External Access authentication and permissions management
    • PDF

    External Access authentication and permissions management

    • PDF

    Article summary

    The latest service changes have not yet been reflected in this content. We will update the content as soon as possible. Please refer to the Korean version for information on the latest updates.

    Available in Classic and VPC

    This page provides description on how to authenticate workloads outside NAVER Cloud Platform and manage the permissions required to access NAVER Cloud Platform.

    Authenticate external workload

    To authenticate external workloads and securely provide temporary keys, generate an X.509 certificate using the NCP Private CA service on NAVER Cloud Platform, and manage authentication and authorization through the External Access menu.

    Create Trust Anchor

    This step involves configuring the Trust Anchor to validate the customer's certificate. To create Trust Anchor, follow these steps:

    1. On NAVER Cloud Platform console, click Services > Management & Governance > Sub Account > Sub Accounts in order.
    2. Click the [Create] button on the Trust Anchor tab.
      subaccount-external-access_trustanchor_01_ko
    3. Enter the name and description of the trust anchor you want to create in the Trust Anchor information.
    4. Select the CA to register in the CA information.
      • If no CA has been created, you can proceed by creating one by clicking the Create Private CA button.
    5. After completing the Trust Anchor information and CA information entries, click the [Create] button.
    6. Check the Trust Anchor tab to verify that the trust anchor has been added.
      subaccount-external-access_trustanchor_02_ko

    Create profile and role integrations

    This step involves creating and managing a Profile for accessing NAVER Cloud Platform.
    By mapping the External Access Service Role to the Profile, you can control access to NAVER Cloud Platform resources through the external access service role for authenticated external workloads. To create a Profile, follow these steps:

    1. On NAVER Cloud Platform console, click Services > Management & Governance > Sub Account > Sub Accounts in order.
    2. Click the [Create] button on the Profile tab.
      subaccount-external-access_profile_01_ko
    3. In Profile information, enter the name and notes for the profile you want to create.
    4. In Role information, select role that you want to integrate with the profile.
    5. Set the expiration time for the temporarily issued key in Session information.
    6. Click [Create].
    7. Check the Profile tab to verify that the profile has been added
      subaccount-external-access_profile_02_ko
    Note
    • A role can only be linked to one profile
    • A profile can be created without any roles assigned.
    • The session expiration time can range from 600 seconds (10 minutes) to 43200 seconds (12 hours).

    Subject Activity

    You can manage the detailed usage history of certificates with the same subject attributes through subject activity. Subject activity is automatically generated based on the certificate usage history, to view the usage history follow these steps:

    1. On NAVER Cloud Platform console, click Services > Management & Governance > Sub Account > Sub Accounts in order.
    2. Click Subject that has been created in Subject Activity tab.
    3. Check the information of the created Subject and the certificate usage history.

    Issue temporary keys with Signing Helper

    Once the trust anchor and profile settings are complete, you can issue temporary keys and obtain temporary credentials through Signing Helper CLI.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.