Available in Classic and VPC
You can set access permissions for Pinpoint Cloud using Sub Account, NAVER Cloud Platform's account management service. Sub Account offers both system-managed (System Managed) and user-defined (User Created) policies to help you configure management and operation permissions.
Sub Account is a free service with no additional charges. For more information about Sub Account, see Services > Management & Governance > Sub Account menu on the NAVER Cloud Platform portal and the Sub Account user guide.
System-managed policies
System-managed policies are pre-built, role-based policies that NAVER Cloud Platform provides for your convenience. A sub-account created through the Sub Account service can be granted access to Pinpoint Cloud by assigning a system-managed policy. Listed below are brief descriptions of the system-managed policies for Pinpoint Cloud.
| Policy name | Policy description |
|---|---|
| NCP_ADMINISTRATOR | Full access to all services, same as the main account |
| NCP_INFRA_MANAGER | Access to all services, except My Account > Billing and Cost Management > Billing and Payments in the console |
| NCP_FINANCE_MANAGER | Access only to Cost Explorer and My Account > Billing and Cost Management > Billing and Payments in the console |
| NCP_PINPOINT_CLOUD_MANAGER | Full access to all features of the Pinpoint Cloud service |
| NCP_PINPOINT_CLOUD_VIEWER | Read-only access to the Pinpoint Cloud service |
User-defined policies
User-defined policies let you create custom permissions. When you assign a user-defined policy to a sub account, that account can only perform the specific actions you've allowed. Here are the available user-defined policies for Pinpoint Cloud:
| Type | Action | Related action | Resource type | Group by resource type | Action description |
|---|---|---|---|---|---|
| View | View/getRepositoryList | Repository | View a list of repositories | ||
| View | View/getRepositoryUsage | View/getRepositoryList | Repository | View usage by repository | |
| Change | Change/createRepository | View/getRepositoryList | Repository | Create a repository | |
| Change | Change/deleteRepository | View/getRepositoryList | Repository | Repository | Delete a repository |
If you grant someone access to a specific action but not to the required related actions, they won't be able to complete their tasks. Sub Account automatically includes these related permissions to prevent this issue. However, if you manually uncheck these auto-selected related actions, the system assumes this was intentional and won't override your selection.