copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2025-01-17 |
schematics, automation, terraform |
schematics |
{{site.data.keyword.attribute-definition-list}}
{: #access}
Use {{site.data.keyword.iamlong}} to grant permissions to {{site.data.keyword.bpshort}} workspaces and actions. {: shortdesc}
As the {{site.data.keyword.cloud}} account owner, you need to make sure that you control user access to {{site.data.keyword.bpshort}} workspaces and the actions in your account. {{site.data.keyword.bplong_notm}} integrate with {{site.data.keyword.iamlong}} (IAM) to securely authenticate users for platform services and control access to the resources. IAM uses the concept of resource groups, access groups, roles, and access policies to manage the access to {{site.data.keyword.cloud}} resources. For more information about how IAM works? And how you can use resource groups, access groups, and access policies to organize {{site.data.keyword.bpshort}} access for a team? See What is {{site.data.keyword.iamlong}}?
{: #access-roles} {: help} {: support}
Grant access to {{site.data.keyword.bplong_notm}} by assigning {{site.data.keyword.iamlong}} (IAM) service access roles to your users. {: shortdesc}
Who must grant access to {{site.data.keyword.bplong_notm}}?
As the account owner or an authorized account administrator, you can assign IAM service access roles to your users. The IAM service access roles determine the actions that you can work on an {{site.data.keyword.bplong_notm}} resource, such as a workspace or an action. To avoid assigning access policies to individual users, consider creating IAM access groups.
Is access to {{site.data.keyword.bplong_notm}} sufficient to manage {{site.data.keyword.cloud_notm}} resources?
No. If you are assigned an {{site.data.keyword.bplong_notm}} service access role, you can view, create, update, or delete workspaces and actions in {{site.data.keyword.bplong_notm}}. However, to manage other {{site.data.keyword.cloud_notm}} resources with {{site.data.keyword.bpshort}}, you must be assigned the IAM platform or service access role for the individual {{site.data.keyword.cloud_notm}} resource that you want to work with. See the documentation for your resource to determine the access policies that you need to work with your resource.
{: #rba-role}
Region-based access is a {{site.data.keyword.bpshort}} feature that enables you to securely authenticate invited users and consistently control access to the {{site.data.keyword.bpshort}} entities such as workspace, action, agent, and so on. To assign access policies to individual users, consider creating IAM access groups. {: short}
For example, if an account owner wanted to restrict the Region-based access is a {{site.data.keyword.bpshort}} resource access to the invited users only for a specific region, like eu-de
. Then, an account owner can define the region-based access policy that are applied to the {{site.data.keyword.bpshort}} service, so that the invited user can access the resources only from eu-de
region. For more information, see the setting up region-based access to invite a user.
{: #rba-access-setup}
As the {{site.data.keyword.cloud_notm}} account owner or authorized account administrator. Create a region-based access policy for your users to the {{site.data.keyword.bplong_notm}} resources that you want your users to access. {: shortdesc}
-
Invite users to your {{site.data.keyword.cloud_notm}} account.
-
From the invited users list, click the User name that you want to apply region-based access control.
-
Click Access tab > Access Policies > Assign Access.
-
Select Access Policy.
- Select
Schematics
as Services parameter. - Select
Specific resources
as Resources parameter for providing region-based access. Note if you selectAll resources
, user can access all the resources from all the regions. - To enable the scope access to a particular region select the same region that you want the user to access, for example
Frankfurt (eu-de)
. Click Next. - Provide the Roles and actions for the
Service access
andPlatform access
as per the requirement. Click Next.
- Select
-
Click Review to review the settings. Click Add.
-
Click Assign to assign the region-based access to a user.
{: #iam-platform-svc-roles}
The user roles exist at both the platform (account) and service level. If you are unsure about what a platform or a service role allows a user to do platform roles interact mainly with {{site.data.keyword.cloud_notm}} services like the resource controller or {{site.data.keyword.iamshort}}. However, roles inside a service interact mainly with the relevant API, which in this case is the {{site.data.keyword.bpshort}} API.
{: #iam-platform-roles}
Platform roles can be assigned over an entire account, over particular service instances, or within objects inside a service instance.
- Administrator: Has the full spectrum of rights over a particular action and its child actions. It includes to invite new users and assign roles over the object (only administrators can assign roles). Administrators do not have service roles by default. However, they can assign roles to themselves.
- Editor: Can view, create, and delete instances at the account level, except invite new users, manage the account, and assign access policies. It has limited use for actions within a service instance, beyond the ability to view them.
- Operator: Can view instances at the account level, but cannot edit them. It has limited use for actions within a service instance, beyond the ability to view them.
- Viewer: Can view instances at the account level, but cannot edit them. It has limited use for actions within a service instance, beyond the ability to view them.
{: #iam-service-roles}
While an account-level role gives a user particular permissions over service instances by default, roles can also be assigned over a particular service instance. Service roles can be applied to the three first-class objects within a service instance: the instance as a whole, particular workspace, and action. However, these permissions can be assigned more granularly where necessary.
