- Print
- PDF
Managing App Safer permissions
- Print
- PDF
Available in Classic and VPC
Sub Account is an account management service of NAVER Cloud Platform that allows you to set the access authority for App Safer in various levels. Sub Account provides System managed policies and User created policies for setting management and administration permissions.
Sub Account is a service provided free of charge upon subscription. For more information on Sub Account, see the Services > Management & Governance > Sub Account menu in the NAVER Cloud Platform portal, and Sub Account user guide.
System managed policies
System managed policies are role-based policies defined by NAVER Cloud Platform for user convenience. If you give the System managed policy to a sub account you created with Sub Account, the account can use App Safer. The following is a simple explanation of the System managed policies of App Safer.
Policy name | Policy description |
---|---|
NCP_ADMINISTRATOR | Permission to access the portal and console on NAVER Cloud Platform in the same manner as main accounts |
NCP_INFRA_MANAGER | Permission to use all services in NAVER Cloud Platform and access My Page > Manage notifications in the portal |
NCP_APP_SAFER_MANAGER | Permission to use all the features of App Safer |
NCP_APP_SAFER_VIEWER | Permission to only use the search feature in the App Safer service |
User created policies
User created policies are policies that users may directly create. Once User created policies are granted to a sub account created in Sub Account, that sub account can only use the user-assigned action combinations. The following is a brief description about User created policies of App Safer.
Classification | Action name | Related actions | Resource type | Group by resource type | Action description |
---|---|---|---|---|---|
View | View/getPackageList | - | - | App | View app list |
View | View/getPackageDetail | View/getPackageList | App | App | View package details |
View | View/downloadPackage | View/getPackageList View/getPackageDetail | App | App | Download a packed app or SDK |
View | View/getEvent | View/getPackageList | - | App | View detection history |
Change | Change/unblockDevice | View/getPackageList View/getPackageDetail View/getEvent | App | App | Unblock blocked devices |
Change | Change/updatePackage | View/getPackageList View/getPackageDetail | App | App | Change the policies and status of app |
Change | Change/createPackage | View/getPackageList | - | App | Register a new app |
Change | Change/manageApplication | View/getPackageList View/getPackageDetail | App | App | Stop/Restart the app operation |
Change | Change/deletePackage | View/getPackageList View/getPackageDetail | App | App | Delete app |
Even when you are granted permission for a specific action, if you are not also granted permissions for the related actions that are required, then you won't be able to perform jobs properly. To prevent such issues, Sub Account provides a feature that automatically grants permissions for related actions when granting action permissions. However, if you deselect related actions that are automatically granted, then the system determines that it was done intentionally by the main account user and does not forcibly include them. Thus, be careful when setting permissions.