copyright | lastupdated | keywords | subcollection | content-type | completion-time | ||
---|---|---|---|---|---|---|---|
|
2021-06-11 |
get started with IAM, getting started with Identity and Access Management tutorial, IAM tutorial, IAM quick start, resource group, access group, access policy, inviting users |
account |
tutorial |
10m |
{:shortdesc: .shortdesc}
{:screen: .screen}
{:codeblock: .codeblock}
{:pre: .pre}
{:tip: .tip}
{:note: .note}
{:external: target="_blank" .external}
{:step: data-tutorial-type='step'}
{:step-next: data-tutorial-type='step-next'}
{: #access-getstarted} {: toc-content-type="tutorial"} {: toc-completion-time="10m"}
Get up and running quickly with {{site.data.keyword.Bluemix_notm}} Identity and Access Management (IAM) by setting up access groups for quick access assignments, inviting users to your account, and managing their access. {:shortdesc}
This tutorial is for IAM-enabled resources. For services that don't support creating IAM policies for managing access, you can use Cloud Foundry access or classic infrastructure permissions. {: note}
{: #iam-before-you-begin}
If you are new to using IAM, check out the following documentation to learn more about the features, concepts, and components of the access management system:
- What is IBM Cloud Identity and Access Management? provides a quick overview of what IAM is in {{site.data.keyword.Bluemix_notm}}, the available features, and links to available CLI and API docs.
- IAM access gives a more in-depth review of how access management works by using access policies.
{: #create-access-group} {: step}
To streamline the process of assigning access to users in your account, you can create an access group. Access groups are a way to organize users and service IDs so that you can easily assign access by adding one or more policies for the entire group. Then, you can add or remove users and service IDs as needed instead of assigning individual access to each user.
A unique name is required to differentiate access groups in the account. {: note}
{: #group_setup}
To create an access group, complete the following steps:
- In the {{site.data.keyword.cloud_notm}} console, click Manage > Access (IAM), and select Access Groups.
- Click Create.
- Enter a unique name to identify your access group and an optional description.
- Click Create.
Next, continue to set up your group by adding users or service IDs:
- Select the name of the group that you want to update.
- Click Add users.
- Select the users that you want to add from the list, and click Add to group.
- To add service IDs to the group, click Service IDs.
- Select the IDs that you want to add from the list, and click Add to group.
{: #group_access}
After you create your access groups, you can assign access to all members of the group with one or more policies. By assigning a group of users access to a group of resources with a single policy, you reduce the overall number of policies that you need to manage.
- From the Access policies tab, click Assign access.
- Select IAM services or Account management.
- Select the type of access that you want to assign.
If you're assigning access to IAM-enabled services, some services support the use of advanced operators to grant access to resources that satisfy specific naming conventions. See Assigning access by using wildcard policies for more information. {: note}
- Click Add. Repeat as needed to add more access.
- Click Assign to assign all added access to your access group.
{: #invite-user} {: step}
You can invite one or multiple users in a single invite. If you invite multiple users in one invitation, the same access is assigned to each user. However, you can invite users to your account with no access, and assign them access later.
- In the console, go to Manage > Access (IAM), and select Users.
- Click Invite users. Specify the email addresses of the users. If you are inviting more than one user with a single invitation, they are all assigned the same access.
- Add one or more of the access options that you manage. You must assign at least one access option. For any access options that you don't add and configure, the default value of No access is assigned. Depending on the options that you are authorized to manage, you can assign the following types of access:
- Add users to access groups. Click Add for each access group that you want the users to belong to.
- Manually assign users access. Expand this section to assign individual IAM access policies, Cloud Foundry roles, or classic infrastructure permissions.
-
Select Cloud Foundry > an organization > a region to select a specific space, and assign a space role. An organization and space role are both required to add the access assignment to the invite.
-
Select Classic infrastructure, and then select from the three permission sets.
-
Select IAM services, and then select the option for all services or just a specific service. Next, you can scope the access to the entire account or just one resource group. Then, select all roles that apply. To view what actions are mapped to each role, click the Actions for role option to view a list of all actions that are mapped to a specific role.
Some services support the use of advanced operators to grant access to resources that satisfy specific naming conventions. See Assigning access by using wildcard policies for more information.If you select the Account scope for the access policy, the user must already have the Viewer role or higher on the resource group or groups that contain the resources you want the user to have access to. Without a role on a resource group, the user can't work with the resource from the Resource list page in the console. {: tip}
-
Select Account management, and then choose from the all account management services option or select a specific service. Then, select all roles that apply.
-
- Select Add to save the access assignment to the invitation.
- After you add all the necessary access assignments, click Invite.
For more information, see Inviting users to an account.
{: #user_access_manage} {: step}
After you invite users, you might want to assign more access or edit the existing access to ensure that all members of your account have the correct level of access.
{: #new_access}
To assign a new access policy, complete the following steps:
- In the console, click Manage > Access (IAM), and select Users.
- From the row for the user that you want to assign access, click the Actions icon
> Assign access.
- Click Add for each access group that you want the users to belong to.
- (Optional) If you want to assign additional access to Cloud Foundry roles, classic infrastructure permissions, individual IAM services, or account management services, expand the Assign users additional access section.
- Select any combination of roles or permissions to define the scope of access, and click Add. For more information, see IAM roles.
- Click Assign to assign all added access to the selected user.
Assign the viewer role or higher to the resource group that contains the resource to ensure that the user can access the resource from their list of resources. {:tip}
{: #editing_access}
You can update existing access by editing the assigned roles for a user.
- In the console, click Manage > Access (IAM), and select Users.
- Select the name of the user that you want to edit access for.
- Click Access policies.
- Click the Actions icon
> Edit on the row for the policy that you want to edit.
- Edit the policy by updating the assigned roles.
- Click Save.
{: #iam-user-next}
Learn what else you can do with {{site.data.keyword.Bluemix_notm}} IAM by checking out the features list.