Skip to content

Latest commit

 

History

History
73 lines (47 loc) · 4.46 KB

quickstart.md

File metadata and controls

73 lines (47 loc) · 4.46 KB
copyright lastupdated
years
2017
2017-11-16

{:shortdesc: .shortdesc} {:codeblock: .codeblock} {:screen: .screen} {:new_window: target="_blank"}

Getting started tutorial

{: #getstarted}

This tutorial is intended to help you get up and running quickly with IBM Cloud Identity and Access Management (IAM) by inviting users to your account and assigning Cloud IAM access to those users.

This tutorial is for IAM-managed resources. For services that do not support creating Cloud IAM policies for managing access, you can use Cloud Foundry access.

Step 1: Invite users and assign initial access

You can invite a one or multiple users and set an initial access policy for the users on the invitation. If you invite multiple users in one invitation, the same access is assigned to each of the users. In the Access section of the Invite users page, you only see the sections that you are permitted to assign.

As the account owner, you can assign Cloud IAM roles for users that you invite in the Services section. You can provide access to all resources in a resource group, all resources for a specific service in a resource group, all Identity and Access enabled services in the account, or a single resource in the initial policy that you assign in the invitation:

  1. Go to Manage > Security > Identity and Access, and then select Users.
  2. Click Invite users.
  3. Specify the email address of the users that you want to invite.
  4. In the Access section, expand the Services option.
  5. Choose to assign access to a Resource or to resources within a Resource group.
  6. Depending on your selection, follow the prompts to specify the access to an individual service instance, all Identity and Access enabled services, all resources in a resource group, or to a specific service within the selected resource group. If you selected the resource group option, you can also provide the user with access to view, edit, or manage access to the resource group by selecting a role for access to the resource group.
  7. If you have permission, you can also assign Cloud Foundry or infrastructure access on the invitation.
  8. Click Invite users.

For more information, see Inviting users and assigning access.

Step 2: Manage access for existing users

After you have invited users and assigned initial access, you might want to assign additional access or edit the initial access that you assigned to ensure all of the users in your account have the desired level of access.

Assigning new access

You can assign access to a user for a resource group or a single resource.

  1. From the menu bar, click Manage > Security > Identity and Access, and then select Users.
  2. Click the name of the user that you want to assign access.
  3. Click Assign access.
  4. Choose how you want to assign access:
    • Select Assign access within a resource group to assign access to all resources within a group or to just resources for a specific service within a group. You can also provide the user with access to view, edit, or manage access to the resource group by selecting a role for access to the resource group. Select No access if you want the user to only have access to the specified resource and not the group that it is organized in.
    • Select Assign access to resources to assign access to all Identity and Access enabled resources across the account, all resources of a specific service across the account, a single instance, or a single resource within a specific service instance.
  5. Select any combination of roles to define the scope of access. See Cloud IAM roles for more information.
  6. Click Assign.

Editing existing access

You can update existing access by editing the assigned roles for a user.

  1. From the menu bar, click Manage > Security > Identity and Access, and then select Users.
  2. Select the name of the user that you want to edit access for.
  3. From the row for the policy that you want to edit, click Edit policy from the Actions menu.
  4. Edit the policy by updating the assigned roles.
  5. Click Save.

You can remove access from a user by clicking the Remove option from the Actions menu for the policy that you want to remove.

Next steps

Learn what else you can do with Cloud IAM by checking out the Cloud IAM features list.