Managing SourceCommit permissions
    • PDF

    Managing SourceCommit permissions

    • PDF

    Article Summary

    Available in Classic and VPC

    You may set various access permissions for SourceCommit using Sub Account, which is an account management service provided by NAVER Cloud Platform. Sub Account provides System Managed policies and User Created policies for setting management and administration permissions.

    Note

    Sub Account is a service provided free of charge upon subscription request. For more details about Sub Account, refer to the Services > Management & Governance > Sub Account menu in the NAVER Cloud Platform portal, and Sub Account user guide.

    System Managed policies

    System Managed policies are role-based policies defined by NAVER Cloud Platform for user convenience. Once System Managed policies are granted to a sub account created in Sub Account, that sub account can use SourceCommit. The following is a brief description about System Managed policies of SourceCommit.

    PolicyPolicy description
    NCP_ADMINISTRATORPermission to access the portal and console in NAVER Cloud Platform in the same manner as main accounts
    NCP_INFRA_MANAGERPermission to use all services in NAVER Cloud Platform and access My page > Manage notifications in the portal
    NCP_SOURCECOMMIT_MANAGERPermission to use all the features in SourceCommit
    NCP_SOURCECOMMIT_VIEWERPermission to only use the View list and Search features in SourceCommit
    NCP_SOURCECOMMIT_ADMINAdmin permissions template previously managed in SourceCommit. Permission to create the ADMIN permissions policy previously managed in SourceCommit through the Load policy function
    NCP_SOURCECOMMIT_WRITEWRITE permissions template previously managed in SourceCommit. Permission to create the WRITE permissions policy previously managed in SourceCommit through the Load policy function
    NCP_SOURCECOMMIT_READREAD permissions template previously managed in SourceCommit. Permission to create the READ permissions policy managed in SourceCommit through the Load policy function

    User Created policies

    User Created policies are policies that users may create. Once User Created policies are granted to a sub account created in Sub Account, that sub account can only use the user-assigned action combinations. The following is a brief description of User created policies of SourceCommit.

    DivisionActionRelated action(s)Resource typeGroup by resource typeAction description
    ViewView/getRepositoryList--RepositoryView repository list
    ViewView/getRepositoryDetailView/getRepositoryList
    View/accessFileSafer
    View/getGitContents
    Change/changeGitContents
    RepositoryRepositoryView repository details
    ViewView/getGitContentsView/getRepositoryList
    View/getRepositoryDetail
    RepositoryGit RemoteView remote repository (clone, pull, etc.)
    ViewView/getPullRequestListView/getRepositoryList
    View/getRepositoryDetail
    RepositoryPull RequestView pull request list
    ViewView/getPullRequestDetailView/getRepositoryList
    View/getRepositoryDetail
    View/getPullRequestList
    RepositoryPull RequestView pull request details
    ViewView/accessFileSaferView/getRepositoryList
    View/getRepositoryDetail
    View/getPullRequestList
    RepositoryFile SaferConnect to File Safer
    ViewView/getWebhookListView/getRepositoryList
    View/getRepositoryDetail
    -WebhookView webhook list
    ViewView/getCloudFunctionsTriggerListView/getRepositoryList
    View/getRepositoryDetail
    View/getWebhookList
    -WebhookView Cloud Functions Trigger list
    ViewView/getCloudFunctionsActionListView/getRepositoryList
    View/getRepositoryDetail
    View/getWebhookList
    View/getCloudFunctionsTriggerList
    -WebhookView Cloud Functions Action list
    ChangeChange/createRepositoryView/getRepositoryList
    View/accessFileSafer
    RepositoryRepositoryCreate repository
    ChangeChange/importRepositoryView/getRepositoryList
    View/accessFileSafer
    RepositoryRepositoryCopy external repository
    ChangeChange/changeRepositoryView/getRepositoryList
    View/getRepositoryDetail
    View/accessFileSafer
    RepositoryRepositoryChange repository settings
    ChangeChange/deleteRepositoryView/getRepositoryList
    View/getRepositoryDetail
    RepositoryRepositoryDelete repository
    ChangeChange/changeGitPasswordView/getRepositoryListRepositoryGit RemoteSet git account information (password/ssh)
    ChangeChange/changeGitContentsView/getRepositoryList
    View/getRepositoryDetail
    View/getGitContents
    RepositoryGit RemoteEdit remote repository (push, etc.)
    ChangeChange/createPullRequestView/getRepositoryList
    View/getRepositoryDetail
    View/getPullRequestList
    View/getPullRequestDetail
    RepositoryPull RequestCreate pull request
    ChangeChange/changePullRequestView/getRepositoryList
    View/getRepositoryDetail
    View/getPullRequestList
    View/getPullRequestDetail
    RepositoryPull RequestEdit pull request details
    ChangeChange/mergePullRequestView/getRepositoryList
    View/getRepositoryDetail
    View/getPullRequestList
    View/getPullRequestDetail
    RepositoryPull RequestMerge pull request
    ChangeChange/closePullRequestView/getRepositoryList
    View/getRepositoryDetail
    View/getPullRequestList
    View/getPullRequestDetail
    RepositoryPull RequestClose pull request
    ChangeChange/createWebhookView/getRepositoryList
    View/getRepositoryDetail
    View/getWebhookList
    View/getCloudFunctionsTriggerList
    View/getCloudFunctionsActionList
    -WebhookCreate webhook
    ChangeChange/changeWebhookView/getRepositoryList
    View/getRepositoryDetail
    View/getWebhookList
    View/getCloudFunctionsTriggerList
    View/getCloudFunctionsActionList
    RepositoryWebhookChange webhook settings
    ChangeChange/deleteWebhookView/getRepositoryList
    View/getRepositoryDetail
    View/getWebhookList
    RepositoryWebhookDelete webhook
    ChangeChange/createCloudFunctionsTriggerView/getCloudFunctionsTriggerList
    View/getCloudFunctionsActionList
    -WebhookCreate Cloud Functions Trigger
    Caution

    Even when you are granted permissions for a specific action, if you are not also granted permissions for the related actions that are required, you won't be able to perform jobs properly. To prevent such issues, Sub Account provides a function that automatically grants permissions for related actions when granting action permissions. However, if you deselect related actions that are automatically granted, the system determines that it was done intentionally by the main account user and won't forcibly include them. Thus, be careful when setting permissions.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.