Sub Account resource management
- Print
- PDF
Sub Account resource management
- Print
- PDF
Article Summary
Share feedback
Thanks for sharing your feedback!
Available in Classic and VPC
Check the resource information of Sub Account. All activities that you can perform in Sub Account are mapped with the resource type and task history by resource type (action) defined in Resource Manager. Based on the value mapped, the task history actually performed by users is collected in Cloud Activity Tracer, and the admin can use it when monitoring the users' activities or creating audit reports. In addition, the resource type is used as a standard for usage permissions by user in Sub Account.
The following describes the resource and task history by resource type:
- Resource
- Unit of key information managed by each service
- Object that can be created, changed, and deleted by the user
- Unique value by each service of NAVER Cloud Platform
- Task history by resource type (action)
- History of tasks performed by the user through the console and API
- Act of creating, changing, or deleting resources
The following describes Sub Account's resource type and task history information by resource type:
Service name (product code) | Resource type | Task history by resource type |
---|---|---|
Sub Account(IAM) | Group | Add sub account to group |
Attach policy to group | ||
Create group | ||
Delete group | ||
Delete sub account from group | ||
Detach policy from group | ||
Replace policy to group | ||
Update group | ||
MFA | Delete MFA | |
Register MFA | ||
Update MFA | ||
Policy | Create policy | |
Delete policy | ||
Update policy | ||
Role | Attach Entities To Role | |
Attach Policies To Role | ||
Attach Role To Entities | ||
Create Role | ||
Create STS credentials | ||
Delete Role | ||
Detach Entities From Role | ||
Detach Policies From Role | ||
Detach Role From Entities | ||
Replace Policies To Role | ||
Suspend Role | ||
Switch To Role | ||
Switch to Role with SSO | ||
Unsuspend Role | ||
Update Role | ||
SubAccount | Add sub account to group | |
Attach policy to sub account | ||
Change password | ||
Create STS credentials | ||
Create access key | ||
Create sub account | ||
Delete sub account from group | ||
Detach policy from sub account | ||
Disable access key | ||
Enable access key | ||
Expire STS Credentials | ||
Login | ||
Remove api key | ||
Remove sub account | ||
Replace policy to sub account | ||
Reset secondary authentication | ||
Suspend sub account | ||
Unsuspend sub account | ||
Update accessKey access control rules | ||
Update console access control rules | ||
Update sub account | ||
Tenant | Delete login url | |
Update login url | ||
Update password expiration settings | ||
Update session expiration settings |
Note
- Resource Manager: it is a service provided by NAVER Cloud Platform for free. For more information on how to use the service, see the Resource Manager user guide.
- Cloud Activity Tracer: it is a service provided by NAVER Cloud Platform for free. For more information on how to use the service, see the Cloud Activity Tracer user guide.
- Sub Account: it is a service provided by NAVER Cloud Platform for free. The permissions are designed based on the resource type defined in Resource Manager. However, because the resource type group and the action by resource type are configured in Sub Account, they differ from the group and action values defined in Resource Manager.
Was this article helpful?