Managing Cloud Advisor permissions
    • PDF

    Managing Cloud Advisor permissions

    • PDF

    Article Summary

    Available in VPC

    By using Sub Account, NAVER Cloud Platform's account management service, you can set various access permissions for Cloud Advisor. Sub Account provides System-Managed policies and User-Created policies for setting management and administration permissions.
    Note

    Sub Account is a service provided free of charge upon subscription request. For more details about Sub Account, refer to the Services > Management & Governance > Sub Account menu in the NAVER Cloud Platform portal, and Sub Account user guide.

    System-managed policies

    System-managed policies are role-based policies defined by the NAVER Cloud Platform for user convenience. Once System-managed policies are granted to a sub account created in Sub Account, that sub account can use Cloud Advisor. The following is a brief description about System Managed policies of Cloud Advisor.

    Policy namePolicy description
    NCP_ADMINISTRATORPermission to access the portal and console in NAVER Cloud Platform in the same manner as main accounts
    NCP_INFRA_MANAGERPermission to use all services in NAVER Cloud Platform and access My Page > Manage notifications in the portal
    NCP_VPC_CLOUD_ADVISOR_MANAGERPermission to use all features of Cloud Advisor
    NCP_VPC_CLOUD_ADVISOR_VIEWERPermission to only use the View list and Search features in Cloud Advisor

    User-created policies

    User-created policies are policies that users may create. Once User-created policies are granted to a sub account created in Sub Account, that sub account can only use the user-assigned action combinations. The following is a brief description of the user-created policies of Cloud Advisor.

    DivisionAction nameRelated action(s)Resource typeGroup by resource typeAction description
    ViewView/getNotification---Views weekly email recipient
    ViewView/getResultOfCostCheck---Checks performed expense and high utilization check result
    ViewView/getResultOfSecurityCheck---Checks performed security check result
    ChangeChange/adjustCostCheckTargetView/getResultOfCostCheck
    Change/refreshCostCheck
    --Excludes or includes target resources on expense and high utilization checklist.
    ChangeChange/adjustSecurityCheckTargetChange/refreshSecurityCheck
    View/getResultOfSecurityCheck
    --Excludes or includes target resources of security checklist
    ChangeChange/manageNotification---Sets weekly email recipient
    ChangeChange/refreshCostCheckView/getResultOfCostCheck--Expense and high utilization check execution request
    ChangeChange/refreshSecurityCheckView/getResultOfSecurityCheck--Security check execution request
    ChangeChange/subscribeProduct---Request subscription or cancel subscription of Cloud Advisor.
    Caution

    Even when you are granted permission for a specific action, if you are not also granted permissions for the related actions that are required, then you won't be able to perform jobs properly. To prevent such issues, Sub Account provides a feature that automatically grants permissions for related actions when granting action permissions. However, if you deselect related actions that are automatically granted, then the system determines that it was done intentionally by the main account user and won't forcibly include them. So, be cautioned when setting permissions.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.