-
Product Advantages
-
Product functions
-
Application scenarios
-
solution
-
Product Advantages
- Secure and reliable
It supports a variety of security policy configurations to provide security protection for user resources and information.
- Flexible management
Set up user groups for batch authorization, or grant refined authorization to individual users.
- Easy to expand
Provide authentication and authorization for other services of Inspur Cloud.
Product functions
- Manage users and keys
Centralized management is supported, the identity of the access user is identified through the AK, and the signature verification is performed by the SK.
- Batch authorization of user groups
Set up multiple user groups and grant corresponding permissions to user groups for batch authorization to IAM users.
- Refined permission management
Custom policies are supported to achieve refined authorization and higher management flexibility.
- Provide certification and authorization
Provide authentication and authorization for other services of Inspur Cloud, and use other services according to permissions.
Application scenarios
-
Management and decentralization of enterprise sub-accounts
-
Cross-enterprise entrusted management
-
Temporary authorization management for mobile device apps
-
Implement on-demand fine-grained permission management and control of resource instances
Users purchase multiple resources for projects A and B, and need to allocate resources to different employees or applications. In order to avoid sharing your account password, you can create sub-accounts and group them to grant permissions for projects A and B to user groups, so that the user groups have the permissions for projects A and B.
-
Resource operation and authorization management between different enterprises
Enterprise A has purchased multiple resources in Inspur Cloud and wants enterprise B to participate in the management of part of A's resources, at this time, enterprise B can create an IAM user, and enterprise A can set the corresponding permission policy role A and grant permissions to the IAM user created by enterprise B, so that enterprise B user can access the resources purchased by enterprise A.
-
Temporary authorization management for mobile apps
Enterprises need to directly connect to the object storage system when developing an app, and the user terminal device is not controlled, and the enterprise creates a role in IAM to authorize AppServer to use it as an IAM user. When an app is directly connected to OBS to transmit data, AppServer can play a role (call STS AssumeRole) to obtain a temporary security token and pass it to the app to directly access the OBS API.
More options
Empower customers to quickly and securely migrate to the cloud,
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.