Available in Classic and VPC
You can set different access permissions for One Click Multi DRM using NAVER Cloud Platform's Sub Account service. Sub Account offers system-managed (System Managed) policies to help you configure management and operation permissions.
Sub Account is a free service with no additional charges. For more information about Sub Account, see [Services > Management & Governance > Sub Account] on the NAVER Cloud Platform portal and the [Sub Account user guide].
System-managed policies
System-managed policies are pre-built, role-based policies that NAVER Cloud Platform provides for your convenience. When you assign one of these policies to a sub account, that account gets access to One Click Multi DRM. Here are the available system-managed policies for One Click Multi DRM:
| Policy name | Policy description |
|---|---|
| NCP_ADMINISTRATOR | Full access to all services, same as the main account |
| NCP_INFRA_MANAGER | Access to all services, except My Account > Manage Billing Information and Payment > Manage Billing and Payment on the console |
| NCP_FINANCE_MANAGER | Access limited to the Cost Explorer services and My Account > Manage Billing Information and Payment > Manage Billing and Payment on the console |
User-defined policies
User-defined policies let you create custom permissions. When you assign a user-defined policy to a sub account, that account can only perform the specific actions you've allowed.
Here are the available user-defined policies:
| Type | Action | Related action | Resource type | Group by resource type | Action description |
|---|---|---|---|---|---|
| View | getDRMLicenseList | View/getPolicyDetail View/getPolicyList View/getSiteDetail getSiteList |
Site | DRMLicense | View DRM licensing list. |
| View | getDRMLicenseListAsExcel | View/getPolicyDetail View/getPolicyList View/getSiteDetail View/getSiteList |
Site | DRMLicense | View DRM licensing history list in Excel. |
| View | getPolicyAllLogs | - | - | Policy | View full policy logs. |
| View | getPolicyDetail | View/getPolicyList | Policy | Policy | View policy information. |
| View | getPolicyList | - | - | Policy | View policy list. |
| View | getPolicyLogs | - | Policy | Policy | View policy logs. |
| View | getSiteAllLogs | View/getPolicyDetail View/getPolicyList View/getSiteDetail View/getSiteList |
- | Site | View full site logs. |
| View | getSiteDetail | View/getPolicyDetail View/getPolicyList View/getSiteList |
Site | Site | View site information. |
| View | getSiteList | - | - | Site | View site list. |
| View | getSiteLogs | View/getPolicyDetail View/getPolicyList View/getSiteDetail View/getSiteList |
Site | Site | View site logs. |
| Change | blockSite | View/getPolicyDetail View/getPolicyList View/getSiteDetail View/getSiteList |
Site | Site | Forcibly stop a site. |
| Change | copyPolicy | View/getPolicyDetail View/getPolicyList Change/createPolicy |
Policy | Policy | Copy policies. |
| Change | createDRMLicense | View/getPolicyDetail View/getPolicyList View/getSiteDetail View/getSiteList |
Site | DRMLicense | DRM licensing. |
| Change | createPolicy | View/getPolicyList | - | Policy | Create policies. |
| Change | createSite | View/getPolicyDetail View/getPolicyList View/getSiteList |
- | Site | Create sites. |
| Change | deletePolicy | View/getPolicyDetail View/getPolicyList View/getSiteDetail View/getSiteList Change/updateSite |
Policy | Policy | Delete policies. |
| Change | unblockSite | View/getPolicyDetail View/getPolicyList View/getSiteDetail View/getSiteList |
Site | Site | Unblock sites. |
| Change | updatePolicy | View/getPolicyDetail View/getPolicyList |
Policy | Policy | Edit policy settings. |
| Change | updateSite | View/getPolicyDetail View/getPolicyList View/getSiteDetail View/getSiteList |
Site | Site | Edit site settings. |
| Change | Subscribe | - | Site | Site | Subscribe to the service. |
| Change | Unsubscribe | - | Site | Site | Unsubscribe from the service. |
If you grant someone access to a specific action but not to the required related actions, they won't be able to complete their tasks. Sub Account automatically includes these related permissions to prevent this issue. However, if you manually uncheck these auto-selected related actions, the system assumes this was intentional and won't override your selection.