You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: bp_account.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
copyright:
4
4
5
5
years: 2018, 2025
6
-
lastupdated: "2025-01-28"
6
+
lastupdated: "2025-02-05"
7
7
8
8
keywords: organizing resources, organizing resource groups, account best practices, best practices account, access best practice, my resources, administrator, administrator role
9
9
@@ -73,7 +73,7 @@ The following diagram shows how an access policy works:
73
73
The most commonly used roles are viewer, editor, operator, and administrator platform roles.
74
74
75
75
* The viewer role provides the least amount of access for viewing instances and resource groups in an account.
76
-
* The operator role includes actions such as the ability to view instances and manage aliases, bindings, and credentials.
76
+
* The operator role includes actions such as the ability to view instances and manage credentials.
77
77
* The editor role includes actions the same actions of an operator role but also actions for creating, editing, deleting, and binding service instances.
78
78
* The administrator role includes everything for working with a service instance and assigning access to others for that service or instance that the policy is for.
Copy file name to clipboardexpand all lines: iam-roles-overview.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@
3
3
copyright:
4
4
5
5
years: 2015, 2025
6
-
lastupdated: "2023-12-19"
6
+
lastupdated: "2025-02-05"
7
7
8
8
keywords: IAM access, access policy, IAM roles, platform management roles, service access roles, types of access policies
9
9
@@ -25,7 +25,7 @@ All services that are organized in a resource group in your account are managed
25
25
26
26
You can manage and define access based on specific roles for users and resources in your account.
27
27
28
-
* Platform management roles cover a range of actions, including the ability to create and delete instances, manage aliases, bindings, and credentials, and manage access. The platform roles are administrator, editor, operator, viewer. Platform management roles also apply to [account management services](/docs/account?topic=account-account-services&interface=ui#account-management-actions-roles) that enable users to invite users, manage service IDs, access policies, catalog entries, and track billing and usage depending on their assigned role on an account management service.
28
+
* Platform management roles cover a range of actions, including the ability to create and delete instances, manage credentials, and manage access. The platform roles are administrator, editor, operator, viewer. Platform management roles also apply to [account management services](/docs/account?topic=account-account-services&interface=ui#account-management-actions-roles) that enable users to invite users, manage service IDs, access policies, catalog entries, and track billing and usage depending on their assigned role on an account management service.
29
29
30
30
* Service access roles define a user or service’s ability to perform actions on a service instance, such as accessing the console or performing API calls. The most common service access roles are manager, writer, and reader. Each service maps particular actions for working with the service to each of these roles.
31
31
@@ -50,9 +50,9 @@ The following table provides examples for some of the platform management action
50
50
51
51
| Platform management role | One or all IAM-enabled services | Selected service in a resource group | Resource group access |
| Viewer role | View instances, aliases, bindings, and credentials | View only specified instances in the resource group | View resource group |
54
-
| Operator role | View instances and manage aliases, bindings, and credentials | Not applicable | Not applicable |
55
-
| Editor role | Create, delete, edit, and view instances. Manage aliases, bindings, and credentials | Create, delete, edit, suspend, resume, view, and bind only specified instances in the resource group | View and edit name of resource group |
53
+
| Viewer role | View instances and credentials | View only specified instances in the resource group | View resource group |
54
+
| Operator role | View instances and manage credentials | Not applicable | Not applicable |
55
+
| Editor role | Create, delete, edit, and view instances. Manage credentials | Create, delete, edit, suspend, resume, view, and bind only specified instances in the resource group | View and edit name of resource group |
56
56
| Administrator role | All management actions for services | All management actions for the specified instances in the resource group | View, edit, and manage access for the resource group |
57
57
{: row-headers}
58
58
{: caption="Example platform management roles and actions for services in an account" caption-side="top"}
0 commit comments