directly connected to OBS to transmit data, AppServer can play a role (call STS AssumeRole) to obtain a temporary security token and pass it to the app to directly access the OBS API.

If you have any questions about Inspur Cloud, please contact us

Are you interested in our solutions?

Please do not hesitate to contact us! We're here to help.