Managing Search Engine Service permissions
    • PDF

    Managing Search Engine Service permissions

    • PDF

    Article Summary

    Available in VPC

    By using Sub Account, NAVER Cloud Platform's account management service, you can set various access permissions for Search Engine Service. Sub Account provides System Managed policies and User Created policies for setting management and administration permissions.

    Note

    Sub Account is a service provided free of charge upon subscription request. For more details about Sub Account, refer to the Service > Management & Governance > Sub Account menu in the NAVER Cloud Platform portal, as well as the Sub Account Guide.

    System Managed policies

    System Managed policies are role-based policies defined by NAVER Cloud Platform for user convenience. Once System Managed policies are granted to a sub account created in Sub Account, that sub account can use Search Engine Service. The following is a brief description about System Managed policies of Search Engine Service.

    Policy namePolicy description
    NCP_ADMINISTRATORPermission to access the portal and console in NAVER Cloud Platform in the same manner as main accounts
    NCP_INFRA_MANAGERPermission to use all services in NAVER Cloud Platform and access My Page > Manage notifications in the portal
    NCP_VPC_SEARCH_ENGINE_SERVICE_MANAGERPermission to use all features of Search Engine Service.
    NCP_VPC_SEARCH_ENGINE_SERVICE_VIEWERPermission to only use the View list and Search features in Search Engine Service.

    User Created policies

    User Created policies are policies that users may create. Once User Created policies are granted to a sub account created in Sub Account, that sub account can only use the user-assigned action combinations. The following is a brief description about User Created policies of Search Engine Service.

    ClassificationAction nameRelated action(s)Resource typeGroup by resource typeAction description
    ViewView/getBucketList--ViewCheck bucket list
    ViewView/getClusterACGDetail-ClusterViewView ACG detailed list
    ViewView/getClusterNodeListView/getClusterDetail
    View/getClusterList
    ClusterViewCheck cluster data node information
    ViewView/getClusterDetailView/getClusterListClusterViewCheck cluster details
    ViewView/getClusterList--ViewView cluster list
    ViewView/getDataImportHistoryView/getClusterDetail
    View/getClusterList
    ClusterViewCheck cluster data import history
    ViewView/getSearchEngineClusterMonitorView/getClusterDetail
    View/getClusterList
    View/getClusterNodeList
    ClusterViewCheck cluster monitoring information
    ViewView/getLoginKeyList--ViewView authentication key list
    ViewView/getObjectListView/getBucketListObjectStorage:BucketViewCheck the list and details of the objects in the bucket
    ViewView/getSnapshotHistoryView/getClusterDetail
    View/getClusterList
    ClusterViewCheck cluster snapshot history
    ViewView/getSnapshotSchedulingHistoryView/getBucketList
    View/getClusterDetail
    View/getClusterList
    View/getSnapshotHistory
    ClusterChangeView snapshot schedule creation history
    ViewView/getSubnetDetailView/getSubnetListVPC:SubnetViewView subnet detailed list
    ViewView/getSubnetList--ViewView subnet list
    ViewView/getVPCDetailView/getVPCListVPC:VPCViewView VPC detailed list
    ViewView/getVPCList--ViewView VPC list
    ViewView/getNodeSpecDetailView/getClusterDetail
    View/getClusterList
    ClusterViewView cluster changeable specs
    ChangeChange/changeCountOfDataNodeView/getClusterDetail
    View/getClusterList
    ClusterChangeAdd node to cluster
    ChangeChange/createDataImportJobView/getBucketList
    View/getDataImportHistory
    View/getClusterDetail
    View/getClusterList
    View/getObjectList
    ClusterChangeExecute data import
    ChangeChange/createSearchEngineClusterView/getSubnetList
    View/getLoginKeyList
    View/getSubnetDetail
    View/getClusterList
    View/getVPCDetail
    View/getVPCList
    -ChangeCreate cluster
    ChangeChange/createLoginKey--ChangeCreate cluster access authentication key
    ChangeChange/createSnapshotView/getBucketList
    ObjectStorage:Change/writeObject
    View/getClusterDetail
    View/getClusterList
    View/getSnapshotHistory
    ClusterChangeCreate snapshot of cluster
    ChangeChange/deleteSearcnEngineClusterView/getClusterDetail
    View/getClusterList
    ClusterChangeDelete cluster
    ChangeChange/manageLoginKeyView/getLoginKeyList
    View/getClusterDetail
    View/getClusterList
    -ChangeManage cluster access authentication key
    ChangeChange/releaseSnapshotSchedulingView/getClusterDetail
    View/getClusterList
    View/getSnapshotSchedulingHistory
    View/getSnapshotHistory
    ClusterChangeRemove snapshot scheduling settings
    ChangeChange/resetSearchEngineUserPasswordView/getClusterDetail
    View/getClusterList
    ClusterChangeChange Search Engine access password
    ChangeChange/restartSearcnEngineClusterView/getClusterDetail
    View/getClusterList
    ClusterChangeRestart cluster
    ChangeChange/setSnapshotSchedulingView/getBucketList
    Change/createSnapshot
    View/getClusterDetail
    View/getClusterList
    View/getSnapshotSchedulingHistory
    View/getSnapshotHistory
    ClusterChangeSet snapshot scheduling
    ChangeChange/stopDataImportJobView/getDataImportHistory
    View/getClusterDetail
    View/getClusterList
    ClusterChangeStop data import task.
    ChangeChange/updateAPIAuthenticationKeyView/getClusterDetail
    View/getClusterList
    View/getSnapshotHistory
    ClusterChangeSet API authentication key to cluster for accessing Object Storage
    ChangeChange/changSpecOfNodeView/getClusterDetail
    View/getClusterList
    View/getNodeSpecDetail
    ClusterChangeChange cluster node specifications
    Caution

    Even when you are granted permission for a specific action, if you are not also granted permissions for the related actions that are required, then you won't be able to perform jobs properly. To prevent such issues, Sub Account provides a feature that automatically grants permissions for related actions when granting action permissions. However, if you deselect related actions that are automatically granted, then the system determines that it was done intentionally by the main account user and does not forcibly include them. Thus, be careful when setting permissions.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.