- Print
- PDF
Managing Global DNS permissions
- Print
- PDF
Available in Classic and VPC
By using Sub Account, NAVER Cloud Platform's account management service, you can set various access permissions for Global DNS. Sub Account provides System Managed policies and User Created policies for setting management and administration permissions.
Sub Account is a service provided free of charge upon subscription request. For more details about Sub Account, refer to the Services > Management & Governance > Sub Account menu in NAVER Cloud Platform portal, and Sub Account Guide.
System Managed policies
System Managed policies are role-based policies defined by NAVER Cloud Platform for user convenience. Once System Managed policies are granted to a sub account created in Sub Account, that sub account can use Global DNS. The following is a brief description about System Managed policies of Global DNS.
Policy name | Policy description |
---|---|
NCP_ADMINISTRATOR | Permission to access the portal and console in NAVER Cloud Platform in the same manner as main accounts |
NCP_INFRA_MANAGER | Permission to use all services in NAVER Cloud Platform and access My Page > Manage notifications in the portal |
NCP_GLOBAL_DNS_MANAGER | Permission to use all features of Global DNS |
NCP_GLOBAL_DNS_VIEWER | Permission to only use the View List and Search features of Global DNS |
User Created policies
User-defined policies are policies that users may directly create. Once User Created policies are granted to a sub account created in Sub Account, that sub account can only use the user-assigned action combinations. The following is a brief description about User created policies of Global DNS.
Type | Action name | Related action(s) | Resource type | Group by resource type | Action description |
---|---|---|---|---|---|
View | View/getDomainList | - | - | Global DNS | View domain list |
View | View/getDomainDetail | View/getDomainList | Domain | Global DNS | View domain details |
View | View/getRecordList | View/getDomainList | - | Global DNS | View record list |
View | View/getRecordDetail | View/getDomainList View/getRecordList | Record | Global DNS | View record details |
View | View/getDomainMonitor | - | - | Global DNS | View domain statistics information |
View | View/downloadRecordList | View/getDomainList View/getDomainDetail View/getRecordList View/getRecordDetail | Domain | Global DNS | Download record list as Excel file |
Change | Change/createDomain | View/getDomainList | - | Global DNS | Create new domain |
Change | Change/uploadZonefile | View/getDomainList View/getRecordList View/getRecordDetail Change/createDomain Change/createRecord | Record | Global DNS | Upload zone file to add a large number of domains |
Change | Change/deleteDomain | View/getDomainList View/getDomainDetail | Domain | Global DNS | Delete domain |
Change | Change/createRecord | View/getDomainList View/getRecordList View/getRecordDetail | Record | Global DNS | Create record |
Change | Change/updateRecord | View/getDomainList View/getRecordList View/getRecordDetail | Record | Global DNS | Edit record |
Change | Change/deleteRecord | View/getDomainList View/getRecordList View/getRecordDetail | Record | Global DNS | Delete record |
Change | Change/applyRecordConfig | View/getDomainList View/getDomainDetail View/getRecordList View/getRecordDetail | Domain | Global DNS | Reflect record creation/modification/deletion history |
Change | Change/changeDNSSECstatus | View/getDomainList View/getDomainDetail | Domain | Global DNS | DNSSEC activation/deactivation |
Even when you are granted permission for a specific action, if you are not also granted permissions for the related actions that are required, you won't be able to perform jobs properly. To prevent such issues, Sub Account provides a feature that automatically grants permissions for related actions when granting action permissions. However, if you deselect related actions that are automatically granted, then the system determines that it was done intentionally by the main account user and does not forcibly include them. Thus, be careful when setting permissions.