IBM Cloud Docs
Managing users

Managing users

Create provider organizations to manage API Connect, and map them to IBM Cloud IAM access groups to specify user permissions to the Catalogs and Spaces contained in each provider organization.

In API Connect Reserved, users are grouped into provider organizations. Each provider organization owns a set of assets including APIs, products, catalogs, spaces, and developer portals, and the users who are members of that provider organization can be assigned to roles that determine their level of access to the those assets. User access is managed with the IBM Cloud Identity and Access Management (IAM) service. When a user logs in to a Reserved instance, their permissions are determined by the IAM settings and overwrite any role definitions set in the API Connect UI.

Custom roles are not supported by the IAM service, so if you create custom roles in API Connect, they are deleted the next time each user logs in and their permissions sync with the IAM service.

You must assign a predefined role to each user to ensure they can access your resources. In API Connect, resources are managed in the following hierarchy:

Resource hierarchy
Resource hierarchy

To grant users permissions to the API Connect resources owned by a particular provider organization, add the users to that provider organization. The role that a user is assigned to for the provider organization is inherited by the catalogs within it, and by the spaces within each catalog. You can override this access at the lower levels by assigning the user to a different role. For example, if you only want the user to have Edit access in a particular space, assign the user to the Reader role for the provider organization, and then assign the user to a role with Edit access on the selected space. The user will still have only Reader access to the catalog owning the space, to all other spaces within the same catalog, and to alwildcard l other catalogs and spaces owned by the provider organization.

At a minimum, each user must be assigned at least Reader role on the Reserved instance and on each provider organization that they are allowed to view. Then you can decide what additional roles each should be be assigned to on the provider organization and to each of the catalogs and spaces within it.

Complete the following tasks to grant members of your IBM Cloud account the appropriate access to resources in your Reserved instance.

Creating provider organizations

You can create a single provider organization (for example, in a company with only a few employees) or create multiple provider organizations (for example, different departments in a company with many employees). Some users might belong to multiple provider organizations, and might receive different levels of access with each.

Decide how many provider organizations you need

In API Connect Reserved, all of the members of a provider organization receive the same level of access to API Connect. Review the members of your company's IBM Cloud account and the descriptions of who does what in API Connect, and determine how many provider organizations you need to create.

Create your provider organizations in API Connect

Use the API Connect administration console to create a provider organization and map it to the new IAM access group.

  1. Open the API Connect Reserved instance's administration console.

    a. Log in to IBM Cloud.

    b. On the Dashboard, click Menu icon and select API Management.

    c. In the navigation list, expand API Connect and click Services.

    d. On the Services page, click your Reserved instance's name to open its administration console.

    On the Services page, a Reserved instance is labeled as "infrastructure".

  2. On the administration console's home page, click the Provider organizations tile.

  3. On the Provider organizations page, click Create provider organization.

  4. On the Create provider organization page, provide a Title, select a Resource group, and then click Create.

    The title is the display name of your provider organization; a lowercase version of the title is automatically generated as the provider organization's name for internal use.

Repeat steps 3 and 4 for each additional provider organization. Then, create an IAM access group that will map to each provider organization and define user permissions.

Creating IAM access groups

After you create a provider organization in API Connect, use the IBM Cloud Identity and Access Management (IAM) service to set permissions for it. You can define IAM access groups with policies that determine permissions within each provider organization in API Connect, and then you can add members of your company's IBM Cloud account to the appropriate access groups, which map users to provider organizations.

Determine access needs for users

For each provider organization, you need to create an IAM access group and assign the appropriate permissions. To decide what type of permissions each access group (provider organization) requires, review Table 1 to see how suggested jobs in API Connect map to access roles in IAM.

Each user must be assigned to at least the Reader role on the Reserved instance and on each provider organization that they are allowed to see. If a user can see a provider organization, they can also see all catalogs and spaces within it. Although the user can see all of the catalogs and spaces within the provider organization, they cannot make changes unless you assign them to a role that provides the needed level of permissions for that resource.

Table 1 suggests IAM roles for typical API Connect jobs that users perform. For a complete list of the IAM roles and how they are used in API Connect V10 Reserved, see Managing access.

Mapping API Connect jobs to IAM roles
API Connect job Needs this IAM role Allowed actions
API Developer Service: Writer Create, edit, and publish APIs
API Administrator Service: Manager, Platform: Editor Create, edit, and publish APIs; Full control over data within the service; Modify the service instance
Product Manager Platform: Operator Create, edit, and publish APIs
Administrator Platform: Administrator Full control of the service instance

The IAM service provides roles for both the "platform" (the Reserved instance itself) and the "service" (the product features provided in the Reserved instance). API Connect administrators and API administrators perform tasks that use the platform roles; for example, provisioning a service instance and managing user access to it. Other users perform tasks that use the service roles; for example, creating an API or viewing event analytics.

Create access groups in IAM

In IAM, an access group contains a set of users that are assigned to the same access roles for the same IBM Cloud resource. For your purposes, each access group represents a provider organization and should be assigned to the appropriate access roles for that provider organization.

