Creating a User and Granting ECS Permissions

Use IAM to implement fine-grained permissions control over your ECSs. With IAM, you can:

  • Create IAM users for employees based on your enterprise's organizational structure. Each IAM user will have their own security credentials for accessing ECS resources.

  • Grant only the permissions required for users to perform a specific task.

  • Entrust accounts or cloud services to perform efficient O&M on your ECS resources.

If your account does not need individual IAM users, skip this section.

This section describes the procedure for granting permissions (see Process Flow).

Prerequisites

Before assigning permissions to user groups, you should learn about system policies supported by ECS and select the policies based on service requirements.

For more information about system policies supported by ECS, see Permissions Management.

Process Flow

**Figure 1** Process for granting ECS permissions

Figure 1 Process for granting ECS permissions

  1. Create a user group and assign permissions to it.

    Create a user group on the IAM console, and attach the ECSReadOnlyAccess policy to the group.

  2. Create an IAM user.

    Create a user on the IAM console and add the user to the group created in 1.

  3. Log in and verify permissions.

    Log in to the ECS console by using the created user, and verify that the user only has read permissions for ECS.

    • Choose Service List > Elastic Cloud Server. Then click Create ECS on the ECS console. If a message appears indicating that you have insufficient permissions to perform the operation, the ECS ReadOnlyAccess policy has already taken effect.

    • Choose any other service in Service List. If a message appears indicating that you have insufficient permissions to access the service, the ECSReadOnlyAccess policy has already taken effect.