Service roles can be assigned per-instance or for all instances in an account. {: note}
- Reader: You can perform read-only actions within a service such as viewing service-specific resources. For example, read the action definition, KMS settings, workspace details, agent configuration settings, and so on.
- Writer: You can perform create, edit, and read service-specific resources operation. For example, create and update workspace, action, agent, and so on.
- Manager: In addition to writer access, you have complete privileges as defined by the service. A Manager, for example, has all the permissions that a Reader has and more.
{: #iam-roles-permission-schematics}
The list provides the details about the roles and permission that are needed for the {{site.data.keyword.bpshort}} offerings.
{: #workspace-permissions}
Review the following table to see what permissions you need to work with {{site.data.keyword.bpshort}} workspaces.
{: #action-permissions}
Review the following table to see what permissions you need to work with {{site.data.keyword.bpshort}} actions.
{: #agent-permissions}
The following are the different permissions that a user need to create and deploy the {{site.data.keyword.bpshort}} agent.
- Permission to deploy an agent
- Permission for agent to connect with {{site.data.keyword.bpshort}}
- Permission to users to manage agents
{: #agent-deploy-permission}
Agent recommends by using a service ID and API key to provision the prerequisite the {{site.data.keyword.cloud_notm}} resources such as {{site.data.keyword.containerlong_notm}} or {{site.data.keyword.redhat_openshift_notm}}, {{site.data.keyword.cos_full_notm}}, and {{site.data.keyword.cos_full_notm}} bucket.
Following are the maximum permission and roles that services must deploy an agent.
Resources | Service role | Platform role |
---|---|---|
{{site.data.keyword.containerlong_notm}} |
Manager | Viewer |
Resource Group |
Administrator | |
{{site.data.keyword.redhat_openshift_notm}} or {{site.data.keyword.containershort_notm}} |
Object Writer | Administrator |
{{site.data.keyword.cos_full_notm}} |
Object Writer ++ | Administrator ++ |
{{site.data.keyword.cos_full_notm}} bucket |
Object Writer + Writer | Administrator |
{{site.data.keyword.bpshort}} |
Manager | Operator |
{: caption="Permissions to deploy an agent" caption-side="top"} |
{: #agent-schematics-connect}
Consider the following access are provided for an agent to connect with {{site.data.keyword.bpshort}}.
- You need administrator permission to access the resources such as {{site.data.keyword.containerlong_notm}}, {{site.data.keyword.redhat_openshift_notm}}, {{site.data.keyword.cos_full_notm}}, and so on.
- You need Manager service role access, Operator role permission, and assign access to the trusted profile to connect.
{: #agent-manage-permission}
Review the following table to see what identity and permissions you need to use the {{site.data.keyword.bpshort}} Agent.
In addition to the listed agent activities and permission, you must ensure that you have permissions to run agent create
, agent plan
, agent apply
, agent delete
, and agent destroy
activities to run successfully.
{: important}
{: #kms-permissions}
Review the following table to see what permissions you need to work with {{site.data.keyword.bpshort}} key management system.
{: #access-setup}
As the {{site.data.keyword.cloud_notm}} account owner or authorized account administrator. Create an IAM access group for your users and assign service access policies to {{site.data.keyword.bplong_notm}} and the resources that you want your users to work with. {: shortdesc}
-
Invite users to your {{site.data.keyword.cloud_notm}} account.
-
Define your teams and create an IAM access group for each team.
-
Create a resource group for each team. So that you can organize access to their {{site.data.keyword.cloud_notm}} services and workspaces in your account, and bundle them under one common view and billing process. If you want to keep your {{site.data.keyword.bpshort}} workspaces and actions separate from the {{site.data.keyword.cloud_notm}} resources, you must create multiple resource groups.
-
Assign access to your IAM access group. Consider the following guidelines when you assign access to an IAM access group:
- Make sure to scope access of your group to the resource group that you created for this team.
- If you want your team to have access to multiple resource groups. For example, the Administrator and Manager permissions on all resources in resource group A, but Viewer access for the resources in resource group B, you must create multiple access policies.
- The resource group of the {{site.data.keyword.bpshort}} workspaces or action can be different from the resource group of the {{site.data.keyword.cloud_notm}} resources that you want to work with.
- For a team to use {{site.data.keyword.bpshort}}, you must assign the appropriate service access role for {{site.data.keyword.bpshort}}, and the permissions that are needed for the {{site.data.keyword.cloud_notm}} resources that this team manages with {{site.data.keyword.bpshort}}. You can review the documentation for each of the {{site.data.keyword.cloud_notm}} services to find the appropriate IAM access policy.
{: #access-tag}
You can now centrally manage access tags to the {{site.data.keyword.bpshort}} workspaces in your account at scale. Tags contain the metadata values in the form of key and value to help you organize your cloud data. Tags are essential, as it helps to efficiently optimize your workspace within your account. The following step helps to create and associate access tags for {{site.data.keyword.bpshort}} workspaces in your account.
- To create an access tag, see Create an access management tag.
- To associate access tags, see Attach your access management tag to a {{site.data.keyword.bpshort}} workspaces
For more information about managing access tags, see Controlling access to resources by using tags.