  1. Log in to IBM Cloud.

  2. On the IBM Cloud Dashboard, locate the "User access" tile and click Manage users.

    The IAM service dashboard opens to the Access (IAM) page.

  3. On the Access (IAM) page, look in the navigation menu and click Access groups.

  4. On the Access groups page, click Create.

  5. In the Create access group box, provide a name and description for the new access group, and then click Create.

Repeat steps 4 and 5 for each access group.

Assign access policies to the access groups

An IAM access policy assigns roles (each role represents a set of permissions) to an access group. You can add one or more roles to each access group in IAM, and you can map one or more access groups to each of your API Connect provider organizations.

  1. On the page for your access group, click the Access policies tab.

  2. On the Access policies tab, click Assign access.

  3. On the Assign access page, select IAM services.

    You are only defining access to API Connect, which is an IAM-enabled service.

  4. For What type of access do you want to assign? select API Connect from the list.

    Your provider organizations only apply to API Connect Reserved.

  5. Select a provider organization:

    a. For Which services do you want to assign access to?, select Services based on attributes.

    b. For Add attributes select Service Instance, plus:

    • In the first list, select string equals.

    • In the second (service instances) list, select the name of the provider organization where you want to apply the access policy.

    The new access policy applies only to the specified provider organization. Mapping the policy directly to a provider organization ensures that you don't accidentally grant users a wider range of permissions to the Reserved instance.

  6. Optionally select one or more catalogs owned by the provider organization.

    If you want to assign access only to particular catalogs (instead of all catalogs within that provider organization), select Resource, plus:

    • In the first list, select string equals.

    • In the second (resources) list, select or type the name of the catalog where you want to apply the access policy. You can use wildcards for strings (*) and numbers (?). For example, to apply the access to all catalogs beginning with "catalog-1" followed by any character (as in catalog-1a, catalog-1b), type "catalog-1*".

    Specify catalog names rather than display titles.

  7. Optionally select one or more spaces within a specified catalog.

    If you want to assign access only to particular spaces within a selected catalog, append "/" plus the space name to the catalog name. Specify space names rather than display titles. You can use wildcards for letters and numbers.

    For example, if you specified catalog-1a in the previous step and now want to include only space-1a within that catalog, update the resource name to "catalog-1a/space-1a".

  8. Select the roles that you want to assign to the members of this access group.

    Click the number next to each role to see the detailed list of permissions that are available with that role.

  9. Select Add to add the selected roles to the access group.

  10. Review the "Access summary" section and click Assign to save the access groups with the access policies.

Next, add users to the access group so that the permissions you just configured can be assigned to them.

Add users to the access group

Adding users to an access group maps them to the provider organization that is associated with that access group, and determines their permissions in API Connect when they log in with that provider organization.

  1. On the page for your access group, click the Users tab.

  2. On the Users tab, click Add users.

    The names of all of the users who belong to your company's IBM Cloud account display.

  3. Select users to be added to the access group.

    You can quickly add all of the users in the list by clicking the checkbox next to Users at the beginning of the table.

  4. At the beginning of the table, click Add to group.

Notifying users that the provider organization is available

When you set up IAM access for your users, there is no automatic notification. After you finish configuring access for a provider organization, you should notify its members so they can start working with API Connect. For example, you could send an email or post a message where your users will see it. You should tell users the following information:

  • The name of the Reserved instance (especially if you provisioned more than one)
  • The name of the provider organization that the user is assigned to
  • Where to find documentation: https://cloud.ibm.com/docs/apiconnect

Each user must log out from IBM Cloud and then log in again for the permission changes to take effect.

IBM Cloud log out
IBM Cloud log out

Managing provider organizations

Use IAM to add and remove users, and to manage their permissions.

When you request the deletion of a provider organization in API Connect V10 Reserved, the provider organization is not immediately removed from the system. This delay is part of the resource reclamation process and might prevent you from recreating the provider organization immediately. If you need to recreate the provider organization immediately after deletion, you can speed up the process by forcing the early reclamation of the deleted provider organization as explained in Using resource reclamations. Additionally, if you decide to restore the deleted provider organization, the resource reclamation process allows for the restoration of resources within a limited time frame.

Assign ownership of a provider organization

Instead of managing all provider organizations yourself, you can designate other users as owners and give them the appropriate access. To assign owner-level access to a provider organization, create an IAM access group that has administrative access to the provider organization, and add the user to that access group.

Manage user permissions

To change a user's permissions in API Connect, either change the roles assigned to the IAM access group containing that user, or move the user to a different access group.

Remove users from a provider organization

To remove a user from a provider organization, delete that user from the corresponding access role in IAM. The next time that the user attempts to log in to the provider organization, the login will not be allowed.

A user who is already logged in to API Connect when you remove them from the access group remains logged in and still has access to the provider organization's assets. To stop the user from working with assets immediately, remove them from all catalog and space memberships within the Reserved instance.