Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell ObjectScale 1.3 Administration Guide

IAM Account Management

Account Management enables you to manage IAM identities within each account such as users, groups, and roles.

All IAM entities have a unique ID associated with it. Deleting and re-creating an entity with the same name creates a unique ID for the new entity.

An IAM Account contains other IAM entities like Users, Groups, Roles, Policies, and Service Providers associated with it. You cannot create or modify an Account to have another Account associated with it. Each account consists of replicated IAM entities and local IAM entities. Local IAM entities remain local within the ObjectScale instance and are not replicated. Global entities are replicated to other ObjectScale instances. Replicated IAM entities and local IAM entities have separate APIs.

IAM Identities

Table 1. Identities
Field Description
Account root user
  • Account root user is an admin user in the account.
  • Only the account root user can access the ObjectScale Portal user interface.
  • Account root user is the owner of the buckets and any objects within created by its IAM entities.
IAM user
  • An IAM user is a person or an application in the account that can interact with ObjectScale resources.
  • An IAM user can belong to one or more IAM groups.
  • It is possible to create, view, modify, delete, and list IAM users in ObjectScale using both API and the ObjectScale Portal user interface.
  • IAM users cannot access the ObjectScale Portal user interface.
IAM group
  • An IAM group is a collection of IAM users.
  • IAM groups do not nest and contain only IAM users.
  • IAM groups let you specify permissions for all the users in the group making management easier.
  • Creating and managing groups can be done from both the ObjectScale Portal user interface and API.
  • Tagging on groups is not supported.
IAM role
  • An IAM role is similar to a user, in that it is an identity with permission policies that determine what the identity can and cannot do.
  • An IAM role does not have any credentials that are associated with it.
  • An entity assumes a role by calling an API that provides it with temporary credentials to access a resource.
  • A federated user can assume an IAM role by authenticating with external identity provider.
  • An IAM user can assume a role in the same or different account (cross-account access).
NOTE:IAM and account root users access S3 and IAM APIs using Access Keys. Access Keys are long-term credentials which consist of an access key ID and secret access key. A user can have at most two Access Keys associated with it at any time.

Tagging IAM Entities (Users and Role)

A tag is a label that you assign to a resource. Each tag consists of a key and an optional value, both of which you define. Custom attributes are added to users and roles using a tag key-value pair. These tags can be used to control the access of an entity to resources or to control what tags can be attached to an entity. Groups and policies cannot be tagged. You can apply the same tag to multiple entities. But multiple tags on one entity cannot have the same key. Fifty tags per IAM entity are allowed.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\